Search results for: national security exception
5470 Problems and Prospects of an Intelligent Investment in Kazakh Society
Authors: Sultanbayeva Gulmira Serikbayevna, Golovchun Aleftina Anatolyevna
Abstract:
The development of any nation is directly related to the development of human capital in it. A human development is an increase its intellectual potential, its compliance with the requirements of time, present and future society. Demands of globalization cannot limit the processes of national traditions. The education system must be formed on the basis of international practice of cultural development. In Kazakhstan, where modernization changes are rapidly developing, the education system should be formed in two ways: first, on a national basis, and secondly, based on global best practices. There is the need to recognize and promote the importance of education as a value. The world community considers the problem of spiritual values. Along with individual values, spiritual values are also universal values. Formation of values such as the presence in young people a sense of respect for their homeland, social responsibility, respect the culture and traditions of its people is the most important task than the possession of material goods. When forming the intellectual nation, values in the field of education and science become investments for the development of the society, as well as education and science today transformed into the most important capital.Keywords: human capital, humanitarian technology, intangible assets, intelligent nation, society of knowledge
Procedia PDF Downloads 3185469 Period Poverty: An Analysis of Sustainable Solutions to a Global Problem
Authors: Antonella Regueiro Fernandez
Abstract:
This paper examines the issue of period poverty and the innovative approaches – or lack thereof – that national systems are using to tackle the issue. Through a systems-thinking and economical approach, the paper analyzes the intricate relationship between proper systemic change and sustainable innovations for this global problem. The first part of the research introduces period poverty and the lack of sustainable options currently in place to resolve the issue. The second part delves into a comparison of existing technologies – single-use and reusable period products -- and their benefits and deficiencies. It also provides a comparison of two countries and their existing solutions landscape (Scotland and the United States), arguing that while Scotland has provided an innovative national solution to the problem, it still lacks a proper assessment of the issue of sustainability, while the United States continues to lag in offering any holistic solution at all. The last part provides a conclusion to the research and affirms the importance of holistic policymaking approaches to issues of period poverty, which have the potential to truly benefit half of the world’s population while also encouraging environmental preservation.Keywords: gender equity, sustainability, period poverty, SDGs, sustainable development
Procedia PDF Downloads 1225468 Contemporary Malayalam Independent Cinema: Limited Location Storytelling and It’s Prominence in the Pandemic Era.
Authors: Krishnanunni S.
Abstract:
The COVID-19 Pandemic has had an impact on every part of our lives, and the film industry is no exception. The restrictions the pandemic has brought made filmmakers confine their films to limited spaces. In India, Malayalam cinema was the first to incorporate the pandemic into its stories and started producing films within existing constraints. The purpose of this study was to study how the limited location storytelling concept influenced Malayalam independent and lockdown films. To answer this question, the three of the most popular films that we shot during the pandemic: The Great Indian Kitchen, Joji and Joyful Mystery, were dissected through text analysis and in-depth interviews were conducted with the makers of The Great Indian Kitchen and Joyful Mystery. The study revealed that the pandemic had had an influence on the way filmmakers visualize their stories and shoot them, especially while working within the restrictions of the pandemic. It was also observed that working with limited locations was the only way for filmmakers to make films during the times of pandemic. But rather than a hindrance to their work, filmmakers saw it as a new possibility to create in times of confinement. The findings of this study expanded the work of previous researchers about films shot in limited locations and the significant changes the pandemic has brought to the film industry.Keywords: limited location storytelling, pandemic, pandemic restrictions, lockdown cinema, pandemic films, Malayalam cinema, OTT revolution, cinema, films
Procedia PDF Downloads 785467 Effectiveness of the Resistance to Irradiance Test on Sunglasses Standards
Authors: Mauro Masili, Liliane Ventura
Abstract:
It is still controversial in the literature the ultraviolet (UV) radiation effects on the ocular media, but the World Health Organization has established safe limits on the exposure of eyes to UV radiation based on reports in literature. Sunglasses play an important role in providing safety, and their lenses should provide adequate UV filters. Regarding UV protection for ocular media, the resistance-to-irradiance test for sunglasses under many national standards requires irradiating lenses for 50 uninterrupted hours with a 450 W solar simulator. This artificial aging test may provide a corresponding evaluation of exposure to the sun. Calculating the direct and diffuse solar irradiance at a vertical surface and the corresponding radiant exposure for the entire year, we compare the latter with the 50-hour radiant exposure of a 450 W xenon arc lamp from a solar simulator required by national standards. Our calculations indicate that this stress test is ineffective in its present form. We provide evidence of the need to re-evaluate the parameters of the tests to establish appropriate safe limits against UV radiation. This work is potentially significant for scientists and legislators in the field of sunglasses standards to improve the requirements of sunglasses quality and safety.Keywords: ISO 12312-1, solar simulator, sunglasses standards, UV protection
Procedia PDF Downloads 1975466 Support and Development of SMEs in the Slovak Republic: Selected Issues
Authors: Alexander Kelisek, Stanislava Strelcova
Abstract:
Developing of business in small and medium-sized enterprises (SMEs) is a specific especially for its flexibility and rapid adaptation to the conditions of turbulent market environment compared to large enterprises. Therefore, an importance of SMEs is growing rapidly in Slovakia but also in other EU countries. Small and medium enterprises are characterized by transparent organizational structure, as it allows the realization of direct management and information flow without significant negative aspects. In the national economy small and medium-sized enterprises represent a significant potential when performs a several important functions (e.g. social, economic, export-import, etc.) The significance of these enterprises is not only at national, but also at transnational level. Importance of SMEs is also aware of the EU, which declared this statement in a key document for SMEs called Small Business Act. In this document, SMEs are characterized, as the backbone of the EU economy and also as a key source of jobs opportunities. In addition to these aspects, SMEs attaches high innovation and development potential. The authors of the article are dealing with the current status of SMEs development in the Slovak Republic and highlight the current challenges that entrepreneurs face in their small and medium enterprises.Keywords: small and medium enterprises (SMEs), business support, SMEs development, SMEs funding
Procedia PDF Downloads 3045465 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure
Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar
Abstract:
Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor
Procedia PDF Downloads 3485464 Measuring the Full Impact of Culture: Social Indicators and Canadian Cultural Policy
Authors: Steven Wright
Abstract:
This paper argues that there is an opportunity for PCH to further expand its relevance within the Canadian policy context by taking advantage of the growing international trend of using social indicators for public policy evaluation. Within the mandate and vision of PCH, there is an incomplete understanding of the value that the arts and culture provide for Canadians, specifically with regard to four social indicators: community development, civic engagement, life satisfaction, and work-life balance. As will be shown, culture and the arts have a unique role to play in such quality of life indicators, and there is an opportunity for PCH to aid in the development of a comprehensive national framework that includes these indicators. This paper lays out approach to understanding how social indicators may be included in the Canadian context by first illustrating recent trends in policy evaluation on a national and international scale. From there, a theoretical analysis of the connection between cultural policy and social indicators is provided. The second half of the paper is dedicated to explaining the shortcomings of Canadian cultural policy evaluation in terms of its tendency to justify expenditures related to arts and cultural activities in purely economic terms, and surveying how other governments worldwide are leading the charge in this regard.Keywords: social indicators, evaluation, cultural policy, arts
Procedia PDF Downloads 2965463 AI as a Tool Hindering Digital Education
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.Keywords: AI, digital education, education tools, motivation and engagement
Procedia PDF Downloads 285462 The Global Economic System and the Third World Development
Authors: Monday Dickson
Abstract:
Shortly before the end of the second world war, allied leaders and other western powers designed an economic regime that would foster, among other things, global economic reconstruction, prosperity and overall development of countries of the world. They founded both the World Bank and the International Monetary Fund (IMF), with a general consensus that while the latter should specialize in monitoring global and national economies and acting as a lender of last resort, the former should focus on fighting poverty and promoting development. In setting the rules for world trade, the General Agreement on Trade and Tariffs (GATT) evolved into the World Trade Organisation (WTO). This paper, therefore, examines the impact of the activities of these institutions on the transformation and development aspirations of countries of the Third World. The study adopts the descriptive and analytical methods of investigation and derived relevant secondary data from books, journal articles, encyclopedia as well as reports from countries of the Third World. Findings show that rather than fostering poverty reduction and overall development as envisaged, the activities of global economy system leads to the “development of underdevelopment” of the Third World Countries. The strategic options that are available to countries of the Third World derived from the ability of the national governments to develop programmes of systematic exploration and exploitation of vital indices of relations with strategic countries to advance their development agenda.Keywords: development, global economic system, prosperity, third world
Procedia PDF Downloads 4465461 The Association between Acupuncture Treatment and a Decreased Risk of Irritable Bowel Syndrome in Patients with Depression
Authors: Greg Zimmerman
Abstract:
Background: Major depression is a common illness that affects millions of people globally. It is the leading cause of disability and is projected to become the number one cause of the global burden of disease by 2030. Many of those who suffer from depression also suffer from Irritable Bowel Syndrome (IBS). Acupuncture has been shown to help depression. The aim of this study was to investigate the effectiveness of acupuncture in reducing the risk of IBS in patients with depression. Methods: We enrolled patients diagnosed with depression through the Taiwanese National Health Insurance Research Database (NHIRD). Propensity score matching was used to match equal numbers (n=32971) of the acupuncture cohort and no-acupuncture cohort based on characteristics including sex, age, baseline comorbidity, and medication. The Cox regression model was used to compare the hazard ratios (HRs) of IBS in the two cohorts. Results: The basic characteristics of the two groups were similar. The cumulative incidence of IBS was significantly lower in the acupuncture cohort than in the no-acupuncture cohort (Log-rank test, p<0.001). Conclusion: The results provided real-world evidence that acupuncture may have a beneficial effect on IBS risk reduction in patients with depression.Keywords: acupuncture, depression, irritable bowel syndrome, national health insurance research database, real-world evidence
Procedia PDF Downloads 1065460 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District
Authors: Abha Gupta, Deepak K. Mishra
Abstract:
Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.Keywords: dietary diversity, food Security, India, socio-economic groups
Procedia PDF Downloads 3405459 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters
Authors: Vikram Chowdhary, Marek Vins
Abstract:
The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID
Procedia PDF Downloads 1105458 Development of Doctoral Education in Armenia (1990 - 2023)
Authors: Atom Mkhitaryan, Astghik Avetisyan
Abstract:
We analyze the developments of doctoral education in Armenia since 1990 and the management process. Education and training of highly qualified personnel are increasingly seen as a fundamental platform that ensures the development of the state. Reforming the national institute for doctoral studies (aspirantura) is aimed at improving the quality of human resources in science, optimizing research topics in accordance with the priority areas of development of science and technology, increasing publication and innovative activities, bringing national science and research closer to the world level and achieving international recognition. We present a number of defended dissertations in Armenia during the last 30 years, the dynamics and the main trends of the development of the academic degree awarding system. We discuss the possible impact of reforming the system of training and certification of highly qualified personnel on the organization of third–level doctoral education (doctoral schools) and specialized / dissertation councils in Armenia. The results of the SWOT analysis of doctoral education and academic degree awarding processes in Armenia are shown. The article presents the main activities and projects aimed at using the advantages and strong points of the National Academy network in order to improve the quality of doctoral education and training. The paper explores the mechanisms of organizational, methodological and infrastructural support for research and innovation activities of doctoral students and young scientists. There are also suggested approaches to the organization of strong networking between research institutes and foreign universities for training and certification of highly qualified personnel. The authors define the role of ISEC in the management of doctoral studies and the establishment of a competitive third-level education for the sphere of research and development in Armenia.Keywords: doctoral studies, academic degree, PhD, certification, highly qualified personnel, dissertation, research and development, innovation, networking, management of doctoral school
Procedia PDF Downloads 635457 Cultural Competence of Philippine National Police Personnel
Authors: Nestor C. Nabe, Melvie F. Bayog
Abstract:
The cultural competence of police officers can lead to effective law enforcement and gain respect to their organization. This study evaluated the level of cultural competence of Philippine National Police Personnel in Midsayap, Cotabato, Philippines. Descriptive survey research design was used in this study. The survey utilized an adapted questionnaire to measure the level of cultural competence of the respondents. Questionnaires were administered to 305 ethnic minorities coming from the four major ethnic tribes in Midsayap, Cotabato, Philippines. The data gathered were treated using Percentage, Mean, T-test and Analysis of Variance (ANOVA). The findings are as follows: the level of cultural competence of police personnel is moderate; and, there is no significant difference in the cultural competence of the police personnel when analyzed by age, gender, civil status and, occupation while there is a significant difference analyzed by educational attainment and ethnic tribe. Based on the findings, the following conclusions were drawn: the level of cultural competence of police personnel is only manifested sometimes; and, civil status, and occupation has no significant difference in the cultural competence of police personnel while educational attainment and ethnic tribe has a significant difference.Keywords: competence, cultural, Philippines, police
Procedia PDF Downloads 3455456 Design and Evaluation of an Online Case-Based Library for Technology Integration in Teacher Education
Authors: Mustafa Tevfik Hebebci, Ismail Sahin, Sirin Kucuk, Ismail Celik, Ahmet Oguz Akturk
Abstract:
ADDIE is an instructional design model which has the five core elements: analyze, design, develop, implement, and evaluate. The ADDIE approach provides a systematic process for the analysis of instructional needs, the design and development of instructional programs and materials, implementation of a program, and the evaluation of the effectiveness of an instruction. The case-based study is an instructional design model that is a variant of project-oriented learning. Collecting and analyzing stories can be used in two primary ways -perform task analysis and as a learning support during instruction- by instructional designers. Besides, teachers use technology to develop students’ thinking, enriching the learning environment and providing permanent learning. The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for the interactive case-based library. This web-based library contains the navigation menus as the follows: “Homepage”, "Registration", "Branches", "Aim of The Research", "About TPACK", "National Project", "Contact Us", etc. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. In addition, they encouraged to rate and comment on the case-studies. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology in education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.Keywords: design, ADDIE, case based library, technology integration
Procedia PDF Downloads 4795455 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa
Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba
Abstract:
The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)
Procedia PDF Downloads 3555454 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 665453 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads
Authors: Gaurav Kumar Sinha
Abstract:
In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies
Procedia PDF Downloads 685452 Prevention of Ragging and Sexual Gender Based Violence (SGBV) in Higher Education Institutions in Sri Lanka
Authors: Anusha Edirisinghe
Abstract:
Sexual Gender based violence is a most common social phenomenon in higher education institutions. It has become a hidden crime of the Universities. Masculinities norms and attitudes are more influential and serve as key drivers and risk for ragging and SGBV. This research will reveal that in Sri Lankan universities, SGBV takes from the violence and murder of women students, assault and battery coerced sex, sexual harassment including harassment via information technology. This study focus is to prevention of ragging and SGBV in University system. Main objective of this paper describes and critically analyses of plight of ragging and SGBV in higher education institutions and legal and national level policy implementation to prevent these crimes in society. This paper is with special reference to ragging case from University of Kelaniya 2016. University Grant commission introduced an Act for the prevention of Ragging and gender standing committee established in Sri Lanka in 2016. And each university has been involved in the prevention of SGBV and ragging in higher education institutions. Case study from first year female student, reported sexual harassment was reported to the police station in May in 2016. After this case, the university has been implementing emergency action plan, short term and long term action plan. Ragging and SGBV task force was established and online complaint center opened to all students and academic and non- academics. Under these circumstances student complained to SGBV and other harassment to the university. University security system was strong support with police and marshals, and vigilant committees including lecturers. After this case all universities start to several programmes to stop violence in universityKeywords: higher Education, ragging, sexual gender-based violence, Sri Lanka
Procedia PDF Downloads 3805451 Thermal Behavior of Green Roof: Case Study at Seoul National University Retentive Green Roof
Authors: Theresia Gita Hapsari
Abstract:
There has been major concern about urban heating as urban clusters emerge and population migration from rural to urban areas continues. Green roof has been one of the main practice for urban heat island mitigation for the past decades, thus, this study was conducted to predict the cooling potential of retentive green roof in mitigating urban heat island. Retentive green roof was developed by Han in 2010. It has 320 mm height of retention wall surrounding the vegetation and 65mm depth of retention board underneath the soil, while most conventional green roof doesn’t have any retention wall and only maximum of 25 mm depth of drainage board. Seoul National University retentive green roof significantly reduced sensible heat movement towards the air by 0.5 kWh/m2, and highly enhanced the evaporation process as much as 0.5 – 5.4 kg/m2 which equals to 0.3 – 3.6 kWh/m2 of latent heat flux. These results indicate that with design enhancement, serving as a viable alternate for conventional green roof, retentive green roof contributes to overcome the limitation of conventional green roof which is the main solution for mitigating urban heat island.Keywords: green roof, low impact development, retention board, thermal behavior, urban heat island
Procedia PDF Downloads 2775450 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 305449 Study Case of Spacecraft Instruments in Structural Modelling with Nastran-Patran
Authors: Francisco Borja de Lara, Ali Ravanbakhsh, Robert F. Wimmer-Schweingruber, Lars Seimetz, Fermín Navarro
Abstract:
The intense structural loads during the launch of a spacecraft represent a challenge for the space structure designers because enough resistance has to be achieved while maintaining at the same time the mass and volume within the allowable margins of the mission requirements and inside the limits of the budget project. In this conference, we present the structural analysis of the Lunar Lander Neutron Dosimetry (LND) experiment on the Chang'E4 mission, the first probe to land on the moon’s far side included in the Chinese’ Moon Exploration Program by the Chinese National Space Administration. To this target, the software Nastran/Patran has been used: a structural model in Patran and a structural analysis through Nastran have been realized. Next, the results obtained are used both for the optimization process of the spacecraft structure, and as input parameters for the model structural test campaign. In this way, the feasibility of the lunar instrument structure is demonstrated in terms of the modal modes, stresses, and random vibration and a better understanding of the structural tests design is provided by our results.Keywords: Chang’E4, Chinese national space administration, lunar lander neutron dosimetry, nastran-patran, structural analysis
Procedia PDF Downloads 5295448 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 2665447 The Evaluation of Heavy Metal Pollution Degree in the Soils Around the Zangezur Copper and Molybdenum Combine
Authors: K. A. Ghazaryan, G. A. Gevorgyan, H. S. Movsesyan, N. P. Ghazaryan, K. V. Grigoryan
Abstract:
The heavy metal pollution degree in the soils around the Zangezur copper and molybdenum combine in Syunik Marz, Armenia was aessessed. The results of the study showed that heavy metal pollution degree in the soils mainly decreased with increasing distance from the open mine and the ore enrichment combine which indicated that the open mine and the ore enrichment combine were the main sources of heavy metal pollution. The only exception was observed in the northern part of the open mine where pollution degree in the sites (along the open mine) situated 600 meters far from the mine was higher than that in the sites located 300 meters far from the mine. This can be explained by the characteristics of relief and air currents as well as the weak vegetation cover of these sites and the characteristics of soil structure. According to geo-accumulation index (I-geo), contamination factor (Cf), contamination degree (Cd) and pollution load index (PLI) values, the pollution degree in the soils around the open mine and the ore enrichment combine was higher than that in the soils around the tailing dumps which was due to the proper and accurate operation of the Artsvanik tailing damp and the recultivation of the Voghji tailing dump. The high Cu and Mo pollution of the soils was conditioned by the character of industrial activities, the moving direction of air currents as well as the physicochemical peculiarities of the soils.Keywords: Armenia, Zangezur copper and molybdenum combine, soil, heavy metal pollution degree
Procedia PDF Downloads 3025446 An Empirical Study on the Impact of Peace in Tourists' Country of Origin on Their Travel Behavior
Authors: Claudia Seabra, Elisabeth Kastenholz, José Luís Abrantes, Manuel Reis
Abstract:
In a world of increasing mobility and global risks, terrorism has, in a perverse way, capitalized on contemporaneous society’s growing interest in travel to explore a world whose national boundaries and distances have decreased. Terrorists have identified the modern tourist flows originated from the economically more developed countries as new appealing targets so as to: i) call attention to the causes they defend and ii) destroy a country’s foundations of tourism, with the final aim of disrupting the economic and consequently social fabric of the affected countries. The present study analyses sensitivity towards risk and travel behaviors in international travel amongst a sample of 600 international tourists from 49 countries travelling by air. Specifically, the sample was segmented according to the Global Peace Index. This index defines country profiles regarding the levels of peace. The indicators used are established over three broad themes: i) ongoing domestic and international conflict; ii) societal safety and security; and iii) militarisation. Tourists were segmented, according to their country of origin, in different levels of peacefulness. Several facets of travel behavior were evaluated, namely motivations, attitude towards trip planning, quality perception and perceived value of the trip. Also factors related with risk perception were evaluated, specifically terrorism risk perception during the trip, unsafety sensation as well as importance attributed to safety in travel. Results contribute to our understanding of the role of previous exposure to the lack of peace and safety at home in the international tourists behaviors, which is further discussed in terms of tourism management and marketing implications which should particularly interest tourism services and destinations more affected by terrorism, war, political turmoil, crime and other safety risks.Keywords: terrorism, tourism, safety, risk perception
Procedia PDF Downloads 4415445 Opinions of Individuals from Different Age and Income Brackets on the Duterte Administration's Overall Performance
Authors: Jose Carlos Montemayor, Kendrick Thomas Angelo Santos
Abstract:
Filipinos have been divided on President Rodrigo Duterte’s leadership ever since his election in 2016. This study aimed to gain a thorough, in-depth understanding of the opinions of Filipinos from different age and income brackets on these issues in order to address the lack of studies analysing the current Philippine political landscape. An interview tackling relevant national issues were conducted with twelve respondents from the intersections of four age groups and three income brackets. The government’s handling of some issues received mixed opinions, some had neutral viewpoints, while others had more unfavorable ones. The responses differed on three levels: (1) the general stance on an issue; (2) the strength of a stance; and (3) the factoring in of an issue in forming an overall perception on the administration’s performance. Contrary to previous studies on political thought, opinions varied greatly such that no unique set of viewpoints could be attributed to any of the defined age or income groups. These results will be most useful to political science researchers, political analysts, and candidates shaping their platforms for the upcoming elections. Future studies are recommended to tackle more national issues and to consider other factors that may affect political opinions and behavior.Keywords: age groups, opinion formation, socioeconomic brackets, Philippine politics, Rodrigo Duterte
Procedia PDF Downloads 1375444 The Application of International Law in Terms of Earthlife Africa Johannesburg and Another v Minister of Energy and Others 65662/16 (2017) Case
Authors: M. van der Bank
Abstract:
This study involves a legal analysis of the case Earthlife Africa Johannesburg v Minister of Environmental Affairs and Others. The case considered the impact of the Thabametsi Power Project if it operated to the expected year 2060 on the global climate and ever-changing climate, in South Africa. This judgment highlights the significance, place and principles of climate change and where climate change impacts the South African environmental law which has its founding principles in the Constitution of the Republic of South Africa, 1996. This paper seeks to examine the advances for climate change regulation and application in terms of international law, in South Africa, through a qualitative study involving comparative national and international case law. A literature review study was conducted to compare and contrast the various aspects of law in order to support the argument undertaken. The paper presents a detailed discussion of the current legislation and the position as it currently stands with reference to international law and interpretation. The relevant protections as outlined in the National Environmental Management Act will be discussed. It then proceeds to outline the potential liability of the Minister in the interpretation and application of international law.Keywords: climate change; environment, environmental review, international law; and principles
Procedia PDF Downloads 1255443 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 3395442 Determinants of Income Diversification among Support Zone Communities of National Parks in Nigeria
Authors: Daniel Etim Jacob, Samuel Onadeko, Edem A. Eniang, Imaobong Ufot Nelson
Abstract:
This paper examined determinants of income diversification among households in support zones communities of national parks in Nigeria. This involved the use household data collected through questionnaires administered randomly among 1009 household heads in the study area. The data obtained were analyzed using probability and non-probability statistical analysis such as regression and analysis of variance to test for mean difference between parks. The result obtained indicates that majority of the household heads were male (92.57%0, between the age class of 21 – 40 years (44.90%), had non-formal education (38.16%), were farmers (65.21%), owned land (95.44%), with a household size of 1 – 5 (36.67%) and an annual income range of ₦401,000 - ₦600,000 (24.58%). Mean Simpson index of diversity showed a general low (0.375) level of income diversification among the households. Income, age, off-farm dependence, education, household size and occupation where significant (p<0.01) factors that affected households’ income diversification. The study recommends improvement in the existing infrastructures and social capital in the communities as avenues to improve the livelihood and ensure positive conservation behaviors in the study area.Keywords: income diversification, protected area, livelihood, poverty, Nigeria
Procedia PDF Downloads 1435441 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 318