Search results for: immovable asset register
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 576

Search results for: immovable asset register

426 Silence the Silence No More: A Translanguaging Analysis of Two Silent Scenes in Wong Kar-Wai’s Multi-Genre Film ‘2046’

Authors: Liu M. Hanmin

Abstract:

Wong Kar-Wai’s multi-genre film 2046, world premiered in 2004, comes with a vibrant mediascape made up of multiple named languages, code-switching, intertitles, news footage from the real world, and extra-linguistic means of communication. In film- and multilingual studies it is still a challenge to incorporate non-languages into an analytical framework with conventional languages. This paper uses translanguaging theory to read silent practices in Wong Kar-Wai’ 2046. Two scenes that feature the silence experience the most are taken as case studies. In these two scenes, we can identify two tropes of intersemiotic relationships that are co-articulated by silence: patriarchy and unfinished romance, respectively. The conclusion argues that silence in Wong Kar-Wai’s 2046 exerts multimodal agency by ‘speaking’ directly to the audience and in mutual directions to characters. Thereby, it moves beyond the passive role of merely accentuating or assisting the aural register of a film.

Keywords: translanguaging, Wong Kar-Wai, multimodality, semiotics, inter semiotics, Hong Kong media, film culture

Procedia PDF Downloads 64
425 Dynamics of Investor's Behaviour: An Analytical Survey Study in Indian Securities Market

Authors: Saurabh Agarwal

Abstract:

This paper attempts to formalise the effect of demographic variables like marital status, gender, occupation and age on the source of investment advice which, in turn, affect the herd behaviour of investors and probability of investment in near future. Further, postulations have been made for most preferred investment option and purpose of saving and source of investment. Impact of theoretical analysis on choice among investment alternatives has also been investigated. The analysis contributes to understanding the different investment choices made by households in India. The insights offered in the paper indirectly contribute in uncovering the various unexplained asset pricing puzzles.

Keywords: portfolio choice, investment decisions, investor’s behaviour, Indian securities market

Procedia PDF Downloads 340
424 Development of an Asset Database to Enhance the Circular Business Models for the European Solar Industry: A Design Science Research Approach

Authors: Ässia Boukhatmi, Roger Nyffenegger

Abstract:

The expansion of solar energy as a means to address the climate crisis is undisputed, but the increasing number of new photovoltaic (PV) modules being put on the market is simultaneously leading to increased challenges in terms of managing the growing waste stream. Many of the discarded modules are still fully functional but are often damaged by improper handling after disassembly or not properly tested to be considered for a second life. In addition, the collection rate for dismantled PV modules in several European countries is only a fraction of previous projections, partly due to the increased number of illegal exports. The underlying problem for those market imperfections is an insufficient data exchange between the different actors along the PV value chain, as well as the limited traceability of PV panels during their lifetime. As part of the Horizon 2020 project CIRCUSOL, an asset database prototype was developed to tackle the described problems. In an iterative process applying the design science research methodology, different business models, as well as the technical implementation of the database, were established and evaluated. To explore the requirements of different stakeholders for the development of the database, surveys and in-depth interviews were conducted with various representatives of the solar industry. The proposed database prototype maps the entire value chain of PV modules, beginning with the digital product passport, which provides information about materials and components contained in every module. Product-related information can then be expanded with performance data of existing installations. This information forms the basis for the application of data analysis methods to forecast the appropriate end-of-life strategy, as well as the circular economy potential of PV modules, already before they arrive at the recycling facility. The database prototype could already be enriched with data from different data sources along the value chain. From a business model perspective, the database offers opportunities both in the area of reuse as well as with regard to the certification of sustainable modules. Here, participating actors have the opportunity to differentiate their business and exploit new revenue streams. Future research can apply this approach to further industry and product sectors, validate the database prototype in a practical context, and can serve as a basis for standardization efforts to strengthen the circular economy.

Keywords: business model, circular economy, database, design science research, solar industry

Procedia PDF Downloads 82
423 When English Learners Speak “Non-Standard” English

Authors: Gloria Chen

Abstract:

In the past, when we complimented someone who had a good command of English, we would say ‘She/He speaks/writes standard English,’ or ‘His/Her English is standard.’ However, with English has becoming a ‘global language,’ many scholars and English users even create a plural form for English as ‘world Englishes,’ which indicates that national/racial varieties of English not only exist, but also are accepted to a certain degree. Now, a question will be raised when it comes to English teaching and learning: ‘What variety/varieties of English should be taught?’ This presentation will first explore Braj Kachru’s well-known categorization of the inner circle, the outer circle, and the expanding circle of English users, as well as inner circle varieties such as ‘Ebonics’ and ‘cockney’. The presentation then will discuss the purposes and contexts of English learning, and apply different approaches to different purposes and contexts. Three major purposes of English teaching/learning will be emphasized and considered: (1) communicative competence, (2) academic competence, and (3) intercultural competence. This presentation will complete with the strategies of ‘code switch’ and ‘register switch’ in teaching English to non-standard English speakers in both speaking and writing.

Keywords: world Englishes, standard and non-standard English, inner, outer, expanded circle communicative, academic, intercultural competence

Procedia PDF Downloads 242
422 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 75
421 Learning to Learn: A Course on Language Learning Strategies

Authors: Hélène Knoerr

Abstract:

In an increasingly global world, more and more international students attend academic courses and programs in a second or foreign language, and local students register in language learning classes in order to improve their employability. These students need to quickly become proficient in the new language. How can we, as administrators, curriculum developers and teachers, make sure that they have the tools they need in order to develop their language skills in an academic context? This paper will describe the development and implementation of a new course, Learning to learn, as part of the Major in French/English as a Second Language at the University of Ottawa. This academic program was recently completely overhauled in order to reflect the current approaches in language learning (more specifically, the action-oriented approach as embodied in the Common European Framework of Reference for Languages, and the concept of life-long autonomous learning). The course itself is based on research on language learning strategies, with a particular focus on the characteristics of the “good language learner”. We will present the methodological and pedagogical foundations, describe the course objectives and learning outcomes, the language learning strategies, and the classroom activities. The paper will conclude with students’ feedback and suggest avenues for further exploration.

Keywords: curriculum development, language learning, learning strategies, second language

Procedia PDF Downloads 380
420 Predictors and Prevention of Sports’ Injuries among Male Professional Footballers in Nigeria

Authors: Timothy A. Oloyede

Abstract:

The study assessed the influence of playing field, climatic conditions, rate of exposure to matches, skill level and competition level on the occurrence and severity of football injuries. The prospective outline of the study was as follows: after a baseline examination and measurements were performed ascertaining possible predictors of injury, all players were followed up weekly for one year to register subsequent injuries and complaints. Four hundred and thirty-five out of 455 subjects completed the weekly follow-ups over one year. Multiple regression analysis was employed to analyse the data collected. Results showed that playing field, climatic conditions, rate of exposure to matches skill level and competition level were predictors of injuries among the professional footballer. Playing on natural grass, acclimatization, reduction of physical overload, among others, were strategies postulated for preventing injuries.

Keywords: sports’ injuries, predictors of sports’ injuries, intrinsic risk factors, extrinsic risk factors, injury mechanism, professional footballer

Procedia PDF Downloads 230
419 Modelling the Choice of Global Systems of Mobile Networks in Nigeria Using the Analytical Hierarchy Process

Authors: Awal Liman Sale

Abstract:

The world is fast becoming a global village; and a necessary tool for this process is communication, of which telecommunication is a key player. The quantum development is very rapid as one innovation replaces another in a matter of weeks. Interconnected phone calls across the different Nigerian Telecom service providers are mostly difficult to connect and often diverted, incurring unnecessary charges on the customers. This compels the consumers to register and use multiple subscriber information modules (SIM) so that they can switch to another if one fails. This study aims to identify and prioritize the key factors in selecting telecom service providers by subscribers in Nigeria using the Analytical Hierarchy Process (AHP) in order to match the factors with the GSM network providers and create a hierarchical structure. Opinions of 400 random subscribers of different service providers will be sought using the questionnaire. In general, four components and ten sub-components will be examined in this study. After determining the weight of these components, the importance of each in choosing the service will be prioritized in Nigeria.

Keywords: analytical hierarchy process, global village, Nigerian telecommunication, subscriber information modules

Procedia PDF Downloads 211
418 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 291
417 The Relationship between Class Attendance and Performance of Industrial Engineering Students Enrolled for a Statistics Subject at the University of Technology

Authors: Tshaudi Motsima

Abstract:

Class attendance is key at all levels of education. At tertiary level many students develop a tendency of not attending all classes without being aware of the repercussions of not attending all classes. It is important for all students to attend all classes as they can receive first-hand information and they can benefit more. The student who attends classes is likely to perform better academically than the student who does not. The aim of this paper is to assess the relationship between class attendance and academic performance of industrial engineering students. The data for this study were collected through the attendance register of students and the other data were accessed from the Integrated Tertiary Software and the Higher Education Data Analyzer Portal. Data analysis was conducted on a sample of 93 students. The results revealed that students with medium predicate scores (OR = 3.8; p = 0.027) and students with low predicate scores (OR = 21.4, p < 0.001) were significantly likely to attend less than 80% of the classes as compared to students with high predicate scores. Students with examination performance of less than 50% were likely to attend less than 80% of classes than students with examination performance of 50% and above, but the differences were not statistically significant (OR = 1.3; p = 0.750).

Keywords: class attendance, examination performance, final outcome, logistic regression

Procedia PDF Downloads 110
416 CPU Architecture Based on Static Hardware Scheduler Engine and Multiple Pipeline Registers

Authors: Ionel Zagan, Vasile Gheorghita Gaitan

Abstract:

The development of CPUs and of real-time systems based on them made it possible to use time at increasingly low resolutions. Together with the scheduling methods and algorithms, time organizing has been improved so as to respond positively to the need for optimization and to the way in which the CPU is used. This presentation contains both a detailed theoretical description and the results obtained from research on improving the performances of the nMPRA (Multi Pipeline Register Architecture) processor by implementing specific functions in hardware. The proposed CPU architecture has been developed, simulated and validated by using the FPGA Virtex-7 circuit, via a SoC project. Although the nMPRA processor hardware structure with five pipeline stages is very complex, the present paper presents and analyzes the tests dedicated to the implementation of the CPU and of the memory on-chip for instructions and data. In order to practically implement and test the entire SoC project, various tests have been performed. These tests have been performed in order to verify the drivers for peripherals and the boot module named Bootloader.

Keywords: hardware scheduler, nMPRA processor, real-time systems, scheduling methods

Procedia PDF Downloads 245
415 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 113
414 Improving the Performances of the nMPRA Architecture by Implementing Specific Functions in Hardware

Authors: Ionel Zagan, Vasile Gheorghita Gaitan

Abstract:

Minimizing the response time to asynchronous events in a real-time system is an important factor in increasing the speed of response and an interesting concept in designing equipment fast enough for the most demanding applications. The present article will present the results regarding the validation of the nMPRA (Multi Pipeline Register Architecture) architecture using the FPGA Virtex-7 circuit. The nMPRA concept is a hardware processor with the scheduler implemented at the processor level; this is done without affecting a possible bus communication, as is the case with the other CPU solutions. The implementation of static or dynamic scheduling operations in hardware and the improvement of handling interrupts and events by the real-time executive described in the present article represent a key solution for eliminating the overhead of the operating system functions. The nMPRA processor is capable of executing a preemptive scheduling, using various algorithms without a software scheduler. Therefore, we have also presented various scheduling methods and algorithms used in scheduling the real-time tasks.

Keywords: nMPRA architecture, pipeline processor, preemptive scheduling, real-time system

Procedia PDF Downloads 333
413 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 50
412 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer

Authors: Kinjal Parmar, Matteo Lelli

Abstract:

The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.

Keywords: rockfall, barrier, HelloMac, rockfall alert system

Procedia PDF Downloads 23
411 Essay on Theoretical Modeling of the Wealth Effect of Sukuk

Authors: Jamel Boukhatem, Mouldi Djelassi

Abstract:

Contrary to the existing literature generally focusing on the role played by Sukuk in enhancing investors' and shareholders' wealth, this paper sheds some light on the Sukuk wealth effect across all economic agents: households, government, and investors by implementing a two-period life-cycle model with overlapping generations to show whether Sukuk is net wealth. The main findings are threefold: i) the effect of a change in Sukuk issuances on the consumers’ utility level will be different from one generation to another, ii) an increase in taxes due to the increase in Sukuk and rents is covered by transfers made by the members of generation 1 in the form of inheritance, and iii) the existence of a positive relationship between the asset prices representative of Sukuk and the real activity.

Keywords: Sukuk, households, investors, overlapping generations model, wealth, modeling

Procedia PDF Downloads 52
410 Researching Apache Hama: A Pure BSP Computing Framework

Authors: Kamran Siddique, Yangwoo Kim, Zahid Akhtar

Abstract:

In recent years, the technological advancements have led to a deluge of data from distinctive domains and the need for development of solutions based on parallel and distributed computing has still long way to go. That is why, the research and development of massive computing frameworks is continuously growing. At this particular stage, highlighting a potential research area along with key insights could be an asset for researchers in the field. Therefore, this paper explores one of the emerging distributed computing frameworks, Apache Hama. It is a Top Level Project under the Apache Software Foundation, based on Bulk Synchronous Processing (BSP). We present an unbiased and critical interrogation session about Apache Hama and conclude research directions in order to assist interested researchers.

Keywords: apache hama, bulk synchronous parallel, BSP, distributed computing

Procedia PDF Downloads 221
409 Health Monitoring of Concrete Assets in Refinery

Authors: Girish M. Bhatia

Abstract:

Most of the important structures in refinery complex are RCC Structures for which in-depth structural monitoring and inspection is required for incessant service. Reinforced concrete structures can be under threat from a combination of insidious challenges due to environmental conditions, including temperature and humidity that lead to accelerated deterioration mechanisms like carbonation, as well as marine exposure, above and below ground structures can experience ingress from aggressive ground waters carrying chlorides and sulphates leading to unexpected deterioration that threaten the integrity of a vital structural asset. By application of health monitoring techniques like corrosion monitoring with help of sensor probes, visual inspection of high rise structures with help of drones, it is possible to establish an early warning at the onset of these destructive processes.

Keywords: concrete structures, corrosion sensors, drones, health monitoring

Procedia PDF Downloads 374
408 Smart BIM Documents - the Development of the Ontology-Based Tool for Employer Information Requirements (OntEIR), and its Transformation into SmartEIR

Authors: Shadan Dwairi

Abstract:

Defining proper requirements is one of the key factors for a successful construction projects. Although there have been many attempts put forward in assist in identifying requirements, but still this area is under developed. In Buildings Information Modelling (BIM) projects. The Employer Information Requirements (EIR) is the fundamental requirements document and a necessary ingredient in achieving a successful BIM project. The provision on full and clear EIR is essential to achieving BIM Level-2. As Defined by PAS 1192-2, EIR is a “pre-tender document that sets out the information to be delivered and the standards and processes to be adopted by the supplier as part of the project delivery process”. It also notes that “EIR should be incorporated into tender documentation to enable suppliers to produce an initial BIM Execution Plan (BEP)”. The importance of effective definition of EIR lies in its contribution to a better productivity during the construction process in terms of cost and time, in addition to improving the quality of the built asset. Proper and clear information is a key aspect of the EIR, in terms of the information it contains and more importantly the information the client receives at the end of the project that will enable the effective management and operation of the asset, where typically about 60%-80% of the cost is spent. This paper reports on the research done in developing the Ontology-based tool for Employer Information Requirements (OntEIR). OntEIR has proven the ability to produce a full and complete set of EIRs, which ensures that the clients’ information needs for the final model delivered by BIM is clearly defined from the beginning of the process. It also reports on the work being done into transforming OntEIR into a smart tool for Defining Employer Information Requirements (smartEIR). smartEIR transforms the OntEIR tool into enabling it to develop custom EIR- tailored for the: Project Type, Project Requirements, and the Client Capabilities. The initial idea behind smartEIR is moving away from the notion “One EIR fits All”. smartEIR utilizes the links made in OntEIR and creating a 3D matrix that transforms it into a smart tool. The OntEIR tool is based on the OntEIR framework that utilizes both Ontology and the Decomposition of Goals to elicit and extract the complete set of requirements needed for a full and comprehensive EIR. A new ctaegorisation system for requirements is also introduced in the framework and tool, which facilitates the understanding and enhances the clarification of the requirements especially for novice clients. Findings of the evaluation of the tool that was done with experts in the industry, showed that the OntEIR tool contributes towards effective and efficient development of EIRs that provide a better understanding of the information requirements as requested by BIM, and support the production of a complete BIM Execution Plan (BEP) and a Master Information Delivery Plan (MIDP).

Keywords: building information modelling, employer information requirements, ontology, web-based, tool

Procedia PDF Downloads 106
407 The Effect of Supply Chain Integration on Information Sharing

Authors: Khlif Hamadi

Abstract:

Supply chain integration has become a potentially valuable way of securing shared information and improving supply chain performance since competition is no longer between organizations but among supply chains. This research conceptualizes and develops three dimensions of supply chain integration (integration with customers, integration with suppliers, and the interorganizational integration) and tests the relationships between supply chain integration, information sharing, and supply chain performance. Furthermore, the four types of information sharing namely; information sharing with customers, information sharing with suppliers, inter-functional information sharing, and intra-organizational information sharing; and the four constructs of Supply Chain Performance represents expenses of costs, asset utilization, supply chain reliability, and supply chain flexibility and responsiveness. The theoretical and practical implications of the study, as well as directions for future research, are discussed.

Keywords: supply chain integration, supply chain management, information sharing, supply chain performance

Procedia PDF Downloads 223
406 Investigation of Suitable Linkage System for Transportation Sustainability: The Instance of Bursa in Turkey

Authors: Elvan Ender, Ozge Celik

Abstract:

Transportation systems play a vital role in access and egress in our lives. Concerns about environmental quality, social equity, economic vitality, and the threat of climate change have converged to produce a growing interest in the concept of sustainability, sustainable development, and sustainable transportation. Cities should respect nature, consider the urban ecological environment as an asset, integrate environmental issues into urban planning and administration, and accelerate the transition to sustainable development. This paper reviews current pedestrian and bike transportation in Bursa and proves the effects of unbalanced distribution to neighbourhoods of this presence. In this way creating proposal map for walking and bicycling to constitute a preliminary base for the physical urban planning of Bursa, has been aimed.

Keywords: Bursa, proposal map, sustainability, transportation

Procedia PDF Downloads 315
405 MapReduce Algorithm for Geometric and Topological Information Extraction from 3D CAD Models

Authors: Ahmed Fradi

Abstract:

In a digital world in perpetual evolution and acceleration, data more and more voluminous, rich and varied, the new software solutions emerged with the Big Data phenomenon offer new opportunities to the company enabling it not only to optimize its business and to evolve its production model, but also to reorganize itself to increase competitiveness and to identify new strategic axes. Design and manufacturing industrial companies, like the others, face these challenges, data represent a major asset, provided that they know how to capture, refine, combine and analyze them. The objective of our paper is to propose a solution allowing geometric and topological information extraction from 3D CAD model (precisely STEP files) databases, with specific algorithm based on the programming paradigm MapReduce. Our proposal is the first step of our future approach to 3D CAD object retrieval.

Keywords: Big Data, MapReduce, 3D object retrieval, CAD, STEP format

Procedia PDF Downloads 517
404 Meta-Analysis of Exercise Interventions for Children and Adolescents Diagnosed with Pediatric Metabolic Syndrome

Authors: James M. Geidner

Abstract:

Objective: The purpose of this meta-analysis was to examine the evidence for the effectiveness of exercise interventions on reducing metabolic components in children and/or adolescents diagnosed with Paediatric Metabolic Syndrome. Methods: A computerized search was made from four databases: PubMed, PsycInfo, SPORTDiscus, Cochrane Central Register. The analysis was restricted to children and adolescents with metabolic syndrome examining the effect of exercise interventions on metabolic components. Effect size and 95% confidence interval were calculated and the heterogeneity of the studies was estimated using Cochran’s Q-statistic and I2. Bias was assessed using multiple tools and statistical analyses. Results: Thirteen studies, consisting of 19 separate trials, were selected for the meta-analysis as they fulfilled the inclusion criteria (n=908). Exercise interventions resulted in decreased waist circumference, systolic blood pressure, diastolic blood pressure, fasting glucose, insulin resistance, triglycerides, and High-Density Lipoprotein Cholesterol (HDL-C). Conclusions: This meta-analysis provides insights into the effectiveness of exercise interventions on markers of Paediatric Metabolic Syndrome in children and adolescents.

Keywords: metabolic syndrome, syndrome x, pediatric, meta-analysis

Procedia PDF Downloads 144
403 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 305
402 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis

Authors: Hromada Martin

Abstract:

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.

Keywords: critical infrastructure, protection, resilience, risk analysis

Procedia PDF Downloads 605
401 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 249
400 Endogeneity between Shari'ah Governance and Board Governance and Its Impact on Financial Stability

Authors: Sabur Mollah, Asma Mobarek

Abstract:

This study aims to explore the endogenous relationship between Shari’ah governance and board governance for Islamic banks to identify complementary or substituting relationship between these governance parameters. By using a sample of 161 Islamic Banks from 24 countries for the period of 2005-2013, we show an endogenous relationship between Shari’ah Supervisory Board (SSB) and Board of Directors (BoD). In this relationship, SSB and BoD complement each other. We also show that this complementary relationship between SSB and BoD helps enhance both management and asset quality, but mitigates capital adequacy, earnings, and liquidity in Islamic banks. The study has important implications for financial stability in the Islamic banking system.

Keywords: Shari’ah Supervisory Board, Boards of Directors, Islamic banking, financial stability

Procedia PDF Downloads 157
399 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 373
398 University Short Courses Web Application Using ASP.Net

Authors: Ahmed Hariri

Abstract:

E-Learning has become a necessity in the advanced education. It is easier for the student and teacher communication also it speed up the process with less time and less effort. With the progress and the enormous development of distance education must keep up with this age of making a website that allows students and teachers to take all the advantages of advanced education. In this regards, we developed University Short courses web application which is specially designed for Faculty of computing and information technology, Rabigh, Kingdom of Saudi Arabia. After an elaborate review of the current state-of-the-art methods of teaching and learning, we found that instructors deliver extra short courses and workshop to students to enhance the knowledge of students. Moreover, this process is completely manual. The prevailing methods of teaching and learning consume a lot of time; therefore in this context, University Short courses web application will help to make process easy and user friendly. The site allows for students can view and register short courses online conducted by instructor also they can see courses starting dates, finishing date and locations. It also allows the instructor to put things on his courses on the site and see the students enrolled in the study material. Finally, student can print the certificate after finished the course online. ASP.NET, SQLSERVER, JavaScript SQL SERVER Database will use to develop the University Short Courses web application.

Keywords: e-learning, short courses, ASP.NET, SQL SERVER

Procedia PDF Downloads 114
397 Theory about the Gebel El-Arak Knife: Egyptian Knife with Canaanite Relief

Authors: Doaa El-Shereef

Abstract:

This paper will focus on proving a theory that it is an Egyptian knife with Canaanite relief and will discuss the nature of the Gebel el-Arak Knife and the civilization to which it belongs and the relationship of the Canaanite deity with Mount Abydos in Egypt, and the influence between the ancient Egyptian religion and the Canaanite religion and their effect on each other. Finally, the paper will discuss in full detail the engraving of the two faces of the knife handle and analyze the register on the front face, which is the scene of the two lions engraved, and between them, an old man symbolized as the deity in the middle and compared it with other drawings similar in the Egyptian civilization. The paper will also discuss the registers on the back face, which are the engravings of a battle, soldiers, uniforms, and boats, and how the back face describes a water battle between three Egyptian boats and two foreign ships. In addition, it will prove that those foreign ships were not Mesopotamian ships because, in the period to which the knife of Gebel Al-Arak belongs, between 3300-3100 BC, there were no battles or trade exchanges between Egypt and Mesopotamia on sea routes. However, there was already a strong land and sea trade between Canaan and Egypt during Chalcolithic Age (4500-3500 BC), as described in many primary sources.

Keywords: Canaan, Egypt, Gebel el-Arak Knife, Louvre

Procedia PDF Downloads 148