Search results for: secure data sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25784

Search results for: secure data sharing

25634 Trans-Boundary Water Disputes between India and Bangladesh and the Policy Responses

Authors: Aditaya Narayan Mishra

Abstract:

Unequal distribution of environmental resources as a possible cause of conflict has been the topic of substantial research, and these connections have ruled the post-Cold War attention in the discourse of environmental security. In this category, considerable concentration has been given to water resources, on account of their important standing for human existence. Thus, water is considered to be one of the most important non-conventional security issues. As per this consideration, the case of India-Bangladesh is one of the most critical examples of disputes over transboundary water sharing. The concern regarding sharing of trans-boundary rivers has been the main focus of Bangladesh and India‘s relationship for the last forty-five years. Both countries share fifty-four rivers, most of which have originated in the Himalayan range. The main causes for problems in the sharing of the waters of trans-boundary rivers between India and Bangladesh include the: Farakka Barrage, Teesta river sharing issue, River linking project and Tipaimukh Dam. The construction of Farakka barrage across the Ganga River was the beginning of water dispute. Attempts at unilateral exploitation of the trans-boundary water resources led to inter-state conflicts that spilled over into other areas of bilateral disputes between India and Bangladesh. Apart from Farakka, Barrage, the disputes over Teesta River sharing, River linking project and Tipaimukh Dam are also vital contents for the both countries bilateral diplomacy. Till date, India and Bangladesh have signed five treaties regarding water sharing. However, all these treaties have been rendered worthless due to mistrust and political upheaval in both countries. The current paper would address all these water sharing disputes between India and Bangladesh with focus on the various policy responses (both bilateral and multilateral initiatives) to deal with these water sharing disputes. It will try to analyze the previous agreements and their drawbacks and loopholes. In addition, it will mention the reasons for water sharing cooperation between India and Bangladesh.

Keywords: India and Bangladesh relations, water disputes, Teesta, river linking project, Tipaimukh Dam, Farakka, policy responses

Procedia PDF Downloads 225
25633 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 275
25632 A Study on the Influence of Planet Pin Parallelism Error to Load Sharing Factor

Authors: Kyung Min Kang, Peng Mou, Dong Xiang, Yong Yang, Gang Shen

Abstract:

In this paper, planet pin parallelism error, which is one of manufacturing error of planet carrier, is employed as a main variable to influence planet load sharing factor. This error is categorize two group: (i) pin parallelism error with rotation on the axis perpendicular to the tangent of base circle of gear(x axis rotation in this paper) (ii) pin parallelism error with rotation on the tangent axis of base circle of gear(y axis rotation in this paper). For this study, the planetary gear system in 1.5MW wind turbine is applied and pure torsional rigid body model of this planetary gear is built using Solidworks and MSC.ADAMS. Based on quantified parallelism error and simulation model, dynamics simulation of planetary gear is carried out to obtain dynamic mesh load results with each type of error and load sharing factor is calculated with mesh load results. Load sharing factor formula and the suggestion for planetary reliability design is proposed with the conclusion of this study.

Keywords: planetary gears, planet load sharing, MSC. ADAMS, parallelism error

Procedia PDF Downloads 395
25631 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 312
25630 The Effectiveness of Exchange of Tacit and Explicit Knowledge Using Digital and Face to Face Sharing

Authors: Delio I. Castaneda, Paul Toulson

Abstract:

The purpose of this study was to investigate the knowledge sharing effectiveness of two types of knowledge, tacit and explicit, depending on two channels: face to face or digital. Participants were 217 knowledge workers in New Zealand and researchers who attended a knowledge management conference in the United Kingdom. In the study, it was found that digital tools are effective to share explicit knowledge. In addition, digital tools that facilitated dialogue were effective to share tacit knowledge. It was also found that face to face communication was an effective way to share tacit and explicit knowledge. Results of this study contribute to clarify in what cases digital tools are effective to share tacit knowledge. Additionally, even though explicit knowledge can be easily shared using digital tools, this type of knowledge is also possible to be shared through dialogue. Result of this study may support practitioners to redesign programs and activities based on knowledge sharing to make strategies more effective.

Keywords: digital knowledge, explicit knowledge, knowledge sharing, tacit knowledge

Procedia PDF Downloads 248
25629 Green Supply Chain Management and Corporate Performance: The Mediation Mechanism of Information Sharing among Firms

Authors: Seigo Matsuno, Yasuo Uchida, Shozo Tokinaga

Abstract:

This paper proposes and empirically tests a model of the relationships between green supply chain management (GSCM) activities and corporate performance. From the literature review, we identified five constructs, namely, environmental commitment, supplier collaboration, supplier assessment, information sharing among suppliers, and business process improvement. These explanatory variables are used to form a structural model explaining the environmental and economic performance. The model was analyzed using the data from a survey of a sample of manufacturing firms in Japan. The results suggest that the degree of supplier collaboration has an influence on the environmental performance directly. While, the impact of supplier assessment on the environmental performance is mediated by the information sharing and/or business process improvement. And the environmental performance has a positive relationship on the economic performance. Academic and managerial implications of our findings are discussed.

Keywords: corporate performance, empirical study, green supply chain management, path modeling

Procedia PDF Downloads 388
25628 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 200
25627 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 384
25626 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 130
25625 Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital

Authors: Ashley Barnes

Abstract:

This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration.

Keywords: criminal justice, mental health, science fiction films, space and place

Procedia PDF Downloads 218
25624 Requirements to Establish a Taxi Sharing System in an Urban Area

Authors: Morteza Ahmadpur, Ilgin Gokasar, Saman Ghaffarian

Abstract:

That Transportation system plays an important role in management of societies is an undeniable fact and it is one of the most challenging issues in human beings routine life. But by increasing the population in urban areas, the demand for transportation modes also increase. Accordingly, it is obvious that more flexible and dynamic transportation system is required to satisfy peoples’ requirements. Nowadays, there is significant increase in number of environmental issues all over the world which is because of human activities. New technological achievements bring new horizons for humans and so they changed the life style of humans in every aspect of their life and transportation is not an exception. By using new technology, societies can modernize their transportation system and increase the feasibility of their system. Real–time Taxi sharing systems is one of the novel and most modern systems all over the world. For establishing this kind of system in an urban area it is required to use the most advanced technologies in a transportation system. GPS navigation devices, computers and social networks are just some parts of this kind of system. Like carpooling, real-time taxi sharing is one of the best ways to better utilize the empty seats in most cars and taxis, thus decreasing energy consumption and transport costs. It can serve areas not covered by a public transit system and act as a transit feeder service. Taxi sharing is also capable of serving one-time trips, not only recurrent commute trips or scheduled trips. In this study, we describe the requirements and parameters that we need to establish a useful real-time ride sharing system for an urban area. The parameters and requirements of this study can be used in any urban area.

Keywords: transportation, intelligent transportation systems, ride-sharing, taxi sharing

Procedia PDF Downloads 423
25623 Process Driven Architecture For The ‘Lessons Learnt’ Knowledge Sharing Framework: The Case Of A ‘Lessons Learnt’ Framework For KOC

Authors: Rima Al-Awadhi, Abdul Jaleel Tharayil

Abstract:

On a regular basis, KOC engages into various types of Projects. However, due to very nature and complexity involved, each project experience generates a lot of ‘learnings’ that need to be factored into while drafting a new contract and thus avoid repeating the same mistakes. But, many a time these learnings are localized and remain as tacit leading to scope re-work, larger cycle time, schedule overrun, adjustment orders and claims. Also, these experiences are not readily available to new employees leading to steep learning curve and longer time to competency. This is to share our experience in designing and implementing a process driven architecture for the ‘lessons learnt’ knowledge sharing framework in KOC. It high-lights the ‘lessons learnt’ sharing process adopted, integration with the organizational processes, governance framework, the challenges faced and learning from our experience in implementing a ‘lessons learnt’ framework.

Keywords: lessons learnt, knowledge transfer, knowledge sharing, successful practices, Lessons Learnt Workshop, governance framework

Procedia PDF Downloads 572
25622 Intergenerational Succession within Family Businesses: The Role of Sharing and Creation Knowledge

Authors: Wissal Ben Arfi, Jean-Michel Sahut

Abstract:

The purpose of this paper is to provide a deeper understanding of the succession process from a knowledge management perspective. By doing that, succession process in family businesses, as an environment for creating and sharing knowledge, was explored. Design/Methodology/Approach: To support our reasoning, we collected qualitative data through 16 in-depth interviews conducted with all decision makers involved in the family businesses succession process in France. These open-ended responses were subsequently exposed to thematic discourse analysis. Findings: Central to this exhibit is the nature and magnitude of knowledge creation and sharing among the actors within the family succession context and how can tacit knowledge sharing facilitate the succession process. We also identified factors that inhibit down the knowledge creation and sharing processes. The sharing and creation of knowledge among members of a family business appear to be a complex process that must be part of a strategy for change. This implies that it requests trust and takes a certain amount of time because it requires organizational change and a clear and coherent strategic vision that is accepted and assimilated by all the members. Professional and leadership skills are of particular importance in knowledge sharing and creation processes. In most cases, tacit knowledge is crucial when it is shared and accumulated collectively. Our findings reveal that managers should find ways of implementing knowledge sharing and creation processes while acknowledging the succession process within family firms. This study highlights the importance of generating knowledge strategies in order to enhance the performance and the success of intergenerational succession. The empirical outcomes contribute to enrich the field of succession management process and enhance the role of knowledge in shaping family performance and longevity. To a large extent, the lessons learned from the study of succession processes in family-owned businesses are that when there is a deliberate effort to introduce a knowledge-based approach, this action becomes a seminal event in the life of the organization. Originality/Value: The paper contributes to the deep understanding of interactions among actors by examining the knowledge creation and sharing processes since current researches in family succession focused on aspects such as personal development of potential, intra-family succession intention, decision-making processes in family businesses. Besides, as succession is one of the key factors that determine the longevity and the performance of family businesses, it also contributes to literature by examining how tacit knowledge is transferred, shared and created in family businesses and how this can facilitate the intergenerational succession process.

Keywords: family-owned businesses, succession process, knowledge, performance

Procedia PDF Downloads 204
25621 Supply Chain Coordination under Carbon Trading Mechanism in Case of Conflict

Authors: Fuqiang Wang, Jun Liu, Liyan Cai

Abstract:

This paper investigates the coordination of the conflicting two-stage low carbon supply chain consisting of upstream and downstream manufacturers. The conflict means that the upstream manufacturer takes action for carbon emissions reduction under carbon trading mechanism while the downstream manufacturer’s production cost rises. It assumes for the Stackelberg game that the upstream manufacturer plays as a leader and the downstream manufacturer does as a follower. Four kinds of the situation of decentralized decision making, centralized decision-making, the production cost sharing contract and the carbon emissions reduction revenue sharing contract under decentralized decision making are considered. The backward induction approach is adopted to solve the game. The results show that the more intense the conflict is, the lower the efficiency of carbon emissions reduction and the higher the retail price is. The optimal investment of the decentralized supply chain under the two contracts is unchanged and still lower than that of the centralized supply chain. Both the production cost sharing contract and the carbon emissions reduction revenue sharing contract cannot coordinate the supply chain, because that the sharing cost or carbon emissions reduction sharing revenue will transfer through the wholesale price mechanism. As a result, it requires more complicated contract forms to coordinate such a supply chain.

Keywords: cap-and-trade mechanism, carbon emissions reduction, conflict, supply chain coordination

Procedia PDF Downloads 336
25620 Production Sharing Contracts Transparency Simulation

Authors: Chariton Christou, David Cornwell

Abstract:

Production Sharing Contract (PSC) is the type of contract that is being used widely in our time. The financial crisis made the governments tightfisted and they do not have the resources to participate in a development of a field. Therefore, more and more countries introduce the PSC. The companies have the power and the money to develop the field with their own way. The main problem is the transparency of oil and gas companies especially in the PSC and how this can be achieved. Many discussions have been made especially in the U.K. What we are suggesting is a dynamic financial simulation with the help of a flow meter. The flow meter will count the production of each field every day (it will be installed in a pipeline). The production will be the basic input of the simulation. It will count the profit, the costs and more according to the information of the flow meter. In addition it will include the terms of the contract and the costs that have been paid. By all these parameters the simulation will be able to present in real time the information of a field (taxes, employees, R-factor). By this simulation the company will share some information with the government but not all of them. The government will know the taxes that should be paid and what is the sharing percentage of it. All of the other information could be confidential for the company. Furthermore, oil company could control the R-factor by changing the production each day to maximize its sharing percentages and as a result of this the profit. This idea aims to change the way that governments 'control' oil companies and bring a transparency evolution in the industry. With the help of a simulation every country could be next to the company and have a better collaboration.

Keywords: production sharing contracts, transparency, simulation

Procedia PDF Downloads 367
25619 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 157
25618 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 92
25617 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 65
25616 Proposal for Knowledge-Based Virtual Community System (KBVCS) for Enhancing Knowledge Sharing in Mechatronics System Diagnostic and Repair

Authors: Adetoba B. Tiwalola, Adedeji W. Oyediran, Yekini N. Asafe, Akinwole A. Kikelomo

Abstract:

Mechatronics is synergistic integration of mechanical engineering, with electronics and intelligent computer control in the design and manufacturing of industrial products and processes. Automobile (auto car, motor car or car is a wheeled motor vehicle used for transporting passengers, which also carries its own engine or motor) is a mechatronic system which served as major means of transportation around the world. Virtually all community has a need for automobile. This makes automobile issues as related to diagnostic and repair interesting to all communities. Consequent to the diversification of skill in diagnosing automobile faults and approaches in solving some problems and innovation in automobile industry. It is appropriate to say that repair and diagnostic of automobile will be better enhanced if community has opportunity of sharing knowledge and idea globally. This paper discussed the desirable elements in automobile as mechatronics system and present conceptual framework of virtual community model for knowledge sharing among automobile users.

Keywords: automobile, automobile users, knowledge sharing, mechatronics system, virtual community

Procedia PDF Downloads 436
25615 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion

Authors: Rui Liu, Klaus Greve

Abstract:

The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.

Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization

Procedia PDF Downloads 281
25614 Intrabody Communication Using Different Ground Configurations in Digital Door Lock

Authors: Daewook Kim, Gilwon Yoon

Abstract:

Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift keying modulation where individual data are transmitted to the external devices for the purpose of secure access such as digital door lock. It was found that the quality of IBC data transmission was heavily dependent on ground configurations of electronic circuits. Reliable IBC transmissions were not possible when both of the transmitter and receiver used batteries as circuit power source. Transmission was reliable when power supplies were used as power source for both transmitting and receiving sites because the common ground was established through the grounds of instruments such as power supply and oscilloscope. This was due to transmission dipole size and the ground effects of floor and AC power line. If one site used battery as power source and the other site used the AC power as circuit power source, transmission was possible.

Keywords: frequency shift keying, ground, intrabody, communication, door lock

Procedia PDF Downloads 414
25613 Cohabitation, Ethnicities, and Tolerance: An Anthropologic Approach of Political Conflicts in Mozambique

Authors: Samuel Francisco Ngovene

Abstract:

Mozambique is a country with cultural segregation along its rivers, dividing the main ethnic groups of Machangana, Macena, and Macua, inter alia South, Centre, and North. This division has led to internal conflicts, seemingly rooted in ethnicity. The aim of this study is to analyze the tolerance of the main ethnic groups in Mozambique in terms of cohabitation, sharing opportunities, and political power. The study utilizes participant observation in the field, group discussions, and a questionnaire targeting 150 respondents split into 50 for each ethnic group. The study finds that people in Mozambique are generally tolerant of cohabiting or marrying individuals from different ethnic groups. However, when it comes to sharing opportunities such as employment or business, there is a perception that individuals from different ethnic groups may be taking away opportunities. Similarly, each ethnic group believes that having a president from their own group would lead to better opportunities for their community. The study highlights the importance of addressing this intolerance, as it can be a source of internal political conflicts. The anthropological approach provides a valuable tool for diplomacy channels to ensure long-lasting peace. Analysis procedures: The data collected through participant observation, group discussions are analytically crosschecked, comparing the opinions of people from different ethnic groups, while the data from the questionnaire are analyzed statistically to understand the level of tolerance among the ethnic groups and their perceptions of sharing opportunities and political power. The study addresses the question of whether the main ethnic groups in Mozambique are tolerant of cohabitation, sharing opportunities, and political power among themselves. The study concludes that while there is overall tolerance for cohabitation and marriage across ethnic groups, there is also a perception that individuals from different ethnic groups may take away opportunities. The study suggests that cultural education from a young age may be an effective way to promote tolerance.

Keywords: cohabitation, ethnicities, Mozambique, political conflicts, tolerance

Procedia PDF Downloads 50
25612 The Effects of Cost-Sharing Contracts on the Costs and Operations of E-Commerce Supply Chains

Authors: Sahani Rathnasiri, Pritee Ray, Sardar M. N. Isalm, Carlos A. Vega-Mejia

Abstract:

This study develops a cooperative game theory-based cost-sharing contract model for a business to consumer (B2C) e-commerce supply chain to minimize the overall supply chain costs and the individual costs within an information asymmetry scenario. The objective of this study is to address the issues of strategic interactions among the key players of the e-commerce supply chain operation, which impedes the optimal operational outcomes. Game theory has been included in the field of supply chain management to resolve strategic decision-making issues; however, most of the studies are limited only to two-echelons of the supply chains. Multi-echelon supply chain optimizations based on game-theoretic models are less explored in the previous literature. This study adopts a cooperative game model to focus on the common payoff of operations and addresses the issues of information asymmetry and coordination of a three-echelon e-commerce supply chain. The cost-sharing contract model integrates operational features such as production, inventory management and distribution with the contract related constraints. The outcomes of the model highlight the importance of maintaining lower operational costs by all players to obtain benefits from the cost-sharing contract. Further, the cost-sharing contract ensures true cost revelation, and hence eliminates the information asymmetry issues among the players. Comparing the results of the contract model with the de-centralized e-commerce supply chain operation further emphasizes that the cost-sharing contract derives Pareto-improved outcomes and minimizes the costs of overall e-commerce supply chain operation.

Keywords: cooperative game theory, cost-sharing contract, e-commerce supply chain, information asymmetry

Procedia PDF Downloads 117
25611 Designing an Integrated Platform for Real-Time Recommendations Sharing among the Aged and People Living with Cancer

Authors: Adekunle O. Afolabi, Pekka Toivanen

Abstract:

The world is expected to experience growth in the number of ageing population, and this will bring about high cost of providing care for these valuable citizens. In addition, many of these live with chronic diseases that come with old age. Providing adequate care in the face of rising costs and dwindling personnel can be challenging. However, advances in technologies and emergence of the Internet of Things are providing a way to address these challenges while improving care giving. This study proposes the integration of recommendation systems into homecare to provide real-time recommendations for effective management of people receiving care at home and those living with chronic diseases. Using the simplified Training Logic Concept, stakeholders and requirements were identified. Specific requirements were gathered from people living with cancer. The solution designed has two components namely home and community, to enhance recommendations sharing for effective care giving. The community component of the design was implemented with the development of a mobile app called Recommendations Sharing Community for Aged and Chronically Ill People (ReSCAP). This component has illustrated the possibility of real-time recommendations, improved recommendations sharing among care receivers and between a physician and care receivers. Full implementation will increase access to health data for better care decision making.

Keywords: recommendation systems, Internet of Things, healthcare, homecare, real-time

Procedia PDF Downloads 151
25610 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 378
25609 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 58
25608 INCIPIT-CRIS: A Research Information System Combining Linked Data Ontologies and Persistent Identifiers

Authors: David Nogueiras Blanco, Amir Alwash, Arnaud Gaudinat, René Schneider

Abstract:

At a time when the access to and the sharing of information are crucial in the world of research, the use of technologies such as persistent identifiers (PIDs), Current Research Information Systems (CRIS), and ontologies may create platforms for information sharing if they respond to the need of disambiguation of their data by assuring interoperability inside and between other systems. INCIPIT-CRIS is a continuation of the former INCIPIT project, whose goal was to set up an infrastructure for a low-cost attribution of PIDs with high granularity based on Archival Resource Keys (ARKs). INCIPIT-CRIS can be interpreted as a logical consequence and propose a research information management system developed from scratch. The system has been created on and around the Schema.org ontology with a further articulation of the use of ARKs. It is thus built upon the infrastructure previously implemented (i.e., INCIPIT) in order to enhance the persistence of URIs. As a consequence, INCIPIT-CRIS aims to be the hinge between previously separated aspects such as CRIS, ontologies and PIDs in order to produce a powerful system allowing the resolution of disambiguation problems using a combination of an ontology such as Schema.org and unique persistent identifiers such as ARK, allowing the sharing of information through a dedicated platform, but also the interoperability of the system by representing the entirety of the data as RDF triplets. This paper aims to present the implemented solution as well as its simulation in real life. We will describe the underlying ideas and inspirations while going through the logic and the different functionalities implemented and their links with ARKs and Schema.org. Finally, we will discuss the tests performed with our project partner, the Swiss Institute of Bioinformatics (SIB), by the use of large and real-world data sets.

Keywords: current research information systems, linked data, ontologies, persistent identifier, schema.org, semantic web

Procedia PDF Downloads 129
25607 Application of Blockchain Technology in Geological Field

Authors: Mengdi Zhang, Zhenji Gao, Ning Kang, Rongmei Liu

Abstract:

Management and application of geological big data is an important part of China's national big data strategy. With the implementation of a national big data strategy, geological big data management becomes more and more critical. At present, there are still a lot of technology barriers as well as cognition chaos in many aspects of geological big data management and application, such as data sharing, intellectual property protection, and application technology. Therefore, it’s a key task to make better use of new technologies for deeper delving and wider application of geological big data. In this paper, we briefly introduce the basic principle of blockchain technology at the beginning and then make an analysis of the application dilemma of geological data. Based on the current analysis, we bring forward some feasible patterns and scenarios for the blockchain application in geological big data and put forward serval suggestions for future work in geological big data management.

Keywords: blockchain, intellectual property protection, geological data, big data management

Procedia PDF Downloads 82
25606 A Multi-Role Oriented Collaboration Platform for Distributed Disaster Reduction in China

Authors: Linyao Qiu, Zhiqiang Du

Abstract:

As the rapid development of urbanization, economic developments, and steady population growth in China, the widespread devastation, economic damages, and loss of human lives caused by numerous forms of natural disasters are becoming increasingly serious every year. Disaster management requires available and effective cooperation of different roles and organizations in whole process including mitigation, preparedness, response and recovery. Due to the imbalance of regional development in China, the disaster management capabilities of national and provincial disaster reduction centers are uneven. When an undeveloped area suffers from disaster, neither local reduction department could get first-hand information like high-resolution remote sensing images from satellites and aircrafts independently, nor sharing mechanism is provided for the department to access to data resources deployed in other place directly. Most existing disaster management systems operate in a typical passive data-centric mode and work for single department, where resources cannot be fully shared. The impediment blocks local department and group from quick emergency response and decision-making. In this paper, we introduce a collaborative platform for distributed disaster reduction. To address the issues of imbalance of sharing data sources and technology in the process of disaster reduction, we propose a multi-role oriented collaboration business mechanism, which is capable of scheduling and allocating for optimum utilization of multiple resources, to link various roles for collaborative reduction business in different place. The platform fully considers the difference of equipment conditions in different provinces and provide several service modes to satisfy technology need in disaster reduction. An integrated collaboration system based on focusing services mechanism is designed and implemented for resource scheduling, functional integration, data processing, task management, collaborative mapping, and visualization. Actual applications illustrate that the platform can well support data sharing and business collaboration between national and provincial department. It could significantly improve the capability of disaster reduction in China.

Keywords: business collaboration, data sharing, distributed disaster reduction, focusing service

Procedia PDF Downloads 293
25605 Risk-Sharing Financing of Islamic Banks: Better Shielded against Interest Rate Risk

Authors: Mirzet SeHo, Alaa Alaabed, Mansur Masih

Abstract:

In theory, risk-sharing-based financing (RSF) is considered a corner stone of Islamic finance. It is argued to render Islamic banks more resilient to shocks. In practice, however, this feature of Islamic financial products is almost negligible. Instead, debt-based instruments, with conventional like features, have overwhelmed the nascent industry. In addition, the framework of present-day economic, regulatory and financial reality inevitably exposes Islamic banks in dual banking systems to problems of conventional banks. This includes, but is not limited to, interest rate risk. Empirical evidence has, thus far, confirmed such exposures, despite Islamic banks’ interest-free operations. This study applies system GMM in modeling the determinants of RSF, and finds that RSF is insensitive to changes in interest rates. Hence, our results provide support to the “stability” view of risk-sharing-based financing. This suggests RSF as the way forward for risk management at Islamic banks, in the absence of widely acceptable Shariah compliant hedging instruments. Further support to the stability view is given by evidence of counter-cyclicality. Unlike debt-based lending that inflates artificial asset bubbles through credit expansion during the upswing of business cycles, RSF is negatively related to GDP growth. Our results also imply a significantly strong relationship between risk-sharing deposits and RSF. However, the pass-through of these deposits to RSF is economically low. Only about 40% of risk-sharing deposits are channeled to risk-sharing financing. This raises questions on the validity of the industry’s claim that depositors accustomed to conventional banking shun away from risk sharing and signals potential for better balance sheet management at Islamic banks. Overall, our findings suggest that, on the one hand, Islamic banks can gain ‘independence’ from conventional banks and interest rates through risk-sharing products, the potential for which is enormous. On the other hand, RSF could enable policy makers to improve systemic stability and restrain excessive credit expansion through its countercyclical features.

Keywords: Islamic banks, risk-sharing, financing, interest rate, dynamic system GMM

Procedia PDF Downloads 314