Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6006

Search results for: security service

4236 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama

Authors: Frie Ayalew, Seada Hussen

Abstract:

Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.

Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation

Procedia PDF Downloads 61
4235 Sustainable Traffic Flow: The Case Study of Un-Signalized Pedestrian Crossing at Stationary Bottleneck and Its Impact on Traffic Flow

Authors: Imran Badshah

Abstract:

This paper study the impact of Un-signalized pedestrian on traffic flow at Stationary Bottleneck. The Highway Capacity Manual (HCM) analyze the methodology of level of service for Urban street segment but it does not include the impact of un-signalized pedestrian crossing at stationary bottleneck. The un-signalized pedestrian crossing in urban road segment causes conflict between vehicles and pedestrians. As a result, the average time taken by vehicle to travel along a road segment increased. The speed of vehicle and the level of service decreases as the running time of a segment increased. To analyze the delay, we need to determine the pedestrian speed while crossing the road at a stationary bottleneck. The objective of this research is to determine the speed of pedestrian and its impact on traffic flow at stationary bottleneck. In addition, the result of this study should be incorporated in the Urban Street Analysis Chapter of HCM.

Keywords: stationary bottleneck, traffic flow, pedestrian speed, HCM

Procedia PDF Downloads 71
4234 E-Government, China Internet Plus, and the One Belt One Road Initiative: The Africa Connection

Authors: Isaac Kofi Mensah, Mi Jianing

Abstract:

The lack of Information and Communication Technologies (ICT) infrastructure in African countries is hampering the successful adoption, development and implementation of e-government in Africa. Electronic government is the use of ICTs to modernize government public administration processes and to provide government services to citizens with a purpose to enhance efficiency, accountability, and transparency in government’s interaction with the citizenry. ICT application in public administration has the potential to modernize and create smarter government and improvement in public service delivery. China’s Internet Plus policy and One Belt One Road strategy present a golden opportunity for countries in Africa to attract the huge financial investment through Chinese IT companies to develop and close Africa’s ICT infrastructure gap. This study recommends the establishment of One Belt One Road ICT Infrastructure Fund for Africa (OBOR ICT Fund for Africa) to enable countries in Africa to source solely for the purpose of ICT infrastructure development in the public sector/government machinery which would in turn promote the adoption and development of e-government in the public sectors of respective countries in Africa.

Keywords: e-government, public service delivery, internet plus, one belt one road initiative, China, Africa

Procedia PDF Downloads 652
4233 A Method for the Extraction of the Character's Tendency from Korean Novels

Authors: Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim

Abstract:

The character in the story-based content, such as novels and movies, is one of the core elements to understand the story. In particular, the character’s tendency is an important factor to analyze the story-based content, because it has a significant influence on the storyline. If readers have the knowledge of the tendency of characters before reading a novel, it will be helpful to understand the structure of conflict, episode and relationship between characters in the novel. It may therefore help readers to select novel that the reader wants to read. In this paper, we propose a method of extracting the tendency of the characters from a novel written in Korean. In advance, we build the dictionary with pairs of the emotional words in Korean and English since the emotion words in the novel’s sentences express character’s feelings. We rate the degree of polarity (positive or negative) of words in our emotional words dictionary based on SenticNet. Then we extract characters and emotion words from sentences in a novel. Since the polarity of a word grows strong or weak due to sentence features such as quotations and modifiers, our proposed method consider them to calculate the polarity of characters. The information of the extracted character’s polarity can be used in the book search service or book recommendation service.

Keywords: character tendency, data mining, emotion word, Korean novel

Procedia PDF Downloads 322
4232 A Simulation Study on the Applicability of Overbooking Strategies in Inland Container Transport

Authors: S. Fazi, B. Behdani

Abstract:

The inland transportation of maritime containers entails the use of different modalities whose capacity is typically booked in advance. Containers may miss their scheduled departure time at a terminal for several reasons, such as delays, change of transport modes, multiple bookings pending. In those cases, it may be difficult for transport service providers to find last minute containers to fill the vacant capacity. Similarly to other industries, overbooking could potentially limit these drawbacks at the cost of a lower service level in case of actual excess of capacity in overbooked rides. However, the presence of multiple modalities may provide the required flexibility in rescheduling and limit the dissatisfaction of the shippers in case of containers in overbooking. This flexibility is known with the term 'synchromodality'. In this paper, we evaluate via discrete event simulation the application of overbooking. Results show that in certain conditions overbooking can significantly increase profit and utilization of high-capacity means of transport, such as barges and trains. On the other hand, in case of high penalty costs and limited no-show, overbooking may lead to an excessive use of expensive trucks.

Keywords: discrete event simulation, flexibility, inland shipping, multimodality, overbooking

Procedia PDF Downloads 111
4231 Reliability Assessment Using Full Probabilistic Modelling for Carbonation and Chloride Exposures, Including Initiation and Propagation Periods

Authors: Frank Papworth, Inam Khan

Abstract:

Fib’s model code 2020 has four approaches for design life verification. Historically ‘deemed to satisfy provisions have been the principal approach, but this has limited options for materials and covers. The use of an equation in fib’s model code for service life design to predict time to corrosion initiation has become increasingly popular to justify further options, but in some cases, the analysis approaches are incorrect. Even when the equations are computed using full probabilistic analysis, there are common mistakes. This paper reviews the work of recent fib commissions on implementing the service life model to assess the reliability of durability designs, including initiation and propagation periods. The paper goes on to consider the assessment of deemed to satisfy requirements in national codes and considers the influence of various options, including different steel types, various cement systems, quality of concrete and cover, on reliability achieved. As modelling is based on achieving agreed target reliability, consideration is given to how a project might determine appropriate target reliability.

Keywords: chlorides, marine, exposure, design life, reliability, modelling

Procedia PDF Downloads 212
4230 Ways Management of Foods Not Served to Consumers in Food Service Sector

Authors: Marzena Tomaszewska, Beata Bilska, Danuta Kolozyn-Krajewska

Abstract:

Food loss and food waste are a global problem of the modern economy. The research undertaken aimed to analyze how food is handled in catering establishments when it comes to food waste and to demonstrate main ways of management with foods/dishes not served to consumers. A survey study was conducted from January to June 2019. The selection of catering establishments participating in the study was deliberate. The study included establishments located only in Mazowieckie Voivodeship (Poland). 42 completed questionnaires were collected. In some questions, answers were based on a 5-point scale of 1 to 5 (from 'always'/'every day' to 'never'). The survey also included closed questions with a suggested cafeteria of answers. The respondents stated that in their workplaces, dishes served cold and hot ready meals are discarded every day or almost every day (23.7% and 20.5% of answers respectively). A procedure most frequently used for dealing with dishes not served to consumers on a given day is their storage at a cool temperature until the following day. In the research, 1/5 of respondents admitted that consumers 'always' or 'usually' leave uneaten meals on their plates, and over 41% 'sometimes' do so. It was found additionally that food not used in food service sector is most often thrown into a public container for rubbish. Most often thrown into the public container (with communal trash) were: expired products (80.0%), plate waste (80.0%), and inedible products (fruit and vegetable peels, egg shells) (77.5%). Most frequently into the container dedicated only for food waste were thrown out used deep-frying oil (62.5%). 10% of respondents indicated that inedible products in their workplaces is allocate for animal feeds. Food waste in the food service sector still remains an insufficiently studied issue, as owners of these objects are often unwilling to disclose data pertaining to the subject. Incorrect ways of management with foods not served to consumers were observed. There is the need to develop the educational activities for employees and management in the context of food waste management in the food service sector. This publication has been developed under the contract with the National Center for Research and Development No Gospostrateg1/385753/1/NCBR/2018 for carrying out and funding of a project implemented as part of the 'The social and economic development of Poland in the conditions of globalizing markets - GOSPOSTRATEG' program entitled 'Developing a system for monitoring wasted food and an effective program to rationalize losses and reduce food wastage' (acronym PROM).

Keywords: food waste, inedible products, plate waste, used deep-frying oil

Procedia PDF Downloads 98
4229 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation

Authors: Jerome Osentowski

Abstract:

The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.

Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures

Procedia PDF Downloads 419
4228 Factors Affecting the Adoption of Cloud Business Intelligence among Healthcare Sector: A Case Study of Saudi Arabia

Authors: Raed Alsufyani, Hissam Tawfik, Victor Chang, Muthu Ramachandran

Abstract:

This study investigates the factors that influence the decision by players in the healthcare sector to embrace Cloud Business Intelligence Technology with a focus on healthcare organizations in Saudi Arabia. To bring this matter into perspective, this study primarily considers the Technology-Organization-Environment (TOE) framework and the Human Organization-Technology (HOT) fit model. A survey was hypothetically designed based on literature review and was carried out online. Quantitative data obtained was processed from descriptive and one-way frequency statistics to inferential and regression analysis. Data were analysed to establish factors that influence the decision to adopt Cloud Business intelligence technology in the healthcare sector. The implication of the identified factors was measured, and all assumptions were tested. 66.70% of participants in healthcare organization backed the intention to adopt cloud business intelligence system. 99.4% of these participants considered security concerns and privacy risk have been the most significant factors in the adoption of cloud Business Intelligence (CBI) system. Through regression analysis hypothesis testing point that usefulness, service quality, relative advantage, IT infrastructure preparedness, organization structure; vendor support, perceived technical competence, government support, and top management support positively and significantly influence the adoption of (CBI) system. The paper presents quantitative phase that is a part of an on-going project. The project will be based on the consequences learned from this study.

Keywords: cloud computing, business intelligence, HOT-fit model, TOE, healthcare and innovation adoption

Procedia PDF Downloads 147
4227 Radio Regulation Development and Radio Spectrum Analysis of Earth Station in Motion Service

Authors: Fei Peng, Jun Yuan, Chen Fan, Fan Jiang, Qian Sun, Yudi Liu

Abstract:

Although Earth Station in Motion (ESIM) services are widely used and there is a huge market demand around the world, International Telecommunication Union (ITU) does not have unified conclusion for the use of ESIM yet. ESIM are Mobile Satellite Services (MSS) due to its mobile-based attributes, while multiple administrations want to use ESIM in Fixed Satellite Service (FSS). However, Radio Regulations (RR) have strict distinction between MSS and FSS. In this case, ITU has been very controversial because this kind of application will violate the RR Article and the conflict will bring risks to the global deployment. Thus, this paper illustrates the development of rules, regulations, standards concerning ESIM and the radio spectrum usage of ESIM in different regions around the world. Firstly, the basic rules, standard and definition of ITU’s Radiocommunication Sector (ITU-R) is introduced. Secondly, the World Radiocommunication Conference (WRC) agenda item on radio spectrum allocation for ESIM, e.g. in C/Ku/Ka band, is introduced and multi-view on the radio spectrum allocation is elaborated, especially on 19.7-20.2 GHz & 29.5-30.0 GHz. Then, some ITU-R Recommendations and Reports are analyzed on the specific technique to enable these ESIM to communicate with Geostationary Earth Orbit Satellite (GSO) space stations in the FSS without causing interference at levels in excess of that caused by conventional FSS earth stations. Meanwhile, the opposite opinion on not allocating EISM service in FSS frequency band is also elaborated. Finally, based on the ESIM’s future application, the ITU-R standards development trend is forecasted. In conclusion, using radio spectrum resource in an equitable, rational and efficient manner is the basic guideline of ITU. Although it is not a good approach to obstruct the revise of RR when there is a large demand for radio spectrum resource in satellite industry, still the propulsion and global demand of the whole industry may face difficulties on the unclear application in modify rules of RR.

Keywords: earth station in motion, ITU standards, radio regulations, radio spectrum, satellite communication

Procedia PDF Downloads 267
4226 An Australian Central Bank Digital Currency: Developing a Framework for Calibrating National Security and Privacy Considerations

Authors: Nancy Michail, Niloufer Selvadurai, Doron Goldbarsht

Abstract:

This study analyses the development of a central bank digital currency (CBDC) in Australia and the framework being developed to ensure that national security and privacy considerations are appropriately addressed. Through the use of doctrinal methodology, the research closely and critically examines current legislation and regulation on privacy federal laws and the need to comply with anti-money laundering and counter-terrorism financing laws (AML/CTF). It is argued that the introduction of CBDCs may lead to potential tension between the application of AML/CTF laws and the upholding of individuals’ fundamental and legislated rights to privacy; therefore, it emphasises the need for clear delineation of ambits and support between different laws and regulations to ensure they operate within their intended purposes and suggests that the calibration of potential tensions between AML/CTF and privacy laws may be achieved through the innovative application of the proportionality principle.

Keywords: anti-money laundering and counter terrorism financing, central bank digital currency, privacy, proportionality principle

Procedia PDF Downloads 43
4225 Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System

Authors: June-Jei Kuo, Yi-Chuan Hsieh

Abstract:

Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users.

Keywords: web-scale discovery system, discovery system, information system success model, flow theory, academic library

Procedia PDF Downloads 77
4224 Exploring the Meaning of Safety in Acute Mental Health Inpatient Units from the Consumer Perspective

Authors: Natalie Cutler, Lorna Moxham, Moira Stephens

Abstract:

Safety is a priority in mental health services, and no more so than in the acute inpatient setting. Mental health service policies and accreditation frameworks commonly approach safety from a risk reduction or elimination perspective leading to service approaches that are arguably more focused on risk than on safety. An exploration what safety means for people who have experienced admission to an acute mental health inpatient unit is currently under way in Sydney, Australia. Using a phenomenographic research approach, this study is seeking to understand the meaning of safety from the perspective of people who use, rather than those who deliver mental health services. Preliminary findings suggest that the meanings of safety for users of mental health services vary from the meanings inherent in the policies and frameworks that inform how mental health services and mental health practice are delivered. This variance has implications for the physical and environmental design of acute mental health inpatient facilities, the policies and practices, and the education and training of mental health staff in particular nurses, who comprise the majority of the mental health workforce. These variances will be presented, along with their implications for the way quality and safety in mental health services are evaluated.

Keywords: acute inpatient, mental health, nursing, phenomenography, recovery, safety

Procedia PDF Downloads 209
4223 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 255
4222 Common Health Problems of Filipino Overseas Household Service Workers: Implications for Wellness

Authors: Veronica Ramirez

Abstract:

For over 40 years now, the Philippines has been supplying Household Service Workers (HSWs) globally. As a requirement of the Philippine Overseas Employment Agency (POEA), all Filipinos applying for overseas work undergo medical examination and a certificate of good health is submitted to the foreign employer before hiring. However, there are workplace-related health problems that develop during employment such as musculoskeletal strain or injury, back pain, hypertension and other illnesses. Some workers are in good working conditions but are on call more than 12 hours per day. There are also those who experience heavy physical work with short rest periods or time off. They can also be easily exposed to disease outbreaks and epidemics. It was the objective of this study to determine the common health problems of Filipino Overseas Service Workers and analyze their implications to wellness in the workplace. Specifically, it sought to describe the work conditions of HSWs and determine the work-related factors affecting their health. It also identified the medical care they avail of and how they perceive their health and wellness as determinants of well-being. Finally, it proposes ways to promote wellness among HSWs. This study focused on physical illnesses and does not include mental problems experienced by HSWs. Using a questionnaire, primary data were gathered online and through survey of HSW rehires who were retaking Pre-Departure Orientation Seminar at recruitment agencies. The 2010 Health Benefit Availment data from the Overseas Workers Welfare Administration (OWWA) was also utilized. Descriptive analysis was employed on the data gathered. Key stakeholders in the migration industry were also interviewed. Previous research studies, reports and literature on migration and wellness were used as secondary data. The study found that Filipino overseas HSWs are vulnerable to physical injury and experience body pains such as back, hip and shoulder pain. Long hours of work, work hazards and lack of rest due to poor accommodations can aggravate their physical condition. Although health insurance and health care are available, HSWs are not aware how to avail them. On the basis of the findings, a Wellness Program can be designed that include health awareness, health care availment, occupational ergonomics, safety and health, work and leisure balance, developing emotional intelligence, anger management and spirituality.

Keywords: health, household service worker, overseas, wellness

Procedia PDF Downloads 233
4221 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 403
4220 A Sociological Study of the Potential Role of Retired Soldiers in the Post War Development and Reconstruction in Sri Lanka

Authors: Amunupura Kiriwandeiye Gedara, Asintha Saminda Gnanaratne

Abstract:

The security forces can be described as a workforce that goes beyond the role of ensuring the national security and contributes to the development process of the country. Soldiers are following combatant training courses during their tenure, they are equipped with a variety of vocational training courses to satisfy the needs of the army, to equip them with vocational training capabilities to achieve the development and reconstruction goals of the country as well as for the betterment of society in the event of emergencies. But with retirement, their relationship with the military is severed, and they are responsible for the future of their lives. The main purpose of this study was to examine how such professional capabilities can contribute to the development of the country, the current socio-economic status of the retired soldiers, and the current application of the vocational training skills they have mastered in the army to develop and rebuild the country in an effective manner. After analyzing the available research literature related to this field, a conceptual framework was developed and according to qualitative research methodology, and data obtained from Case studies and interviews are analyzed by using thematic analysis. Factors influencing early retirement include a lack of understanding of benefits, delays in promotions, not being properly evaluated for work, getting married on hasty decisions, and not having enough time to spend on family and household chores. Most of the soldiers are not aware about various programs and benefits available to retirees. They do not have a satisfactory attitude towards the retirement guidance they receive from the army at the time of retirement. Also, due to the lack of understanding about how to use their vocational capabilities successfully pursue their retirement life, the majority of people are employed in temporary jobs, and some are successful in post-retirement life due to their successful use of training received. Some live on pensions without engaging in any income-generating activities, and those who retire after 12 years of service are facing severe economic hardships as they do not get pensions. Although they have received training in various fields, they do not use them for their benefit due to lack of proper guidance. Although the government implements programs, they are not clearly aware of them. Barriers to utilization of training include an absence of a system to identify the professional skills of retired soldiers, interest in civil society affairs, exploration of opportunities in the civil and private sectors, and politicization of services. If they are given the opportunity, they will be able to contribute to the development and reconstruction process. The findings of the study further show that it has many social, economic, political, and psychological benefits not only for individuals but also for a country. Entrepreneurship training for all retired soldiers, improving officers' understanding, streamlining existing mechanisms, creating new mechanisms, setting up a separate unit for retirees, and adapting them to civil society, private and non-governmental contributions, and training courses can be identified as potential means to improve the current situation.

Keywords: development, reconstruction, retired soldiers, vocational capabilities

Procedia PDF Downloads 107
4219 Exploring Subjective Attitudes towards Public Transport of Intercity Travel and Their Relationships

Authors: Jiaqi Zhang, Zhi Dong, Pan Xing

Abstract:

With the continuous development of urban agglomerations, higher demands are placed on intercity public transport travel services. To improve these services, it is necessary to comprehensively understand the views and evaluations of travelers. Taking the Guanzhong Plain urban agglomeration in China as the object, this study explores subjective attitude indicators from self-administrated survey data and examines the relationship among perceived accessibility, preference, and satisfaction for intercity public transport using a structural equation model. The results show that perceived service quality has a direct positive impact on perceived accessibility and satisfaction. Perceived accessibility and preference significantly affect satisfaction. In addition, perceived accessibility mediates the effect of service quality on satisfaction. This study provides valuable insights from a policy perspective to improve the subjective evaluation of intercity public transport travelers while emphasizing the importance of subjective variables in transport system evaluation and advocates for their subdivision to more comprehensively improve the travel experience.

Keywords: intercity public transport, perceived accessibility, satisfaction, structural equation model

Procedia PDF Downloads 58
4218 Legacy of Smart Cities on Urban Future: Discussing the Future of Smart City by Sharing Its Experiences

Authors: Arsalan Makinian

Abstract:

Our future cities will constantly evolve the necessary technologies for tomorrow’s needs. Technologies which enable a better kind of prosperity and security. This paper reports on the precedent of a smart city from its beginning to prevalence among urbanism academic literature and reports of tech companies. The article aims to direct urban foresight studies and to build a pathway for the future of smart city concept by gathering theoretical and empirical experiences related to smart cities with both top-down and bottom-up approaches. It hopes to deliver results of different studies, pilot projects, and development strategies of some of the smart cities in order to allow a shareable knowledge to take shape and develop in terms of qualitative aspects of a smart city. Now the definition of the smart city goes beyond removing physical boundaries, changing the concept of mobility and providing electronic service for citizens, it now constitutes fields such as energy efficiency, economic competitiveness, protecting the environment and finally, it takes advantage of technology and data science to improve the quality of life. In the smart city, the role of citizens is considered as both final purpose and contributor. Emerging issues which are almost implications of advanced technologies -as the most important trends of the future- and their reflection on the society need to be foresighted. Educating and fostering knowledge of smartness is one of the targets of the smart city concept. In this regard, some of these smart cites have established research and development units to share their projects and smart city initiatives. Due to this fact, gaining experience and sharing the results of this subject is necessary for technology management and moving toward a smart urban future.

Keywords: age of urban tech, bottom-up approach, role of citizens, smart city

Procedia PDF Downloads 124
4217 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 178
4216 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan

Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed

Abstract:

This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.

Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis

Procedia PDF Downloads 42
4215 Impact of Management and Development of Destination Attributes on Coastal Tourists' Visitor Experience, Negombo, Sri Lanka

Authors: M. S. R. Waas, S. G. U. S. Chandrarathne, U. A. Kumara

Abstract:

The purpose of this quantitative study is to identify the impact of the destination attributes of Negombo on the coastal tourists’ visitor experience. As an island nation, Sri Lanka is identified and well renowned for its gold sandy beaches and natural scenic beauty. Among many tourist attractions, Negombo is identified as a developed beach centric tourist destination in the country. Yet, it is identified that there are low positive reviews on the internet for Negombo compared to other beach centric tourist attractions in Sri Lanka. Therefore, this study would help the policymakers and tourism service providers to identify the impact of destination attributes on international visitor satisfaction and to understand the visitors comprehensively so as to develop Negombo as a stable tourist destination while offering a memorable and satisfying experience for its visitors. In support, a self-administered questionnaire survey study was performed with 150 respondents (international tourists) in Negombo. The questions were designed based on the selected dimensions of destination attributes such as tourism service quality, infrastructure and superstructure developments, tourist information facilities and destination aesthetics and developments. The results showed that the overall satisfaction level of the international tourists who visit Sri Lanka is significantly affected by the destination attributes of Negombo. Yet, the dimensions of destination aesthetics and developments and tourist information facilities indicated a low level of mean satisfaction, paving the critique that Negombo as a beach centric tourist attraction is not serving well with its natural beauty and its destination management. Further, it is advocated that the policymakers and tourism service providers have a significant role in leading the way to attract more potential visitors to enhance their destination satisfaction and to encourage them to revisit Sri Lanka while recommending it to others. The survey was done during the off-peak season of the industry and it is suggested that the survey would have been conducted throughout a complete year.

Keywords: destination attributes, coastal tourism, tourism development, tourist satisfaction

Procedia PDF Downloads 371
4214 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy

Authors: Nyumbaiza Tambwe

Abstract:

The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.

Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture

Procedia PDF Downloads 307
4213 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 377
4212 Access and Utilization of Family Planning Services among Women in a Rural Community of Enugu state Nigeria, using a Descriptive Cross-sectional Design

Authors: Chidiebere Joy Nwankwo, Benjamin S. C. Uzochukwu, Florence T. Sibeudu

Abstract:

Background: Family planning is one of the most cost-effective ways to prevent maternal, infant, and child mortality. It can decrease maternal mortality by reducing the number of unintended pregnancies, the number of abortions, and the proportion of births at high risk. It has been seen to improve the health and economic well-being of families and communities and ensures women’s planned childbearing in order to achieve education and career goals which could raise family income thereby reducing poverty. The choice and use of a particular family planning method and their sources vary globally. Rural Communities often face significant challenges in accessing and utilizing family planning services. Aim: This study set out to assess Access and Utilization of Family Planning Services among Women of Reproductive Age in a Rural Community of Enugu state, Nigeria. Rural communities were chosen for this study because past demographic surveys have shown that women in urban areas are more likely to accept and practice family planning compared to those in rural areas. Method: A Descriptive Cross-sectional Research design was employed to achieve the aim and objectives of the study. Data collected from 177 consenting participants using interviewer-administered questionnaires was analysed using Descriptive statistics to summarize the Socio-demographic characteristics of the participants and Access and Utilization of Family Planning Services among the participants including Reasons for using different Family Planning Methods and Barriers encountered in Access and Utilization of these services. A Cross-tabulation between Socio-demographic Characteristics of respondents and the use of Family Planning services was carried out. Result: The findings of this study revealed that majority of the participants (72.9%) have not utilized any family planning service. Out of those (27.1%) that have used any family planning service, majority of them are still currently using a form of family planning service and have access to them in health facilities, patent medicine vendors and others based on multiple responses. Male condoms were the most utilized modern family planning service. Based on multiple responses, inaccessibility, personal beliefs and partner’s objection were the most identified barriers encountered in accessing family planning services. Conclusion: Access and uptake of family planning services in rural communities is lower than the national average. Increasing access to family planning is an urgent priority for rural areas Interventions that will scale up Access and Utilization of family planning services in rural communities should be intensified.

Keywords: access, family planning, rural community, utilization

Procedia PDF Downloads 25
4211 Understanding the Influence on Drivers’ Recommendation and Review-Writing Behavior in the P2P Taxi Service

Authors: Liwen Hou

Abstract:

The booming mobile business has been penetrating the taxi industry worldwide with P2P (peer to peer) taxi services, as an emerging business model, transforming the industry. Parallel with other mobile businesses, member recommendations and online reviews are believed to be very effective with regard to acquiring new users for P2P taxi services. Based on an empirical dataset of the taxi industry in China, this study aims to reveal which factors influence users’ recommendations and review-writing behaviors. Differing from the existing literature, this paper takes the taxi driver’s perspective into consideration and hence selects a group of variables related to the drivers. We built two models to reflect the factors that influence the number of recommendations and reviews posted on the platform (i.e., the app). Our models show that all factors, except the driver’s score, significantly influence the recommendation behavior. Likewise, only one factor, passengers’ bad reviews, is insignificant in generating more drivers’ reviews. In the conclusion, we summarize the findings and limitations of the research.

Keywords: online recommendation, P2P taxi service, review-writing, word of mouth

Procedia PDF Downloads 294
4210 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints

Authors: Zongjie Wang, Zhizhong Guo

Abstract:

While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.

Keywords: optimal power flow, time period, security, economy

Procedia PDF Downloads 430
4209 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 347
4208 An Exploratory Analysis of Brisbane's Commuter Travel Patterns Using Smart Card Data

Authors: Ming Wei

Abstract:

Over the past two decades, Location Based Service (LBS) data have been increasingly applied to urban and transportation studies due to their comprehensiveness and consistency. However, compared to other LBS data including mobile phone data, GPS and social networking platforms, smart card data collected from public transport users have arguably yet to be fully exploited in urban systems analysis. By using five weekdays of passenger travel transaction data taken from go card – Southeast Queensland’s transit smart card – this paper analyses the spatiotemporal distribution of passenger movement with regard to the land use patterns in Brisbane. Work and residential places for public transport commuters were identified after extracting journeys-to-work patterns. Our results show that the locations of the workplaces identified from the go card data and residential suburbs are largely consistent with those that were marked in the land use map. However, the intensity for some residential locations in terms of population or commuter densities do not match well between the map and those derived from the go card data. This indicates that the misalignment between residential areas and workplaces to a certain extent, shedding light on how enhancements to service management and infrastructure expansion might be undertaken.

Keywords: big data, smart card data, travel pattern, land use

Procedia PDF Downloads 266
4207 An Exploratory Case Study of Pre-Service Teachers' Learning to Teach Mathematics to Culturally Diverse Students through a Community-Based After-School Field Experience

Authors: Eugenia Vomvoridi-Ivanovic

Abstract:

It is broadly assumed that participation in field experiences will help pre-service teachers (PSTs) bridge theory to practice. However, this is often not the case since PSTs who are placed in classrooms with large numbers of students from diverse linguistic, cultural, racial, and ethnic backgrounds (culturally diverse students (CDS)) usually observe ineffective mathematics teaching practices that are in contrast to those discussed in their teacher preparation program. Over the past decades, the educational research community has paid increasing attention to investigating out-of-school learning contexts and how participation in such contexts can contribute to the achievement of underrepresented groups in Science, Technology, Engineering, and mathematics (STEM) education and their expanded participation in STEM fields. In addition, several research studies have shown that students display different kinds of mathematical behaviors and discourse practices in out-of-school contexts than they do in the typical mathematics classroom since they draw from a variety of linguistic and cultural resources to negotiate meanings and participate in joint problem solving. However, almost no attention has been given to exploring these contexts as field experiences for pre-service mathematics teachers. The purpose of this study was to explore how participation in a community based after-school field experience promotes understanding of the content pedagogy concepts introduced in elementary mathematics methods courses, particularly as they apply to teaching mathematics to CDS. This study draws upon a situated, socio-cultural theory of teacher learning that centers on the concept of learning as situated social practice, which includes discourse, social interaction, and participation structures. Consistent with exploratory case study methodology, qualitative methods were employed to investigate how a cohort of twelve participating pre-service teacher's approach to pedagogy and their conversations around teaching and learning mathematics to CDS evolved through their participation in the after-school field experience, and how they connected the content discussed in their mathematics methods course with their interactions with the CDS in the after-school. Data were collected over a period of one academic year from the following sources: (a) audio recordings of the PSTs' interactions with the students during the after-school sessions, (b) PSTs' after-school field-notes, (c) audio-recordings of weekly methods course meetings, and (d) other document data (e.g., PST and student generated artifacts, PSTs' written course assignments). The findings of this study reveal that the PSTs benefitted greatly through their participation in the after-school field experience. Specifically, after-school participation promoted a deeper understanding of the content pedagogy concepts introduced in the mathematics methods course and gained a greater appreciation for how students learn mathematics with understanding. Further, even though many of PSTs' assumptions about the mathematical abilities of CDS were challenged and PSTs began to view CDSs' cultural and linguistic backgrounds as resources (rather than obstacles) for learning, some PSTs still held negative stereotypes about CDS and teaching and learning mathematics to CDS in particular. Insights gained through this study contribute to a better understanding of how informal mathematics learning contexts may provide a valuable context for pre-service teacher's learning to teach mathematics to CDS.

Keywords: after-school mathematics program, pre-service mathematical education of teachers, qualitative methods, situated socio-cultural theory, teaching culturally diverse students

Procedia PDF Downloads 114