Search results for: human factor in security
13392 The Impact of Leadership Culture on Motivation, Efficiency, and Performance of Customs Employees: A Case Study of Iran Customs
Authors: Kazem Samadi
Abstract:
In today’s world, public agencies like customs have become vital institutions in international trade processes and in maintaining national economic security due to increasing economic and commercial complexities. In this regard, human resource management (HRM) is crucial to achieving organizational goals. This research employed a descriptive survey method, in which the statistical population consisted of all customs employees. Using Cochran's formula, 300 employees were selected from the central customs office. A researcher-made questionnaire was used as the data collection tool, with content validity and reliability confirmed using Cronbach's alpha coefficient. The collected data were analyzed through structural modeling using SPSS and AMOS 24. The results indicated that leadership culture significantly affected employee motivation, efficiency, and performance in customs. Customs managers and leaders in Iran can improve organizational productivity by fostering this culture, thereby facilitating individual and organizational development for their staff.Keywords: leadership culture, organizational culture, employee performance, customs
Procedia PDF Downloads 1913391 The New Insight about Interspecies Transmission of Iranian H9N2 Influenza Viruses from Avian to Human
Authors: Masoud Soltanialvar, Ali Bagherpour
Abstract:
Documented cases of human infection with H9N2 avian influenza viruses, first detected in 1999 in Hong Kong and China, indicate that these viruses can be directly transmitted from birds to humans. In this study, we characterized the mutation in the Hemagglutinin (HA) genes and proteins that correlates with a shift in affinity of the Hemagglutinin (HA) protein from the “avian” type sialic receptors to the “human” type in 10 Iranian isolates. We delineated the genomes and receptor binding profile of HA gene of some field isolates and established their phylogenetic relationship to the other Asian H9N2 sub lineages. A total of 1200 tissue samples collected from 40 farms located in various states of Iran during 2008 – 2010 as part of a program to monitor Avian Influenza Viruses (AIV) infection. To determine the genetic relationship of Iranian viruses, the Hemagglutinin (HA) genes from ten isolates were amplified and sequenced (by RT-PCR method). Nucleotide sequences (orf) of the (HA) genes were used for phylogenetic tree construction. Deduced amino acid sequences showed the presence of L226 (234 in H9 numbering) in all ten Iranian isolates which indicates a preference to binding of α (2–6) sialic acid receptors, so these Iranian H9N2 viruses have the potential to infect human beings. These isolates showed high degree of homology with 2 human H9N2 isolates A/HK/1073/99, A/HK/1074/99. Phylogenetic analysis of showed that all the HA genes of the Iranian H9N2 viruses fall into a single group within a G1-like sublineage which had contributed as donor of six internal genes to H5N1 highly pathogenic avian influenza. The results of this study indicated that all Iranian viruses have the potential to emerge as highly pathogenic influenza virus, and considering the homology of these isolates with human H9N2 strains, it seems that the potential of these avian influenza isolates to infect human should not be overlooked.Keywords: influenza virus, hemagglutinin, neuraminidase, Iran
Procedia PDF Downloads 44913390 Factors That Stimulate Employee Development in Polish Small Enterprises
Authors: Ewa Rak
Abstract:
This paper is part of a broader research project on employee development in small enterprises, financed by Polish National Science Centre. The project results will serve as basis for a doctoral dissertation. The paper utilises literature studies and qualitative research conducted in small enterprises operating in the Lower Silesia region of Poland. This paper aims to identify some of the factors that stimulate employee development in small companies operating in Poland. The great variety of business pursuits and applications represented by this sector makes it hard to determine a universal configuration of factors to offer best possible conditions for employee development. Research results suggest that each of the examined companies had one or two of such factors in focus, and serving as the basis for the entire pro-development system. These include: employment security (both for employee and entrepreneur) and extensive knowledge and experience of entrepreneurs, but only if it is combined with a willingness and ability to share it.Keywords: employee development, factors that stimulate employee development, human resources development, Poland, small enterprises, training
Procedia PDF Downloads 26813389 A Leadership Approach for the Sake of Organizations: Human-Oriented Leadership
Authors: Eser Bingül
Abstract:
The leadership and leaders, also having been a privileged subject of scientific researches in the last century, have become influential in shaping the destiny of the states since the first examples of the warfare history. The issue of leadership, finding a place in the management science, can also be defined as an integration of function within the aspect of leader. In this description, the relationship has come to the foreground which is established between the development of leadership theories and the elements of function which are leader, followers, and condition. While one reason of this analysis in leadership is to keep a lens to the historical background, the main reason has been a questioning the traits and education of leaders who have still affected the nation’s and organization’s fate. The links and analysis established in the definition of leadership have put forward the necessity of solving the unpredictable structure of human nature and behaviors in the focus of leadership approach. On the other hand becoming a model that meets the today’s needs of any system has given a clue that the leaders should turn towards the people. Being aware of this necessity, human-oriented leadership approach aims to gain both followers and their abilities to the system with giving them a deserved esteem and create the team spirit based on mutual trust. Ultimately this approach, with the determined leadership qualities consisting of charisma, ability of communication and trust, will be able to produce the solutions to the instant and long-term problems and uncertainties, derived from the variables of function, for the sake of systems.Keywords: human nature, leadership, human-oriented approach, social sciences and humanities
Procedia PDF Downloads 31913388 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence
Procedia PDF Downloads 45013387 Design and Validation of the 'Teachers' Resilience Scale' for Assessing Protective Factors
Authors: Athena Daniilidou, Maria Platsidou
Abstract:
Resilience is considered to greatly affect the personal and occupational wellbeing and efficacy of individuals; therefore, it has been widely studied in the social and behavioral sciences. Given its significance, several scales have been created to assess resilience of children and adults. However, most of these scales focus on examining only the internal protective or risk factors that affect the levels of resilience. The aim of the present study is to create a reliable scale that assesses both the internal and the external protective factors that affect Greek teachers’ levels of resilience. Participants were 136 secondary school teachers (89 females, 47 males) from urban areas of Greece. Connor-Davidson Resilience Scale (CD-Risc) and Resilience Scale for Adults (RSA) were used to collect the data. First, exploratory factor analysis was employed to investigate the inner structure of each scale. For both scales, the analyses revealed a differentiated factor solution compared to the ones proposed by the creators. That prompt us to create a scale that would combine the best fitting subscales of the CD-Risc and the RSA. To this end, the items of the four factors with the best fit and highest reliability were used to create the ‘Teachers' resilience scale’. Exploratory factor analysis revealed that the scale assesses the following protective/risk factors: Personal Competence and Strength (9 items, α=.83), Family Cohesion Spiritual Influences (7 items, α=.80), Social Competence and Peers Support (7 items, α=.78) and Spiritual Influence (3 items, α=.58). This four-factor model explained 49,50% of the total variance. In the next step, a confirmatory factor analysis was performed on the 26 items of the derived scale to test the above factor solution. The fit of the model to the data was good (χ2/292 = 1.245, CFI = .921, GFI = .829, SRMR = .074, CI90% = .026-,056, RMSEA = 0.43), indicating that the proposed scale can validly measure the aforementioned four aspects of teachers' resilience and thus confirmed its factorial validity. Finally, analyses of variance were performed to check for individual differences in the levels of teachers' resilience in relation to their gender, age, marital status, level of studies, and teaching specialty. Results were consistent to previous findings, thus providing an indication of discriminant validity for the instrument. This scale has the advantage of assessing both the internal and the external protective factors of resilience in a brief yet comprehensive way, since it consists 26 items instead of the total of 58 of the CD-Risc and RSA scales. Its factorial inner structure is supported by the relevant literature on resilience, as it captures the major protective factors of resilience identified in previous studies.Keywords: protective factors, resilience, scale development, teachers
Procedia PDF Downloads 29713386 An Empirical Study on Employees’ Theft Behavior in Insurance Industry
Authors: B. Khorsandi Talab, M. Kordi
Abstract:
It is highly deplorable that every year, theft behavior among employees of the insurance industry is growing throughout the world. A very significant source of contraction (despite many costly technological and widespread security measures) needs to be addressed and prevented. Employee and agent theft cannot be ignored as it causes significant losses to employers. This study investigates the workplace factors that affect the insurance employee and agent theft behavior. Although identifying theft is difficult, this study will help employers to further understand employees’ theft behavior. This study was conducted in two service small and medium organizations (two branches of insurance companies) in ALBORZ’s capital city, KARAJ. Data has been collected via questionnaire from 30 employees and agents consisting employees and supervisors of branches and agencies. According to the results, it must be acknowledged that compensation, organizational justice, internal control systems, penalties and personal characteristics were associated with employees' theft behavior, it is despite the fact that, no effect could be assumed for organizational ethics and requirement in this case. Nevertheless, poor financial status cannot be considered as the driving factor in pushing employees to steal property as well as increasing their theft behavior. As mentioned earlier, the purpose of this study was to determine the factors contributing to employees’ theft (insurance employees and agencies) behavior in insurance organizations in Karaj.Keywords: service theft, employee theft behavior, work theft, insurance agency, SMEs
Procedia PDF Downloads 43713385 Real Time Traffic Performance Study over MPLS VPNs with DiffServ
Authors: Naveed Ghani
Abstract:
With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2
Procedia PDF Downloads 42613384 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 42113383 Effect of Slope Angle on Gougerd Landslide Stability in Northwest of Iran
Authors: Akbar Khodavirdizadeh
Abstract:
Gougerd village landslide with area about 150 hectares is located in southwest of Khoy city in northwest of the Iran. This Landslide was commenced more than 21 years and caused some damages in houses like some fissures on walls and some cracks on ground and foundations. The main mechanism of landslide is rotational with the high different of top and foot is about 230 m. The thickness of slide mass based on geoelectrical investigation is about 16m obtained. The upper layer of slope is silty sand and the lower layer of clayey gravel. In this paper, the stability of landslide are analyzed based in static analysis under different groundwater surface conditions and at slope angle changes with limit eqlibrium method and the simplified Bishop method. The results of the 72 stability analysis showed that the slope stability of Gougerd landslide increased with increasing of the groundwater surface depth of slope crown. And especially when decreased of slope angle, the safety facter more than in previous state is increased. The required of safety factor for stability in groundwater surface depth from slope crown equal 14 m and with decreased of slope angle to 3 degree at decrease of groundwater surface depth from slope crown equal 6.5 m obtained. The safety factor in critical conditions under groundwater surface depth from slope crown equal 3.5 m and at decreased of slope angle to 3 degree equal 0.5 m obtained. At groudwater surface depth from slope crown of 3 m, 7 m and 10 m respectively equal to 0.97, 1.19 and 1.33 obtained. At groudwater surface depth from slope crown of 3 m, 7 m and 10 m with decreased of slope angle to 3 degree, respectively equal to 1.27, 1.54 and 1.72 obtained. According to the results of this study, for 1 m of groundwater level decrease, the safety factor increased by 5%, and for 1 degree of reduction of the slope angle, safety factor increased by 15%. And the effect of slope angle on Gougerd landslide stability was felt more than groundwater effect.Keywords: Gougerd landslide, stability analysis, slope angle, groundwater, Khoy
Procedia PDF Downloads 16913382 Enterprise Risk Management, Human Capital and Organizational Performance: Insights from Public Listed Companies
Authors: Omar Moafaq Saleh Aljanabi, Noradiva Hamzah, Ruhanita Maelah
Abstract:
In today’s challenging global economy, which is driven by information and knowledge, risk management is undergoing a great change, as organizations shift from traditional and compartmental risk management to an enterprise-wide approach. Enterprise risk management (ERM), which aims at increasing the sustainability of an organization and achieving competitive advantage, is gaining global attention and fast becoming an essential concern in all industries. Furthermore, in order to be effective, ERM should be managed by managers with high-level skills and knowledge. Despite the importance of the knowledge embedded in, there remains a paucity of evidence concerning how human capital could influence the organization’s ERM. Responses from 116 public listed companies (PLCs) on the main market of Bursa Malaysia were analyzed using Structural Equation Modelling (SEM). This study found that there is a significant association between ERM and organizational performance. The results also indicate that human capital has a positive moderating effect on the relationship between ERM and performance. The study contributes to the ERM literature by providing empirical evidence on the relationship between ERM, human capital, and organizational performance. Findings from this study also provide guidelines for managers, policy makers, and the regulatory bodies, to evaluate the ERM practices in PLCs.Keywords: enterprise risk management, human capital, organizational performance, Malaysian public listed companies
Procedia PDF Downloads 19513381 Impact of Climate Variation on Natural Vegetations and Human Lives in Thar Desert, Pakistan
Authors: Sujo Meghwar, Zulfqar Ali laghari, Kanji Harijan, Muhib Ali Lagari, G. M. Mastoi, Ali Mohammad Rind
Abstract:
Thar Desert is the most populous Desert of the world. Climate variation in Thar Desert has induced an increase in the magnitude of drought. The variation in climate variation has caused a decrease in natural vegetations. Some plant species are eliminated forever. We have applied the SPI (standardized precipitation index) climate model to investigate the drought induced by climate change. We have gathered the anthropogenic response through a developed questionnaire. The data was analyzed in SPSS version 18. The met-data of two meteorological station elaborated by the time series has suggested an increase in temperature from 1-2.5 centigrade, the decrease in rain fall rainfall from 5-25% and reduction in humidity from 5-12 mm in the 20th century. The anthropogenic responses indicate high impact of climate change on human life and vegetations. Triangle data, we have collected, gives a new insight into the understanding of an association between climate change, drought and human activities.Keywords: Thar desert, human impact, vegetations, temperature, rainfall, humidity
Procedia PDF Downloads 40413380 A Review of Physiological Measures for Cognitive Workload Assessment of Aircrew
Authors: Naveed Tahir, Adnan Maqsood
Abstract:
Cognitive workload is a significant factor affecting user performance, and it has been broadly investigated for its application in ergonomics as well as in designing and optimizing effective human-machine interactions. It is mentally challenging to maneuver an aircraft, and pilots must control the aircraft and adequately communicate to the verbal-auditory stimuli. Several physiological measures have long been researched and used to demonstrate the cognitive workload. In our current study, we have summarized recent findings of the effectiveness, accuracy, and applicability of commonly used physiological measures in evaluating cognitive workload. We have also highlighted on the advancements in physiological measures. The strength and limitations of physiological measures have also been discussed to assess the cognitive workload of people, especially the aircrews in laboratory settings and real-time situations. We have presented the research findings of the physiological measures to base suggestions on the proper applications of the measures and settings demanding the use of single measure or their combinations.Keywords: aircrew, cognitive workload, subjective measure, physiological measure, performance measure
Procedia PDF Downloads 16213379 The Violations of Human Rights After the February Revolution in Libya
Authors: Abdsalam Alahwal, Suren Pillay
Abstract:
Libya saw the occurrence of violations of human rights on a large scale as well as the deterioration of the rule of law in large parts of the country after the February 17 revolution that removed the Colonel Muammar Gaddafi from power in what is known upheaval of the Arab Spring. Although Libya, a country with a modern democracy, but he has declared unconstitutional temporarily allowed to exercise all the rights of political, civil and judicial, but the presence of weapons in the hands of militias list on the basis of regional, tribal and ideology was the main reason for the deterioration of the humanitarian situation as well as the foreign intervention in Libya. Where reports stressed that violations are serious committed by the conflicting parties from power after the fall of Gaddafi of assassinations and kidnapping of identity and practices related to human trafficking Some of these reports indicate that some ethnic ingredients such as Tawergha and Epiphyseal where was deliberately targeted by some militias were displacement around the city because of their allegiance to the former regime after the war ended in 2012. It is noteworthy that many of these violations and abuses committed by these militias that participated overthrow Gaddafi may rise to war crimes and crimes against humanity. That the intervention in Libya, although it had a human purpose and under the pretext of reducing the political system of human rights violations, but that the main objective, which was behind the international intervention was to overthrow the existing political system and the elimination of Muammar Gaddafi.Keywords: Arab Spring, democracy, revolution , Libya
Procedia PDF Downloads 30213378 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 14813377 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 29013376 In-Vivo Association of Multivalent 11 Zinc Fingers Transcriptional Factors CTCF and Boris to YB-1 in Multiforme Glioma-RGBM Cell Line
Authors: Daruliza Kernain, Shaharum Shamsuddin, See Too Wei Cun
Abstract:
CTCF is a unique, highly conserved and ubiquitously expressed 11 zinc finger (ZF) transcriptional factor with multiple target sites. It is able to bind to various target sequences to perform different regulatory roles including promoter activation or repression, creating hormone-responsive gene silencing element, and functional block of enhancer-promoter interactions. The binding of CTCF to the essential binding site is through the combination of different ZF domain. On the other hand, BORIS for brother of the regulator of imprinted sites, which expressed only in the testis and certain cancer cell line is homology to CTCF 11 ZF domains. Since both transcriptional factors share the same ZF domains hence there is a possibility for both to bind to the same target sequences. In this study, the interaction of these two proteins to multi-functional Y-box DNA/RNA-binding factor, YB-1 was determined. The protein-protein interaction between CTCF/YB-1 and BORIS/YB-1 were discovered by Co-immuno-precipitation (CO-IP) technique through reciprocal experiment from RGBM total cell lysate. The results showed that both CTCF and BORIS were able to interact with YB-1 in Glioma RGBM cell line. To the best of our knowledge, this is the first findings demonstrating the ability of BORIS and YB-1 to form a complex in vivo.Keywords: immunoprecipitation, CTCF/BORIS/YB-1, transcription factor, molecular medicine
Procedia PDF Downloads 26613375 Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model
Authors: Dojoon Jung, Kiwoong Moon, Joong Lee
Abstract:
The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage.Keywords: human height, CCTV footage, 2D/3D matching, 3D human body model
Procedia PDF Downloads 24813374 Predictive Modelling Approaches in Food Processing and Safety
Authors: Amandeep Sharma, Digvaijay Verma, Ruplal Choudhary
Abstract:
Food processing is an activity across the globe that help in better handling of agricultural produce, including dairy, meat, and fish. The operations carried out in the food industry includes raw material quality authenticity; sorting and grading; processing into various products using thermal treatments – heating, freezing, and chilling; packaging; and storage at the appropriate temperature to maximize the shelf life of the products. All this is done to safeguard the food products and to ensure the distribution up to the consumer. The approaches to develop predictive models based on mathematical or statistical tools or empirical models’ development has been reported for various milk processing activities, including plant maintenance and wastage. Recently AI is the key factor for the fourth industrial revolution. AI plays a vital role in the food industry, not only in quality and food security but also in different areas such as manufacturing, packaging, and cleaning. A new conceptual model was developed, which shows that smaller sample size as only spectra would be required to predict the other values hence leads to saving on raw materials and chemicals otherwise used for experimentation during the research and new product development activity. It would be a futuristic approach if these tools can be further clubbed with the mobile phones through some software development for their real time application in the field for quality check and traceability of the product.Keywords: predictive modlleing, ann, ai, food
Procedia PDF Downloads 8213373 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan
Authors: Sehrish Qayyum
Abstract:
Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security
Procedia PDF Downloads 10613372 Study Protocol: Impact of a Sustained Health Promoting Workplace on Stock Price Performance and Beta - A Singapore Case
Authors: Wee Tong Liaw, Elaine Wong Yee Sing
Abstract:
Since 2001, many companies in Singapore have voluntarily participated in the bi-annual Singapore HEALTH Award initiated by the Health Promotion Board of Singapore (HPB). The Singapore HEALTH Award (SHA), is an industry wide award and assessment process. SHA assesses and recognizes employers in Singapore for implementing a comprehensive and sustainable health promotion programme at their workplaces. The rationale for implementing a sustained health promoting workplace and participating in SHA is obvious when company management is convinced that healthier employees, business productivity, and profitability are positively correlated. However, performing research or empirical studies on the impact of a sustained health promoting workplace on stock returns are not likely to yield any interests in the absence of a systematic and independent assessment on the comprehensiveness and sustainability of a health promoting workplace in most developed economies. The principles of diversification and mean-variance efficient portfolio in Modern Portfolio Theory developed by Markowitz (1952) laid the foundation for the works of many financial economists and researchers, and among others, the development of the Capital Asset Pricing Model from the work of Sharpe (1964), Lintner (1965) and Mossin (1966), and the Fama-French Three-Factor Model of Fama and French (1992). This research seeks to support the rationale by studying whether there is a significant relationship or impact of a sustained health promoting workplace on the performance of companies listed on the SGX. The research shall form and test hypotheses pertaining to the impact of a sustained health promoting workplace on company’s performances, including stock returns, of companies that participated in the SHA and companies that did not participate in the SHA. In doing so, the research would be able to determine whether corporate and fund manager should consider the significance of a sustained health promoting workplace as a risk factor to explain the stock returns of companies listed on the SGX. With respect to Singapore’s stock market, this research will test the significance and relevance of a health promoting workplace using the Singapore Health Award as a proxy for non-diversifiable risk factor to explain stock returns. This study will examine the significance of a health promoting workplace on a company’s performance and study its impact on stock price performance and beta and examine if it has higher explanatory power than the traditional single factor asset pricing model CAPM (Capital Asset Pricing Model). To study the significance there are three key questions pertinent to the research study. I) Given a choice, would an investor be better off investing in a listed company with a sustained health promoting workplace i.e. a Singapore Health Award’s recipient? II) The Singapore Health Award has four levels of award starting from Bronze, Silver, Gold to Platinum. Would an investor be indifferent to the level of award when investing in a listed company who is a Singapore Health Award’s recipient? III) Would an asset pricing model combining FAMA-French Three Factor Model and ‘Singapore Health Award’ factor be more accurate than single factor Capital Asset Pricing Model and the Three Factor Model itself?Keywords: asset pricing model, company's performance, stock prices, sustained health promoting workplace
Procedia PDF Downloads 36913371 Measuring Fluctuating Asymmetry in Human Faces Using High-Density 3D Surface Scans
Authors: O. Ekrami, P. Claes, S. Van Dongen
Abstract:
Fluctuating asymmetry (FA) has been studied for many years as an indicator of developmental stability or ‘genetic quality’ based on the assumption that perfect symmetry is ideally the expected outcome for a bilateral organism. Further studies have also investigated the possible link between FA and attractiveness or levels of masculinity or femininity. These hypotheses have been mostly examined using 2D images, and the structure of interest is usually presented using a limited number of landmarks. Such methods have the downside of simplifying and reducing the dimensionality of the structure, which will in return increase the error of the analysis. In an attempt to reach more conclusive and accurate results, in this study we have used high-resolution 3D scans of human faces and have developed an algorithm to measure and localize FA, taking a spatially-dense approach. A symmetric spatially dense anthropometric mask with paired vertices is non-rigidly mapped on target faces using an Iterative Closest Point (ICP) registration algorithm. A set of 19 manually indicated landmarks were used to examine the precision of our mapping step. The protocol’s accuracy in measurement and localizing FA is assessed using simulated faces with known amounts of asymmetry added to them. The results of validation of our approach show that the algorithm is perfectly capable of locating and measuring FA in 3D simulated faces. With the use of such algorithm, the additional captured information on asymmetry can be used to improve the studies of FA as an indicator of fitness or attractiveness. This algorithm can especially be of great benefit in studies of high number of subjects due to its automated and time-efficient nature. Additionally, taking a spatially dense approach provides us with information about the locality of FA, which is impossible to obtain using conventional methods. It also enables us to analyze the asymmetry of a morphological structures in a multivariate manner; This can be achieved by using methods such as Principal Components Analysis (PCA) or Factor Analysis, which can be a step towards understanding the underlying processes of asymmetry. This method can also be used in combination with genome wide association studies to help unravel the genetic bases of FA. To conclude, we introduced an algorithm to study and analyze asymmetry in human faces, with the possibility of extending the application to other morphological structures, in an automated, accurate and multi-variate framework.Keywords: developmental stability, fluctuating asymmetry, morphometrics, 3D image processing
Procedia PDF Downloads 14013370 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 8413369 Glycation of Serum Albumin: Cause Remarkable Alteration in Protein Structure and Generation of Early Glycation End Products
Authors: Ishrat Jahan Saifi, Sheelu Shafiq Siddiqi, M. R. Ajmal
Abstract:
Glycation of protein is very important as well as a harmful process, which may lead to develop DM in human body. Human Serum Albumin (HSA) is the most abundant protein in blood and it is highly prone to glycation by the reducing sugars. 2-¬deoxy d-¬Ribose (dRib) is a highly reactive reducing sugar which is produced in cells as a product of the enzyme thymidine phosphorylase. It is generated during the degradation of DNA in human body. It may cause glycation in HSA rapidly and is involved in the development of DM. In present study, we did in¬vitro glycation of HSA with different concentrations of 2-¬deoxy d-¬ribose and found that dRib glycated HSA rapidly within 4h incubation at 37◦C. UV¬ Spectroscopy, Fluorescence spectroscopy, Fourier transform infrared spectroscopy (FTIR) and Circular Dichroism (CD) technique have been done to determine the structural changes in HSA upon glycation. Results of this study suggested that dRib is the potential glycating agent and it causes alteration in protein structure and biophysical properties which may lead to development and progression of Diabetes mellitus.Keywords: 2-deoxy D-ribose, human serum albumin, glycation, diabetes mellitus
Procedia PDF Downloads 21013368 Health and Safety of Red Cross Workers in Long-Term Homes during Early Days of the COVID-19 Pandemic: A Human Performance Perspective
Authors: Douglas J. Kube
Abstract:
At the beginning of the COVID-19 pandemic, the Canadian Red Cross deployed workers into long-term care homes across Canada to support our most vulnerable citizens. It began by recruiting and training small teams of workers to provide non-clinical services for facilities in outbreak. Deployed workers were trained on an approach based on successful Red Cross deployments used with Ebola in which zones were established, levels of protection used, and strict protocols followed to prevent exposure. This paper addresses aspects of human performance through a safety culture lens. The Red Cross deployments highlight valuable insights and are an excellent case study in the principles of human performance and organizational culture. This paper looks at human performance principles, including human fallibility, predictability of error-likely situations, avoiding events by understanding reasons mistakes occur, and the influence on behaviour by organizational factors. This study demonstrates how the Red Cross’s organizational culture and work design positively influenced performance to protect workers and residents/clients. Lastly, this paper shares lessons that can be applied in many workplaces to improve worker health and safety and safety culture. This critical examination is based on the author’s experience as a Senior Occupational Health and Safety Advisor with the Red Cross during the pandemic as part of the team responsible for developing and implementing biological safety practices in long-term care deployments.Keywords: COVID, human performance, organizational culture, work design
Procedia PDF Downloads 5813367 Human Rabies Survivors in India: Epidemiological, Immunological and Virological Studies
Authors: Madhusudana S. N., Reeta Mani, Ashwini S. Satishchandra P., Netravati, Udhani V., Fiaz A., Karande S.
Abstract:
Rabies is an acute encephalitis which is considered 100% fatal despite occasional reports of survivors. However, in recent times more cases of human rabies survivors are being reported. In the last 5 years, there are six laboratories confirmed human rabies survivors in India alone. All cases were children below 15 years and all contracted the disease by dog bites. All of them also had received the full or partial course of rabies vaccination and 4 out of 6 had also received rabies immunoglobulin. All cases were treated in intensive care units in hospitals at Bangalore, Mumbai, Chandigarh, Lucknow and Goa. We report here the results of immunological and virological studies conducted at our laboratory on these patients. The clinical samples that were obtained from these patients were Serum, CSF, nuchal skin biopsy and saliva. Serum and CSF samples were subjected to standard RFFIT for estimation of rabies neutralizing antibodies. Skin biopsy, CSF and saliva were processed by TaqMan real-time PCR for detection of viral RNA. CSF, saliva and skin homogenates were also processed for virus isolation by inoculation of suckling mice. The PBMCs isolated from fresh blood was subjected to ELISPOT assay to determine the type of immune response (Th1/Th2). Both CSF and serum were also investigated for selected cytokines by Luminex assay. The level of antibodies to virus G protein and N protein were determined by ELISA. All survivors had very high titers of RVNA in serum and CSF 100 fold higher than non-survivors and vaccine controls. A five-fold rise in titer could be demonstrated in 4 out of 6 patients. All survivors had a significant increase in antibodies to G protein in both CSF and serum when compared to non-survivors. There was a profound and robust Th1 response in all survivors indicating that interferon gamma could play an important factor in virus clearance. We could isolate viral RNA in only one patient four years after he had developed symptoms. The partial N gene sequencing revealed 99% homology to species I strain prevalent in India. Levels of selected cytokines in CSF and serum did not reveal any difference between survivors and non-survivors. To conclude, survival from rabies is mediated by virus-specific immune responses of the host and clearance of rabies virus from CNS may involve the participation of both Th2 and Th1 immune responses.Keywords: rabies, rabies treatment, rabies survivors, immune reponse in rabies encephalitis
Procedia PDF Downloads 33013366 Temperamental Determinants of Eye-Hand Coordination Formation in the Special Aerial Gymnastics Instruments (SAGI)
Authors: Zdzisław Kobos, Robert Jędrys, Zbigniew Wochyński
Abstract:
Motor activity and good health are sine qua non determinants of a proper practice of the profession, especially aviation. Therefore, candidates to the aviation are selected according their psychomotor ability by both specialist medical commissions. Moreover, they must past an examination of the physical fitness. During the studies in the air force academy, eye-hand coordination is formed in two stages. The future aircraft pilots besides all-purpose physical education must practice specialist training on SAGI. Training includes: looping, aerowheel, and gyroscope. Aim of the training on the above listed apparatuses is to form eye-hand coordination during the tasks in the air. Such coordination is necessary to perform various figures in the real flight. Therefore, during the education of the future pilots, determinants of the effective ways of this important parameter of the human body functioning are sought for. Several studies of the sport psychology indicate an important role of the temperament as a factor determining human behavior during the task performance and acquiring operating skills> Polish psychologist Jan Strelau refers to the basic, relatively constant personality features which manifest themselves in the formal characteristics of the human behavior. Temperament, being initially determined by the inborn physiological mechanisms, changes in the course of maturation and some environmental factors and concentrates on the energetic level and reaction characteristics in time. Objectives. This study aimed at seeking a relationship between temperamental features and eye-hand coordination formation during training on SAGI. Material and Methods: Group of 30 students of pilotage was examined in two situations. The first assessment of the eye-hand coordination level was carried out before the beginning of a 30-hour training on SAGI. The second assessment was carried out after training completion. Training lasted for 2 hours once a week. Temperament was evaluated with The Formal Characteristics of Behavior − Temperament Inventory (FCB-TI) developed by Bogdan Zawadzki and Jan Strelau. Eye-hand coordination was assessed with a computer version of the Warsaw System of Psychological Tests. Results: It was found that the training on SAGI increased the level of eye-hand coordination in the examined students. Conclusions: Higher level of the eye-hand coordination was obtained after completion of the training. Moreover, a relationship between eye-hand coordination level and selected temperamental features was statistically significant.Keywords: temperament, eye-hand coordination, pilot, SAGI
Procedia PDF Downloads 44013365 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 5913364 Important of Innovation for Entrepreneurs
Authors: Eetedal Alanjem, Majedah Alnajem
Abstract:
The importance of innovation in entrepreneurship can be seen in the invention of new ways to produce products or improved solutions. A service industry can expand with new or improved types of services to fulfill the ever changing needs of their clients. Manufacturers can come up with new products from raw materials and by-products. Innovation is vital for the durability of any business. Innovation usually begins with a need. Small businesses are generally directly involved in their communities and they know exactly what the communities need and strive to come up with solutions to fulfill those needs. They seize the opportunity to innovate to ease communal problems and make lives more comfortable. And then, these solutions keep getting better, easier and more useful as entrepreneurs and their small businesses come up with improved formulas and solutions. Keeping abreast with current trends and demands is an important factor for entrepreneurs to fuel their creativity and innovation. Manufacturers are constantly innovating to produce more without sacrificing quality. Small businesses should make innovation as a fundamental part of their organisational development since innovation creates business success. Entrepreneurs must not see just one solution to a need. They should come up with ideas for multiple solutions. It is imperative for small businesses to encourage growth of innovation among their employees. Competition is another factor that elevates the importance of innovation in entrepreneurship. It motivates entrepreneurs to come up with better, improved products and services than their competitors for a higher share of the market. In this paper will go in-depth for each factor and will discuss some of cases studies to know how innovation it’s important for entrepreneurs by facts & lessons?Keywords: innovation, entrepreneurship, creativity, organisational development
Procedia PDF Downloads 42113363 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain
Authors: Tarun Chand, Michael Jurczyk
Abstract:
With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development
Procedia PDF Downloads 67