Search results for: national security strategy
8200 Experimental Analysis of Control in Electric Vehicle Charging Station Based Grid Tied Photovoltaic-Battery System
Authors: A. Hassoune, M. Khafallah, A. Mesbahi, T. Bouragba
Abstract:
This work presents an improved strategy of control for charging a lithium-ion battery in an electric vehicle charging station using two charger topologies i.e. single ended primary inductor converter (SEPIC) and forward converter. In terms of rapidity and accuracy, the power system consists of a topology/control diagram that would overcome the performance constraints, for instance the power instability, the battery overloading and how the energy conversion blocks would react efficiently to any kind of perturbations. Simulation results show the effectiveness of the proposed topologies operated with a power management algorithm based on voltage/peak current mode controls. In order to provide credible findings, a low power prototype is developed to test the control strategy via experimental evaluations of the converter topology and its controls.Keywords: battery storage buffer, charging station, electric vehicle, experimental analysis, management algorithm, switches control
Procedia PDF Downloads 1658199 Pattern Recognition Based on Simulation of Chemical Senses (SCS)
Authors: Nermeen El Kashef, Yasser Fouad, Khaled Mahar
Abstract:
No AI-complete system can model the human brain or behavior, without looking at the totality of the whole situation and incorporating a combination of senses. This paper proposes a Pattern Recognition model based on Simulation of Chemical Senses (SCS) for separation and classification of sign language. The model based on human taste controlling strategy. The main idea of the introduced model is motivated by the facts that the tongue cluster input substance into its basic tastes first, and then the brain recognizes its flavor. To implement this strategy, two level architecture is proposed (this is inspired from taste system). The separation-level of the architecture focuses on hand posture cluster, while the classification-level of the architecture to recognizes the sign language. The efficiency of proposed model is demonstrated experimentally by recognizing American Sign Language (ASL) data set. The recognition accuracy obtained for numbers of ASL is 92.9 percent.Keywords: artificial intelligence, biocybernetics, gustatory system, sign language recognition, taste sense
Procedia PDF Downloads 2948198 Factors Affecting the Effective Management of the Employee Welfare Fund at the Department of Labour Protection and Welfare
Authors: Nareerut Rodwring
Abstract:
The purposes of this research were to study the current problems of the management of welfare fund at the department of labor protection and welfare, to study important factors affecting the management of welfare fund at the department of labor protection and welfare, to study major influences of the management of welfare fund at the department of labor protection and welfare, and finally to propose the proper guidelines for the management of welfare fund at the department of labor protection and welfare. This research study utilized the information from document, laws, rules, and regulations of the government, handbook for welfare, and government policy in the past. Moreover, the qualitative research was conducted by retrieving insight information from key informants, 15 persons for the committee of welfare employees, and 10 persons from a high level of management in the welfare area, academics, and experts. In terms of quantitative method, the study covers all 76 provinces and 10 areas of Bangkok. Independent variables included strategy, structure, shared value, system, whereas the dependent variables included the management factors such as speed, punctuation, and quality of work.Keywords: strategy, welfare, labor protection, management
Procedia PDF Downloads 1798197 Association of Laterality and Sports Specific Rotational Preference with Number of Injuries in Artistic Gymnasts
Authors: Teja Joshi
Abstract:
Laterality has shown to play a role in performance as well as injuries especially in unilateral sports disciplines. Uniquely, Artistic Gymnastics involves combination of unilateral, bilateral and complex multi-planer elements as well as gymnastics specific rotational preference. Therefore, this study was conducted to explore if any such preferences are associated with number of injuries in artistic gymnasts. To explore the association between lateral preferences, rotational preferences and injuries incidence in artistic gymnastics. Artistic gymnasts above 16 years of age, were invited to participate in an online survey. The survey included consent, lateral preference inventory, injury data collection according to anatomical locations and rotational preference for selected gymnastics elements performed on the floor exercise. SPSS version 24 was used to analyse Non-parametric data using Kruskal-Wallis (K- independent test) test. Multiple regression was performed to identify the predictor for injuries and their side in gymnasts. Total number of injuries per gymnast was associated with handedness (p value-0.049) and no significant association was noted for footdness (p value-0.207), eyedness (p value-0.491) and eardness (p value-0.798). Additionally, rotational preferences did not influence number of injuries (p value-0.521). In multiple regression, eyedness was identified as a predicting factor to determine the number of injuries. Rotational preferences were neither determined as a national strategy nor a product of lateral preference. Dominant hand had higher number of injuries in artistic gymnasts. Rotational preference is independent of laterality, number of injuries and nationality.Keywords: sports injury, rotational preference, gymnastics, handedness
Procedia PDF Downloads 1198196 Water Infrastructure Asset Management: A Comparative Analysis of Three Urban Water Utilities in South Africa
Authors: Elkington S. Mnguni
Abstract:
Water and sanitation services in South Africa are characterized by both achievements and challenges. After the end of apartheid in 1994 the newly elected government faced the challenge of eradicating backlogs with respect to access to basic services, including water and sanitation. Capital investment made in the development of new water and sanitation infrastructure to provide basic services to previously disadvantaged communities has grown, to a certain extent, at the expense of investment in the operation and maintenance of new and existing infrastructure. Challenges resulting from aging infrastructure and poor plant performance highlight the need for investing in the maintenance, rehabilitation, and replacement of existing infrastructure to optimize the return on investment. Advanced water infrastructure asset management (IAM) is key to achieving adequate levels of service, particularly with regard to reliable and high quality drinking water supply, prevention of urban flooding, efficient use of natural resources and prevention of pollution and associated risks. Against this backdrop, this paper presents an appraisal of water and sanitation IAM systems in South Africa’s three utilities, being metropolitan cities in the Gauteng Province. About a quarter of the national population lives in the three rapidly urbanizing cities of Johannesburg, Ekurhuleni and Tshwane, located in a semi-arid region. A literature review has been done and field visits to some of the utility facilities are being conducted. Semi-structured interviews will be conducted with the three utilities. The following critical factors are being analysed in terms of compliance with the national Water Services IAM Strategy (2011) and other applicable legislation: asset registers; capacity of assets; current and predicted demand; funding availability / budget allocations; plans: operation & maintenance, renewal & replacement, and risk management; no-drop status (non-revenue water levels); blue drop status (water quality); green drop status (effluent quality); and skills availability. Some of the key challenges identified in the literature review include: funding constraints, Skills shortage, and wastewater treatment plants operating beyond their design capacities. These challenges will be verified during field visits and research interviews. Gaps between literature and practice will be identified and relevant recommendations made if necessary. The objective of this study is to contribute to the resolution of the challenges brought about by the backlogs in the operation and maintenance of water and sanitation assets in the country in general, and in the three cities in particular, thus improving the sustainability thereof.Keywords: asset management, backlogs, levels of service, sustainability, water and sanitation infrastructure
Procedia PDF Downloads 2288195 Review and Comparison of Iran`s Sixteenth Topic of the Building with the Ranking System of the Water Sector Lead to Improve the Criteria of the Sixteenth Topic
Authors: O. Fatemi
Abstract:
Considering growing building construction industry in developing countries and sustainable development concept, as well as the importance of taking care of the future generations, codifying buildings scoring system based on environmental criteria, has always been a subject for discussion. The existing systems cannot be used for all the regions due to several reasons, including but not limited to variety in regional variables. In this article, the most important common LEED (Leadership in Energy and Environmental Design) and BREEAM (Building Research Establishment Environmental Assessment Method) common and Global environmental scoring systems, used in UK, USA, and Japan, respectively, have been discussed and compared with a special focus on CASBEE (Comprehensive Assessment System for Built Environment Efficiency), to credit assigning field (weighing and scores systems) as well as sustainable development criteria in each system. Then, converging and distinct fields of the foregoing systems are examined considering National Iranian Building Code. Furthermore, the common credits in the said systems not mentioned in National Iranian Building Code have been identified. These credits, which are generally included in well-known fundamental principles in sustainable development, may be considered as offered options for the Iranian building environmental scoring system. It is suggested that one of the globally and commonly accepted systems is chosen considering national priorities in order to offer an effective method for buildings environmental scoring, and then, a part of credits is added and/or removed, or a certain credit score is changed, and eventually, a new scoring system with a new title is developed for the country. Evidently, building construction industry highly affects the environment, economy, efficiency, and health of the relevant occupants. Considering the growing trend of cities and construction, achieving building scoring systems based on environmental criteria has always been a matter of discussion. The existing systems cannot be used for all the regions due to several reasons, including but not limited to variety in regional variables.Keywords: scoring system, sustainability assessment, water efficiency, national Iranian building code
Procedia PDF Downloads 1818194 Operation Strategies of Residential Micro Combined Heat and Power Technologies
Authors: Omar A. Shaneb, Adell S. Amer
Abstract:
Reduction of CO2 emissions has become a priority for several countries due to increasing concerns about global warming and climate change, especially in the developed countries. Residential sector is considered one of the most important sectors for considerable reduction of CO2 emissions since it represents a significant amount of the total consumed energy in those countries. A significant CO2 reduction cannot be achieved unless some initiatives have been adopted in the policy of these countries. Introducing micro combined heat and power (µCHP) systems into residential energy systems is one of these initiatives, since such a technology offers several advantages. Moreover, µCHP technology has the opportunity to be operated not only by natural gas but it could also be operated by renewable fuels. However, this technology can be operated by different operation strategies. Each strategy has some advantages and disadvantages. This paper provides a review of different operation strategies of such a technology used for residential energy systems, especially for single dwellings. The review summarizes key points that outline the trend of previous research carried out in this field.Keywords: energy management, µCHP systems, residential energy systems, sustainable houses, operation strategy.
Procedia PDF Downloads 4298193 The Lethal Autonomy and Military Targeting Process
Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk
Abstract:
The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)
Procedia PDF Downloads 4288192 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 2508191 The Relation between Coping Strategies with Stress and Mental Health Situation in Flying Addicted Family of Self Introducer and Private
Authors: Farnoush Haghanipour
Abstract:
Recent research studies relation between coping strategies with stress and mental health situation in flying addicted family of self-introducer and private, Units of Guilan province. For this purpose 251 family (parent, spouse), that referred to private and self-introducer centers to break out of drug are selected in random sampling form. Research method was cross sectional-descriptive and purpose of research was fixing of between kinds of coping strategies with stress and mental health condition with attention to demographic variables. Therefore to collection of information, coping strategies questionnaire (CSQ) and mental health questionnaire (GHQ) was used and finally data analyzed by descriptive statistical methods (average, standard deviation) and inferential statistical correlation coefficient and regression. Study of correlation coefficient between mental healths with problem focused emotional focused and detachment strategies in level more than %99 is confirmed. Also mental health with avoidant focused hasn't correlation in other words relation is between mental health with problem focused strategies (r= 0/34) and emotional focused with mental health (r=0.52) and detachment with mental health (r= 0.18) in meaningful level 0.05. And also relation is between emotional focused strategies and mental health (r= 0.034) that is meaningless in Alpha 0.05. Also relation between problem processed coping strategies and mental health situation with attention to demographic variable is meaningful and relation level verified in confidence level more than 0.99. And result of anticipation equation regression statistical test has most a have in problem focused coping strategy, mental health, but relation of the avoidant emotional, detachment strategy with mental health was meaningless with attention to demographic variables.Keywords: stress, coping strategy with stress, mental health, self introducer and private
Procedia PDF Downloads 3108190 Flexible Mixed Model Assembly Line Design: A Strategy to Respond for Demand Uncertainty at Automotive Part Manufacturer in Indonesia
Authors: T. Yuri, M. Zagloel, Inaki M. Hakim, Tegu Bintang Nugraha
Abstract:
In an era of customer centricity, automotive parts manufacturer in Indonesia must be able to keep up with the uncertainty and fluctuation of consumer demand. Flexible Manufacturing System (FMS) is a strategy to react to predicted and unpredicted changes of demand in automotive industry. This research is about flexible mixed model assembly line design through Value Stream Mapping (VSM) and Line Balancing in mixed model assembly line prior to simulation. It uses value stream mapping to identify and reduce waste while finding the best position to add or reduce manpower. Line balancing is conducted to minimize or maximize production rate while increasing assembly line productivity and efficiency. Results of this research is a recommendation of standard work combination for specifics demand scenario which can enhance assembly line efficiency and productivity.Keywords: automotive industry, demand uncertainty, flexible assembly system, line balancing, value stream mapping
Procedia PDF Downloads 3308189 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges
Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold
Abstract:
If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience
Procedia PDF Downloads 1868188 PUF-Based Lightweight Iot Secure Authentication Chip Design
Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He
Abstract:
This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.Keywords: PUF, IoT, authentication, secure communication, encryption, XOR
Procedia PDF Downloads 1418187 Fusion Neutron Generator Dosimetry and Applications for Medical, Security, and Industry
Authors: Kaouther Bergaui, Nafaa Reguigui, Charles Gary
Abstract:
Characterization and the applications of deuterium-deuterium (DD) neutron generator developed by Adelphie technology and acquired by the National Centre of Nuclear Science and Technology (NCNST) were presented in this work. We study the performance of the neutron generator in terms of neutron yield, production efficiency, and the ionic current as a function of the acceleration voltage at various RF powers. We provide the design and optimization of the PGNAA chamber and thus give insight into the capabilities of the planned PGNAA facility. Additional non-destructive techniques were studied employing the DD neutron generator, such as PGNAA and neutron radiography: The PGNAA is used for determining the concentration of 10B in Si and SiO2 matrices by using a germanium detector HPGe and the results obtained are compared with PGNAA system using a Sodium Iodide detector (NaI (Tl)); Neutron radiography facility was tested and simulated, using a camera device CCD and simulated by the Monte Carlo code; and the explosive detection system (EDS) also simulated using the Monte Carlo code. The study allows us to show that the new models of DD neutron generators are feasible and that superior-quality neutron beams could be produced and used for various applications. The feasibility of Boron neutron capture therapy (BNCT) for cancer treatment using a neutron generator was assessed by optimizing Beam Shaping Assembly (BSA) on a phantom using Monte-Carlo (MCNP6) simulations.Keywords: neutron generator deuterium-deuterium, Monte Carlo method, radiation, neutron flux, neutron activation analysis, born, neutron radiography, explosive detection, BNCT
Procedia PDF Downloads 1948186 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy
Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi
Abstract:
Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.Keywords: terrorism, economy, Boko Haram, Nigeria
Procedia PDF Downloads 2618185 Research on the Relationship between Localization Strategic Human Resource Management Practices and Firm Performance: A Comparison of Japanese Multinational Enterprise Subsidiaries in Vietnam
Authors: Nana Weng
Abstract:
Firstly, based on two diamond models and Value-Rarity-Inimitability-Organization framework, this paper analyzes the Country Specific factors of and firm specific factors which influence subsidiaries’ sustainable competitive advantage. Then, according to the main content of Strategic Human Resource Management (SHRM) research that HRM strategy should fit into corporate strategy, we explained what the SHRM practices should be in the context of localization strategies within Multinational Enterprise (MNE) companies. Then we choose two Japanese MNE subsidiaries in the same industry and tested the hypothesis that localization SHRM practices positively impact on subsidiary’s sustainable competitive advantage, further positively affect firm integrated performance (both financial performance and organizational and organizational performance) lever through High Performance Work Practices (HPWPs) of local employees.Keywords: localization SHRM, firm integrated performance, Japanese MNE subsidiaries, Vietnam
Procedia PDF Downloads 3808184 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 4508183 The Provisional National Defense Council cum National Democratic Congress Government and Tourism Development in Ghana: A Reflection
Authors: Yobo Opare-Addo
Abstract:
Ghana came under a military and democratic rule of the same leadership from 1981-2000. These were the Provisional National Defense Council (PNDC), a military government and a democratic government, the National Democratic Congress (NDC) both under the leadership of Flt. Lt. J.J. Rawlings. Meanwhile the year 1985 marked a turning point in the development of the tourism industry in Ghana. Interest in tourism among African governments and for that matter the ‘PNDC cum NDC Government’ (PNDC/NDC) arose because of adverse developments in intangible exports and a corresponding decline in commodity export earnings. The ‘PNDC/NDC Government’ undertook measures and policies to improve the tourism industry and at the same time embarked on export diversification to reap the foreign exchange that the industry could generate in Ghana. The objective of this paper is to examine the measures and policies of the PNDC/NDC to improve the tourism industry in order to reap the foreign exchange. It specifically interrogates the role of the government as an agent of tourism development, through its deliberate creation of a conducive environment for tourism to flourish, the involvement of the private sector both foreign and local and the provision of tourism facilities and infrastructure and how these factors impacted on the tourism industry in Ghana. In the final analysis it evaluates the degree of success of the PNDC/NDC Government in this arena of Ghana’s socio-cultural and economic development. Introduction The Provisional National Defense Council (PNDC), a military government under the leadership of Flt. Lt J.J. Rawlings overthrew a constitutionally elected government of People’s National Party in 1981. In 1992, the National Democratic Congress (NDC) won the general election conducted in December. Flt. Lt. J.J. Rawlings, the party’s leader became the President of the Fourth Republic from January 1993 to December 2000. It was refreshing to see Ghanaians embrace democracy with renewed energy, zeal, and enthusiasm. This paper takes a critical look at the efforts of the PNDC cum NDC Government (PNDC/NDC) to develop tourism in Ghana during the period from 1981-2000 Methodology: Qualitative method of research was adopted for the study. Data was collected from both primary and secondary sources, and analysis was done using descriptive analysis because descriptive analysis made it possible to describe or summarize the statistical data in the research. To gather data from primary sources, questionnaires, oral interviews, and semi-structured discussions were conducted. Respondents included public officials from Ghana Tourist Board, Ministry of Tourism, Hoteliers, restaurant operators and travel and tour operators in Accra. Secondary data sources included articles in journals, reports, magazines, bulletins, and books. The major findings included statistical data for tourism arrivals and receipts during the period and the status of the industry by the year 2000. Conclusion: The paper contributes to knowledge on political and historical aspects of tourism development in Ghana, which is almost non-existent, attitudes of the PNDC cum NDC government towards tourism development and the debates on the generation of foreign exchange to Ghana and third world countries.Keywords: ghana, infrastructure, policies, privatization, tourism facilities
Procedia PDF Downloads 868182 Using ANN in Emergency Reconstruction Projects Post Disaster
Authors: Rasha Waheeb, Bjorn Andersen, Rafa Shakir
Abstract:
Purpose The purpose of this study is to avoid delays that occur in emergency reconstruction projects especially in post disaster circumstances whether if they were natural or manmade due to their particular national and humanitarian importance. We presented a theoretical and practical concepts for projects management in the field of construction industry that deal with a range of global and local trails. This study aimed to identify the factors of effective delay in construction projects in Iraq that affect the time and the specific quality cost, and find the best solutions to address delays and solve the problem by setting parameters to restore balance in this study. 30 projects were selected in different areas of construction were selected as a sample for this study. Design/methodology/approach This study discusses the reconstruction strategies and delay in time and cost caused by different delay factors in some selected projects in Iraq (Baghdad as a case study).A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. Project participants from the case projects provided data about the projects through a data collection instrument distributed through a survey. Mixed approach and methods were applied in this study. Mathematical data analysis was used to construct models to predict delay in time and cost of projects before they started. The artificial neural networks analysis was selected as a mathematical approach. These models were mainly to help decision makers in construction project to find solutions to these delays before they cause any inefficiency in the project being implemented and to strike the obstacles thoroughly to develop this industry in Iraq. This approach was practiced using the data collected through survey and questionnaire data collection as information form. Findings The most important delay factors identified leading to schedule overruns were contractor failure, redesigning of designs/plans and change orders, security issues, selection of low-price bids, weather factors, and owner failures. Some of these are quite in line with findings from similar studies in other countries/regions, but some are unique to the Iraqi project sample, such as security issues and low-price bid selection. Originality/value we selected ANN’s analysis first because ANN’s was rarely used in project management , and never been used in Iraq to finding solutions for problems in construction industry. Also, this methodology can be used in complicated problems when there is no interpretation or solution for a problem. In some cases statistical analysis was conducted and in some cases the problem is not following a linear equation or there was a weak correlation, thus we suggested using the ANN’s because it is used for nonlinear problems to find the relationship between input and output data and that was really supportive.Keywords: construction projects, delay factors, emergency reconstruction, innovation ANN, post disasters, project management
Procedia PDF Downloads 1658181 Dental Pathologies and Diet in Pre-hispanic Populations of the Equatorial Pacific Coast: Literature Review
Authors: Ricardo Andrés Márquez Ortiz
Abstract:
Objective. The objective of this literature review is to compile updated information from studies that have addressed the association between dental pathologies and diet in prehistoric populations of the equatorial Pacific coast. Materials and method. The research carried out corresponds to a documentary study of ex post facto retrospective, historiographic and bibliometric design. A bibliographic review search was carried out in the libraries of the Colombian Institute of Anthropology and History (ICANH) and the National University of Colombia for books and articles on the archeology of the region. In addition, a search was carried out in databases and the Internet for books and articles on dental anthropology, archeology and dentistry on the relationship between dental pathologies and diet in prehistoric and current populations from different parts of the world. Conclusions. The complex societies (500 BC - 300 AD) of the equatorial Pacific coast used an agricultural system of intensive monoculture of corn (Zea mays). This form of subsistence was reflected in an intensification of dental pathologies such as dental caries, dental abscesses generated by cavities, and enamel hypoplasia associated with a lower frequency of wear. The Upper Formative period (800 A.D. -16th century A.D.) is characterized by the development of polyculture, slash-and-burn agriculture, as an adaptive agricultural strategy to the ecological damage generated by the intensive economic activity of complex societies. This process leads to a more varied diet, which generates better dental health.Keywords: dental pathologies, nutritional diet, equatorial pacific coast, dental anthropology
Procedia PDF Downloads 468180 Evaluating Oman's Green Transition: A Dynamic Stochastic General Equilibrium Analysis of Climate Policy Effects
Authors: Mohamed Chakroun
Abstract:
In this paper, we analyze the macroeconomic impacts of Oman’s strategy to transition to a green economy by 2050. Our objective is to determine the most effective climate policy instrument to facilitate this transition. By utilizing a Dynamic Stochastic General Equilibrium (DSGE) model, we assess the effectiveness of three climate policy tools: a carbon tax, subsidies to green assets, and taxes on brown assets. Our results indicate that a combination of a carbon tax, along with differentiated taxes and subsidies on green and brown assets, proves to the most effective policy in reducing emissions while maintaining macroeconomic stability. The findings of this study demonstrate the need for policymakers to balance the immediate goals of reducing emissions with the economic costs involved. Implementing a gradual transition strategy may be preferable as it allows for mitigating the negative economic impacts while facilitating the shift towards a green economy.Keywords: green economy, carbon tax, DSGE model, climate policy, sustainable growth
Procedia PDF Downloads 268179 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1138178 An Empirical Study for the Data-Driven Digital Transformation of the Indian Telecommunication Service Providers
Authors: S. Jigna, K. Nanda Kumar, T. Anna
Abstract:
Being a major contributor to the Indian economy and a critical facilitator for the country’s digital India vision, the Indian telecommunications industry is also a major source of employment for the country. Since the last few years, the Indian telecommunication service providers (TSPs), however, are facing business challenges related to increasing competition, losses, debts, and decreasing revenue. The strategic use of digital technologies for a successful digital transformation has the potential to equip organizations to meet these business challenges. Despite an increased focus on digital transformation, the telecom service providers globally, including Indian TSPs, have seen limited success so far. The purpose of this research was thus to identify the factors that are critical for the digital transformation and to what extent they influence the successful digital transformation of the Indian TSPs. The literature review of more than 300 digital transformation-related articles, mostly from 2013-2019, demonstrated a lack of an empirical model consisting of factors for the successful digital transformation of the TSPs. This study theorizes a research framework grounded in multiple theories, and a research model consisting of 7 constructs that may be influencing business success during the digital transformation of the organization was proposed. The questionnaire survey of senior managers in the Indian telecommunications industry was seeking to validate the research model. Based on 294 survey responses, the validation of the Structural equation model using the statistical tool ADANCO 2.1.1 was found to be robust. Results indicate that Digital Capabilities, Digital Strategy, and Corporate Level Data Strategy in that order has a strong influence on the successful Business Performance, followed by IT Function Transformation, Digital Innovation, and Transformation Management respectively. Even though Digital Organization did not have a direct significance on Business Performance outcomes, it had a strong influence on IT Function Transformation, thus affecting the Business Performance outcomes indirectly. Amongst numerous practical and theoretical contributions of the study, the main contribution for the Indian TSPs is a validated reference for prioritizing the transformation initiatives in their strategic roadmap. Also, the main contribution to the theory is the possibility to use the research framework artifact of the present research for quantitative validation in different industries and geographies.Keywords: corporate level data strategy, digital capabilities, digital innovation, digital strategy
Procedia PDF Downloads 1298177 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 168176 The Rise of Blue Water Navy and its Implication for the Region
Authors: Riddhi Chopra
Abstract:
Alfred Thayer Mahan described the sea as a ‘great common,’ which would serve as a medium for communication, trade, and transport. The seas of Asia are witnessing an intriguing historical anomaly – rise of an indigenous maritime power against the backdrop of US domination over the region. As China transforms from an inward leaning economy to an outward-leaning economy, it has become increasingly dependent on the global sea; as a result, we witness an evolution in its maritime strategy from near seas defense to far seas deployment strategies. It is not only patrolling the international waters but has also built a network of civilian and military infrastructure across the disputed oceanic expanse. The paper analyses the reorientation of China from a naval power to a blue water navy in an era of extensive globalisation. The actions of the Chinese have created a zone of high alert amongst its neighbors such as Japan, Philippines, Vietnam and North Korea. These nations are trying to align themselves so as to counter China’s growing brinkmanship, but China has been pursuing claims through a carefully calibrated strategy in the region shunning any coercive measures taken by other forces. If China continues to expand its maritime boundaries, its neighbors – all smaller and weaker Asian nations would be limited to a narrow band of the sea along its coastlines. Hence it is essential for the US to intervene and support its allies to offset Chinese supremacy. The paper intends to provide a profound analysis over the disputes in South China Sea and East China Sea focusing on Philippines and Japan respectively. Moreover, the paper attempts to give an account of US involvement in the region and its alignment with its South Asian allies. The geographic dynamics is said the breed a national coalition dominating the strategic ambitions of China as well as the weak littoral states. China has conducted behind the scenes diplomacy trying to persuade its neighbors to support its position on the territorial disputes. These efforts have been successful in creating fault lines in ASEAN thereby undermining regional integrity to reach a consensus on the issue. Chinese diplomatic efforts have also forced the US to revisit its foreign policy and engage with players like Cambodia and Laos. The current scenario in the SCS points to a strong Chinese hold trying to outspace all others with no regards to International law. Chinese activities are in contrast with US principles like Freedom of Navigation thereby signaling US to take bold actions to prevent Chinese hegemony in the region. The paper ultimately seeks to explore the changing power dynamics among various claimants where a rival superpower like US can pursue the traditional policy of alliance formation play a decisive role in changing the status quo in the arena, consequently determining the future trajectory.Keywords: China, East China Sea, South China Sea, USA
Procedia PDF Downloads 2418175 Knowledge Management Strategies within a Corporate Environment of Papers
Authors: Daniel J. Glauber
Abstract:
Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification
Procedia PDF Downloads 4428174 Quality of Life Responses of Students with Intellectual Disabilities Entering an Inclusive, Residential Post-Secondary Program
Authors: Mary A. Lindell
Abstract:
Adults with intellectual disabilities (ID) are increasingly attending postsecondary institutions, including inclusive residential programs at four-year universities. The legislation, national organizations, and researchers support developing postsecondary education (PSE) options for this historically underserved population. Simultaneously, researchers are assessing the quality of life indicators (QOL) for people with ID. This study explores the quality of life characteristics for individuals with ID entering a two-year PSE program. A survey aligned with the PSE program was developed and administered to participants before they began their college program (in future studies, the same survey will be administered 6 months and 1 year after graduating). Employment, income, and housing are frequently cited QOL measures. People with disabilities, and especially people with ID, are more likely to experience unemployment and low wages than people without disabilities. PSE improves adult outcomes (e.g., employment, income, housing) for people with and without disabilities. Similarly, adults with ID who attend PSE are more likely to be employed than their peers who do not attend PSE; however, adults with ID are least likely among their typical peers and other students with disabilities to attend PSE. There is increased attention to providing individuals with ID access to PSE and more research is needed regarding the characteristics of students attending PSE. This study focuses on the participants of a fully residential two-year program for individuals with ID. Students earn an Applied Skills Certificate while focusing on five benchmarks: self-care, home care, relationships, academics, and employment. To create a QOL measure, the goals of the PSE program were identified, and possible assessment items were initially selected from the National Core Indicators (NCI) and the National Transition Longitudinal Survey 2 (NTLS2) that aligned with the five program goals. Program staff and advisory committee members offered input on potential item alignment with program goals and expected value to students with ID in the program. National experts in researching QOL outcomes of people with ID were consulted and concurred that the items selected would be useful in measuring the outcomes of postsecondary students with ID. The measure was piloted, modified, and administered to incoming students with ID. Research questions: (1) In what ways are students with ID entering a two-year PSE program similar to individuals with ID who complete the NCI and NTLS2 surveys? (2) In what ways are students with ID entering a two-year PSE program different than individuals with ID who completed the NCI and NTLS2 surveys? The process of developing a QOL measure specific to a PSE program for individuals with ID revealed that many of the items in comprehensive national QOL measures are not relevant to stake-holders of this two-year residential inclusive PSE program. Specific responses of students with ID entering an inclusive PSE program will be presented as well as a comparison to similar items on national QOL measures. This study explores the characteristics of students with ID entering a residential, inclusive PSE program. This information is valuable for, researchers, educators, and policy makers as PSE programs become more accessible for individuals with ID.Keywords: intellectual disabilities, inclusion, post-secondary education, quality of life
Procedia PDF Downloads 998173 Research on Models and Selection of Entry Strategies for Catering Industry Based on the Evolutionary Game Theory
Authors: Jianxin Zhu, Na Liu
Abstract:
Entry strategies play a vital role in the development of new enterprises in the catering industry. Different entry strategies will have different effects on the development of new enterprise. Based on the research of scholars at home and abroad, and combining the characteristics of the catering industry, the entry strategies are divided into low-price entry strategies and high-quality entry strategies. Facing the entry of new enterprise, the strategies of incumbent enterprises are divided into response strategies and non-response strategies. This paper uses evolutionary game theory to study the strategic interaction mechanism between incumbent companies and new enterprises. When different initial values and parameter values are set, which strategy will the two-game subjects choose, respectively? Using matlab2016 for numerical simulation, the results show that the choice of strategies for new enterprise and incumbent enterprise is influenced by more than one factor, and the system has different evolution trends under different circumstances. When the parameters were set, the choice of two subjects' strategies mainly depends on the net profit between the strategies.Keywords: catering industry, entry strategy, evolutionary game, strategic interaction mechanism
Procedia PDF Downloads 1328172 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1568171 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Authors: Haowei Chen, Kaiqi Xiong
Abstract:
This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis
Procedia PDF Downloads 98