Search results for: access to finance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3820

Search results for: access to finance

1840 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 88
1839 The Effect of Perceived Organizational Support and Leader Member Exchange on Turnover Intention: A Field Study in the Healthcare Industry

Authors: Mehtap Öztürk, Adem Öğüt, Emine Öğüt

Abstract:

Leader member exchange is considered as relationship-based approach to leadership. The focal point of this theory is that effective leadership processes occur when leaders and followers are able to develop mature leadership relationships and thus gain access to a variety of benefits these relationships bring. In this context, it can be claimed that the quality of leader member exchange appears to have a strong affect on perceived organizational support and reduce turnover intention. The purpose of this study is to determine the relationship between the levels of leader member exchange, perceived organizational support and turnover intention on the employees of a health institution operating in the province of Konya. A field study based on survey method on 134 physicians who are employees of a health institution operating in the mentioned sample. In accordance with this purpose, it has been observed that there is a negative and statistically significant relationship between leader member exchange and turnover intention. Furthermore, it has been also realized that there is a negative and statistically significant relationship between perceived organizational support and turnover intention.

Keywords: leader member exchange, perceived organizational support, social exchange theory, turnover intention

Procedia PDF Downloads 357
1838 Effect of Electronic Banking on the Performance of Deposit Money Banks in Nigeria: Using ATM and Mobile Phone as a Case Study

Authors: Charity Ifunanya Osakwe, Victoria Ogochuchukwu Obi-Nwosu, Chima Kenneth Anachedo

Abstract:

The study investigates how automated teller machines (ATM) and mobile banking affect deposit money banks in the Nigerian economy. The study made use of time series data which were obtained from the Central Bank of Nigeria Statistical Bulletin from 2009 to 2021. The Central Bank of Nigeria (CBN) data on automated teller machine and mobile phones were used to proxy electronic banking while total deposit in banks proxied the performance of deposit money banks. The analysis for the study was done using ordinary least square econometric technique with the aid of economic view statistical package. The results show that the automated teller machine has a positive and significant effect on the total deposits of deposit money banks in Nigeria and that making use of deposits of deposit money banks in Nigeria. It was concluded in the study that e-banking has equally increased banking access to customers and also created room for banks to expand their operations to more customers. The study recommends that banks in Nigeria should prioritize the expansion and maintenance of ATM networks as well as continue to invest in and develop more mobile banking services.

Keywords: electronic, banking, automated teller machines, mobile, deposit

Procedia PDF Downloads 54
1837 Pyelography by Intraosseous Injection of Iodixanol in Persian Squirrel

Authors: Mehdi Tavana, Seyedeh Zeinab Peighambarzadeh

Abstract:

Pyelography is used for morphologic and especially functional studies of the urinary tracts. There are many indications for excretory Pyelography in humans and animals. Intravenous Pyelography is the most practical method; other Pyelography techniques were manipulated because of difficulties for finding veins in small size of the patients. At the best of times, the combination of small veins and abundant subcutaneous tissue makes vascular access difficult or impossible, therefore, another methods of administration of contrast media is desired. This study was performed to evaluate the feasibility of intraosseous injection of iodixanol in providing a safe and diagnostic urogram in Persian squirrel. Fourteen hundred mg iodine per kilogram body weight of iodixanol was injected subcutaneously over tibial tuberosity on ten clinically healthy adult Persian squirrels with no signs of urinary system disorder. Lateral and ventrodorsal radiographs were taken every 2 minutes until the pyelogram was finished. Intraosseous injection of iodixanol was successful to show nephrogram, pyelogram, uretrogram and cystogram clearly. There were no abnormal clinical signs after one week of experiments. Biochemical and hematological profiles were in normal ranges. It is concluded that intraosseous Pyelography is an effective and reliable method for Pyelography studies in squirrel. Microscopic examinations of the kidneys and the site of injection after one week were normal.

Keywords: pyelography, intraosseous injection, iodixanol, persian squirrel

Procedia PDF Downloads 524
1836 Views on Abortion and Case Law on International and European Levels: Past and Present Jurisprudence

Authors: Aurélie Cassiers

Abstract:

In this presentation, an overview is given of the freedom of states to legislate concerning abortion. Today, access to safe and legal abortion is still a hot topic in many countries in the world. Abortion policies try to strike a balance between women’s rights to self-determination and private life on the one hand, and the protection of the life of unborn children on the other. Each country has different religious, cultural and political views on abortion, and therefore specific legislations. However, citizens may submit a complaint at international courts when they find their national legislation too restrictive. The study is discussed of the development of the ECtHR, UNCHR, and IACHR case law, regarding the question of the ‘right to abort’ and indirectly of the protection of the unborn children. Each relevant case is analyzed to answer the following questions: Is the unborn child protected, and if so, how? Why does the woman want to abort and how is her interest or right protected? How is a fair balance reached between the different interests? Is the state completely free to write policies that restrict abortion? What are the factors to determine the margin of appreciation of the state? In conclusion, does this specific court recognize a right to abort, and if so, under which conditions? To conclude, this presentation shows that each court has its own perspective on and perception of abortion, and its own criteria to determine whether the state is complying with international norms regarding individual liberty and protection of the children.

Keywords: abortion, international courts, unborn children, women rights

Procedia PDF Downloads 129
1835 Continuous-Time Convertible Lease Pricing and Firm Value

Authors: Ons Triki, Fathi Abid

Abstract:

Along with the increase in the use of leasing contracts in corporate finance, multiple studies aim to model the credit risk of the lease in order to cover the losses of the lessor of the asset if the lessee goes bankrupt. In the current research paper, a convertible lease contract is elaborated in a continuous time stochastic universe aiming to ensure the financial stability of the firm and quickly recover the losses of the counterparties to the lease in case of default. This work examines the term structure of the lease rates taking into account the credit default risk and the capital structure of the firm. The interaction between the lessee's capital structure and the equilibrium lease rate has been assessed by applying the competitive lease market argument developed by Grenadier (1996) and the endogenous structural default model set forward by Leland and Toft (1996). The cumulative probability of default was calculated by referring to Leland and Toft (1996) and Yildirim and Huan (2006). Additionally, the link between lessee credit risk and lease rate was addressed so as to explore the impact of convertible lease financing on the term structure of the lease rate, the optimal leverage ratio, the cumulative default probability, and the optimal firm value by applying an endogenous conversion threshold. The numerical analysis is suggestive that the duration structure of lease rates increases with the increase in the degree of the market price of risk. The maximal value of the firm decreases with the effect of the optimal leverage ratio. The results are indicative that the cumulative probability of default increases with the maturity of the lease contract if the volatility of the asset service flows is significant. Introducing the convertible lease contract will increase the optimal value of the firm as a function of asset volatility for a high initial service flow level and a conversion ratio close to 1.

Keywords: convertible lease contract, lease rate, credit-risk, capital structure, default probability

Procedia PDF Downloads 98
1834 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 74
1833 The Systematic Impact of Climatic Disasters on the Maternal Health in Pakistan

Authors: Yiqi Zhu, Jean Francois Trani, Rameez Ulhassan

Abstract:

Extreme weather phenomena increased by 46% between 2007 and 2017 and have become more intense with the rise in global average temperatures. This increased intensity of climate variations often induces humanitarian crises and particularly affects vulnerable populations in low- and middle-income countries (LMICs). Expectant and lactating mothers are among the most vulnerable groups. Pakistan ranks 10th among the most affected countries by climate disasters. In 2022, monsoon floods submerged a third of the country, causing the loss of 1,500 lives. Approximately 650,000 expectant and lactating mothers faced systematic stress from climatic disasters. Our study used participatory methods to investigate the systematic impact of climatic disasters on maternal health. In March 2023, we conducted six Group Model Building (GMB) workshops with healthcare workers, fathers, and mothers separately in two of the most affected areas in Pakistan. This study was approved by the Islamic Relief Research Review Board. GMB workshops consist of three sessions. In the first session, participants discussed the factors that impact maternal health. After identifying the factors, they discussed the connections among them and explored the system structures that collectively impact maternal health. Based on the discussion, a causal loop diagram (CLD) was created. Finally, participants discussed action ideas that could improve the system to enhance maternal health. Based on our discussions and the causal loop diagram, we identified interconnected factors at the family, community, and policy levels. Mothers and children are directly impacted by three interrelated factors: food insecurity, unstable housing, and lack of income. These factors create a reinforcing cycle that negatively affects both mothers and newborns. After the flood, many mothers were unable to produce sufficient breastmilk due to their health status. Without breastmilk and sufficient food for complementary feeding, babies tend to get sick in damp and unhygienic environments resulting from temporary or unstable housing. When parents take care of sick children, they miss out on income-generating opportunities. At the community level, the lack of access to clean water and sanitation (WASH) and maternal healthcare further worsens the situation. Structural failures such as a lack of safety nets and programs associated with flood preparedness make families increasingly vulnerable with each disaster. Several families reported that they had not fully recovered from a flood that occurred ten years ago, and this latest disaster destroyed their lives again. Although over twenty non-profit organizations are working in these villages, few of them provide sustainable support. Therefore, participants called for systemic changes in response to the increasing frequency of climate disasters. The study reveals the systematic vulnerabilities of mothers and children after climatic disasters. The most vulnerable populations are often affected the most by climate change. Collaborative efforts are required to improve water and forest management, strengthen public infrastructure, increase access to WASH, and gradually build climate-resilient communities. Governments, non-governmental organizations, and the community should work together to develop and implement effective strategies to prevent, mitigate, and adapt to climate change and its impacts.

Keywords: climatic disasters, maternal health, Pakistan, systematic impact, flood, disaster relief.

Procedia PDF Downloads 77
1832 Patient Perspectives on Telehealth During the Pandemic in the United States

Authors: Manal Sultan Alhussein, Xiang Michelle Liu

Abstract:

Telehealth is an advanced technology using digital information and telecommunication facilities that provide access to health services from a distance. It slows the transmission factor of COVID-19, especially for elderly patients and patients with chronic diseases during the pandemic. Therefore, understanding patient perspectives on telehealth services and the factors impacting their option of telehealth service will shed light on the measures that healthcare providers can take to improve the quality of telehealth services. This study aimed to evaluate perceptions of telehealth services among different patient groups and explore various aspects of telehealth utilization in the United States during the COVID-19 pandemic. An online survey distributed via social media platforms was used to collect research data. In addition to the descriptive statistics, both correlation and regression analyses were conducted to test research hypotheses. The empirical results highlighted that the factors such as accessibility to telehealth services and the type of specialty clinics that the patients required play important roles in the effectiveness of telehealth services they received. However, the results found that patients’ waiting time to receive telehealth services and their annual income did not significantly influence their desire to select receiving healthcare services via telehealth. The limitations of the study and future research directions are discussed.

Keywords: telehealth, patient satisfaction, pandemic, healthcare, survey

Procedia PDF Downloads 112
1831 Bacteriological Safety of Sachet Drinking Water Sold in Benin City, Nigeria

Authors: Stephen Olusanmi Akintayo

Abstract:

Access to safe drinking water remains a major challenge in Nigeria, and where available, the quality of the water is often in doubt. An alternative to the inadequate clean drinking water is being found in treated drinking water packaged in electrically heated sealed nylon and commonly referred to as “sachet water”. “Sachet water” is a common thing in Nigeria as the selling price is within the reach of members of the low socio- economic class and the setting up of a production unit does not require huge capital input. The bacteriological quality of selected “sachet water” stored at room temperature over a period of 56 days was determined to evaluate the safety of the sachet drinking water. Test for the detection of coliform bacteria was performed, and the result showed no coliform bacteria that indicates the absence of fecal contamination throughout 56 days. Heterotrophic plate count (HPC) was done at an interval 14 days, and the samples showed HPC between 0 cfu/mL and 64 cfu/mL. The highest count was observed on day 1. The count decreased between day 1 and 28, while no growths were observed between day 42 and 56. The decrease in HPC suggested the presence of residual disinfectant in the water. The organisms isolated were identified as Staphylococcus epidermis and S. aureus. The presence of these microorganisms in sachet water is indicative for contamination during processing and handling.

Keywords: coliform, heterotrophic plate count, sachet water, Staphyloccocus aureus, Staphyloccocus epidermidis

Procedia PDF Downloads 341
1830 Candida antarctica Lipase-B Catalyzed Alkaline-Hydrolysis of Some Aryl-Alkyl Acetate in Non-Aqueous Media

Authors: M. Merabet-Khelassi, Z. Houiene, L. Aribi-Zouioueche, O. Riant

Abstract:

Lipases (EC.3.1.1.3) are efficient biotools widely used for their remarkable chemo-, regio- and enantio-selectivity, especially, in kinetic resolution of racemates. They offer access to a large panel of enantiopure building blocks, such as secondary benzylic alcohols, commonly used as synthetic intermediates in pharmaceutical and agrochemical industries. Due to the stability of lipases in both water and organic solvents poor in water, they are able to catalyze both transesterifications of arylalkylcarbinols and hydrolysis of their corresponding acetates. The use of enzymatic hydrolysis in aqueous media still limited. In this presentation, we expose a practical methodology for the preparation of optically enriched acetates using a Candida antarctica lipase B-catalyzed hydrolysis in non-aqueous media in the presence of alkaline carbonate salts. The influence of several parameters which can intervene on the enzymatic efficiency such as the impact of the introduction of the carbonates salts, its amount and the nature of the alkaline earth metal are discussed. The obtained results show that the use of sodium carbonate with CAL-B enhances drastically both reactivity and selectivity of this immobilized lipase. In all cases, the resulting alcohols and remaining acetates are obtained in high ee values (up to > 99 %), and the selectivities reach (E > 500).

Keywords: alkaline-hydrolysis, enzymatic kinetic resolution, lipases, arylalkylcarbinol, non-aqueous media

Procedia PDF Downloads 162
1829 Bounded Rational Heterogeneous Agents in Artificial Stock Markets: Literature Review and Research Direction

Authors: Talal Alsulaiman, Khaldoun Khashanah

Abstract:

In this paper, we provided a literature survey on the artificial stock problem (ASM). The paper began by exploring the complexity of the stock market and the needs for ASM. ASM aims to investigate the link between individual behaviors (micro level) and financial market dynamics (macro level). The variety of patterns at the macro level is a function of the AFM complexity. The financial market system is a complex system where the relationship between the micro and macro level cannot be captured analytically. Computational approaches, such as simulation, are expected to comprehend this connection. Agent-based simulation is a simulation technique commonly used to build AFMs. The paper proceeds by discussing the components of the ASM. We consider the roles of behavioral finance (BF) alongside the traditionally risk-averse assumption in the construction of agent's attributes. Also, the influence of social networks in the developing of agents’ interactions is addressed. Network topologies such as a small world, distance-based, and scale-free networks may be utilized to outline economic collaborations. In addition, the primary methods for developing agents learning and adaptive abilities have been summarized. These incorporated approach such as Genetic Algorithm, Genetic Programming, Artificial neural network and Reinforcement Learning. In addition, the most common statistical properties (the stylized facts) of stock that are used for calibration and validation of ASM are discussed. Besides, we have reviewed the major related previous studies and categorize the utilized approaches as a part of these studies. Finally, research directions and potential research questions are argued. The research directions of ASM may focus on the macro level by analyzing the market dynamic or on the micro level by investigating the wealth distributions of the agents.

Keywords: artificial stock markets, market dynamics, bounded rationality, agent based simulation, learning, interaction, social networks

Procedia PDF Downloads 354
1828 Tracing the Direction of Media Activism: Public Perspective

Authors: G. Arockiasamy, B. Sujeevan Kumar, Surendheran

Abstract:

Human progress and development are highly influenced by the power of information access and technology. A global and multi-national transformation all over the word is possible due to digitalization. In the process of exchanging information, experience, and resources, there is a radical shift in who controls them. Mass media has turned the world into a global village by strengthening communication network. As a result, a new digital culture has emerged as a social network commonly known as new media. Today the advancement of technology is at the doorstep of everyone linking to anywhere. The traditional social restrictions are broken down by the new type of virtual communication modality that transcends people beyond boundaries At the same time media empire has invaded every nook and corner of the world through great expansion. Media activism is growing stronger and stronger but the truth and true meaning lost in the process. This paper explores the peoples’ attitude to media activism and tracing its direction. The methodology employed is random sampling survey and content analysis method. Both qualitatively and quantitatively measured. The findings tend to show 60 percent indicate media activism as positive and others indicate as negative. As a conclusion, media activism has danger within but depends on nature of the development of human orientation.

Keywords: media activism, media industry, program, truth information, orientation and nature

Procedia PDF Downloads 210
1827 Shaheen Bagh Protests: Women, Public Spaces, Citizenship and Dissent

Authors: Priyanka Joshi

Abstract:

The paper traces the evolving relationship between women, public spaces, and citizenship and dissent by analyzing acts of dissent led by women. The paper outlines this relationship in the context of the protests held in Shaheen Bagh, Delhi against the Citizenship Amendment Act (CAA), National Registry of Citizens (NRC), and National Population Register (NPR) in 2019. Additionally, the paper aims to explore how the multiple identities of the protestors in Shaheen Bagh affected the nature, implications, and responses to the protests. To do so, the paper will analyze three key areas in relationship with women, namely, public spaces, citizenship, and dissent. In doing so, it will examine the gendered access to public spaces and its implications on the realization of one’s citizenship rights. Moreover, it will explore the historical notions of citizenship, its contemporary understanding, the exclusionary nature of citizenship, and the conflict between community rights and individual rights with respect to women’s rights. In context of dissent, it will evaluate the understanding of dissent and trace the difference in the experience of dissent based on gender by reviewing social movements led and maintained by women. This paper will utilize secondary data to explore the questions it poses. This includes a study of books and journal articles in conjunction with media reports concerning gender, public spaces, citizenship, and dissent. It will apply an intersectional lens in its analysis.

Keywords: citizenship, dissent, public spaces, Shaheen Bagh, women

Procedia PDF Downloads 151
1826 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 376
1825 Advances in Mathematical Sciences: Unveiling the Power of Data Analytics

Authors: Zahid Ullah, Atlas Khan

Abstract:

The rapid advancements in data collection, storage, and processing capabilities have led to an explosion of data in various domains. In this era of big data, mathematical sciences play a crucial role in uncovering valuable insights and driving informed decision-making through data analytics. The purpose of this abstract is to present the latest advances in mathematical sciences and their application in harnessing the power of data analytics. This abstract highlights the interdisciplinary nature of data analytics, showcasing how mathematics intersects with statistics, computer science, and other related fields to develop cutting-edge methodologies. It explores key mathematical techniques such as optimization, mathematical modeling, network analysis, and computational algorithms that underpin effective data analysis and interpretation. The abstract emphasizes the role of mathematical sciences in addressing real-world challenges across different sectors, including finance, healthcare, engineering, social sciences, and beyond. It showcases how mathematical models and statistical methods extract meaningful insights from complex datasets, facilitating evidence-based decision-making and driving innovation. Furthermore, the abstract emphasizes the importance of collaboration and knowledge exchange among researchers, practitioners, and industry professionals. It recognizes the value of interdisciplinary collaborations and the need to bridge the gap between academia and industry to ensure the practical application of mathematical advancements in data analytics. The abstract highlights the significance of ongoing research in mathematical sciences and its impact on data analytics. It emphasizes the need for continued exploration and innovation in mathematical methodologies to tackle emerging challenges in the era of big data and digital transformation. In summary, this abstract sheds light on the advances in mathematical sciences and their pivotal role in unveiling the power of data analytics. It calls for interdisciplinary collaboration, knowledge exchange, and ongoing research to further unlock the potential of mathematical methodologies in addressing complex problems and driving data-driven decision-making in various domains.

Keywords: mathematical sciences, data analytics, advances, unveiling

Procedia PDF Downloads 93
1824 Shariah Perspective on Legal Framework and Practice of Margin Financing in Pakistan

Authors: Anees Tahir

Abstract:

Margin financing plays a significant role in Pakistan's stock market (PSX), offering investors the opportunity to maximize profits by borrowing funds from financiers to purchase marginable stocks. However, this financial practice raises several Shariah-related concerns. The study follows legal doctrinal research methodology. It explains and analyzes the law of margin financing prevailing in PSX and compares it with the principles of Shariah. It also examines and investigates the practices of margin financing from the perspective of Shariah. As part of the study, the researcher has conducted structured interviews with the Shariah advisors of the finance industry, academicians, market practitioners, and regulators. Thus, the study analyzes the findings of interviews. This article explores the legal framework and practice of margin financing in Pakistan from a Shariah perspective. The article investigates various issues relating to margin financing, including the fundamental concern of interest-based lending, which contravenes Islamic principles. It also highlights the problematic subject matter of margin financing, often involving non-Shariah compliant securities. Additionally, the article addresses the restriction on proprietary rights and the problematic element of speculation associated with margin financing. To provide a Shariah-compliant alternative, the Securities and Exchange Commission of Pakistan (SECP) introduced Murabahah Shares Financing (MSF) in 2019. However, the focus of the market is still on conventional margin financing. In the opinion of the researcher, the effective implementation of MSF is imperative because in the absence of such an alternative, the faith sensitive investor will remain deprived of a level playing field, and he is unable to get required financing opportunities through a halal and Shariah-compliant manner. This article argues that margin financing in its current form is incompatible with Shariah principles and should be discontinued. It is recommended that the SECP should gradually phase out the use of margin financing and increase reliance on MSF to provide faith-sensitive and committed investors with Shariah-compliant financing options.

Keywords: margin financing, marginable stocks, faith sensitive investor, Murabahah shares financing

Procedia PDF Downloads 71
1823 Telecontrolled Service Robots for Increasing the Quality of Life of Elderly and Disabled

Authors: Nayden Chivarov, Denis Chikurtev, Kaloyan Yovchev, Nedko Shivarov

Abstract:

This paper represents methods for improving the efficiency and precision of service mobile robot. This robot is used for increasing the quality of life of elderly and disabled people. The key concept of the proposed Intelligent Service Mobile Robot is its easier adaptability to achieve services for a wide range of Elderly or Disabled Person’s needs, by performing different tasks for supporting Elderly or Disabled Persons care. We developed robot autonomous navigation and computer vision systems in order to recognize different objects and bring them to the people. Web based user interface is developed to provide easy access and tele-control of the robot by any device through the internet. In this study algorithms for object recognition and localization are proposed for providing successful object recognition and accuracy in the positioning. Different methods for sending movement commands to the mobile robot system are proposed and evaluated. After executing some experiments to show the results of the research, we can summarize that these systems and algorithms provide good control of the service mobile robot and it will be more useful to help the elderly and disabled persons.

Keywords: service robot, mobile robot, autonomous navigation, computer vision, web user interface, ROS

Procedia PDF Downloads 339
1822 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 129
1821 Practices of Entomophagy and Entomotherapy in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Philippines

Authors: Jake Joshua C. Garces, Zandra O. Jarito, Leslie Ann T. Barriga, Froilen C. Domicelo, Nimfa R. Pansit

Abstract:

The study was conducted in order to discover the medicinal and edible potentialities of different insect species in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Cebu. In order to identify these entomological practices, a survey was carried out by the researchers in these key sites. Fourteen key informants were obtained and these were identified with the aide of two sampling methods- snowball technique and purposive sampling. Open-ended questionnaires were employed in order to obtain authentic and significant information from the key informants. Results portrayed that in the practice of entomotherapy, two insects were used as medicine namely: migratory locust (Locusta migratoria manillensis) and honey bee (Apis dorsata); and two insect by-products were utilized namely: feces of cockroach (Periplaneta Americana) and honey. White grub (Cotinis nitida) and bee eggs were also documented to manifest edible capability and were thus utilized in the entomophagic practices. After applying thematic analysis, it was determined that the causative factors of their entomological practices include their limited educational attainment, their inability to access urban societies and the influence brought about by their family and community.

Keywords: entomophagy, entomotherapy, entomology, key informants

Procedia PDF Downloads 335
1820 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 30
1819 Strategies and Perceptions of Small Olive Oil Farmers of By-Product Valorization

Authors: Judit Manuel-i-Martin, Mechthild Donner, Ivana Radic, Yamna Erraach, Fatima Elhadad, Taoufik Yatribi, Feliu Lopez-i-Gelats

Abstract:

This paper investigates how small olive farmers and olive oil producers implement circular economy practices to manage olive related waste and how such strategies are perceived by the farmers themselves. While there is a lot of data and research about possible uses of olive oil by-products, the perceptions and related practices of olive oil farmers is a much less investigated domain. A total of 60 semi-structured interviews were conducted in one of the most relevant olive oil producing regions in the Iberian Peninsula -the region of Terres de Ponent (Catalonia – Spain) - to examine the different by-product valorization strategies the olive oil farms develop. We test the hypothesis that the strategies conducted depend on the nature and amount of resources available by the farm. The results obtained point that access to milling infrastructure is a determining factor. We also found that olive tree pruning biomass and olive pomace are the most common by-products valorized by farmers, the first one on-farm and the latter in mills. Results indicate that high value uses for olive oil by-products are rarely implemented by farmers. We conclude that olive farmers tend to perceive by-product valorization strategies as waste management practices rather than as additional sources of value for their farm.

Keywords: circular economy, discourses, Mediterranean region, olive oil by-products, farmers’ strategies, olive pomace

Procedia PDF Downloads 134
1818 Study of Exciton Binding Energy in Photovoltaic Polymers and Non-Fullerene Acceptors

Authors: Ho-Wa Li, Sai-Wing Tsang

Abstract:

The excitonic effect in organic semiconductors plays a key role in determining the electronic devices performance. Strong exciton binding energy has been regarded as the detrimental factor limiting the further improvement in organic photovoltaic cells. To the best of our knowledge, only limited reported can be found in measuring the exciton binding energy in organic photovoltaic materials. Conventional sophisticated approach using photoemission spectroscopy (UPS and IPES) would limit the wide access of the investigation. Here, we demonstrate a facile approach to study the electrical and optical quantum efficiencies of a series of conjugated photovoltaic polymer, fullerene and non-fullerene materials. Quantitative values of the exciton binding energy in those prototypical materials were obtained with concise photovoltaic device structure. And the extracted binding energies have excellent agreement with those determined by the conventional photoemission technique. More importantly, our findings can provide valuable information on the excitonic dissociation in the first excited state. Particularly, we find that the high binding energy of some non-fullerene acceptors limits the combination of polymer acceptors for efficiency exciton dissociation. The results bring insight into the engineering of excitonic effect for the development of efficient organic photovoltaic cells.

Keywords: organic photovoltaics, quantum efficiency, exciton binding energy, device physics

Procedia PDF Downloads 151
1817 Challenges of Technical and Engineering Students in the Application of Scientific Cancer Knowledge to Preserve the Future Generation in Sub-Saharan Africa

Authors: K. Shaloom Mbambu, M. Pascal Tshimbalanga, K. Ruth Mutala, K. Roger Kabuya, N. Dieudonné Kabeya, Y. L. Kabeya Mukeba

Abstract:

In this article, the authors examine the even more worrying situation of girls in sub-Saharan Africa. Two-girls on five are private of Global Education, which represents a real loss to the development of communities and countries. Cultural traditions, poverty, violence, early and forced marriages, early pregnancies, and many other gender inequalities were the causes of this cancer development. Namely, "it is no more efficient development tool that is educating girls." The non-schooling of girls and their lack of supervision by liberal professions have serious consequences for the life of each of them. To improve the conditions of their inferior status, girls to men introduce poverty and health risks. Raising awareness among parents and communities on the importance of girls' education, improving children's access to school, girl-boy equality with their rights, creating income, and generating activities for girls, girls, and girls learning of liberal trades to make them self-sufficient. Organizations such as the United Nations Organization can save the children. ASEAD and the AEDA group are predicting the impact of this cancer on the development of a nation's future generation must be preserved.

Keywords: young girl, Sub-Saharan Africa, higher and vocational education, development, society, environment

Procedia PDF Downloads 254
1816 Social Networking Sites: A Platform for Communication and Collaboration for Visually Impaired

Authors: Sufia Khowaja, Nishat Fatima

Abstract:

Social networking sites are significant for visually impaired to overcome the unique challenges they face and access the resources they need to succeed in their education and beyond which might be difficult to obtain through traditional means. It provides them an opportunity to build relationships, stay connected with their support network as well as to develop social skills which give them emotional support to fell less isolated. In this connection the study is conducted with the aim to determine the use of social networking sites, purpose of using and activities performed by visually impaired at Delhi University, Delhi, Jawaharlal Nehru University, Delhi and Jamia Milia Islamia, Delhi. The study followed survey technique in which structured interview is followed to collect data from 137 visually impaired students and analysed using ‘SPSS ver23’. The findings of the study revealed that mostly used social networking sites are whatsapp by 89.23% students of DU, 95.12% of JNU, 87.09% of JMI, followed by e-mail by 78.46% of DU, 78.04% of JNU, 64.51%; youtube by 73.84% DU, 90.24% JNU, 80.64% JMI. Purpose for using these sites is for academics mentioned by 96.92% DU, 100% JNU, 93.54% JMI. Activities performed on sites are sending and receiving messaging 96.92% DU, 92.68% JNU, 93.55% JMI, communicating with friends and family as well as getting academic information. Findings of the study will be helpful for libraries to disseminate their services and resources as well as latest updates to their visually impaired users with the help of most used tools.

Keywords: social networking sites, visually impaired, Delhi University, Jawaharlal Nehru University, Jamia Milia Islamia

Procedia PDF Downloads 90
1815 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 266
1814 Barriers That Special Education Teachers Faced When Working with Students with Intellectual Disabilities in an Inclusion Schools

Authors: Faris Algahtani

Abstract:

Every child has a right to education. This is one of the laws in the constitution and it empowers every child to access knowledge but it does not, however, allocate special interest to the rights of education for children with disabilities. It also does not address the challenges that teachers of such children face while trying to educate them. This study was conducted at government schools of Saudi Arabia. As the teaching profession is the most valuable profession and deserves to have its challenges tackled. This paper explores the challenges that teachers face as they try to teach students who have intellectual disabilities (ID). It looks at the daily challenges of a teacher who has to teach both children with disabilities and those without. The literature review shed light on the various aspects of mainstream education from the classroom to the outside environment to the teachers involved in mainstream education. The study employed qualitative methods in which Focus Group Discussions were utilized and Twenty (N=20) special education teachers were randomly sampled from primary schools through 6 groups of teachers from 6 different schools were interviewed through semi-structured interviews with the aim of drawing collective perceptions rather than personal perceptions about the challenges. The study found that most teachers had similar perceptions about the challenges that teachers face as they educate students with intellectual disabilities. The study recommends that The Ministry of Education should consider increasing the availability of special needs courses, workshops and conference for special education teachers.

Keywords: intellectual disabilities, inclusion, mainstream schools, disabilities, special education teachers

Procedia PDF Downloads 135
1813 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 38
1812 Online Graduate Students’ Perspective on Engagement in Active Learning in the United States

Authors: Ehi E. Aimiuwu

Abstract:

As of 2017, many researchers in educational journals are still wondering if students are effectively and efficiently engaged in active learning in the online learning environment. The goal of this qualitative single case study and narrative research is to explore if students are actively engaged in their online learning. Seven online students in the United States from LinkedIn and residencies were interviewed for this study. Eleven online learning techniques from research were used as a framework.  Data collection tools were used for the study that included a digital audiotape, observation sheet, interview protocol, transcription, and NVivo 12 Plus qualitative software.  Data analysis process, member checking, and key themes were used to reach saturation. About 85.7% of students preferred individual grading. About 71.4% of students valued professor’s interacting 2-3 times weekly, participating through posts and responses, having good internet access, and using email.  Also, about 57.1% said students log in 2-3 times weekly to daily, professor’s social presence helps, regular punctuality in work submission, and prefer assessments style of research, essay, and case study.  About 42.9% appreciated syllabus usefulness and professor’s expertise.

Keywords: class facilitation, course management, online teaching, online education, student engagement

Procedia PDF Downloads 129
1811 The Hypoglycemic Grab Back (HOGG): Preparing Hypo-Screen-Bags to Streamline the Time-Consuming Process of Administering Glucose Systemic Correction

Authors: Mai Ali

Abstract:

Background: Preparing Hypo-screen-bags in advance streamlines the time-consuming process of administering glucose systemic correction. Additionally, Hypo-Screen Grab Bags are widely adopted in UK hospitals. Aim: The aim of the study is to improve hypoglycemia screening efficiency and equipment accessibility by streamlining item access to grab bag restocking staff. Methodology: The study centered on neonatal wards at LGI & St. James Neonatal Unit and related units. A web-based survey was conducted to evaluate local practices, gathering 21 responses from relevant general staff. The survey outcomes: (1) The demand for accessible grab bags is evident for smoother processes. (2) The potential to enhance efficiency through improved preparation of hypo-screen grab bags. Intervention: A Hypo-Screen Grab Bag was designed, including checklists for stocked items and required samples. Medical staff oversee restocking after use. Conclusion: The study successfully improved hypoglycemia screening efficiency and aided junior staff with accessible supplies and a user-friendly checklist.

Keywords: neonatal hypoglycemia, grab bag, hypo-screening, junior staff

Procedia PDF Downloads 63