Search results for: sense of security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4497

Search results for: sense of security

2517 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 167
2516 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System

Authors: A. S. Walkey, N. P. Patidar

Abstract:

It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.

Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices

Procedia PDF Downloads 510
2515 Cultural Event and Urban Regeneration: Lessons from Liverpool as the 2008 European Capital of Culture

Authors: Yi-De Liu

Abstract:

For many European cities, a key motivation in developing event strategies is to use event as a catalyst for urban regeneration. One type of event that is particularly used as a means of urban development is the European Capital of Culture (ECOC) initiative. Based on a case study of the 2008 ECOC Liverpool, this paper aims at conceptualising the significance of major event for a city’s economic, cultural and social regenerations. In terms of economic regeneration, the role of the ECOC is central in creating Liverpool’s visitor economy and reshaping city image. Liverpool planned different themes for eight consecutive years as a way to ensure economic sustainability. As far as cultural regeneration is concerned, the ECOC contributed to the cultural regeneration of Liverpool by stimulating cultural participation and interest from the demand side, as well as improving cultural provision and collaboration within the cultural sector from the supply side. So as to social regeneration, Liverpool treated access development as a policy guideline and considered the ECOC as an opportunity to enhance the sense of place. The most significant lesson learned from Liverpool is its long-term planning and efforts made to integrate the ECOC into the overall urban development strategy. As a result, a more balanced and long-term effect on urban regeneration could be achieved.

Keywords: cultural event, urban regeneration, european capital of culture, Liverpool

Procedia PDF Downloads 267
2514 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java

Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah

Abstract:

Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.

Keywords: exploitation, home batik industry, occupational health and safety, putting-out system

Procedia PDF Downloads 324
2513 Restriction on the Freedom of Economic Activity in the Polish Energy Law

Authors: Zofia Romanowska

Abstract:

Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.

Keywords: license, energy law, energy market, public goods, regulator

Procedia PDF Downloads 248
2512 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 488
2511 Enhancing Learning Ability among Deaf Students by Using Photographic Images

Authors: Aidah Alias, Mustaffa Halabi Azahari, Adzrool Idzwan Ismail, Salasiah Ahmad

Abstract:

Education is one of the most important elements in a human life. Educations help us in learning and achieve new things in life. The ability of hearing gave us chances to hear voices and it is important in our communication. Hearing stories told by others; hearing news and music to create our creative and sense; seeing and hearing make us understand directly the message trying to deliver. But, what will happen if we are born deaf or having hearing loss while growing up? The objectives of this paper are to identify the current practice in teaching and learning among deaf students and to analyse an appropriate method in enhancing learning process among deaf students. A case study method was employed by using methods of observation and interview to selected deaf students and teachers. The findings indicated that the suitable method of teaching for deaf students is by using pictures and body movement. In other words, by combining these two medium of images and body movement, the best medium that the study suggested is by using video or motion pictures. The study concluded and recommended that video or motion pictures is recommended medium to be used in teaching and learning for deaf students.

Keywords: deaf, photographic images, visual communication, education, learning ability

Procedia PDF Downloads 288
2510 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 27
2509 Herbal Medicines Used for the Cure of Jaundice among the Some Tribal Populations of Madhya Pradesh, India

Authors: Awdhesh Narayan Sharma

Abstract:

The use of herbal medicines for the cure of various ailments among the tribal population is as old as human origin itself. Most of the tribal populations of Madhya Pradesh inhabit in remote and inaccessible ecological setup. From long back, tribals and forests are interrelated to each other. They use an enormous range of wild plants for their basic needs and medicines. The tribal developed a unique understanding with wild plants, herbs, etc., and earned specialized knowledge of disease pattern and curative therapy-through hard experiences, common sense, trial, and error methods. They have passed this knowledge through traditions, taboos, totems, folklore by words of mouth from generation to generation. Here, an attempt has been made to study the possible aspects of herbal medicine for the cure of Jaundice among the tribal populations of Madhya Pradesh, India, through primary data as well as available secondary data. The data have been collected from the 305 Bharias of Patalkot, Madhya Pradesh, India, and included available secondary source of data by various investigators. It may be concluded that a sizable herbal medicinal plants' wealth exists in Madhya Pradesh, India, which still awaits for scientific exploration. The existing herbal medicines used for the cure of jaundice need an extensive investigation from the pharmaceutical point of view.

Keywords: Bharias, herbal medicine, tribal, Madhya Pradesh

Procedia PDF Downloads 179
2508 A Mathematical Model Approach Regarding the Children’s Height Development with Fractional Calculus

Authors: Nisa Özge Önal, Kamil Karaçuha, Göksu Hazar Erdinç, Banu Bahar Karaçuha, Ertuğrul Karaçuha

Abstract:

The study aims to use a mathematical approach with the fractional calculus which is developed to have the ability to continuously analyze the factors related to the children’s height development. Until now, tracking the development of the child is getting more important and meaningful. Knowing and determining the factors related to the physical development of the child any desired time would provide better, reliable and accurate results for childcare. In this frame, 7 groups for height percentile curve (3th, 10th, 25th, 50th, 75th, 90th, and 97th) of Turkey are used. By using discrete height data of 0-18 years old children and the least squares method, a continuous curve is developed valid for any time interval. By doing so, in any desired instant, it is possible to find the percentage and location of the child in Percentage Chart. Here, with the help of the fractional calculus theory, a mathematical model is developed. The outcomes of the proposed approach are quite promising compared to the linear and the polynomial method. The approach also yields to predict the expected values of children in the sense of height.

Keywords: children growth percentile, children physical development, fractional calculus, linear and polynomial model

Procedia PDF Downloads 154
2507 Forecasting Performance Comparison of Autoregressive Fractional Integrated Moving Average and Jordan Recurrent Neural Network Models on the Turbidity of Stream Flows

Authors: Daniel Fulus Fom, Gau Patrick Damulak

Abstract:

In this study, the Autoregressive Fractional Integrated Moving Average (ARFIMA) and Jordan Recurrent Neural Network (JRNN) models were employed to model the forecasting performance of the daily turbidity flow of White Clay Creek (WCC). The two methods were applied to the log difference series of the daily turbidity flow series of WCC. The measurements of error employed to investigate the forecasting performance of the ARFIMA and JRNN models are the Root Mean Square Error (RMSE) and the Mean Absolute Error (MAE). The outcome of the investigation revealed that the forecasting performance of the JRNN technique is better than the forecasting performance of the ARFIMA technique in the mean square error sense. The results of the ARFIMA and JRNN models were obtained by the simulation of the models using MATLAB version 8.03. The significance of using the log difference series rather than the difference series is that the log difference series stabilizes the turbidity flow series than the difference series on the ARFIMA and JRNN.

Keywords: auto regressive, mean absolute error, neural network, root square mean error

Procedia PDF Downloads 270
2506 Ilorin Traditional Architecture as a Good Example of a Green Building Design

Authors: Olutola Funmilayo Adekeye

Abstract:

Tradition African practice of architecture can be said to be deeply rooted in Green Architecture in concept, design and execution. A study into the ancient building techniques in Ilorin Emirate depicts prominent (eco-centric approach of) Green Architecture principles. In the Pre-colonial era before the introduction of modern architecture and Western building materials, the Nigeria traditional communities built their houses to meet their cultural, religious and social needs using mainly indigenous building materials such as mud (Amo), cowdung (Boto), straws (koriko), palm fronts (Imo-Ope) to mention a few. This research attempts to identify the various techniques of applying the traditional African principles of Green Architecture to Ilorin traditional buildings. It will examine and assess some case studies to understand the extent to which Green architecture principles have been applied to traditional building designs that are still preserved today in Ilorin, Nigeria. Furthermore, this study intends to answer many questions, which can be summarized into two basic questions which are: (1) What aspects of what today are recognized as important green architecture principles have been applied to Ilorin traditional buildings? (2) To what extent have the principles of green architecture applied to Ilorin traditional buildings been ways of demonstrating a cultural attachment to the earth as an expression of the African sense of human being as one with nature?

Keywords: green architecture, Ilorin, traditional buildings, design principles, ecocentric, application

Procedia PDF Downloads 557
2505 Effective Urban Design on Environmental Quality Improvement of Historical Textures: A Case Study on Khajeh Khezr Neighborhood in Kerman City

Authors: Saman Sobhani

Abstract:

Historical neighborhoods have special values inside them, and, in addition to inducing a sense of collective memories, they have to have some criteria in respect of achieving desirable environmental quality in order for citizens to live. From the perspective of urban planners and designers, a neighborhood as an urban space has to satisfy various needs of citizens in terms of activities as well as their spiritual requirements. In the research based on the component of environmental quality in one of the neighborhoods with historical value resulting from the theoretical model presented (functional-structural, physical-spatial, and substantive), integrated analysis has been performed on the Khajeh Khezr neighborhood in Kerman. Then, after studying the weaknesses and strengths points of it based on the AIDA model, some mechanisms have been presented to promote environmental quality based on neighborhood organization, and related urban design projects have been defined accordingly. Analyzing the findings shows that inhabitants in the Khajeh Khezr neighborhood are not much satisfied with the quality of the urban environment of the neighborhood. In the research, the descriptive-analytical method and review of texts have been used in the form of library studies, and case study has been applied as well as observation and questionnaire in the form of field studies.

Keywords: environmental quality, Kerman, Khajeh Khezr, neighborhood

Procedia PDF Downloads 89
2504 A Multicenter Assessment on Psychological Well-Being Status among Medical Residents in the United Arab Emirates

Authors: Mahera Abdulrahman

Abstract:

Objective: Healthcare transformation from traditional to modern in the country recently prompted the need to address career choices, accreditation perception and satisfaction among medical residents. However, a concerted nationwide study to understand and address burnout in the medical residency program has not been conducted in the UAE and the region. Methods: A nationwide, multicenter, cross-sectional study was designed to evaluate professional burnout and depression among medical residents in order to address the gap. Results: Our results indicate that 75.5% (216/286) of UAE medical residents had moderate to high emotional exhaustion, 84% (249/298) had high depersonalization, and 74% (216/291) had a low sense of personal accomplishment. In aggregate, 70% (212/302) of medical residents were considered to be experiencing at least one symptom of burnout based on a high emotional exhaustion score or a high depersonalization score. Depression ranging from 6-22%, depending on the specialty was also striking given the fact the Arab culture lays high emphasis on family bonding. Interestingly 83% (40/48) of medical residents who had high scores for depression also reported burnout. Conclusion: Our data indicate that burnout and depression among medical residents is epidemic. There is an immediate need to address burnout through effective interventions at both the individual and institutional levels. It is imperative to reconfigure the approach to medical training for the well-being of the next generation of physicians in the Arab world.

Keywords: mental health, Gulf, Arab, residency training, burnout, depression

Procedia PDF Downloads 298
2503 Sense Environmental Hormones in Elementary School Teachers and Their in Service Learning Motivation

Authors: Fu-Chi Chuang, Yu-Liang, Chang, Wen-Der Wang

Abstract:

Our environment has been contaminated by many artificial chemicals, such as plastics, pesticides. Many of them have hormone-like activity and are classified as 'environmental hormone (also named endocrine disruptors)'. These chemicals interfere with or mimic hormones have adverse effects that persist into adulthood. Environmental education is an important way to teach students to become engaged in real-world issues that transcend classroom walls. Elementary education is the first stage to perform environmental education and it is an important component to help students develop adequate environmental knowledge, attitudes, and behavior. However, elementary teachers' knowledge plays a critical role in this mission. Therefore, we use a questionnaire to survey the knowledge of environmental hormone of elementary school teachers and their learning motivation of the environmental hormone-regarding knowledge. We collected 218 questionnaires from Taiwanese elementary teachers and the results indicate around 73% of elementary teachers do not have enough knowledge about environmental hormones. Our results also reveal the in-service elementary teachers’ learning motivation of environmental hormones knowledge is positively enhanced once they realized their insufficient cognitive ability of environmental hormones. We believe our study will provide the powerful reference for Ministry of Education to set up the policy of environmental education to enrich all citizens sufficient knowledge of the effects of the environmental hormone on organisms, and further to enhance our correct environmental behaviors.

Keywords: elementary teacher, environmental hormones, learning motivation, questionnaire

Procedia PDF Downloads 314
2502 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 92
2501 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 703
2500 Cuckoo Search Optimization for Black Scholes Option Pricing

Authors: Manas Shah

Abstract:

Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).

Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm

Procedia PDF Downloads 457
2499 School Choice and Institutional or Familial Habitus: Reciprocity in Parents-School Relationships

Authors: Fatemeh Yazdani

Abstract:

This paper explores the student intake policies in high-performing private schools in Iran by studying both sides involved in the school choice processes, parents and the school leaders. It is based on in-depth interviews with 27 parents and private schools’ staff and principals supplemented by ethnographic observation in two private schools in Tehran. From the Bourdieusian point of view, this paper argues that the school leadership engineers the composition of private schools’ students via different gatekeeping strategies, and these strategies represent and reconstruct the school’s institutional habitus. It further explores the ways that parents who look for quality education among non-state education providers deal with the school's institutional habitus based on their familial habitus and possessed economic, social, and cultural capital. The conclusion highlights that investigating school choice as a reciprocal process between family and school leadership can shed more light on the ways that an exclusive environment has been created in some high-performing private schools for certain class strata maintaining a distance that needs to be kept from ‘others.’ In a broader sense, this paper engages into an exploration of social inequality reproduction through private education.

Keywords: institutional habitus, private education, school choice, social inequality, student intake

Procedia PDF Downloads 111
2498 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 261
2497 The Role of Business Process Management in Driving Digital Transformation: Insurance Company Case Study

Authors: Dalia Suša Vugec, Ana-Marija Stjepić, Darija Ivandić Vidović

Abstract:

Digital transformation is one of the latest trends on the global market. In order to maintain the competitive advantage and sustainability, increasing number of organizations are conducting digital transformation processes. Those organizations are changing their business processes and creating new business models with the help of digital technologies. In that sense, one should also observe the role of business process management (BPM) and its maturity in driving digital transformation. Therefore, the goal of this paper is to investigate the role of BPM in digital transformation process within one organization. Since experiences from practice show that organizations from financial sector could be observed as leaders in digital transformation, an insurance company has been selected to participate in the study. That company has been selected due to the high level of its BPM maturity and the fact that it has previously been through a digital transformation process. In order to fulfill the goals of the paper, several interviews, as well as questionnaires, have been conducted within the selected company. The results are presented in a form of a case study. Results indicate that digital transformation process within the observed company has been successful, with special focus on the development of digital strategy, BPM and change management. The role of BPM in the digital transformation of the observed company is further discussed in the paper.

Keywords: business process management, case study, Croatia, digital transformation, insurance company

Procedia PDF Downloads 198
2496 An E-Retailing System Architecture Based on Cloud Computing

Authors: Chanchai Supaartagorn

Abstract:

E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.

Keywords: architecture, cloud computing, e-retailing, internet-based

Procedia PDF Downloads 399
2495 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 246
2494 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 527
2493 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 143
2492 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 85
2491 "Black Book": Dutch Prototype or Jewish Outsider

Authors: Eyal Boers

Abstract:

This paper shall demonstrate how films can offer a valuable and innovative approach to the study of images, stereotypes, and national identity. "Black Book" ("Zwartboek", 2006), a World War Two film directed by Paul Verhoeven, tells the story of Rachel Stein, a young Jewish woman who becomes a member of a resistance group in the Netherlands. The main hypothesis in this paper maintains that Rachel's character possesses both features of the Dutch prototype (a white, secular, sexual, freedom-loving individualist who seems "Dutch" enough to be accepted into a Dutch resistance group and even infiltrate the local Nazi headquarters) and features which can be defined as specifically Jewish (a black-haired victim persecuted by the Nazis, transforming herself into a gentile, while remaining loyal to her fellow Jews and ultimately immigrating to Israel and becoming a Hebrew teacher in a Kibbutz). Finally, this paper claims that Rachel's "Dutchness" is symptomatic of Dutch nostalgia in the 21st century for the Jews as "others" who blend into dominant Dutch culture, while Rachel's "Jewish Otherness" reflects a transnational identity – one that is always shifting and traverses cultural and national boundaries. In this sense, a film about Dutch Jews in the Second World War reflects on issues of identity in the 21st Century.

Keywords: Dutch, film, stereotypes, identity

Procedia PDF Downloads 131
2490 The Significance of Community Life in Promoting Unity in the Light of Acts 2:42

Authors: Takesure Mahohoma

Abstract:

Community life is an epitome of the African axiom 'I am because we are, since we are therefore I am.' This culminates in the Ubuntu philosophy which is summarized in the Zulu words, 'umuntu ngumuntu ngabantu' (A person is a person through other people). This relationship gives honour to all people. This is the gist of the paper. This paper seeks to demonstrate the impact of community life in promoting unity from an African perspective. Using the proto-community in Acts 2:42, it is argued that community life is a solution to many social problems that divide African society today. The aim is to encourage all Africans and other people to cultivate a sense of belonging and valuing community life in the light of Acts 2:42. Hence we shall trace this theme from Old Testament, New Testament, and Christian history. The other section touches on the essence of community life and obstacles that hinder it. We shall offer spiritual suggestions and an integrative reflection. The nature of the paper is theology in general but spiritual in particular. As a spiritual paper, it is guided by the foundational approach. Thus, it employs the dialogical and integrative reflection method. The expected result is that freedom from all the miseries experienced is brought by living a community life. This is a life that gives greater assurance of enough food, education, health, peace, employment, and increased responsibility that values human dignity. Thus people are neighbours to each other. There is no stranger among them. The basic presumption is that there can be no development in any society without community life.

Keywords: community, seged, koinonia, neighbor

Procedia PDF Downloads 292
2489 The Clash of the Clans in the British Divorce

Authors: Samuel Gary Beckton

Abstract:

Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.

Keywords: identity, nationalism, Scotland, unionism

Procedia PDF Downloads 169
2488 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 396