Search results for: fraud triangle analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27270

Search results for: fraud triangle analysis

27090 The Hindrances Associated with Internet Banking Services in Nigeria: The Lagos State Perspective

Authors: Patience Oluchi Silas, Yemi Adeshina

Abstract:

Financial transactions involving the use of the internet has become an important practice among commercial banks in Nigeria with the introduction of internet banking and this has improved banking efficiency in rending services to customers. However, customers in Lagos State are enslaved in the fear of insecurity, technical failure, inadequate operational facilities, including improper telecommunications and poor power supply. It is in line with this that this paper explores the obstacles faced by Lagosians, tourists, small scale business owners, companies, customers and the government's attitude in addressing the challenges associated with online banking system in Nigeria through relevant legislations. Internet banking has the potential to transform economic activity and achieve developmental goals. If the associated Challenges are addressed quickly, then it will have the desired impact on the Nigerian economy. In this study, Respondents, mostly bank employees and customers were issued well designed and structured questionnaires to effectively examine the new developments brought about by the introduction of Internet banking and the challenges inhibiting its adoption. Hypotheses were formulated to test assumptions and claims generated from the study. The results were statistically analyzed to address the issues of errors and chances, and at the end, the result of the statistical analysis shows that all especially insecurity, inadequate operational facilities and poor power supply are the significant factors affecting the adoption of internet banking services in Nigeria. The study recommends that for internet banking to assume a developmental dimension in Nigeria and for the country to be fully integrated and respected in global financial environment, the prevalent level of frauds in Lagos State and among Nigerians must first be addressed and the relevant local laws should be put in place and in consonance with international laws and conventions; get the citizens well educated on the intricacies of Internet usage and frauds.

Keywords: internet-banking, adoption, challenges, insecurity, legislation, fraud, Lagos state, statistics

Procedia PDF Downloads 323
27089 Elite Rain: A Solution to the Problem of Destructive Processes in Iran and Other Countries

Authors: Khaled Ali Soltan

Abstract:

Iran can be considered a triangle that is affected by 3 forces: the government, the elite, and the people. Over the last 100 years, these three forces have been at odds with each other. This lack of coordination and sometimes antagonism among these three forces has led to lawlessness in Iran (both the government and the people have entered the cycle of lawlessness) and the spread of destructive processes in the country and the destruction of resources, both natural and human resources. The direct and negative impact of this issue on people's lives as well as the environment highlights the importance of this article. This article descriptively deals with the issue and suggests solutions and examines possible problems and obstacles. There seems to be a way to establish a connection’ closeness and coordination among these three forces and put them on the path of development. ELITE RAIN is a scientific-popular process that can create coordination and cooperation between these forces, prevent destructive processes in the country and put it on the path of sustainable development and a better life. This solution is a more advanced model of brainstorming technique introduced by Alex Osborn in 1953. Given that people have tried different types of protests to improve the status quo, such as the change of government in 1979 which led to the establishment of the theocracy, participating in elections that resulted in more frustration and corruption due to the lack of real parties, and sporadic street protests that resulted in nothing more than repression, it seems that this solution can be successful.

Keywords: corruption, destruction of resources, elite rain, Iran, legal complaints, sustainable development, the elite

Procedia PDF Downloads 59
27088 Collective Behavior of Mice Passing through a Middle-Exit or Corner-Exit under Panic

Authors: Teng Zhang, Xuelin Zhang, Shouxiang Lu, Changhai Li

Abstract:

The existence of animal groups and collective migration are common in nature, and collective behavior is attracting more and more attention of researchers. Previous results have shown that architectural design had an important effect on the process of crowd evacuation. In this paper, collective behavior of mice passing through a middle-exit or corner-exit under panic was investigated. Selfish behavior and herd behavior were easily observed in our video, which caused the congregation with high density near the exit. Triangle structure of congregation formed near the middle-exit while arch structure formed near the corner-exit. It is noteworthy that the exit located at the middle of the wall was more effective for evacuation than at the corner. Meanwhile, the escape sequence of mouse passing through the exit was investigated, and the result showed that the priority depends largely on its location in the congregation. With the level of stimulus increasing, these phenomena still exist. The frequency distributions of time intervals and the burst sizes were also analyzed in this study to explore the secret of collective behavior of mice. These results could provide evidence for the hypothesis or prediction about human behavior in crowd evacuation. However, it is not clear whether the simulated results from different species can correspond to reality or not. Broader comparison among different species about this topic will be eager to be conducted to deepen our understanding of collective behavior in nature.

Keywords: collective behavior, mice, evacuation, exit location

Procedia PDF Downloads 289
27087 Geometric Intuition and Formalism in Passing from Indivisibles to Infinitesimals: Pascal and Leibniz

Authors: Remus Titiriga

Abstract:

The paper focuses on Pascal's indivisibles evolving to Leibniz's infinitesimals. It starts with parallel developments by the two savants in Combinatorics (triangular numbers for Pascal and harmonic triangles for Leibniz) and their implication in determining the sum of mathematical series. It follows with a focus on the geometrical contributions of Pascal. He considered the cycloid and other mechanical curves the epitome of geometric comprehensibility in a series of challenging problems he posed to the mathematical world. Pascal provided the solutions in 1658, in a volume published under the pseudonym of Dettonville, using indivisibles and ratios between curved and straight lines. In the third part, the research follows the impact of this volume on Leibniz as the initial impetus for the elaboration of modern calculus as an algorithmic method disjoint of geometrical intuition. Then paper analyses the further steps and proves that Leibniz's developments relate to his philosophical frame (the search for a characteristic Universalis, the consideration of principle of continuity or the rule of sufficient reason) different from Pascal's and impacting mathematical problems and their solutions. At this stage in Leibniz's evolution, the infinitesimals replaced the indivisibles proper. The last part of the paper starts with speculation around "What if?". Could Pascal, if he lived more, accomplish the same feat? The document uses Pascal's reconstructed philosophical frame to formulate a positive answer. It also proposes to teach calculus with indivisibles and infinitesimals mimicking Pascal and Leibniz's achievements.

Keywords: indivisibles, infinitesimals, characteristic triangle, the principle of continuity

Procedia PDF Downloads 115
27086 Establishing Quality Evaluation Indicators of Early Education Center for 0~3 Years Old

Authors: Lina Feng

Abstract:

The study aimed at establishing quality evaluation indicators of an early education center for 0~3 years old, and defining the weight system of it. Expert questionnaire and Fuzzy Delphi method were applied. Firstly, in order to ensure the indicators in accordance with the practice of early education, 16 experts were invited as respondents to a preliminary Expert Questionnaire about Quality Evaluation Indicators of Early Education Center for 0~3 Years Old. The indicators were based on relevant studies on quality evaluation indicators of early education centers in China and abroad. Secondly, 20 scholars, kindergarten principals, and educational administrators were invited to form a fuzzy Delphi expert team. The experts’ opinions on the importance of indicators were calculated through triangle fuzzy numbers in order to select appropriate indicators and calculate indicator weights. This procedure resulted in the final Quality Evaluation Indicators of Early education Center for 0~3 Years Old. The Indicators contained three major levels, including 6 first-level indicators, 30 second-level indicators, and 147 third-level indicators. The 6 first-level indicators were health and safety; educational and cultivating activities; development of babies; conditions of the center; management of the center; and collaboration between family and the community. The indicators established by this study could provide suggestions for the high-quality environment for promoting the development of early year children.

Keywords: early education center for 0~3 years old, educational management, fuzzy delphi method, quality evaluation indicator

Procedia PDF Downloads 240
27085 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 193
27084 Civic E-Participation in Central and Eastern Europe: A Comparative Analysis

Authors: Izabela Kapsa

Abstract:

Civic participation is an important aspect of democracy. The contemporary model of democracy is based on citizens' participation in political decision-making (deliberative democracy, participatory democracy). This participation takes many forms of activities like display of slogans and symbols, voting, social consultations, political demonstrations, membership in political parties or organizing civil disobedience. The countries of Central and Eastern Europe after 1989 are characterized by great social, economic and political diversity. Civil society is also part of the process of democratization. Civil society, funded by the rule of law, civil rights, such as freedom of speech and association and private ownership, was to play a central role in the development of liberal democracy. Among the many interpretations of concepts, defining the concept of contemporary democracy, one can assume that the terms civil society and democracy, although different in meaning, nowadays overlap. In the post-communist countries, the process of shaping and maturing societies took place in the context of a struggle with a state governed by undemocratic power. State fraud or repudiation of the institution is a representative state, which in the past was the only way to manifest and defend its identity, but after the breakthrough became one of the main obstacles to the development of civil society. In Central and Eastern Europe, there are many obstacles to the development of civil society, for example, the elimination of economic poverty, the implementation of educational campaigns, consciousness-related obstacles, the formation of social capital and the deficit of social activity. Obviously, civil society does not only entail an electoral turnout but a broader participation in the decision-making process, which is impossible without direct and participative democratic institutions. This article considers such broad forms of civic participation and their characteristics in Central and Eastern Europe. The paper is attempts to analyze the functioning of electronic forms of civic participation in Central and Eastern European states. This is not accompanied by a referendum or a referendum initiative, and other forms of political participation, such as public consultations, participative budgets, or e-Government. However, this paper will broadly present electronic administration tools, the application of which results from both legal regulations and increasingly common practice in state and city management. In the comparative analysis, the experiences of post-communist bloc countries will be summed up to indicate the challenges and possible goals for further development of this form of citizen participation in the political process. The author argues that for to function efficiently and effectively, states need to involve their citizens in the political decision-making process, especially with the use of electronic tools.

Keywords: Central and Eastern Europe, e-participation, e-government, post-communism

Procedia PDF Downloads 170
27083 Studying the Effects of Conditional Conservatism and Lack of Information Asymmetry on the Cost of Capital of the Accepted Companies in Tehran Stock Exchange

Authors: Fayaz Moosavi, Saeid Moradyfard

Abstract:

One of the methods in avoiding management fraud and increasing the quality of financial information, is the notification of qualitative features of financial information, including conservatism characteristic. Although taking a conservatism approach, while boosting the quality of financial information, is able to reduce the informational risk and the cost of capital stock of commercial department, by presenting an improper image about the situation of the commercial department, raises the risk of failure in returning the main and capital interest, and consequently the cost of capital of the commercial department. In order to know if conservatism finally leads to the increase or decrease of the cost of capital or does not have any influence on it, information regarding accepted companies in Tehran stock exchange is utilized by application of pooling method from 2007 to 2012 and it included 124 companies. The results of the study revealed that there is an opposite and meaningful relationship between conditional conservatism and the cost of capital of the company. In other words, if bad and unsuitable news and signs are reflected sooner than good news in accounting profit, the cost of capital of the company increases. In addition, there is a positive and meaningful relationship between the cost of capital and lack of information asymmetry.

Keywords: conditional conservatism, lack of information asymmetry, the cost of capital, stock exchange

Procedia PDF Downloads 249
27082 A Review of Spatial Analysis as a Geographic Information Management Tool

Authors: Chidiebere C. Agoha, Armstong C. Awuzie, Chukwuebuka N. Onwubuariri, Joy O. Njoku

Abstract:

Spatial analysis is a field of study that utilizes geographic or spatial information to understand and analyze patterns, relationships, and trends in data. It is characterized by the use of geographic or spatial information, which allows for the analysis of data in the context of its location and surroundings. It is different from non-spatial or aspatial techniques, which do not consider the geographic context and may not provide as complete of an understanding of the data. Spatial analysis is applied in a variety of fields, which includes urban planning, environmental science, geosciences, epidemiology, marketing, to gain insights and make decisions about complex spatial problems. This review paper explores definitions of spatial analysis from various sources, including examples of its application and different analysis techniques such as Buffer analysis, interpolation, and Kernel density analysis (multi-distance spatial cluster analysis). It also contrasts spatial analysis with non-spatial analysis.

Keywords: aspatial technique, buffer analysis, epidemiology, interpolation

Procedia PDF Downloads 293
27081 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 153
27080 The Portuguese Legal Instruments to Combat the Improper Use of the Contract Service

Authors: Ana Lambelho

Abstract:

Nowadays is very common that an activity may be performed independently or dependently. In Portugal, the Labour Law exclusively protects the dependent labour relations. The independent work is regulated by civil law, where the autonomy of the will is the main principle. For companies is more advantageous to hire people under a service agreement since, in that case, the relation is not submitted to the limits established in Labour law and collective bargaining. This practice has nothing wrong, if the performance of work is, in fact, made autonomously. The problem is the increased frequency of the celebration of service agreements to hide a legal relation of subordination. Aware of this and regarding the huge difficulty to demonstrate the existence of subordinated work (that often runs against the employee), the Portuguese legislator devoted some legislative rules in order to facilitate the evidence of legal subordination and, on the other hand, to avoid the misuse of the provision of service agreements. This study focuses precisely on the analysis of this solution, namely the so-called presumption of ‘laboralidade’ and on the lawsuit to recognize the existence of a labour contract. The presumption of the existence of a labour contract is present in the Portuguese legal system since 2003, and received, with the 2009 Labour Code, a new redaction that, according to the doctrine and the jurisprudence, finally approached it to a legal presumption, with the consequent reversal of the burden of proof and, in consequence, made easier to proof the legal subordination, because the employee will just have to plead and prove the existence of two of the elements described in the law to use this presumption. Another change in the Portuguese legal framework is related with the competencies of the Authority for Working Conditions (AWC): now, if during an inspection, the Authority finds a situation that seems to be an undeclared employment situation, it may access the company and, if it does not regularize voluntarily the situation, AWC has a duty to communicate to the public prosecutor, who will begin the lawsuit for the recognition of the existence of an employment contract. To defend the public interest, the action to recognize the existence of an employment contract will follow its terms, even against the employee will. Although the existence of these mechanisms does not solve by itself the problem of evasion of labour law and false ‘green receipts’, it is undeniable that it is an important step in combating fraud in this field.

Keywords: independent work, labour contract, Portugal, service agreement

Procedia PDF Downloads 312
27079 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 793
27078 A Geographical Study of Vindhyanchal in Mirzapur City, U.P. India

Authors: Akhilendra Nath Tiwary

Abstract:

Vindhyanchal is a very famous pilgrimage and tourism site in the west of Mirzapur city of Uttar Pradesh State in India. The city in east is a commercial center for cotton, metal ware and carpets. Among the Hindu population, it is believed that the primordial creative forces of the GOD and the power of the GODDESS make respective triangles which superimpose opposite to each other as hexagram at a point or node (Bindu (point) +Vasini (located) or Vindhyavasini, located in a point/node). Mirzapur city has served as a natural connecting point between north and south India. Before independence of India from Britain in 1947, it was a flourishing commercial center. Post-independence, the negligence of planning authorities and nexus of bureaucrats and politicians started affecting its development. In the meantime, emergence of new industrial cities as Kanpur, Agra, Moradabad, etc., nearer to the capital city of Delhi, posed serious challenges to the development of this small city as many commercial and business activities along with the skilled workforce started shifting to these new cities or to the relatively bigger neighboring cities of Varanasi in east and Allahabad in west. In the present paper, the significant causes, issues and challenges in development of Vindhyanchal is discussed with geographical perspective. An attempt has been made to find out the ways to restore the lost glory of the city as a center of pilgrimage, tourism, and commerce.

Keywords: cultural node, pilgrimage, sacred, Vindhyan triangle, ommercial centre

Procedia PDF Downloads 419
27077 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 83
27076 Application of Subversion Analysis in the Search for the Causes of Cracking in a Marine Engine Injector Nozzle

Authors: Leszek Chybowski, Artur Bejger, Katarzyna Gawdzińska

Abstract:

Subversion analysis is a tool used in the TRIZ (Theory of Inventive Problem Solving) methodology. This article introduces the history and describes the process of subversion analysis, as well as function analysis and analysis of the resources, used at the design stage when generating possible undesirable situations. The article charts the course of subversion analysis when applied to a fuel injection nozzle of a marine engine. The work describes the fuel injector nozzle as a technological system and presents principles of analysis for the causes of a cracked tip of the nozzle body. The system is modelled with functional analysis. A search for potential causes of the damage is undertaken and a cause-and-effect analysis for various hypotheses concerning the damage is drawn up. The importance of particular hypotheses is evaluated and the most likely causes of damage identified.

Keywords: complex technical system, fuel injector, function analysis, importance analysis, resource analysis, sabotage analysis, subversion analysis, TRIZ (Theory of Inventive Problem Solving)

Procedia PDF Downloads 600
27075 Assets Misappropriation in the Malaysian Public and Private Sectors

Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura

Abstract:

Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.

Keywords: assets misappropriation, fraud, public sector, private sector

Procedia PDF Downloads 175
27074 The Inattentional Blindness Paradigm: A Breaking Wave for Attentional Biases in Test Anxiety

Authors: Kritika Kulhari, Aparna Sahu

Abstract:

Test anxiety results from concerns about failure in examinations or evaluative situations. Attentional biases are known to pronounce the symptomatic expression of test anxiety. In recent times, the inattentional blindness (IB) paradigm has shown promise as an attention bias modification treatment (ABMT) for anxiety by overcoming practice and expectancy effects which preexisting paradigms fail to counter. The IB paradigm assesses the inability of an individual to attend to a stimulus that appears suddenly while indulging in a perceptual discrimination task. The present study incorporated an IB task with three critical items (book, face, and triangle) appearing randomly in the perceptual discrimination task. Attentional biases were assessed as detection and identification of the critical item. The sample (N = 50) consisted of low test anxiety (LTA) and high test anxiety (HTA) groups based on the reactions to tests scale scores. Test threat manipulation was done with pre- and post-test assessment of test anxiety using the State Test Anxiety Inventory. A mixed factorial design with gender, test anxiety, presence or absence of test threat, and critical items was conducted to assess their effects on attentional biases. Results showed only a significant main effect for test anxiety on detection with higher accuracy of detection of the critical item for the LTA group. The study presents promising results in the realm of ABMT for test anxiety.

Keywords: attentional bias, attentional bias modification treatment, inattentional blindness, test anxiety

Procedia PDF Downloads 202
27073 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 51
27072 Isolated Iterating Fractal Independently Corresponds with Light and Foundational Quantum Problems

Authors: Blair D. Macdonald

Abstract:

After nearly one hundred years of its origin, foundational quantum mechanics remains one of the greatest unexplained mysteries in physicists today. Within this time, chaos theory and its geometry, the fractal, has developed. In this paper, the propagation behaviour with an iteration of a simple fractal, the Koch Snowflake, was described and analysed. From an arbitrary observation point within the fractal set, the fractal propagates forward by oscillation—the focus of this study and retrospectively behind by exponential growth from a point beginning. It propagates a potentially infinite exponential oscillating sinusoidal wave of discrete triangle bits sharing many characteristics of light and quantum entities. The model's wave speed is potentially constant, offering insights into the perception and a direction of time where, to an observer, when travelling at the frontier of propagation, time may slow to a stop. In isolation, the fractal is a superposition of component bits where position and scale present a problem of location. In reality, this problem is experienced within fractal landscapes or fields where 'position' is only 'known' by the addition of information or markers. The quantum' measurement problem', 'uncertainty principle,' 'entanglement,' and the classical-quantum interface are addressed; these are a problem of scale invariance associated with isolated fractality. Dual forward and retrospective perspectives of the fractal model offer the opportunity for unification between quantum mechanics and cosmological mathematics, observations, and conjectures. Quantum and cosmological problems may be different aspects of the one fractal geometry.

Keywords: measurement problem, observer, entanglement, unification

Procedia PDF Downloads 72
27071 Conflicts and Similarities among Energy Law, Environmental Law and Economic Aspects

Authors: Bahareh Arghand, Seyed Abbas Poorhashemi, Ramin Roshandel

Abstract:

Nowadays, Economic growth and the increasing use of fossil fuel have caused major damages to environment. Therefore, international law has tried to codify the rules and regulations and identify legal principles to decrease conflict of interests between energy law and environmental law. The open relationship between energy consumption and the law of nature has been ignored for years, because the focus of energy law has been on an affordable price of a reliable supply of energy; while the focus of environmental law was on protection of the nature. In fact, the legal and overall policies of energy are based on Sic Omnes and inter part for governments whereas environmental law is based on common interests and Erga Omnes. The relationship between energy law, environmental law and economic aspects is multilateral, complex and important. Moreover, they influence each other. There are similarities in the triangle of energy, environment and economic aspects and in some cases there are conflict of interest but their conflicts are in goals not in practice and their legal jurisdiction is in international law. The development of national and international rules and regulations relevant to energy-environment has been done by separate sectors, whereas sustainable development principle, especially in the economic sector, requires environmental considerations. It is an important turning point to integrate and decrease conflict of interest among energy law, environmental law and economic aspects. The present study examines existing legal principles on energy and the environment and identifies the similarities and conflicts based on the descriptive-analytic study. The purpose of investigating these legal principles is to integrate and decrease conflict of interest between energy law and environmental law.

Keywords: energy law, environmental law, erga omnes, sustainable development

Procedia PDF Downloads 361
27070 Inappropriate Job Behaviour and Performance of Employees

Authors: Prakash Singh

Abstract:

The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.

Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage

Procedia PDF Downloads 352
27069 An Assessment of the Performance of Local Government in Ondo State Nigeria: A Capital Budgeting Approach

Authors: Olurankinse Felix

Abstract:

Local governments in Ondo State Nigeria are the third tier of government saddled with the responsibility of providing governance and economic services at the grassroots. To be able to do this, the Constitution of the Federal Republic of Nigeria provided that a proportion of Federation Account be allocated to them in addition to their internally generated revenue. From the allocation and other incidental sources of revenue, the local governments are expected to provide basic infrastructures and other social amenities to better the lots of the rural dwellers. Nevertheless, local governments’ performances in terms of provision of social amenities are without questioning and quite not encouraging. Assessing the performance of local governments in this period of dearth and scarcity of resources is highly indispensable more so that the activities of local governments’ staff are bedeviled and characterized with fraud, corruption and mismanagement. Considering the direct impact of the consequences of their action on the living standard of the rural dwellers therefore calls for the need to evaluate their level of performances using capital budgeting approach. The paper being a time series study adopts the survey design. Data were obtained through secondary source mainly from the Annual financial statements and publication of approved budgets estimates covering the period of study (2008-2012). The use of ratio analysis was employed in analyzing the comparative level of performances of the local governments under study. The result of the study shows that less than 30% of the local governments were able to harness the budgetary allocation to provide amenities to the beneficiaries while majority of the local governments were involved in unethical conduct ranging from theft of fund, corruption, diversion of funds and extra-budgetary activities. Also, there is poor internally generated revenue to complement the statutory allocation and besides, the monthly withholding of larger portions of local government share by the state in the name of joint account were also seen as contributory factors. The study recommends the need for transparency and accountability in public fund management through the oversight function of the state house of assembly. Also local government should be made to be autonomous and independent of the state by jettisoning the idea of joint account.

Keywords: performance, transparency and accountability, capital budgeting, joint account, local government autonomy

Procedia PDF Downloads 312
27068 Investigating the Relationship between Bioethics and Sports

Authors: Franco Bruno Castaldo

Abstract:

Aim: The term bioethics is a term coined by VanPotter R ., who in 1970 thought of a discipline, capable of contributing to a better quality of human life and the cosmos. At first he intended bioethics as a wisdom capable of creating a bridge between bios and ethos and between bio-experimental science and ethical-anthropological sciences.Similarly, the modern sport is presented as a polysemic phenomenon, multidisciplinary, pluris value. From the beginning, the sport is included in the discussion of bioethical problems with doping. Today, the ethical problems of the sport are not only ascribable to doping, the medicalization of society, Techniques for enhancement, violence, Fraud, corruption, even the acceptance of anthropological transhumanist theories. Our purpose is to shed light on these issues so that there is a discernment, a fine-tuning also in educational programs, for the protection of all the sport from a scientist adrift, which would lead to an imbalance of values. Method: Reading, textual and documentary analysis, evaluation of critical examples. Results: Harold VanderZwaag, (1929-2011) in ancient times, asked: how many athletic directors have read works of sport philosophy or humanities? Along with E.A. Zeigler (North American Society for Sport Management) are recognized as pioneers of educational Sport Management. Comes the need to leave the confines of a scientific field, In order to deal with other than itself. Conclusion: The quantitative sciences attracts more funds than qualitative ones, the philosopher M. Nussbaum, has relaunched the idea that the training of students will have to be more disinterested than utilitarian, Offering arguments against the choice of anti-classical, analyzing and comparing different educational systems. schools, universities must assign a prominent place in the program of study to the humanistic, literary and artistic subjects, cultivating a participation that can activate and improve the ability to see the world through the eyes of another person. In order to form citizens who play their role in society, science and technology alone are not enough, we need disciplines that are able to cultivate critical thinking, respect for diversity, solidarity, the judgment, the freedom of expression. According to A. Camelli, the humanities faculties prepare for that life-long learning, which will characterize tomorrow's jobs.

Keywords: bioethics, management, sport, transhumanist, medicalization

Procedia PDF Downloads 494
27067 Cyclocoelids (Trematoda: Echinostomata) from Gadwall Mareca strepera in the South of the Russian Far East

Authors: Konstantin S. Vainutis, Mark E. Andreev, Anastasia N. Voronova, Mikhail Yu. Shchelkanov

Abstract:

Introduction: The trematodes from the family Cyclocoelidae (cyclocoelids) belong to the superfamily Echinostomatoidea infecting air sacs and trachea of wild birds. At present, the family Cyclocoelidae comprises nine valid genera in three subfamilies: Cyclocoelinae (type taxon), Haematotrephinae, and Typhlocoelinae. To our best knowledge, in this study, molecular genetic methods were used for the first time for studying cyclocoelids from the Russian Far East. Here we provide the data on the morphology and phylogeny of cyclocoelids from gadwall from the Russian Far East. The morphological and genetic data obtained for cyclocoelids indicated the necessity to revise the previously proposed classification within the family Cyclocoelidae. Objectives: The first objective was performing the morphological study of cyclocoelids found in M. strepera from the Russian Far East. The second objective is to reconstruct the phylogenetic relationships of the studied trematodes with other cyclocoelids using the 28S gene. Material and methods: During the field studies in the Khasansky district of the Primorsky region, 21 cyclocoelids were recovered from the air sacs of a single gadwall Mareca strepera. Seven samples of cyclocoelids were overstained in alum carmine, dehydrated in a graded ethanol series, cleared in clove oil, and mounted in Canada balsam. Genomic DNA was extracted from four cyclocoelids using the alkaline lysis method HotShot. The 28S rDNA fragment was amplified using the forward primer Digl2 and the reverse primer 1500R. Results: According to morphological features (ovary intratesticular, forming a triangle with the testes), the studied worms belong to the subfamily Cyclocoelinae Stossich, 1902. In particular, the highest morphological similarity was observed in relation to the trematodes of the genus Cyclocoelum Brandes, 1892 – genital pores are pharyngeal. However, the genetic analysis has shown significant discrepancies between the trematodes studied regarding the genus Cyclocoelum. On the phylogenetic tree, these trematodes took the sister position in relation to the genus Morishitium (previously considered in the subfamily Szidatitrematinae). Conclusion: Based on the results of the morphological and genetic studies, cyclocoelids isolated from Mareca strepera are suggested to be described in the previously unknown genus and differentiated from the type genus Cyclocoelum of the type subfamily Cyclocoelinae. Considering the available molecular data, including described cyclocoelids, the family Cyclocoelidae comprises ten valid genera in the three subfamilies mentioned above.

Keywords: new species, trematoda, phylogeny, cyclocoelidae

Procedia PDF Downloads 827
27066 Comparative Study on Inhibiting Factors of Cost and Time Control in Nigerian Construction Practice

Authors: S. Abdulkadir, I. Y. Moh’d, S. U. Kunya, U. Nuruddeen

Abstract:

The basis of any contract formation between the client and contractor is the budgeted cost and the estimated duration of projects. These variables are paramount important to project's sponsor in a construction projects and in assessing the success or viability of construction projects. Despite the availability of various techniques of cost and time control, many projects failed to achieve their initial estimated cost and time. The paper evaluate the inhibiting factors of cost and time control in Nigerian construction practice and comparing the result with the United Kingdom practice as identified by one researcher. The populations of the study are construction professionals within Bauchi and Gombe state, Nigeria, a judgmental sampling employed in determining the size of respondents. Descriptive statistics used in analyzing the data in SPSS. Design change, project fraud and corruption, financing and payment of completed work found to be common among the top five inhibiting factors of cost and time control in the study area. Furthermore, the result had shown some comprising with slight contrast as in the case of United Kingdom practice. Study recommend the adaptation of mitigation measures developed in the UK prior to assessing its effectiveness and so also developing a mitigating measure for other top factors that are not within the one developed in United Kingdom practice. Also, it recommends a wider assessing comparison on the modify inhibiting factors of cost and time control as revealed by the study to cover almost all part of Nigeria.

Keywords: comparison, cost, inhibiting factor, United Kingdom, time

Procedia PDF Downloads 422
27065 Improved Classification Procedure for Imbalanced and Overlapped Situations

Authors: Hankyu Lee, Seoung Bum Kim

Abstract:

The issue with imbalance and overlapping in the class distribution becomes important in various applications of data mining. The imbalanced dataset is a special case in classification problems in which the number of observations of one class (i.e., major class) heavily exceeds the number of observations of the other class (i.e., minor class). Overlapped dataset is the case where many observations are shared together between the two classes. Imbalanced and overlapped data can be frequently found in many real examples including fraud and abuse patients in healthcare, quality prediction in manufacturing, text classification, oil spill detection, remote sensing, and so on. The class imbalance and overlap problem is the challenging issue because this situation degrades the performance of most of the standard classification algorithms. In this study, we propose a classification procedure that can effectively handle imbalanced and overlapped datasets by splitting data space into three parts: nonoverlapping, light overlapping, and severe overlapping and applying the classification algorithm in each part. These three parts were determined based on the Hausdorff distance and the margin of the modified support vector machine. An experiments study was conducted to examine the properties of the proposed method and compared it with other classification algorithms. The results showed that the proposed method outperformed the competitors under various imbalanced and overlapped situations. Moreover, the applicability of the proposed method was demonstrated through the experiment with real data.

Keywords: classification, imbalanced data with class overlap, split data space, support vector machine

Procedia PDF Downloads 293
27064 Spatial Variability of Renieramycin-M Production in the Philippine Blue Sponge, Xestospongia Sp.

Authors: Geminne Manzano, Porfirio Aliño, Clairecynth Yu, Lilibeth Salvador-Reyes, Viviene Santiago

Abstract:

Many marine benthic organisms produce secondary metabolites that serve as ecological roles to different biological and environmental factors. The secondary metabolites found in these organisms like algae, sponges, tunicates and worms exhibit variation at different scales. Understanding the chemical variation can be essential in deriving the evolutionary and ecological function of the secondary metabolites that may explain their patterns. Ecological surveys were performed on two collection sites representing from two Philippine marine biogeographic regions – in Oriental Mindoro located on the West Philippine Sea (WPS) and in Zamboanga del Sur located at Celebes Sea (CS), where a total of 39 Xestospongia sp. sponges were collected using SCUBA. The sponge samples were transported to the laboratory for taxonomic identification and chemical analysis. Biological and environmental factors were investigated to determine their relation to the abundance and distribution patterns and its spatial variability of their secondary metabolite production. Extracts were subjected to thin-layer chromatography and anti-proliferative assays to confirm the presence of Renieramycin-M and to test its cytotoxicity. The blue sponges were found to be more abundant on the WPS than in CS. Both the benthic community and the fish community in Oriental Mindoro, WPS and Zamboanga del Sur, CS sites are characterized by high species diversity and abundance and a very high biomass category. Environmental factors like depth and monsoonal exposure were also compared showing that wave exposure and depth are associated with the abundance and distribution of the sponges. Renieramycin-M presence using the TLC profiles between the sponge extracts from WPS and from CS showed differences in the Reniermycin-M presence and the presence of other functional groups were observed between the two sites. In terms of bioactivity, different responses were also exhibited by the sponge extracts coming from the different region. Different responses were also noted on its bioactivity depending on the cell lines tested. Exploring the influence of ecological parameters on the chemical variation can provide deeper chemical ecological insights in the knowledge and their potential varied applications at different scales. The results of this study provide further impetus in pursuing studies into patterns and processes of the chemical diversity of the Philippine blue sponge, Xestospongia sp. and the chemical ecological significance of the coral triangle.

Keywords: chemical ecology, porifera, renieramycin-m, spatial variability, Xestospongia sp.

Procedia PDF Downloads 196
27063 Toehold Mediated Shape Transition of Nucleic Acid Nanoparticles

Authors: Emil F. Khisamutdinov

Abstract:

Development of functional materials undergoing structural transformations in response to an external stimulus such as environmental changes (pH, temperature, etc.), the presence of particular proteins, or short oligonucleotides are of great interest for a variety of applications ranging from medicine to electronics. The dynamic operations of most nucleic acid (NA) devices, including circuits, nano-machines, and biosensors, rely on networks of NA strand displacement processes in which an external or stimulus strand displaces a target strand from a DNA or RNA duplex. The rate of strand displacement can be greatly increased by the use of “toeholds,” single-stranded regions of the target complex to which the invading strand can bind to initiate the reaction, forming additional base pairs that provide a thermodynamic driving force for transformation. Herein, we developed a highly robust nanoparticle shape transition, sequentially transforming DNA polygons from one shape to another using the toehold-mediated DNA strand displacement technique. The shape transformation was confirmed by agarose gel electrophoresis and atomic force microscopy. Furthermore, we demonstrate that our approach is applicable for RNA shape transformation from triangle to square, which can be detected by fluorescence emission from malachite green binding RNA aptamer. Using gel-shift and fluorescence assays, we demonstrated efficient transformation occurs at isothermal conditions (37°C) that can be implemented within living cells as reporter molecules. This work is intended to provide a simple, cost-effective, and straightforward model for the development of biosensors and regulatory devices in nucleic acid nanotechnology.

Keywords: RNA nanotechnology, bionanotechnology, toehold mediated DNA switch, RNA split fluorogenic aptamers

Procedia PDF Downloads 59
27062 Effects of Wind Load on the Tank Structures with Various Shapes and Aspect Ratios

Authors: Doo Byong Bae, Jae Jun Yoo, Il Gyu Park, Choi Seowon, Oh Chang Kook

Abstract:

There are several wind load provisions to evaluate the wind response on tank structures such as API, Euro-code, etc. the assessment of wind action applying these provisions is made by performing the finite element analysis using both linear bifurcation analysis and geometrically nonlinear analysis. By comparing the pressure patterns obtained from the analysis with the results of wind tunnel test, most appropriate wind load criteria will be recommended.

Keywords: wind load, finite element analysis, linear bifurcation analysis, geometrically nonlinear analysis

Procedia PDF Downloads 613
27061 The Scientific Study of the Relationship Between Physicochemical and Microstructural Properties of Ultrafiltered Cheese: Protein Modification and Membrane Separation

Authors: Shahram Naghizadeh Raeisi, Ali Alghooneh

Abstract:

The loss of curd cohesiveness and syneresis are two common problems in the ultrafiltered cheese industry. In this study, by using membrane technology and protein modification, a modified cheese was developed and its properties were compared with a control sample. In order to decrease the lactose content and adjust the protein, acidity, dry matter and milk minerals, a combination of ultrafiltration, nanofiltration and reverse osmosis technologies was employed. For protein modification, a two-stage chemical and enzymatic reaction was employed before and after ultrafiltration. The physicochemical and microstructural properties of the modified ultrafiltered cheese were compared with the control one. Results showed that the modified protein enhanced the functional properties of the final cheese significantly (pvalue< 0.05), even if the protein content was 50% lower than the control one. The modified cheese showed 21 ± 0.70, 18 ± 1.10 & 25±1.65% higher hardness, cohesiveness and water-holding capacity values, respectively, than the control sample. This behavior could be explained by the developed microstructure of the gel network. Furthermore, chemical-enzymatic modification of milk protein induced a significant change in the network parameter of the final cheese. In this way, the indices of network linkage strength, network linkage density, and time scale of junctions were 10.34 ± 0.52, 68.50 ± 2.10 & 82.21 ± 3.85% higher than the control sample, whereas the distance between adjacent linkages was 16.77 ± 1.10% lower than the control sample. These results were supported by the results of the textural analysis. A non-linear viscoelastic study showed a triangle waveform stress of the modified protein contained cheese, while the control sample showed rectangular waveform stress, which suggested a better sliceability of the modified cheese. Moreover, to study the shelf life of the products, the acidity, as well as molds and yeast population, were determined in 120 days. It’s worth mentioning that the lactose content of modified cheese was adjusted at 2.5% before fermentation, while the lactose of the control one was at 4.5%. The control sample showed 8 weeks shelf life, while the shelf life of the modified cheese was 18 weeks in the refrigerator. During 18 weeks, the acidity of modified and control samples increased from 82 ± 1.50 to 94 ± 2.20 °D and 88 ± 1.64 to 194 ± 5.10 °D, respectively. The mold and yeast populations, with time, followed the semicircular shape model (R2 = 0.92, R2adj = 0.89, RMSE = 1.25). Furthermore, the mold and yeast counts and their growth rate in the modified cheese were lower than those for control one; Aforementioned result could be explained by the shortage of the source of energy for the microorganism in the modified cheese. The lactose content of the modified sample was less than 0.2 ± 0.05% at the end of fermentation, while this was 3.7 ± 0.68% in the control sample.

Keywords: non-linear viscoelastic, protein modification, semicircular shape model, ultrafiltered cheese

Procedia PDF Downloads 61