Search results for: private information retrieval
12162 Development of Innovative Islamic Web Applications
Authors: Farrukh Shahzad
Abstract:
The rich Islamic resources related to religious text, Islamic sciences, and history are widely available in print and in electronic format online. However, most of these works are only available in Arabic language. In this research, an attempt is made to utilize these resources to create interactive web applications in Arabic, English and other languages. The system utilizes the Pattern Recognition, Knowledge Management, Data Mining, Information Retrieval and Management, Indexing, storage and data-analysis techniques to parse, store, convert and manage the information from authentic Arabic resources. These interactive web Apps provide smart multi-lingual search, tree based search, on-demand information matching and linking. In this paper, we provide details of application architecture, design, implementation and technologies employed. We also presented the summary of web applications already developed. We have also included some screen shots from the corresponding web sites. These web applications provide an Innovative On-line Learning Systems (eLearning and computer based education).Keywords: Islamic resources, Muslim scholars, hadith, narrators, history, fiqh
Procedia PDF Downloads 28312161 Retrieving Similar Segmented Objects Using Motion Descriptors
Authors: Konstantinos C. Kartsakalis, Angeliki Skoura, Vasileios Megalooikonomou
Abstract:
The fuzzy composition of objects depicted in images acquired through MR imaging or the use of bio-scanners has often been a point of controversy for field experts attempting to effectively delineate between the visualized objects. Modern approaches in medical image segmentation tend to consider fuzziness as a characteristic and inherent feature of the depicted object, instead of an undesirable trait. In this paper, a novel technique for efficient image retrieval in the context of images in which segmented objects are either crisp or fuzzily bounded is presented. Moreover, the proposed method is applied in the case of multiple, even conflicting, segmentations from field experts. Experimental results demonstrate the efficiency of the suggested method in retrieving similar objects from the aforementioned categories while taking into account the fuzzy nature of the depicted data.Keywords: fuzzy object, fuzzy image segmentation, motion descriptors, MRI imaging, object-based image retrieval
Procedia PDF Downloads 37512160 Semantic Analysis of the Change in Awareness of Korean College Admission Policy
Authors: Sujin Hwang, Hyerang Park, Hyunchul Kim
Abstract:
The purpose of this study is to find the effectiveness of the admission simplification policy. The number of online news articles about ‘high school record’ was collected and semantically analyzed to identify and analyze the social awareness during 2014 to 2015. The main results of the study are as follows: First, there was a difference in expectations that the burden of the examinees would decrease as announced by KCUE. Thus, there was still a strain on the university entrance exam after the enforcement of the policy. Second, private tutoring is expanding in different forms, rather than reducing the policy. It is different from the prediction that examinees can prepare for university admissions without the private tutoring. Thus, the college admission rules currently enforced needs to be improved. The reasonable college admission system changes are discussed.Keywords: education policy, private tutoring, shadow education, education admission policy
Procedia PDF Downloads 22712159 CSR Reporting, State Ownership, and Corporate Performance in China: Proof from Longitudinal Data of Publicly Traded Enterprises from 2006 to 2020
Authors: Wanda Luen-Wun Siu, Xiaowen Zhang
Abstract:
This paper offered the primary methodical proof on how CSR reporting related to enterprise earnings in listed firms in China in light of most evidence focusing on cross-sectional data or data in a short span of time. Using full economic and business panel data on China’s publicly listed enterprise from 2006 to 2020 over two decades in the China Stock Market and Accounting Research database, we found initial evidence of significant direct relations between CSR reporting and firm corporate performance in both state-owned and privately owned firms over this period, supporting the stakeholder theory. Results also revealed that state-owned enterprises performed as well as private enterprises in the current period. But private enterprises performed better than state-owned enterprises in the subsequent years. Moreover, the release of social responsibility reports had a more significant impact on the financial performance of state-owned and private enterprises in the current period than in the subsequent periods. Specifically, CSR release was not significantly associated with the financial performance of state-owned enterprises on the lag of the first, second, and third periods. But it had an impact on the lag of the first, second, and third periods among private enterprises. Such findings suggested that CSR reporting helped improve the corporate financial performance of state-owned and private enterprises in the current period, but this kind of effect was more significant among private enterprises in the lag periods.Keywords: China’s listed firms, CSR reporting, financial performance, panel analysis
Procedia PDF Downloads 16612158 Imputing the Minimum Social Value of Public Healthcare: A General Equilibrium Model of Israel
Authors: Erez Yerushalmi, Sani Ziv
Abstract:
The rising demand for healthcare services, without a corresponding rise in public supply, led to a debate on whether to increase private healthcare provision - especially in hospital services and second-tier healthcare. Proponents for increasing private healthcare highlight gains in efficiency, while opponents its risk to social welfare. None, however, provide a measure of the social value and its impact on the economy in terms of a monetary value. In this paper, we impute a minimum social value of public healthcare that corresponds to indifference between gains in efficiency, with losses to social welfare. Our approach resembles contingent valuation methods that introduce a hypothetical market for non-commodities, but is different from them because we use numerical simulation techniques to exploit certain market failure conditions. In this paper, we develop a general equilibrium model that distinguishes between public-private healthcare services and public-private financing. Furthermore, the social value is modelled as a by product of healthcare services. The model is then calibrated to our unique health focused Social Accounting Matrix of Israel, and simulates the introduction of a hypothetical health-labour market - given that it is heavily regulated in the baseline (i.e., the true situation in Israel today). For baseline parameters, we estimate the minimum social value at around 18% public healthcare financing. The intuition is that the gain in economic welfare from improved efficiency, is offset by the loss in social welfare due to a reduction in available social value. We furthermore simulate a deregulated healthcare scenario that internalizes the imputed value of social value and searches for the optimal weight of public and private healthcare provision.Keywords: contingent valuation method (CVM), general equilibrium model, hypothetical market, private-public healthcare, social value of public healthcare
Procedia PDF Downloads 14612157 Annotation Ontology for Semantic Web Development
Authors: Hadeel Al Obaidy, Amani Al Heela
Abstract:
The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology
Procedia PDF Downloads 17312156 A Survey of Response Generation of Dialogue Systems
Authors: Yifan Fan, Xudong Luo, Pingping Lin
Abstract:
An essential task in the field of artificial intelligence is to allow computers to interact with people through natural language. Therefore, researches such as virtual assistants and dialogue systems have received widespread attention from industry and academia. The response generation plays a crucial role in dialogue systems, so to push forward the research on this topic, this paper surveys various methods for response generation. We sort out these methods into three categories. First one includes finite state machine methods, framework methods, and instance methods. The second contains full-text indexing methods, ontology methods, vast knowledge base method, and some other methods. The third covers retrieval methods and generative methods. We also discuss some hybrid methods based knowledge and deep learning. We compare their disadvantages and advantages and point out in which ways these studies can be improved further. Our discussion covers some studies published in leading conferences such as IJCAI and AAAI in recent years.Keywords: deep learning, generative, knowledge, response generation, retrieval
Procedia PDF Downloads 13412155 Support Vector Regression for Retrieval of Soil Moisture Using Bistatic Scatterometer Data at X-Band
Authors: Dileep Kumar Gupta, Rajendra Prasad, Pradeep Kumar, Varun Narayan Mishra, Ajeet Kumar Vishwakarma, Prashant K. Srivastava
Abstract:
An approach was evaluated for the retrieval of soil moisture of bare soil surface using bistatic scatterometer data in the angular range of 200 to 700 at VV- and HH- polarization. The microwave data was acquired by specially designed X-band (10 GHz) bistatic scatterometer. The linear regression analysis was done between scattering coefficients and soil moisture content to select the suitable incidence angle for retrieval of soil moisture content. The 250 incidence angle was found more suitable. The support vector regression analysis was used to approximate the function described by the input-output relationship between the scattering coefficient and corresponding measured values of the soil moisture content. The performance of support vector regression algorithm was evaluated by comparing the observed and the estimated soil moisture content by statistical performance indices %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE). The values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 2.9451, 1.0986, and 0.9214, respectively at HH-polarization. At VV- polarization, the values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 3.6186, 0.9373, and 0.9428, respectively.Keywords: bistatic scatterometer, soil moisture, support vector regression, RMSE, %Bias, NSE
Procedia PDF Downloads 42812154 Influence of Information and Communication Technology on Dress Culture among Senior Secondary School Students in Ife East Local Government, Osun State, Nigeria
Authors: Idowu J. Diyaolu, Ebenezer O. Obayomi, Taiwo A. Bamidele
Abstract:
Information and Communication Technology (ICT) has been observed to have influence on the lifestyle of youths in general. Dressing styles, fashion consciousness and choice of role model are some of the areas of influence. The study was carried out to examine the perception and influence of ICT on the clothing culture of selected Senior Secondary School Students in Ife-East Local government area of Osun State, Nigeria. Two hundred Senior Secondary School Students from public and private schools were randomly selected. Data was collected using structured questionnaire. The result showed that 79.0% were computer literate, 64.5% have facebook account and 93.5% browse with phones. Based on their perception on the influence of ICT, 74.5% of the respondents agreed that frequent use of ICT has increased their level of fashion consciousness while 60.5% were motivated by the images and dressing pattern in magazines, on TV and the internet. Also, large proportions (60.5%) were influenced by the dressing styles of their friends on social media. Male students were significantly more engaged in ICT related activities than females (t = 1.29, P < 0.05), whereas there is no significant difference in the involvement in ICT activities between private and public school students (t = 0.325, P > 0.05). Since ICT has influence on dressing, appropriate dressing pattern should be encouraged on mass media.Keywords: dress culture, information and communication technology, fashion trend, role model
Procedia PDF Downloads 46312153 Impact of Proposed Modal Shift from Private Users to Bus Rapid Transit System: An Indian City Case Study
Authors: Rakesh Kumar, Fatima Electricwala
Abstract:
One of the major thrusts of the Bus Rapid Transit System is to reduce the commuter’s dependency on private vehicles and increase the shares of public transport to make urban transportation system environmentally sustainable. In this study, commuter mode choice analysis is performed that examines behavioral responses to the proposed Bus Rapid Transit System (BRTS) in Surat, with estimation of the probable shift from private mode to public mode. Further, evaluation of the BRTS scenarios, using Surat’s transportation ecological footprint was done. A multi-modal simulation model was developed in Biogeme environment to explicitly consider private users behaviors and non-linear environmental impact. The data of the different factors (variables) and its impact that might cause modal shift of private mode users to proposed BRTS were collected through home-interview survey using revealed and stated preference approach. A multi modal logit model of mode-choice was then calibrated using the collected data and validated using proposed sample. From this study, a set of perception factors, with reliable and predictable data base, to explain the variation in modal shift behaviour and their impact on Surat’s ecological environment has been identified. A case study of the proposed BRTS connecting the Surat Industrial Hub to the coastal area is provided to illustrate the approach.Keywords: BRTS, private modes, mode choice models, ecological footprint
Procedia PDF Downloads 51912152 Linking Soil Spectral Behavior and Moisture Content for Soil Moisture Content Retrieval at Field Scale
Authors: Yonwaba Atyosi, Moses Cho, Abel Ramoelo, Nobuhle Majozi, Cecilia Masemola, Yoliswa Mkhize
Abstract:
Spectroscopy has been widely used to understand the hyperspectral remote sensing of soils. Accurate and efficient measurement of soil moisture is essential for precision agriculture. The aim of this study was to understand the spectral behavior of soil at different soil water content levels and identify the significant spectral bands for soil moisture content retrieval at field-scale. The study consisted of 60 soil samples from a maize farm, divided into four different treatments representing different moisture levels. Spectral signatures were measured for each sample in laboratory under artificial light using an Analytical Spectral Device (ASD) spectrometer, covering a wavelength range from 350 nm to 2500 nm, with a spectral resolution of 1 nm. The results showed that the absorption features at 1450 nm, 1900 nm, and 2200 nm were particularly sensitive to soil moisture content and exhibited strong correlations with the water content levels. Continuum removal was developed in the R programming language to enhance the absorption features of soil moisture and to precisely understand its spectral behavior at different water content levels. Statistical analysis using partial least squares regression (PLSR) models were performed to quantify the correlation between the spectral bands and soil moisture content. This study provides insights into the spectral behavior of soil at different water content levels and identifies the significant spectral bands for soil moisture content retrieval. The findings highlight the potential of spectroscopy for non-destructive and rapid soil moisture measurement, which can be applied to various fields such as precision agriculture, hydrology, and environmental monitoring. However, it is important to note that the spectral behavior of soil can be influenced by various factors such as soil type, texture, and organic matter content, and caution should be taken when applying the results to other soil systems. The results of this study showed a good agreement between measured and predicted values of Soil Moisture Content with high R2 and low root mean square error (RMSE) values. Model validation using independent data was satisfactory for all the studied soil samples. The results has significant implications for developing high-resolution and precise field-scale soil moisture retrieval models. These models can be used to understand the spatial and temporal variation of soil moisture content in agricultural fields, which is essential for managing irrigation and optimizing crop yield.Keywords: soil moisture content retrieval, precision agriculture, continuum removal, remote sensing, machine learning, spectroscopy
Procedia PDF Downloads 9912151 Emotional Artificial Intelligence and the Right to Privacy
Authors: Emine Akar
Abstract:
The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.Keywords: AI, privacy law, data protection, big data
Procedia PDF Downloads 8812150 Evaluation of Critical Success Factors in Public-Private Partnership Projects Based on Structural Equation Model
Authors: Medya Fathi
Abstract:
Today, success in the construction industry is not merely about project completion in a timely manner within an established budget and meeting required quality considerations. Management practices and partnerships need to be emphasized as well. In this regard, critical success factors (CSFs) cover necessary considerations for a successful project beyond the traditional success definition, which vary depending on project outcomes, delivery methods, project types, and partnering processes. Despite the extensive research on CSFs, there is a paucity of studies that examine CSFs for public-private partnership (PPP); the delivery method, which has gained increasing attention from researchers and practitioners over the last decade with a slow but growing adoption in the transportation infrastructure, particularly, highway industry. To fill this knowledge gap, data are collected through questionnaire surveys among private and public parties involved in PPP transportation projects in the United States. Then, the collected data are analyzed to explore the causality relationships between CSFs and PPP project success using structural equation model and provide a list of factors with the greatest influence. This study advocates adopting a critical success factor approach to enhance PPP success in the U.S. transportation industry and identify elements essential for public and private organizations to achieve this success.Keywords: project success, critical success factors, public-private partnership, transportation
Procedia PDF Downloads 9612149 Monetary Policy and Assets Prices in Nigeria: Testing for the Direction of Relationship
Authors: Jameelah Omolara Yaqub
Abstract:
One of the main reasons for the existence of central bank is that it is believed that central banks have some influence on private sector decisions which will enable the Central Bank to achieve some of its objectives especially that of stable price and economic growth. By the assumption of the New Keynesian theory that prices are fully flexible in the short run, the central bank can temporarily influence real interest rate and, therefore, have an effect on real output in addition to nominal prices. There is, therefore, the need for the Central Bank to monitor, respond to, and influence private sector decisions appropriately. This thus shows that the Central Bank and the private sector will both affect and be affected by each other implying considerable interdependence between the sectors. The interdependence may be simultaneous or not depending on the level of information, readily available and how sensitive prices are to agents’ expectations about the future. The aim of this paper is, therefore, to determine whether the interdependence between asset prices and monetary policy are simultaneous or not and how important is this relationship. Studies on the effects of monetary policy have largely used VAR models to identify the interdependence but most have found small effects of interaction. Some earlier studies have ignored the possibility of simultaneous interdependence while those that have allowed for simultaneous interdependence used data from developed economies only. This study, therefore, extends the literature by using data from a developing economy where information might not be readily available to influence agents’ expectation. In this study, the direction of relationship among variables of interest will be tested by carrying out the Granger causality test. Thereafter, the interaction between asset prices and monetary policy in Nigeria will be tested. Asset prices will be represented by the NSE index as well as real estate prices while monetary policy will be represented by money supply and the MPR respectively. The VAR model will be used to analyse the relationship between the variables in order to take account of potential simultaneity of interdependence. The study will cover the period between 1980 and 2014 due to data availability. It is believed that the outcome of the research will guide monetary policymakers especially the CBN to effectively influence the private sector decisions and thereby achieve its objectives of price stability and economic growth.Keywords: asset prices, granger causality, monetary policy rate, Nigeria
Procedia PDF Downloads 22012148 Private Technology Parks–The New Engine for Innovation Development in Russia
Authors: K. Volkonitskaya, S. Lyapina
Abstract:
According to the National Monitoring Centre of innovation infrastructure, scientific and technical activities and regional innovation systems by December 2014. 166 technology parks were established in Russia. Comparative analysis of technological parks performance in Russia, the USA, Israel and the European Union countries revealed significant reduction of key performance indicators in Russian innovation infrastructure institutes. The largest deviations were determined in the following indicators: new products and services launched, number of companies and jobs, amount of venture capital invested. Lower performance indicators of Russian technology parks can be partly explained by slack demand for national high-tech products and services, lack of qualified specialists in the sphere of innovation management and insufficient cooperation between different innovation infrastructure institutes. In spite of all constraints in innovation segment of Russian economy in 2010-2012 private investors for the first time proceeded to finance building of technological parks. The general purpose of the research is to answer two questions: why despite the significant investment risks private investors continue to implement such comprehensive infrastructure projects in Russia and is business model of private technological park more efficient than strategies of state innovation infrastructure institutes? The goal of the research was achieved by analyzing business models of private technological parks in Moscow, Kaliningrad, Astrakhan and Kazan. The research was conducted in two stages: the on-line survey of key performance indicators of private and state Russian technological parks and in-depth interviews with top managers and investors, who have already build private technological parks in by 2014 or are going to complete investment stage in 2014-2016. The results anticipated are intended to identify the reasons of efficient and inefficient technological parks performance. Furthermore, recommendations for improving the efficiency of state technological and industrial parks were formulated. Particularly, the recommendations affect the following issues: networking with other infrastructural institutes, services and infrastructure provided, mechanisms of public-private partnership and investment attraction. In general intensive study of private technological parks performance and development of effective mechanisms of state support can have a positive impact on the growth rates of the number of Russian technological, industrial and science parks.Keywords: innovation development, innovation infrastructure, private technology park, public-private partnership
Procedia PDF Downloads 43612147 The Relationship between Confidence, Accuracy, and Decision Making in a Mobile Review Program
Authors: Carla Van De Sande, Jana Vandenberg
Abstract:
Just like physical skills, cognitive skills grow rusty over time unless they are regularly used and practiced, so academic breaks can have negative consequences on student learning and success. The Keeping in School Shape (KiSS) program is an engaging, accessible, and cost-effective intervention that harnesses the benefits of retrieval practice by using technology to help students maintain proficiency over breaks from school by delivering a daily review problem via text message or email. A growth mindset is promoted through feedback messages encouraging students to try again if they get a problem wrong and to take on a challenging problem if they get a problem correct. This paper reports on the relationship between confidence, accuracy, and decision-making during the implementation of the KiSS Program at a large university during winter break for students enrolled in an engineering introductory Calculus course sequence.Keywords: growth mindset, learning loss, on-the-go learning, retrieval practice
Procedia PDF Downloads 20512146 Health Status among Government and Private Primary School Children in the Central of Thailand
Authors: Petcharat Kerdonfag, Supunnee Thrakul
Abstract:
School health services through regular screening of school students’ health status have been the main responsibility for community or school health nurses. The purposes of these retrospective study were to assess and compare health problems between government and private primary school students in the central region of Thailand. The data were collected from the school health records in October at the end of the first semester in the academic year 2018. Two thousand and fifty primary school health records from government and private primary schools were gathered to assess health problems regarding anthropometric measurements, physical examination/personal hygiene, and clinical findings for this study. Descriptive statistics and Chi-square were used to be analyzed. The results revealed that health problems of all the school students remained high magnitude. The five top ranks for prevalence rate of health problems were dental caries (36.6%), visual acuity problem (27.7%), over-nutrition (16.8%), head lice (12.8%), and under-nutrition (6.8%), respectively. However, when compared between government and private schools among five health problems; dental caries (55.0% vs 19.9%), visual acuity problem (23.1% vs 31.9%), over-nutrition (20.2% vs 13.8%), head lice (26.5% vs 0.3%), and under-nutrition (10.6% vs 3.4%) with Chi-square analysis, there were significantly different (p < .001). The problem of visual acuity seems to be more serious in private schools while other health problems tend to be more critical in government schools. The findings have suggested that parents who have children in the private primary schools should pay more attention to visual health defects whereas parents with children in the government school should pay more vigilance regards to hygiene and health behavior problems.Keywords: community health nursing, school health service, health status, primary school children
Procedia PDF Downloads 12212145 High-Resolution Spatiotemporal Retrievals of Aerosol Optical Depth from Geostationary Satellite Using Sara Algorithm
Authors: Muhammad Bilal, Zhongfeng Qiu
Abstract:
Aerosols, suspended particles in the atmosphere, play an important role in the earth energy budget, climate change, degradation of atmospheric visibility, urban air quality, and human health. To fully understand aerosol effects, retrieval of aerosol optical properties such as aerosol optical depth (AOD) at high spatiotemporal resolution is required. Therefore, in the present study, hourly AOD observations at 500 m resolution were retrieved from the geostationary ocean color imager (GOCI) using the simplified aerosol retrieval algorithm (SARA) over the urban area of Beijing for the year 2016. The SARA requires top-of-the-atmosphere (TOA) reflectance, solar and sensor geometry information and surface reflectance observations to retrieve an accurate AOD. For validation of the GOCI retrieved AOD, AOD measurements were obtained from the aerosol robotic network (AERONET) version 3 level 2.0 (cloud-screened and quality assured) data. The errors and uncertainties were reported using the root mean square error (RMSE), relative percent mean error (RPME), and the expected error (EE = ± (0.05 + 0.15AOD). Results showed that the high spatiotemporal GOCI AOD observations were well correlated with the AERONET AOD measurements with a correlation coefficient (R) of 0.92, RMSE of 0.07, and RPME of 5%, and 90% of the observations were within the EE. The results suggested that the SARA is robust and has the ability to retrieve high-resolution spatiotemporal AOD observations over the urban area using the geostationary satellite.Keywords: AEORNET, AOD, SARA, GOCI, Beijing
Procedia PDF Downloads 17112144 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System
Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi
Abstract:
Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.Keywords: RFID, asset tracking system, MongoDB, NoSQL
Procedia PDF Downloads 30612143 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 8512142 Memory Consolidation: Application of Retrieval Strategies in the Classroom
Authors: Eric Tardif, Nicolas Meylan
Abstract:
Recent studies suggest that the consolidation of episodic memory is better achieved through repeated retrieval than with the use of concept mapping or repeated study. Although such laboratory results highly appeal to educationalists, it remains to be shown whether they can be directly used in a classroom setting. Forty-five college students (42 girls; mean age 16.1 y/o) were asked to remember pairs of biology-related words (e.g. mitochondria-energy) in two configurations. The first configuration consisted of a three-minute study of pairs of words followed by a final one-minute test in which the first word of a pair was shown and the subject asked to write down the second associated word. This procedure was repeated three times. The second configuration consisted of a one-minute study of a list of pairs of words, which was immediately followed by a one-minute test. This procedure was repeated 6 times. Subjects filled out a small questionnaire assessing their general mood, level of fatigue, stress and motivation to do the exercise. One week later, subjects were given a final test using the same words. A total of 8 lists of words were studied and tested during the semester. Results showed that subjects recalled more correct words when using the second configuration, both within the study period and one week later, confirming laboratory findings. However, the general performance (mean items recalled) as well as the motivation to do the exercise gradually decreased during the semester. Motivation was positively correlated with performance (r=0.77, p<0.05). The results suggest that laboratory findings may provide some applications in education but other variables inherent to the classroom setting must also be considered.Keywords: long-term, episodic memory, consolidation, retrieval, school setting
Procedia PDF Downloads 33912141 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks
Authors: Chi-Hsuan Cheng
Abstract:
This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurityKeywords: cybersecurity, cybercrime, public private partnerships, cyberattack
Procedia PDF Downloads 7512140 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 40012139 A Holistic Approach to Institutional Cyber Security
Authors: Mehmet Kargaci
Abstract:
It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.Keywords: cyber defence, information, critical infrastructure, security
Procedia PDF Downloads 53712138 Coherencing a Diametrical Interests between the State, Adat Community and Private Interests in Utilising the Land for Investment in Indonesia
Authors: L. M. Hayyan ul Haq, Lalu Sabardi
Abstract:
This research is aimed at exploring an appropriate regulatory model in coherencing a diametrical interest between the state, Adat legal community, and private interests in utilising and optimizing land in Indonesia. This work is also highly relevant to coherencing the obligation of the state to respect, to fulfill and to protect the fundamental rights of people, especially to protect the communal or adat community rights to the land. In visualizing those ideas, this research will use the normative legal research to elaborate the normative problem in land use, as well as redesigning and creating an appropriate regulatory model in bridging and protecting all interest parties, especially, the state, Adat legal community, and private parties. In addition, it will also employ an empirical legal research for identifying some operational problems in protecting and optimising the land. In detail, this research will not only identify the problems at the normative level, such as conflicted norms, the absence of the norms, and the unclear norm in land law, but also the problems at operational level, such as institutional relationship in managing the land use. At the end, this work offers an appropriate regulatory model at the systems level, which covers value and norms in land use, as well as the appropriate mechanism in managing the utilization of the land for the state, Adat legal community, and private sector. By manifesting this objective, the government will not only fulfill its obligation to regulate the land for people and private, but also to protect the fundamental rights of people, as mandated by the Indonesian 1945 Constitution.Keywords: adat community rights, fundamental rights, investment, land law, private sector
Procedia PDF Downloads 51412137 The Effect of Artificial Intelligence on Communication and Information Systems
Authors: Sameh Ibrahim Ghali Hanna
Abstract:
Information system (IS) are fairly crucial in the operation of private and public establishments in growing and developed international locations. Growing countries are saddled with many project failures throughout the implementation of records systems. However, successful information systems are greatly wished for in developing nations in an effort to decorate their economies. This paper is extraordinarily critical in view of the high failure fee of data structures in growing nations, which desire to be decreased to minimal proper levels by means of advocated interventions. This paper centers on a review of IS development in developing international locations. The paper gives evidence of the IS successes and screw-ups in developing nations and posits a version to deal with the IS failures. The proposed model can then be utilized by means of growing nations to lessen their IS mission implementation failure fee. A contrast is drawn between IS improvement in growing international locations and evolved international locations. The paper affords valuable records to assist in decreasing IS failure, and growing IS models and theories on IS development for developing countries.Keywords: research information systems (RIS), research information, heterogeneous sources, data quality, data cleansing, science system, standardization artificial intelligence, AI, enterprise information system, EIS, integration developing countries, information systems, IS development, information systems failure, information systems success, information systems success model
Procedia PDF Downloads 2112136 Partnerships between Public Administration and Private Social Investment for Territorial Development: Lessons after 15 Brazilian Cases
Authors: Graziela D. de Azevedo, Livia M. Pagotto, Mario P. Monzoni, Neto
Abstract:
This article aims to discuss partnerships between public administration and private social investment aimed at territorial development. There has been some approximation in Brazil from private social investors with initiatives aiming at territorial development policies in highly vulnerable territories or in places where the business sector operates. This represents this paper’s major justification: on the advance of academic debate about how businesses, institutes, and foundations have been working alongside local governments, taking the territory as the reference for joint action. The research was based on the literature on governance and territorial development and adopted a mixed iterative approach (inductive and deductive) through an interpretative lens so as to develop an analysis structure that complements and expands knowledge about the contribution of public policies and private social investments for territorial development in Brazil. The analysis of 15 cases based on three distinct blocks (territorial development plans, articulation for education, and thematic approaches) has made it possible to identify common elements regarding the motivations of partnerships, the specific needs of the actors involved, and the priority drivers for stimulating development. Findings include discussion on the leading role of territories in their development paths, on the institutionalization and strengthening of capacities, and on long-term perspectives in development strategies.Keywords: private social investment, public administration, territorial governance, territorial development
Procedia PDF Downloads 21212135 Applicable Law to Intellectual and Industrial Property Agreements According to Turkish Private International Law and Rome I Regulation
Authors: Sema Cortoglu Koca
Abstract:
Intellectual and industrial property rules, have a substantial effect on the sustainable development. Intellectual and industrial property rights, as temporary privileges over the products of intellectual activity, determine the supervision of information and technology. The level and scope of intellectual property protection thus influence the flow of technology between developed and developing countries. In addition, intellectual and industrial property rights are based on the notion of balance. Since they are time-limited rights, they reconcile private and public benefits. That is, intellectual and industrial property rights respond to both private interests and public interests by rewarding innovators and by promoting the dissemination of ideas, respectively. Intellectual and industrial property rights can, therefore, be a tool for sustainable development. If countries can balance their private and public interests according to their particular context and circumstances, they can ensure the intellectual and industrial property which promotes innovation and technology transfer relevant for them. People, enterprises and countries who need technology, can transfer developed technology which is acquired by people, enterprises and countries so as to decrease their technological necessity and improve their technology. Because of the significance of intellectual and industrial property rights on the technology transfer law as mentioned above, this paper is confined to intellectual and industrial property agreements especially technology transfer contracts. These are license contract, know-how contract, franchise agreement, joint venture agreement, management agreement, research and development agreement. In Turkey, technology transfer law is still a developing subject. For developing countries, technology transfer regulations are very important for their private international law because these countries do not know which technology transfer law is applicable when conflicts arise. In most technology transfer contracts having international elements, the parties choose a law to govern their contracts. Where the parties do not choose a law, either expressly or impliedly, and matters which is not excluded in party autonomy, the court has to determine the applicable law to contracts in a matter of capacity, material, the formal and essential validity of contracts. For determining the proper law of technology transfer contracts, it is tried to build a rule for applying all technology transfer contracts. This paper is confined to the applicable law to intellectual and industrial property agreements according to ‘5718 Turkish Act on Private International Law and Civil Procedure’ and ‘Regulation (EC) No 593/2008 of the European Parliament and of the Council of 17 June 2008 on the law applicable to contractual obligations (Rome I)’. Like these complex contracts, to find a rule can be really difficult. We can arrange technology transfer contracts in groups, and we can determine the rule and connecting factors to these groups. For the contracts which are not included in these groups, we can determine a special rule considering the characteristics of the contract.Keywords: intellectual and industrial property agreements, Rome I regulation, technology transfer, Turkish act on private international law and civil procedure
Procedia PDF Downloads 15312134 Public-Private Partnership Transportation Projects: An Exploratory Study in the US
Authors: Medya Fathi
Abstract:
When public transportation projects were delivered through design-bid-build and later design-build, governments found a serious issue: inadequate funding. With population growth, governments began to develop new arrangements in which the private sectors were involved to cut the financial burden. This arrangement, known as Public-Private Partnership (PPP), has its own risks; however, performance outputs can motivate or discourage its use. On top of such output's list are time and budget, which can be affected by the type of project delivery methods. Project completion within or ahead of schedule as well as within or under budget is among any owner’s objectives. With a higher application of PPP in the highway industry in the US and insufficient PPP research, the current study addresses the schedule and cost performance of PPP highway projects and determines which one outperforms the other. To meet this objective, after collecting performance data of all PPP projects, schedule growth and cost growth are calculated, and finally, statistical analysis is conducted to evaluate the PPP performance. The results and conclusions will be provided. This study can assist practitioners in applying PPP for transportation projects by showing its ability to save time and/or cost.Keywords: cost, delivery method, highway, public-private partnership, schedule, transportation
Procedia PDF Downloads 17612133 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law
Authors: Sara Vora (Hoxha)
Abstract:
Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection
Procedia PDF Downloads 75