Search results for: security laws
1499 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 511498 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation
Authors: Y. Atilgan Şengül
Abstract:
Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.Keywords: healthcare, health informatics, medical record system, questionnaire
Procedia PDF Downloads 1731497 Human Rights Impact on Citizens Evolution
Authors: Joseph Marzouk Gerais Abdelmalak
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 731496 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP
Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin
Abstract:
Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.Keywords: analytical hierarchy process, job selection, multi-criteria, decision making
Procedia PDF Downloads 4001495 The Legal Implications of Gender Quota for Public Companies
Authors: Murat Can Pehlivanoglu
Abstract:
Historically, gender equality has been mainly defended in the legal arenas of constitutional law and employment law. However, social and economic progress has required corporate law to provide gender equality on corporate boards. Recently, following the trend in Europe, the State of California (United States) enacted a law requiring that every publicly traded corporation based in California should have women on its board of directors. Still, the legal, social and economic implications of this law are yet to be discovered. The contractarian view of corporate law is predominant in the U.S. jurisprudence. However, gender quota law may not be justified through contractarian theory grounds. Therefore, the conformity of gender quota law with the general principles of U.S. corporate law remains questionable, and the immunity of close corporations from the scope of gender quota legislation provides support for the discrepancy. The methodology employed in this paper in the discussion of the rule’s conformity with corporate law is doctrinal, and American case law and legal scholarship are the basis for this discussion. This paper uses the aforementioned California law as sample legislation to evaluate the gender quota laws’ conformity with the contractarian theory of corporate law. It chooses California law as the sample due to its newness and the presence of pending shareholder lawsuits against it. Also, since California is home to global companies, the effect of such law is expected to be wider. As alternative theories laid down by corporate law may already be activated to provide gender equality on boards of publicly traded corporations, enacting a specific gender quota law would not be justified by an allegedly present statutory deficiency based on contractarian theory. However, this theoretical reality would not enable shareholders to succeed in their lawsuits against such law on corporate law grounds, and investors will have limited options against its results. This will eventually harm the integrity of the marketplace. Through the analysis of the contractarian theory of corporate law and California gender quota law, the major finding of this paper is that the contractarian theory of corporate law does not permit mandating board room equality through corporate law. In conclusion, it expresses that the issue should be dealt with through separate legislation with a different remedial structure, to preserve the traditional rationale of corporate law in U.S. law.Keywords: board of directors, gender equality, gender quota, publicly traded corporations
Procedia PDF Downloads 1271494 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying
Authors: Sultan Alanazi, Adwan Alanazi
Abstract:
Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes
Procedia PDF Downloads 1381493 Perception and Effect of Gender-Based Violence on Sustainable Development and Education of Girl-Child in Southwestern Nigeria
Authors: Afolabi Comfort Yemisi
Abstract:
Gender-based violence remains a serious threat to the growth, health, and safety of women and girls globally, including Nigeria. The rising violence of various shades of violence, especially against women and girls in the guise of cultural preservation, raised serious concerns. The challenge of this harmful gender narrative is more critical in attaining the Sustainable Development Goals and Goal 4 (Quality Education) in Nigeria. The study investigated the perception and effects of gender-based violence on sustainable development and education of the girl-child in Southwestern Nigeria. Primary and Secondary data were used for the study. Primary data were obtained using a structured questionnaire administered to young females in tertiary institutions, secondary schools, non-governmental organizations, and government institutions dealing with gender-based violence in the study area, while the secondary data were sourced from journals, books and dailies. A multistage random sampling technique was employed to select a sample of 360 respondents who completed the questionnaire for the study. Descriptive statistics and regression analysis were applied to the data collected. The result revealed a high prevalence of gender-based violence, and it was perceived to be culturally motivated. Sexual violence, sexual harassment and psychological violence were the significant forms of gender-based violence that adversely affected the Sustainable Development Goal 4. The result further revealed that loss of concentration, shame and depression, school drop-out, poor academic performance and inferiority complex were the major effects of gender-based violence on the education of girl-child in the study area. The study recommended that to avert catastrophic damages and adverse effects of gender-based violence on the girl-child, there is a need for thorough awareness and sensitization programmes to build their resilience. Also, enforcement of established laws against gender-based violence by both government and non-governmental institutions is sacrosanct.Keywords: perception, effects, gender-based violence, sustainable development, education, girl-child, sensitisation
Procedia PDF Downloads 111492 Political Determinants of Sovereign Spread: The Great East-West Divide
Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic
Abstract:
We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.Keywords: sovereign bonds, European Union, developing countries, political determinants
Procedia PDF Downloads 3111491 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Shenouda Farag Aziz Ibrahim
Abstract:
The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 381490 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables
Authors: Vicx Farm
Abstract:
This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.Keywords: energy, agriculture, sustainability, power
Procedia PDF Downloads 741489 Highway Waste Management in Zambia Policy Preparedness and Remedies: The Case of Great East Road
Authors: Floyd Misheck Mwanza, Paul Boniface Majura
Abstract:
The paper looked at highways/ roadside waste generation, disposal and the consequent environmental impacts. The dramatic increase in vehicular and paved roads in the recent past in Zambia, has given rise to the indiscriminate disposal of litter that now poses a threat to health and the environment. Primary data was generated by carrying out oral interviews and field observations for holistic and in–depth assessment of the environment and the secondary data was obtained from desk review method, information on effects of roadside wastes on environment were obtained from relevant literatures. The interviews were semi structured and a purposive sampling method was adopted and analyzed descriptively. The results of the findings showed that population growth and unplanned road expansion has exceeded the expected limit in recent time with resultant poor system of roadside wastes disposal. Roadside wastes which contain both biodegradable and non-biodegradable roadside wastes are disposed at the shoulders of major highways in temporary dumpsites and are never collected by a road development agency (RDA). There is no organized highway to highway or street to street collection of the wastes in Zambia by the key organization the RDA. The study revealed that roadside disposal of roadside wastes has serious impacts on the environment. Some of these impacts include physical nuisance of the wastes to the environment, the waste dumps also serve as hideouts for rodents and snakes which are dangerous. Waste are blown around by wind making the environment filthy, most of the wastes are also been washed by overland flow during heavy downpour to block drainage channels and subsequently lead to flooding of the environment. Most of the non- biodegradable wastes contain toxic chemicals which have serious implications on the environmental sustainability and human health. The paper therefore recommends that Government/ RDA should come up with proper orientation and environmental laws should be put in place for the general public and also to provide necessary facilities and arrange for better methods of collection of wastes.Keywords: biodegradable, disposal, environment, impacts
Procedia PDF Downloads 3431488 Understanding Water Governance in the Central Rift Valley of Ethiopia: Zooming into Transparency, Accountability, and Participation
Authors: Endalew Jibat, Feyera Senbeta, Tesfaye Zeleke, Fitsum Hagos
Abstract:
Water governance considers multi-sector participation beyond the state; and for sustainable use of water resources, appropriate laws, policies, regulations, and institutions needs to be developed and put in place. Water policy, a critical and integral instrument of water governance, guided water use schemes and ensures equitable water distribution among users. The Ethiopian Central Rift Valley (CRV) is wealthy of water resources, but these water resources are currently under severe strain owing to an imbalance in human-water interactions. The main aim of the study was to examine the state of water resources governance in the CRV of Ethiopia, and the impact of the Ethiopian Water Resources Management Policy on water governance. Key informant interviews (KII), focused group discussions, and document reviews were used to gather data for the study. The NVivo 11 program was used to organize, code, and analyze the data. The results revealed that water resources governance practices such as water allocation and apportionment, comprehensive and integrated water management plans, water resources protection, and conservation activities were rarely implemented. Water resources management policy mechanisms were not fully put in place. Lack of coherence in water policy implementation, absence of clear roles and responsibilities of stakeholders, absence of transparency and accountability in irrigation water service delivery, and lack of meaningful participation of key actors in water governance decision-making were the primary shortcomings observed. Factors such as over-abstraction, deterioration of buffer zone, and chemical erosion from surrounding farming have contributed to the reduction in water volume and quality in the CRV. These challenges have influenced aquatic ecosystem services and threaten the livelihoods of the surrounding communities. Hence, reforms relating to policy coherence and enforcement, stakeholder involvement, water distribution strategies, and the application of water governance principles must be given more emphasis.Keywords: water resources, irrigation, governance, water allocation, governance principles, stakeholders engagement, central rift valley
Procedia PDF Downloads 921487 A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Authors: Seyed Mahdi Jameii
Abstract:
Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay.Keywords: attacks, routing, security, underwater wireless sensor networks
Procedia PDF Downloads 4181486 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria
Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria
Abstract:
The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.Keywords: dental surgeon, medical devices, sterilization, survey
Procedia PDF Downloads 4021485 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 5041484 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations
Authors: Mark A. Spooner
Abstract:
The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.Keywords: digital forensics, forensic examination, small device, trends
Procedia PDF Downloads 1991483 The Impact of the Urban Planning and Environmental Problems over the Quality of Life Case Study: Median Zone of Bucharest's Sector 1, Romania
Authors: Cristian Cazacu, Bela Kobulniczky
Abstract:
Even though nowadays the median area of the Bucharest’s Sector 1 owns one of the best reputations in terms of quality of life level, the problems in urban planning from the last twenty years, as well as those related to the urban environment, became more and more obvious and shrill. And all this happened as long as non-compliance with urban and spatial planning laws, corroborated with uncontrolled territorial expansion on certain areas and faulty management of public and private spaces were more acute. The action of all these factors has been felt more and more strongly in the territory in the last twenty years, generating the degradation of the quality of the urban environment and affecting in parallel the general level of the inhabitants¬’ quality of life. Our methodology is based on analyzing a wide range of environmental parameters and it is also based on using advanced resources and skills for mapping planning and environmental dysfunctions as well as the possibility of integrating information into GIS programs, all data sets corroborated with problems related to spatial planning management and inaccuracies of the urbanistic sector. In the end, we managed to obtain a calculated and realistic image of the dysfunctions and a quantitative view of their magnitude in the territory. We also succeeded to create a full general map of the degree of degradation of the urban environment by typologies of urban tissues. Moreover, the methods applied by us can also be used globally to calculate and create realistic images and intelligent maps over the quality of the environment in areas larger than this one. Our study shows that environmental degradation occurred differently in the urban tissues from our study area, depending on several factors, reviewing the faulty way in which the processes of recovery / urban regeneration of the gap in recent years have led to the creation of new territorial dysfunctions. The general, centralized results show that the analyzed space has a much wider range of problems than initially thought, although notoriety and social etiquette place them far above other spaces from the same city of study.Keywords: environment, GIS, planning, urban tissues
Procedia PDF Downloads 1481482 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 721481 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand
Authors: Rahil Saeedi
Abstract:
The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking
Procedia PDF Downloads 1671480 Time's Arrow and Entropy: Violations to the Second Law of Thermodynamics Disrupt Time Perception
Authors: Jason Clarke, Michaela Porubanova, Angela Mazzoli, Gulsah Kut
Abstract:
What accounts for our perception that time inexorably passes in one direction, from the past to the future, the so-called arrow of time, given that the laws of physics permit motion in one temporal direction to also happen in the reverse temporal direction? Modern physics says that the reason for time’s unidirectional physical arrow is the relationship between time and entropy, the degree of disorder in the universe, which is evolving from low entropy (high order; thermal disequilibrium) toward high entropy (high disorder; thermal equilibrium), the second law of thermodynamics. Accordingly, our perception of the direction of time, from past to future, is believed to emanate as a result of the natural evolution of entropy from low to high, with low entropy defining our notion of ‘before’ and high entropy defining our notion of ‘after’. Here we explored this proposed relationship between entropy and the perception of time’s arrow. We predicted that if the brain has some mechanism for detecting entropy, whose output feeds into processes involved in constructing our perception of the direction of time, presentation of violations to the expectation that low entropy defines ‘before’ and high entropy defines ‘after’ would alert this mechanism, leading to measurable behavioral effects, namely a disruption in duration perception. To test this hypothesis, participants were shown briefly-presented (1000 ms or 500 ms) computer-generated visual dynamic events: novel 3D shapes that were seen either to evolve from whole figures into parts (low to high entropy condition) or were seen in the reverse direction: parts that coalesced into whole figures (high to low entropy condition). On each trial, participants were instructed to reproduce the duration of their visual experience of the stimulus by pressing and releasing the space bar. To ensure that attention was being deployed to the stimuli, a secondary task was to report the direction of the visual event (forward or reverse motion). Participants completed 60 trials. As predicted, we found that duration reproduction was significantly longer for the high to low entropy condition compared to the low to high entropy condition (p=.03). This preliminary data suggests the presence of a neural mechanism that detects entropy, which is used by other processes to construct our perception of the direction of time or time’s arrow.Keywords: time perception, entropy, temporal illusions, duration perception
Procedia PDF Downloads 1721479 The Web Site Development for E-Commerce Trading in Thailand Customers View
Authors: Ladaporn Pithuk
Abstract:
The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.Keywords: customer requirement, customization, connection, online business
Procedia PDF Downloads 2011478 'Bemo' (Beras Moringa) as Commodity Innovation Cost of Food Ingredients: In Dealing with Afta Competition
Authors: Isma Alfia Novita
Abstract:
Indonesia is one country with the largest agricultural producer in the world but still can not meet the needs of the national rice. In addition, Indonesia was ranked the second-largest rice importer after the Philippines. Indonesia's rice consumption reached 102 kg per capita, or almost twice the average global rice consumption is only 60 kg per capita per year. One of the government's efforts in developing national food consumption is to invite people to improve diversification and food security. This is done considering the diet of Indonesia is still high consumption of rice. Therefore, this program made innovations Rice Moringa namely imitation rice with the addition of Moringa (Moringa oleifera). Moringa is a plant that is widely grown and easily found. In addition, Moringa has many benefits because it contains vitamin A, vitamin B, vitamin C, calcium, protein, and potassium. Based on the analysis of the nutrient content, it is known that the Moringa leaves have good potential to maintain the balance of nutrients in the bodyKeywords: imitation rice, Moringa oliefera, Moringa, AFTA
Procedia PDF Downloads 1291477 Trust Management for an Authentication System in Ubiquitous Computing
Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet
Abstract:
Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.Keywords: ubiquitous computing, authentication, context-awareness, trust management
Procedia PDF Downloads 2431476 Ethical Discussions on Prenatal Diagnosis: Iranian Case of Thalassemia Prevention Program
Authors: Sachiko Hosoya
Abstract:
Objectives: The purpose of this paper is to investigate the social policy of preventive genetic medicine in Iran, by following the legalization process of abortion law and the factors affecting the process in wider Iranian contexts. In this paper, ethical discussions of prenatal diagnosis and selective abortion in Iran will be presented, by exploring Iranian social policy to control genetic diseases, especially a genetic hemoglobin disorder called Thalassemia. The ethical dilemmas in application of genetic medicine into social policy will be focused. Method: In order to examine the role of the policy for prevention of genetic diseases and selective abortion in Iran, various resources have been sutudied, not only academic articles, but also discussion in the Parliament and documents related to a court case, as well as ethnographic data on living situation of Thalassemia patients. Results: Firstly, the discussion on prenatal diagnosis and selective abortion is overviewed from the viewpoints of ethics, disability rights activists, and public policy for lower-resources countries. As a result, it should be noted that the point more important in the discussion on prenatal diagnosis and selective abortion in Iran is the allocation of medical resources. Secondly, the process of implementation of national thalassemia screening program and legalization of ‘Therapeutic Abortion Law’ is analyzed, through scrutinizing documents such as the Majlis record, government documents and related laws and regulations. Although some western academics accuse that Iranian policy of selective abortion seems to be akin to eugenic public policy, Iranian government carefully avoid to distortions of the policy as ‘eugenic’. Thirdly, as a comparative example, discussions on an Iranian court case of patient’s ‘right not to be born’ will be introduced. Along with that, restrictive living environments of people with Thalassemia patients and the carriers are depicted, to understand some disabling social factors for people with genetic diseases in the local contexts of Iran.Keywords: abortion, Iran, prenatal diagnosis, public health ethics, Thalassemia prevention program
Procedia PDF Downloads 3461475 The Representations of Protesters in the UK National Daily Press: Pro- And Anti- Brexit Demonstrations 2016-2019
Authors: Charlotte-Rose Kennedy
Abstract:
In a political climate divided by Brexit, it is crucial to be critical of the press, as it is the apparatus which political authorities use to impose their laws and shape public opinion. Although large protests have the power to shake and disrupt policy-making by making it difficult for governments to ignore their goals, the British press historically constructs protesters as delegitimate, deviant, and criminal, which could limit protests’ credibility and democratic power. This paper explores how the remain supporting daily UK press (The Mirror, Financial Times, The Independent, The Guardian) and the leave supporting daily UK press (The Daily Mail, The Daily Star, The Sun, The Express, The Telegraph) discursively constructed every pro- and anti-Brexit demonstration from 2016 to 2019. 702 instances of the terms ‘protester’, ‘protesters’, ‘protestor’ and ‘protestors’ were analyzed through both transitivity analysis and critical discourse analysis. This mixed-methods approach allowed for the analysis of how the UK press perpetuated and upheld social ideologies about protests through their specific grammatical and language choices. The results of this analysis found that both remain and leave supporting press utilized the same discourses to report on protests they oppose and protests they support. For example, the remain backing The Mirror used water metaphors regularly associated with influxes of refugees and asylum seekers to support the protesters on the remain protest ‘Final Say’, and oppose the protesters on the leave protest ‘March to Leave’. Discourses of war, violence, and victimhood are also taken on by both sides of the press Brexit debate and are again used to support and oppose the same arguments. Finally, the paper concludes that these analogous discourses do nothing to help the already marginalized social positions of protesters in the UK and could potentially lead to reduced public support for demonstrations. This could, in turn, facilitate the government in introducing increasingly restrictive legislation in relation to freedom of assembly rights, which could be detrimental to British democracy.Keywords: Brexit, critical discourse analysis, protests, transitivity analysis, UK press
Procedia PDF Downloads 1791474 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 5001473 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 1441472 Feasibility Study of Wireless Communication for the Control and Monitoring of Rotating Electrical Machine
Authors: S. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, M. Pietrzak-David
Abstract:
Electrical machine monitoring is important to protect motor from unexpected problems. Today, using wireless communication for electrical machines is interesting for both real time monitoring and diagnostic purposes. In this paper, we propose a system based on wireless communication IEEE 802.11 to control electrical machine. IEEE 802.11 standard is recommended for this type of applications because it provides a faster connection, better range from the base station, and better security. Therefore, our contribution is to study a new technique to control and monitor the rotating electrical machines (motors, generators) using wireless communication. The reliability of radio channel inside rotating electrical machine is also discussed. Then, the communication protocol, software and hardware design used for the proposed system are presented in detail and the experimental results of our system are illustrated.Keywords: control, DFIM machine, electromagnetic field, EMC, IEEE 802.11, monitoring, rotating electrical machines, wireless communication
Procedia PDF Downloads 6951471 Key Affecting Factors for Social Sustainability through Urban Green Space Planning
Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu
Abstract:
Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.Keywords: UGS, planning, social sustainability, key factors
Procedia PDF Downloads 771470 Authentication of Physical Objects with Dot-Based 2D Code
Authors: Michał Glet, Kamil Kaczyński
Abstract:
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.Keywords: anti-forgery, authentication, paper documents, security
Procedia PDF Downloads 133