Search results for: security laws
1439 The Effect of Tax Evasion and Avoidance on Somalia’s Economy
Authors: Mohamed Salad Ahmed
Abstract:
This study explores the impact of tax evasion and avoidance on the economy of Somalia. Somalia's economy is largely informal and cash-based, making it challenging to accurately assess the extent of tax evasion and avoidance. However, it is widely recognized that these practices have significant negative effects on the economy, including reduced government revenue, an uneven playing field for businesses, corruption, and a lack of access to international aid and investment. The study focuses on identifying strategies and solutions to reduce tax evasion and avoidance and increase revenue collection. This includes improving the government's capacity to enforce tax laws and regulations, creating a more transparent and accountable tax system, and increasing public awareness of the importance of paying taxes. By addressing these issues, Somalia can improve its economic stability and enhance its ability to provide essential public services, reduce poverty, and promote growth and development. Tax evasion and avoidance have a significant negative impact on the economy of Somalia. The informal nature of the country's economy and the difficulty in accurately assessing the extent of tax evasion and avoidance make it challenging to address these issues effectively. The lack of government revenue resulting from tax evasion and avoidance makes it difficult for the government to fund essential services, leading to a decline in the quality of public services and hindering economic growth. Tax evasion and avoidance also create an uneven playing field for businesses, discourage investment, contribute to corruption, and undermine the rule of law. Additionally, tax evasion and avoidance can make it more difficult for Somalia to access international aid and investment. Addressing these issues will require a concerted effort by the government to strengthen tax collection and enforcement, as well as by the international community to provide technical assistance and support. This abstract highlights the importance of addressing tax evasion and avoidance in Somalia and the potential benefits of doing so.Keywords: tax evasion, tax avoidance, Somalia economy, revenue collection, informal economy, corruption economic growth, investment, tax policy, tax administration, governance, private sector
Procedia PDF Downloads 111438 Assessment of Implementation of the Health and Safety Contents of the Nigerian Factories Act by Small and Medium Scale Industries in Anambra State, Nigeria
Authors: Vivian Uchechi Okpala
Abstract:
Background: Millions of workers die every year as a result of occupational hazards, accidents and injuries, which are as a result of non- compliance to the laws or legislations guiding the health, safety and welfare of workers in the industries. This and many more lead to the assessment of implementation of the health and safety contents of the Nigerian Factories Act (NFA) by small and medium scale industries in Anambra State. Objectives: The study is aimed at achieving the following specific objectives; to assess the extent of implementation of Part-II Health and Part -III Safety (General Provisions), implementation of Part II Health and Part -III Safety (General Provisions Nigerian Factories Acts based on the age of the industries, locations of the industries and level of education of the workers of the small and medium scale industries Methods: the research design that was used for this study was descriptive survey research design, Area of this study was Anambra state, The population for this study comprised 180 chairmen/presidents of union workers of manufacturing industries in Anambra State, The instrument used for this study was structured questionnaire titled ‘assessment of implementation of NFA health and safety contents by small and medium scale industries, results: From the analysis, the following findings were made: Results: The medium scale industries implemented the Part-II Health and Part III Safety (General provisions) better than the small scale industries in Anambra state, the age of the industries, location of the industries and the level of education of the workers in the industries significantly influenced the implementation of the Part III Safety (General Provisions) of NFA, the location of the industries significantly influenced the implementation of the Part II-Health (General Provisions) of NFA. Conclusion: there was generally a certain level of implementation of the factories Act, there is need for more improvement, strict inspection by the regulatory agencies. Implications of the study were highlighted and several suggestions for further studies were made. Based on the findings, several recommendations were made including that the Ministry of Labour and Productivity and the Ministry of Health should strengthen planned information, strict policies to sanction the offenders. Keywords: Occupational Health and Safety, Nigerian Factories ActKeywords: occupational health and safety, Nigerian factories act, workers, welfare
Procedia PDF Downloads 1411437 Weakly Non-Linear Stability Analysis of Newtonian Liquids and Nanoliquids in Shallow, Square and Tall High-Porosity Enclosures
Authors: Pradeep G. Siddheshwar, K. M. Lakshmi
Abstract:
The present study deals with weakly non-linear stability analysis of Rayleigh-Benard-Brinkman convection in nanoliquid-saturated porous enclosures. The modified-Buongiorno-Brinkman model (MBBM) is used for the conservation of linear momentum in a nanoliquid-saturated-porous medium under the assumption of Boussinesq approximation. Thermal equilibrium is imposed between the base liquid and the nanoparticles. The thermophysical properties of nanoliquid are modeled using phenomenological laws and mixture theory. The fifth-order Lorenz model is derived for the problem and is then reduced to the first-order Ginzburg-Landau equation (GLE) using the multi-scale method. The analytical solution of the GLE for the amplitude is then used to quantify the heat transport in closed form, in terms of the Nusselt number. It is found that addition of dilute concentration of nanoparticles significantly enhances the heat transport and the dominant reason for the same is the high thermal conductivity of the nanoliquid in comparison to that of the base liquid. This aspect of nanoliquids helps in speedy removal of heat. The porous medium serves the purpose of retainment of energy in the system due to its low thermal conductivity. The present model helps in making a unified study for obtaining the results for base liquid, nanoliquid, base liquid-saturated porous medium and nanoliquid-saturated porous medium. Three different types of enclosures are considered for the study by taking different values of aspect ratio, and it is observed that heat transport in tall porous enclosure is maximum while that of shallow is the least. Detailed discussion is also made on estimating heat transport for different volume fractions of nanoparticles. Results of single-phase model are shown to be a limiting case of the present study. The study is made for three boundary combinations, viz., free-free, rigid-rigid and rigid-free.Keywords: Boungiorno model, Ginzburg-Landau equation, Lorenz equations, porous medium
Procedia PDF Downloads 3221436 Intelligent Electric Vehicle Charging System (IEVCS)
Authors: Prateek Saxena, Sanjeev Singh, Julius Roy
Abstract:
The security of the power distribution grid remains a paramount to the utility professionals while enhancing and making it more efficient. The most serious threat to the system can be maintaining the transformers, as the load is ever increasing with the addition of elements like electric vehicles. In this paper, intelligent transformer monitoring and grid management has been proposed. The engineering is done to use the evolving data from the smart meter for grid analytics and diagnostics for preventive maintenance. The two-tier architecture for hardware and software integration is coupled to form a robust system for the smart grid. The proposal also presents interoperable meter standards for easy integration. Distribution transformer analytics based on real-time data benefits utilities preventing outages, protects the revenue loss, improves the return on asset and reduces overall maintenance cost by predictive monitoring.Keywords: electric vehicle charging, transformer monitoring, data analytics, intelligent grid
Procedia PDF Downloads 7911435 Evaluation of Magnificent Event of India with Special Reference to Maha Kumbha Mela (Fair) 2013-A Congregation of Millions
Authors: Sharad Kumar Kulshreshtha
Abstract:
India is a great land of cultural and traditional diversity. Its spectrums create a unique ambiance in all over the country. Specially, fairs and festivals are ancient phenomena in Indian culture. In India, there are thousands of such religious, spiritual, cultural fairs organized on auspicious occasions. These fairs reflect the effective and efficient role of social governance and responsibility of Indian society. In this context a mega event known as ‘Kumbha Mela’ literally mean ‘Kumbha Fair’ which is organize after every twelve years at (Prayaag) Allahabad an ancient city of India, now is in the state of Uttar Pradesh. Kumbh Mela is one of the largest human congregations on the Earth. The Kumbha Mela that is held here is considered to be the largest and holiest city among the four cities where Kubha fair organize. According to the Hindu religious scripture a dip for possessing the holy confluence, known as Triveni Sangam, which is a meeting point of the three sacred rivers of India i.e., –Ganges, Yamuna and Saraswati (mythical). During the Kumbha fair the River Ganges is believed to turn to nectar, bringing great blessing to everyone who bathes in it. Other activities include religious discussions, devotional singings and mass feedings pilgrims and poor. The venue for Kumbh Mela (fair) depends on the position Sun, Moon, and Jupiter which holds in that period in different zodiac signs. More than 120 Millions (12 Crore) people visited in the Kumbha Fair-2013 in Allahabad. A temporary tented city was set up for the pilgrims over an area of 2 hectares of the land along the river of Ganges. As many as 5 power substations, temporary police stations, hospitals, bus terminals, stalls were set up for providing various facilities to the visitors and thousands of volunteers participated for assistance of this event. All efforts made by fair administration to provide facility to visitors, such security and sanitation, medical care and frequent water and power supply. The efficient and timely arrangement at the Kumbha Mela attracted the attention of many government and institutions. The Harvard University of USA conducted research to find out how it was made possible. This paper will focuses on effective and efficient planning and preparation of Kumbha Fair which includes facilitation process, role of various coordinating agencies. risk management crisis management strategies Prevention, Preparedness, Response, and Recovery (PPRR Approach), emergency response plan (ERP), safety and security issues, various environmental aspects along with health hazards and hygiene crowd management, evacuation, monitoring, control and evaluation.Keywords: event planning and facility arrangement, risk management, crowd management, India
Procedia PDF Downloads 3061434 Performance Analysis of N-Tier Grid Protocol for Resource Constrained Wireless Sensor Networks
Authors: Jai Prakash Prasad, Suresh Chandra Mohan
Abstract:
Modern wireless sensor networks (WSN) consist of small size, low cost devices which are networked through tight wireless communications. WSN fundamentally offers cooperation, coordination among sensor networks. Potential applications of wireless sensor networks are in healthcare, natural disaster prediction, data security, environmental monitoring, home appliances, entertainment etc. The design, development and deployment of WSN based on application requirements. The WSN design performance is optimized to improve network lifetime. The sensor node resources constrain such as energy and bandwidth imposes the limitation on efficient resource utilization and sensor node management. The proposed N-Tier GRID routing protocol focuses on the design of energy efficient large scale wireless sensor network for improved performance than the existing protocol.Keywords: energy efficient, network lifetime, sensor networks, wireless communication
Procedia PDF Downloads 4691433 A Method of Drilling a Ground Using a Robotic Arm
Authors: Lotfi Beji, Laredj Benchikh
Abstract:
Underground tunnel face bolting and pipe umbrella reinforcement are one of the most challenging tasks in construction whether industrial or not, and infrastructures such as roads or pipelines. It is one of the first sectors of economic activity in the world. Through a variety of soil and rock, a cyclic Conventional Tunneling Method (CTM) remains the best one for projects with highly variable ground conditions or shapes. CTM is the only alternative for the renovation of existing tunnels and creating emergency exit. During the drilling process, a wide variety of non-desired vibrations may arise, and a method using a robot arm is proposed. The main kinds of drilling through vibration here is the bit-bouncing phenomenon (resonant axial vibration). Hence, assisting the task by a robot arm may play an important role on drilling performances and security. We propose to control the axial-vibration phenomenon along the drillstring at a practical resonant frequency, and embed a Resonant Sonic Drilling Head (RSDH) as a robot end effector for drilling. Many questionable industry drilling criteria and stability are discussed in this paper.Keywords: drilling, resonant vibration, robot arm, control
Procedia PDF Downloads 2901432 An Erudite Technique for Face Detection and Recognition Using Curvature Analysis
Authors: S. Jagadeesh Kumar
Abstract:
Face detection and recognition is an authoritative technology for image database management, video surveillance, and human computer interface (HCI). Face recognition is a rapidly nascent method, which has been extensively discarded in forensics such as felonious identification, tenable entree, and custodial security. This paper recommends an erudite technique using curvature analysis (CA) that has less false positives incidence, operative in different light environments and confiscates the artifacts that are introduced during image acquisition by ring correction in polar coordinate (RCP) method. This technique affronts mean and median filtering technique to remove the artifacts but it works in polar coordinate during image acquisition. Investigational fallouts for face detection and recognition confirms decent recitation even in diagonal orientation and stance variation.Keywords: curvature analysis, ring correction in polar coordinate method, face detection, face recognition, human computer interaction
Procedia PDF Downloads 2871431 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India
Authors: Anushtha Saxena
Abstract:
This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.Keywords: data monetization, e-commerce companies, regulatory framework, GDPR
Procedia PDF Downloads 1201430 Challenge Response-Based Authentication for a Mobile Voting System
Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono
Abstract:
A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.Keywords: authentication, data protection, mobile voting, security
Procedia PDF Downloads 4191429 Home Garden: A Food-Based Strategy to Achieve Sustainable Impact on Household Nutrition of Resource-Poor Families in Nepal
Authors: Purushottam P. Khatiwada, Bikash Paudel, Ram B. Rana, Parshuram Biswakarma, Roshan Pudasaini
Abstract:
Nepal has been putting its efforts into securing food and nutrition security for its citizens adopting different models and approaches. Home Garden approach, that integrates vegetables, fruits, small livestock, poultry along with other components like fish, honeybee, mushroom, spices for the promotion of nutritional security of resource-poor and disadvantaged groups was implemented during March 2009 to July 2013 spreading over 16 districts of Nepal covering 115 farmers groups, directly working with 3500 households. Sustained long-term impact of development interventions targeted to the resource-poor and disadvantaged groups has been a recurrent issue for donors, policymakers and practitioners alike. Considering the issue, a post-project evaluation was carried out in a selected project group (Dangibari of Jhapa) after four years of project completion in 2017 in order to evaluate the impact and understand the factors associated with its success. Qualitative information was collected through focus group discussion with group members and associated local institutions. For quantitative information, a quick survey was carried out to the same group members only selecting few indicators. The results are compared with the data obtained from the baseline study conducted by the project in March 2009. The impact of project intervention was evident as compared to the benchmarks established during the baseline, even after four years of project completion. The area under home garden is increased to 729 m² from 386 m² and average food self-sufficiency months increased to 10.22 from 8.11. Seven to eleven fruit species are maintained in the home gardens. An average number of vegetable species grown increased to 15.85 from 9.86. It has resulted in an increase in vegetables self-sufficient month to 8.74 from 4.74 and a huge increase in cash income NPR 6142.8 (USD 59.6) from NPR 385.7 (USD 3.9) from the sale of surplus vegetables. Coaching and mentoring including nutrition sensitization by the project staff at the beginning, inputs and technical support during the project implementation phase and projects effort on the institutional building of disadvantaged farmers were the key drivers of home garden sustainability and expansion. Specifically, package of home garden management trainings provided by the project staff, availability of group funds for buying inputs even after the project, uniting home garden group members in a cooperative, resource leveraging by local institutions through group lobbying, farmers innovations for maintaining home garden diversity and continuous backstopping support by few active members as local resource persons to other members are some additional factors contributing to sustain and/or improve the home garden status by the resource-poor and disadvantaged group.Keywords: food-based nutrition, home garden, resource-poor and disadvantaged group, sustained impact
Procedia PDF Downloads 1451428 A Case Study on an Integrated Analysis of Well Control and Blow out Accident
Authors: Yasir Memon
Abstract:
The complexity and challenges in the offshore industry are increasing more than the past. The oil and gas industry is expanding every day by accomplishing these challenges. More challenging wells such as longer and deeper are being drilled in today’s environment. Blowout prevention phenomena hold a worthy importance in oil and gas biosphere. In recent, so many past years when the oil and gas industry was growing drilling operation were extremely dangerous. There was none technology to determine the pressure of reservoir and drilling hence was blind operation. A blowout arises when an uncontrolled reservoir pressure enters in wellbore. A potential of blowout in the oil industry is the danger for the both environment and the human life. Environmental damage, state/country regulators, and the capital investment causes in loss. There are many cases of blowout in the oil the gas industry caused damage to both human and the environment. A huge capital investment is being in used to stop happening of blowout through all over the biosphere to bring damage at the lowest level. The objective of this study is to promote safety and good resources to assure safety and environmental integrity in all operations during drilling. This study shows that human errors and management failure is the main cause of blowout therefore proper management with the wise use of precautions, prevention methods or controlling techniques can reduce the probability of blowout to a minimum level. It also discusses basic procedures, concepts and equipment involved in well control methods and various steps using at various conditions. Furthermore, another aim of this study work is to highlight management role in oil gas operations. Moreover, this study analyze the causes of Blowout of Macondo well occurred in the Gulf of Mexico on April 20, 2010, and deliver the recommendations and analysis of various aspect of well control methods and also provides the list of mistakes and compromises that British Petroleum and its partner were making during drilling and well completion methods and also the Macondo well disaster happened due to various safety and development rules violation. This case study concludes that Macondo well blowout disaster could be avoided with proper management of their personnel’s and communication between them and by following safety rules/laws it could be brought to minimum environmental damage.Keywords: energy, environment, oil and gas industry, Macondo well accident
Procedia PDF Downloads 1871427 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems
Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar
Abstract:
Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.Keywords: medical device, cyber security, attack, detection, machine learning
Procedia PDF Downloads 3571426 The Responsible Lending Principle in the Spanish Proposal of the Mortgage Credit Act
Authors: Noelia Collado-Rodriguez
Abstract:
The Mortgage Credit Directive 2014/17/UE should have been transposed the 21st of March of 2016. However, in Spain not only we did not meet the deadline, but currently we just have a preliminary draft of the so-called Mortgage Credit Act. Before we analyze the preliminary draft from the standpoint of the responsible lending principle, we should point out that this preliminary draft is not a consumer law statute. Through the text of the preliminary draft we cannot see any reference to the consumer, but we see references to the borrower. Furthermore, and more important, the application of this statute would not be, according to its text, circumscribed to borrowers who address the credit to a personal purpose. Instead, it seems that the preliminary draft aims to be one more of the rules of banking transparency that already exists in the Spanish legislation. In this sense, we can also mention that the sanctions contained in the preliminary draft are referred to these laws of banking ordination and oversight – where the rules of banking transparency belong –. This might be against the spirit of the Mortgage Credit Directive, which allows the extension of its scope to credits aimed to acquire other immovable property beyond the residential one. However, the borrower has to be a consumer accordingly with the Directive. It is quite relevant that the prospective Spanish Mortgage Credit Act might not be a consumer protection statute; specially, from the perspective of the responsible lending principle. The responsible lending principle is a consumer law principle, which is based on the structural weakness of the consumer’s position in the relationship with the creditor. Therefore, it cannot surprise that the Spanish preliminary draft does not state any of the pre contractual conducts that express the responsible lending principle. We are referring to the lender’s duty to provide adequate explanations; the consumer’s suitability test; the lender’s duty to assess consumer’s creditworthiness; the consultation of databases to perform the creditworthiness assessment; and the most important, the lender’s prohibition to grant credit in case of a negative creditworthiness assessment. The preliminary draft just entitles the Economy Ministry to enact provisions related to those topics. Thus, the duties and rules derived from the responsible lending principle included in the EU Directive will not have legal character in Spain, being mere administrative regulations. To conclude, the two main questions that come up after reading the Spanish Mortgage Credit Act preliminary draft are, in the first place, what kind of consequences might arise from the Mortgage Credit Act if finally it is not a consumer law statute. And in the second place, what might be the consequences for the responsible lending principle of being developed by administrative regulations instead of by legislation.Keywords: consumer credit, consumer protection, creditworthiness assessment, responsible lending
Procedia PDF Downloads 2881425 Risk Factors Affecting Construction Project Cost in Oman
Authors: Omar Amoudi, Latifa Al Brashdi
Abstract:
Construction projects are always subject to risks and uncertainties due to its unique and dynamic nature, outdoor work environment, the wide range of skills employed, various parties involved in addition to situation of construction business environment at large. Altogether, these risks and uncertainties affect projects objectives and lead to cost overruns, delay, and poor quality. Construction projects in Oman often experience cost overruns and delay. Managing these risks and reducing their impacts on construction cost requires firstly identifying these risks, and then analyzing their severity on project cost to obtain deep understanding about these risks. This in turn will assist construction managers in managing and tacking these risks. This paper aims to investigate the main risk factors that affect construction projects cost in the Sultanate of Oman. In order to achieve the main aim, literature review was carried out to identify the main risk factors affecting construction cost. Thirty-three risk factors were identified from the literature. Then, a questionnaire survey was designed and distributed among construction professionals (i.e., client, contractor and consultant) to obtain their opinion toward the probability of occurrence for each risk factor and its possible impact on construction project cost. The collected data was analyzed based on qualitative aspects and in several ways. The severity of each risk factor was obtained by multiplying the probability occurrence of a risk factor with its impact. The findings of this study reveal that the most significant risk factors that have high severity impact on construction project cost are: Change of Oil Price, Delay of Materials and Equipment Delivery, Changes in Laws and Regulations, Improper Budgeting, and Contingencies, Lack of Skilled Workforce and Personnel, Delays Caused by Contractor, Delays of Owner Payments, Delays Caused by Client, and Funding Risk. The results can be used as a basis for construction managers to make informed decisions and produce risk response procedures and strategies to tackle these risks and reduce their negative impacts on construction project cost.Keywords: construction cost, construction projects, Oman, risk factors, risk management
Procedia PDF Downloads 3451424 Computational System for the Monitoring Ecosystem of the Endangered White Fish (Chirostoma estor estor) in the Patzcuaro Lake, Mexico
Authors: Cesar Augusto Hoil Rosas, José Luis Vázquez Burgos, José Juan Carbajal Hernandez
Abstract:
White fish (Chirostoma estor estor) is an endemic species that habits in the Patzcuaro Lake, located in Michoacan, Mexico; being an important source of gastronomic and cultural wealth of the area. Actually, it have undergone an immense depopulation of individuals, due to the high fishing, contamination and eutrophication of the lake water, resulting in the possible extinction of this important species. This work proposes a new computational model for monitoring and assessment of critical environmental parameters of the white fish ecosystem. According to an Analytical Hierarchy Process, a mathematical model is built assigning weights to each environmental parameter depending on their water quality importance on the ecosystem. Then, a development of an advanced system for the monitoring, analysis and control of water quality is built using the virtual environment of LabVIEW. As results, we have obtained a global score that indicates the condition level of the water quality in the Chirostoma estor ecosystem (excellent, good, regular and poor), allowing to provide an effective decision making about the environmental parameters that affect the proper culture of the white fish such as temperature, pH and dissolved oxygen. In situ evaluations show regular conditions for a success reproduction and growth rates of this species where the water quality tends to have regular levels. This system emerges as a suitable tool for the water management, where future laws for white fish fishery regulations will result in the reduction of the mortality rate in the early stages of development of the species, which represent the most critical phase. This can guarantees better population sizes than those currently obtained in the aquiculture crop. The main benefit will be seen as a contribution to maintain the cultural and gastronomic wealth of the area and for its inhabitants, since white fish is an important food and economical income of the region, but the species is endangered.Keywords: Chirostoma estor estor, computational system, lab view, white fish
Procedia PDF Downloads 3251423 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 2991422 The Effect of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Nawal Yacoub Halim Abdelmasih
Abstract:
The link between terrorism and human rights has grown to be a chief challenge in the combat against terrorism around the sector. This is primarily based on the truth that terrorism and human rights are so closely related that after the former starts, the latter is violated. This direct connection is identified in the Vienna Declaration and program of movement adopted by way of the sector Convention on Human Rights in Vienna on June 25, 1993, which acknowledges that acts of terrorism in all their paperwork and manifestations intended to damage the human rights of people. Terrorism, therefore, represents an assault on our maximum fundamental human rights. To this stop, the first part of this article makes a specialty of the connections between terrorism and human rights and seeks to spotlight the interdependence between those two standards. The second part discusses the rising idea of cyberterrorism and its manifestations. An evaluation of the fight against cyberterrorism inside the context of human rights is likewise performed.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 61421 Physicochemical Characterization of Peptides Isolated from Vigna unguiculata
Authors: Sonaal Ramsookmohan
Abstract:
Legume seeds are common foods in human diet and have been identied as a valuable source of human nutritonn Since they are useful sources of protein; legume proteins are used in many food applicatonsn Critcal functonal propertes are recognized to impact the quality of foodn Cowpea (Vigna unguiculata), has been well documented for its immense potental in contributng to food security forming part of daily staple diets in most developing countriesn. In this study, cowpea seeds were used to prepare cowpea four, protein isolates by the salt extractonndialysis method and peptdes by enzymatc hydrolysis using Alcalase and Flavourzymen Functonal analyses such as water absorpton capacity, oil absorpton capacity, emulsifying and foaming propertes were conducted on the cowpea peptdesn The physicochemical propertes determine their potental applicaton in food industries as functonal ingredientsn Cowpea peptdes could increase the value of cowpea by expanding its use, as well as contribute to the legume grain sector.Keywords: physicochemical, peptides, Cowpea, alcalase, flavourzyme
Procedia PDF Downloads 761420 Virtual Approach to Simulating Geotechnical Problems under Both Static and Dynamic Conditions
Authors: Varvara Roubtsova, Mohamed Chekired
Abstract:
Recent studies on the numerical simulation of geotechnical problems show the importance of considering the soil micro-structure. At this scale, soil is a discrete particle medium where the particles can interact with each other and with water flow under external forces, structure loads or natural events. This paper presents research conducted in a virtual laboratory named SiGran, developed at IREQ (Institut de recherche d’Hydro-Quebec) for the purpose of investigating a broad range of problems encountered in geotechnics. Using Discrete Element Method (DEM), SiGran simulated granular materials directly by applying Newton’s laws to each particle. The water flow was simulated by using Marker and Cell method (MAC) to solve the full form of Navier-Stokes’s equation for non-compressible viscous liquid. In this paper, examples of numerical simulation and their comparisons with real experiments have been selected to show the complexity of geotechnical research at the micro level. These examples describe transient flows into a porous medium, interaction of particles in a viscous flow, compacting of saturated and unsaturated soils and the phenomenon of liquefaction under seismic load. They also provide an opportunity to present SiGran’s capacity to compute the distribution and evolution of energy by type (particle kinetic energy, particle internal elastic energy, energy dissipated by friction or as a result of viscous interaction into flow, and so on). This work also includes the first attempts to apply micro discrete results on a macro continuum level where the Smoothed Particle Hydrodynamics (SPH) method was used to resolve the system of governing equations. The material behavior equation is based on the results of simulations carried out at a micro level. The possibility of combining three methods (DEM, MAC and SPH) is discussed.Keywords: discrete element method, marker and cell method, numerical simulation, multi-scale simulations, smoothed particle hydrodynamics
Procedia PDF Downloads 3021419 Life-Saving Design Strategies for Nursing Homes and Long-Term Care Facilities
Authors: Jason M. Hegenauer, Nicholas Fucci
Abstract:
In the late 1990s, a major deinstitutionalization movement of elderly patients took place, since which, the design of long-term care facilities has not been adequately analyzed in the United States. Over the course of the last 25 years, major innovations in construction methods, technology, and medicine have been developed, drastically changing the landscape of healthcare architecture. In light of recent events, and the expected increase in elderly populations with the aging of the baby-boomer generation, it is evident that reconsideration of these facilities is essential for the proper care of aging populations. The global response has been effective in stifling this pandemic; however, widespread disease still poses an imminent threat to the human race. Having witnessed the devastation Covid-19 has reaped throughout nursing homes and long-term care facilities, it is evident that the current strategies for protecting our most vulnerable populations are not enough. Light renovation of existing facilities and previously overlooked considerations for new construction projects can drastically lower the risk at nursing homes and long-term care facilities. A reconfigured entry sequence supplements several of the features which have been long-standing essentials of the design of these facilities. This research focuses on several aspects identified as needing improvement, including indoor environment quality, security measures incorporated into healthcare architecture and design, and architectural mitigation strategies for sick building syndrome. The results of this study have been compiled as 'best practices' for the design of future healthcare construction projects focused on the health, safety, and quality of life of the residents of these facilities. These design strategies, which can easily be implemented through renovation of existing facilities and new construction projects, minimize risk of infection and spread of disease while allowing routine functions to continue with minimal impact, should the need for future lockdowns arise. Through the current lockdown procedures, which were implemented during the Covid-19 pandemic, isolation of residents has caused great unrest and worry for family members and friends as they are cut off from their loved ones. At this time, data is still being reported, leaving infection and death rates inconclusive; however, recent projections in some states list long-term care facility deaths as high as 60% of all deaths in the state. The population of these facilities consists of residents who are elderly, immunocompromised, and have underlying chronic medical conditions. According to the Centers for Disease Control, these populations are particularly susceptible to infection and serious illness. The obligation to protect our most vulnerable population cannot be overlooked, and the harsh measures recently taken as a response to the Covid-19 pandemic prove that the design strategies currently utilized for doing so are inadequate.Keywords: building security, healthcare architecture and design, indoor environment quality, new construction, sick building syndrome, renovation
Procedia PDF Downloads 981418 Assessment Of Factors Affecting Sustainability of Rice (Oryza sativa) Processing and Marketing in Ogun State, Nigeria
Authors: A. M. Omoare, O. O. Sofowora, W. O. Oyediran
Abstract:
The study was carried out to assess the factors affecting the sustainability of rice processing and marketing in Ogun State, Nigeria. Multi-stage sampling technique was used to select one hundred and twenty (120) respondents for the study. Descriptive statistics was used to describe the objectives while hypotheses were analyzed with Pearson Product Moment Correlation. The result showed that most (85%) of the respondents was less than 50 years old and had been in rice business for more than 6 years. The majority (66.67%) of the respondents got their capitals from cooperative societies. All (100%) the respondents used rice as household food security and source of income. However, efficient rice processing and marketing were affected by inadequate manpower capacity development and inputs. There was a positive and significant relationship between socio-economic characteristics and processing techniques (p < 0.05). It is hereby recommended that extension service providers should introduce improved rice processing systems to the rice millers traders in the study area.Keywords: sustainability, rice processing, marketing, constraints, millers traders
Procedia PDF Downloads 3931417 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This data mining application is to be designed using a structured system analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the design and implementation of a computerized medical record system. This computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: programming, data, software development, innovation
Procedia PDF Downloads 871416 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben
Authors: Mentor Sulollari
Abstract:
Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben
Procedia PDF Downloads 2981415 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 871414 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment
Authors: Arslan Murtaza
Abstract:
RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient
Procedia PDF Downloads 3341413 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 4001412 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management
Authors: Arjmand Khaliq, Pemra Sohaib
Abstract:
There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.Keywords: cellular networks, energy management, renewable energy source, smart grid technology
Procedia PDF Downloads 4131411 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models
Authors: Y. Bhatt, N. Ghosh, N. Tiwari
Abstract:
Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.Keywords: acreage response function, biofuel, food security, sustainable development
Procedia PDF Downloads 3011410 A Review: The Impact of Core Quality the Empirical Review of Critical Factors on the Causes of Delay in Road Constructions Projects in the GCC Countries
Authors: Sulaiman Al-Hinai, Setyawan Widyarto
Abstract:
The aim of this study is to identify the critically dominating factors on the delays of road constructions in the GCC countries and their effects on project delivery in Arab countries. Towards the achieved of the objectives the study used the empirical literature from the all relevant online sources and database as many as possible. The findings of this study have summarized and short listed of the success factors in the two categories such as internal and external factors have caused to be influenced to delay of road constructions in the Arab regions. However, in the category of internal factors, there are 63 factors short listed from seven group of factors which has revealed to effects on the delay of road constructions especially, the consultant related factors, the contractor related factors, designed related factors, client related factors, labor related factors, material related issues, equipment related issues respectively. Moreover, for external related factors are also considered to summarized especially natural disaster (flood, hurricanes and cyclone etc.), conflict, war, global financial crisis, compensation delay to affected property owner, price fluctuated, unexpected ground conditions (soil and high-water level), changing of government regulations and laws, delays in obtaining permission from municipality, loss of time by traffic control and restrictions at job site, problem with inhabitant of community, delays in providing service from utilities (water and electricity’s) and accident during constructions accordingly. The present study also concluded the effects of above factors which has delay road constructions through increasing of cost and overrun it, taken overtime, creating of disputes, going for lawsuits, finally happening of abandon of projects. Thus, the present study has given the following recommendations to overcome of above problems by increasing of detailed site investigations, ensure careful monitoring and regular meetings, effective site management, collaborative working and effective coordination’s, proper and comprehensive planning and scheduling and ensure full and intensive commitment from all parties accordingly.Keywords: Arab GCC countries, critical success factors, road constructions delay, project management
Procedia PDF Downloads 127