Search results for: security laws
1349 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources
Authors: Leandro Moura da Silva
Abstract:
The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA
Procedia PDF Downloads 5021348 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations
Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson
Abstract:
Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.Keywords: oblivious transfer, quantum protocol, cryptography, XOR
Procedia PDF Downloads 1261347 Responding to and Preventing Sexual and Gender Based Violence Related to Ragging, in University of Kelaniya: A Case Study
Authors: Anuruddhi Edirisinghe, Anusha Edirisinghe, Maithree Wicramasinghe, Sagarika Kannangara, Annista Wijayanayake
Abstract:
SGBV which refer to acts of inflicting physical, mental or sexual harm or sufferings that deprive a person’s liberty based on one’s gender or sexuality is known to occur in various forms. Ragging in educational institutions can often be one such form of SGBV. Ragging related SGBV is a growing problem despite various legal, policy and programme initiatives introduced over the years. While the punishment of perpetrators through the criminal justice system is expected to bring a deterrent effect, other strategies such as awareness-raising, attitudinal changes, and the empowerment of students to say no to ragging and SGBV will lead to enlightened attitudes about the practice in universities. Thus, effective regular prevention programmes are the need of the hour. The objectives of the paper are to engage with the case of a female fresher subjected to verbal abuse, physical assault and sexual harassment due to events which started as a result of wearing a trouser to the university during the ragging season. The case came to the limelight since a complaint was made to the police and 10 students were arrested under the anti-ragging act. This led to dividend opinions among the student population and a backlash from the student union. Simultaneously, this resulted in the society demanding the stricter implementation of laws and the punishment of perpetrators. The university authority appointed a task force comprising of academics, non-academics, parents, community leaders, stakeholders and students to draw up an action plan to respond to the immediate situation as well as future prevention. The paper will also discuss the implementation of task force plan. The paper is based on interviews with those involved with the issue and the experiences of the task force members and is expected to provide an in-depth understanding of the intricacies and complications associated with dealing with a contentious problem such as ragging. Given the political and ethical issues involved with insider research as well as the sensationalism of the topic, maximum care will be taken to safeguard the interests of those concerned.Keywords: fresher, sexual and gender based violence (SGBV), sexual harassment, ragging
Procedia PDF Downloads 2361346 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
Authors: Jinghui Peng, Shanyu Tang, Jia Li
Abstract:
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.Keywords: steganalysis, security, Fast Fourier Transform, streaming media
Procedia PDF Downloads 1471345 Li-Fi Technology: Data Transmission through Visible Light
Authors: Shahzad Hassan, Kamran Saeed
Abstract:
People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.Keywords: communication, LED, Li-Fi, Wi-Fi
Procedia PDF Downloads 3471344 The Factors Affecting Customers’ Trust on Electronic Commerce Website of Retail Business in Bangkok
Authors: Supattra Kanchanopast
Abstract:
The purpose of this research was to identify factors that influenced the trust of e-commerce within retail businesses. In order to achieve the objectives of this research, the researcher collected data from random e-commerce users in Bangkok. The data was comprised of the results of 382 questionnaires. The data was analyzed by using descriptive statistics, which included frequency, percentages, and the standard deviation of pertinent factors. Multiple regression analysis was also used. The findings of this research revealed that the majority of the respondents were female, 25-40 years old, and graduated a bachelor degree. The respondents mostly worked in private sectors and had monthly income between 15,000-25,000 baht. The findings also indicate that information quality factors, website design factors, service quality factor, security factor and advertising factors as significant factors effecting customer trust of e-commerce in online retail. The hypotheses testing revealed that these factors in e-commerce had an effect on customer’s trust in the same direction with high level.Keywords: e-commerce, online retail, Retail business, trust, website
Procedia PDF Downloads 1981343 The Impact of Climate Change on the Spread of Potato Pests in Kazakhstan
Authors: R. Zh. Abdukerim, D. A. Absatarova, A. T. Aitbayeva, M. A. Askarova, S. T. Turuspekova, E. V. Zhunus
Abstract:
The resilience of agricultural systems at the global level to climate change and their ability to recover determines the prospects for food security on a global scale. Since climate change will lead to changes in temperatures, precipitation, weather conditions and mass outbreaks of harmful organisms. The issue of adaptation to climate change in the agricultural sector is one of the priorities of Kazakhstan's Development Strategy for the period up to 2050. Since Kazakhstan is an agroindustrial country in which agriculture plays an important economic role. Kazakhstan is the largest potato producer in Central Asia, accounting for about 60% of the total vegetable production, which determines the urgency of solving the problem of increasing yields and quality. The control harmful organisms plays an important role in solving this issue. Due to the fact that climate change can lead to an increase in the number of harmful organisms and, accordingly, to a complete loss of harvest.Keywords: potato pests, Colorado potato beetle, soil pests, global climate change
Procedia PDF Downloads 641342 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 3821341 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 891340 An Effective Preventive Program of HIV/AIDS among Hill Tribe Youth, Thailand
Authors: Tawatchai Apidechkul
Abstract:
This operational research was conducted and divided into two phases: the first phase aimed to determine the risk behaviors used a cross-sectional study design, following by the community participatory research design to develop the HIV/AIDS preventive model among the Akha youths. The instruments were composed of completed questionnaires and assessment forms that were tested for validity and reliability before use. Study setting was Jor Pa Ka and Saen Suk Akha villages, Mae Chan District, Chiang Rai, Thailand. Study sample were the Akha youths lived in the villages. Means and chi-square test were used for the statistical testing. Results: Akha youths in the population mobilization villages live in agricultural families with low income and circumstance of narcotic drugs. The average age was 16 (50.00%), 51.52% Christian, 48.80% completed secondary school, 43.94% had annual family income of 30,000-40,000 baht. Among males, 54.54% drank, 39.39% smoked, 7.57% used amphetamine, first sexual intercourse reported at 14 years old, 50.00% had 2-5 partners, 62.50% had unprotected sex (no-condom). Reasons of unprotected sex included not being able to find condom, unawareness of need to use condoms, and dislike. 28.79% never been received STI related information, 6.06% had STI. Among females, 15.15% drank, 28.79% had sexual intercourse and had first sexual intercourse less than 15 year old. 40.00% unprotected sex (no-condom), 10.61% never been received STI related information, and 4.54% had STI. The HIV/AIDS preventive model contained two components. Peer groups among the youths were built around interests in sports. Improving knowledge would empower their capability and lead to choices that would result in HIV/AIDS prevention. The empowering model consisted of 4 courses: a. human reproductive system and its hygiene, b. risk-avoid skills, family planning, and counseling techniques, c. HIV/AIDS and other STIs, d. drugs and related laws and regulations. The results of the activities found that youths had a greater of knowledge and attitude levels for HIV/AIDS prevention with statistical significance (χ2-τεστ= 12.87, p-value= 0.032 and χ2-τεστ= 9.31, p-value<0.001 respectively). A continuous and initiative youths capability development program is the appropriate process to reduce the spread of HIV/AIDS in youths, particularly in the population who have the specific of language and culture.Keywords: AIV/AIDS, preventive program, effective, hill tribe
Procedia PDF Downloads 3701339 Happiness of Undergraduate Nursing Students, College of Nursing, Ratchaburi, Thailand
Authors: Paveenapat Nithitantiwat, Kwanjai Pataipakaipet
Abstract:
The purpose of this research was to study the happiness level of nursing students, Boromarajonani College of nursing, Ratchaburi, Thailand. A purposive sampling of 652 first to four-year nursing students was used. This research is descriptive research. The instruments were questionnaires that developed by the researcher. It included the demographic data and nursing student’s perception about healthcare, safety, life security, family, proud of oneself, education and activities, dormitories and environment in college, and how to improve their happiness. Frequencies, percentage, mean, and T-test is used to analysis the data. The results of the research have shown that family and moral value was an important thing in nursing student’s life. In addition, the mean of the happiness level was a high level. The first year nursing students had the higher mean score of the happiness level than the fourth year, second year, and the third year, respectively. Therefore, nursing students would realize that the important things in their life are family and Buddhism’s teaching. In addition, dharma is guideline how to be both academic achievements and successful in life.Keywords: happiness, nursing students, nursing students’ perceptions, bachelor program
Procedia PDF Downloads 3271338 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication
Authors: Aishwarya Shekhar, Himanshu Sharma
Abstract:
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.Keywords: confidentiality, deduplication, data compression, hybridity of cloud
Procedia PDF Downloads 3831337 Seismic Response Analysis of Frame Structures Based on Super Joint Element Model
Authors: Li Xu, Yang Hong, T. Zhao Wen
Abstract:
Experimental results of many RC beam-column subassemblage indicate that slippage of longitudinal beam rebar within the joint and the shear deformation of joint core have significant influence on seismic behavior of the subassemblage. However, rigid joint assumption has been generally used in the seismic response analysis of RC frames, in which two kinds of inelastic deformation of joint have been ignored. Based on OpenSees platform, ‘Super Joint Element Model’ with more detailed inelastic mechanism is used to simulate the inelastic response of joints. Two finite element models of typical RC plane frame, namely considering or ignoring the inelastic deformation of joint respectively, were established and analyzed under seven strong earthquake waves. The simulated global and local inelastic deformations of the RC plane frame is shown and discussed. The analyses also confirm the security of the earthquake-resistant frame designed according to Chinese codes.Keywords: frame structure, beam-column joint, longitudinal bar slippage, shear deformation, nonlinear analysis
Procedia PDF Downloads 4091336 Application of Drones in Agriculture
Authors: Reza Taherlouei Safa, Mohammad Aboonajmi
Abstract:
Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.Keywords: drone, precision agriculture, farmer income, UAV
Procedia PDF Downloads 811335 Exploratory Case Study: Judicial Discretion and Political Statements Transforming the Actions of the Commissioner for the South African Revenue Service
Authors: Werner Roux Uys
Abstract:
The Commissioner for the South African Revenue Service (SARS) holds a high position of trust in South African society and a lack of trust by taxpayers in the Commissioner’s actions or conduct could compromise SARS’ management of public finances. Tax morality – which is implicit in the social contract between taxpayers and the state – includes distinct phenomena that can cause a breakdown if there is a perceived lack of action on the part of the Commissioner to ensure public finances are kept safe. To promote tax morality, the Commissioner must support the judiciary in the exercise of its discretion to punish fraudulent tax activities and corrupt tax practices. For several years the political meddling in the Commissioner’s actions and conduct have caused perceived abuse of power at SARS, and taxpayers believed their hard-earned income paid over to SARS would be fruitless and wasteful expenditure. The purpose of this article is to identify and analyse previous decisions held by the South African judiciary regarding the Commissioner’s actions and conduct in tax matters, as well as consider important political statements and newspaper bulletins for the purpose of this research. The study applies a qualitative research approach and exploratory case study technique. Keywords were selected and inserted in the LexisNexis electronic database to systematically identify applicable case law where the ratio decidendi of the court referred to the actions and/or conduct of the Commissioner. Specific real-life statements, including political statements and newspaper bulletins, were selected to support the topic at hand. The purpose of the study is to educate the public about the perceptions that have transformed taxpayers’ behaviour towards the Commissioner for SARS since South Africa’s fledgling constitutional democracy was inaugurated in 1994. The study adds to the literature by identifying key characteristics or distinct phenomena regarding the actions and conduct of the Commissioner affecting taxpayers’ behaviour, including discretionary decision-making. From the findings, it emerged that SARS must abide by its (own) laws and that there is a need to educate not only South African taxpayers about tax morality, but also the public in general.Keywords: commissioner, SARS, action and conduct, judiciary, discretionry, decsion-making
Procedia PDF Downloads 681334 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis
Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti
Abstract:
Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis
Procedia PDF Downloads 1601333 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques
Authors: Misha Alexander, S. B. Waykar
Abstract:
Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping
Procedia PDF Downloads 4041332 Innovation and Performance of Very Small Agri-Food Enterprises in Cameroon
Authors: Ahmed Moustapha Mfokeu
Abstract:
Agri-food VSEs in Cameroon are facing a succession of crises, lack of security, particularly in the Far North, South West, and North West regions, the consequences of the Covid 19 crisis, and the war in Ukraine . These multiple crises have benefited the reception of the prices of the raw materials. Moreover, the exacerbation of competitive pressures is driven by the technological acceleration of productive systems in emerging countries which increase the demands imposed on the markets. The Cameroonian VSE must therefore be able to meet the new challenges of international competition, especially through innovation. The objective of this research is to contribute to the knowledge of the effects of innovation on the performance of very small agribusinesses in Cameroon. On the methodological level, the data were provided from a sample of 153 companies in the cities of Douala and Yaoundé. This research uses structural equation models with latent variables. The main results show that there is a positive and significant link between innovation and the performance of very small agri-food companies, so if it is important for entrepreneurs to encourage and practice innovation, it is also necessary to make them understand and make them like this aspect in their strategic function.Keywords: innovation, performance, very small enterprise, agrifood
Procedia PDF Downloads 1101331 Prospects and Problems of Islamic Banking: A Case Study of Aurangabad District
Authors: Shabina Khan, Rukhsana Tabassum Syeda
Abstract:
Islamic banking is a finance system based on the principles of Shariah law. Charging interest is prohibited in Islam. Instead of charging interest the lender shares some part of profit or loss with the borrower, there is a great need for Islamic banking after the collapse of leading Wall Street institutions notably Lehman Brothers and other global finance institution, economic recession, Islamic banking have emerged as an alternative to conventional banking. Islamic banking is growing at the rate of more than 15% not only in Muslim countries, but also in secular and modern industrialized countries like U.K. Japan, France, Singapore, Hongkong. India with a total population of about 184 million about $ 1.5% Muslim deposit interest is lying unclaimed in different Indian banks, as there are no banks based on shariah laws approved by the RBI. When we take the example of Kerala state in India, almost 26.2% population is Muslim. Thus thousands of crore of rupees earned in interest is suspended accounts. In Kerala alone Rs. 40,000 crore and in Jammu and Kashmir Rs. 50,000 crore as interest earned on deposit of Muslim are lying unclaimed. By 2050, Indian Muslim population would be the largest in the world. It will surpass Indonesia. The Muslim population is likely to exceed 18% i.e. 310 mn. Muslim population will increase four percentage points from 14% to 18%. This paper studies the problems and prospects of Islamic banking in India. India has 29 states and Maharashtra is one of them. In the Maharashtra state is Aurangabad district. According to census 2011, Aurangabad city population is 51.07% is Hindu .Muslim is the second most popular religion with approximately 30.79. There are branches of Islamic banking run by Anjuman e Islam in many parts of India by the name of Al- Khair Baitul Mal which is a nongovernment organization. Its branch is in Aurangabad. The main objectives of this study are: 1. To find the scope of Islamic banking. 2. To study and analyze the prospects and problems of such organizations in Aurangabad district. 3. To create awareness about Islamic banking. 4. To study the functions of the organizations based on Islamic banking rules. 5. To encourage non-Muslims to invest in Islamic banking. The methodology used will be primary as well as secondary data. This is helping the weaker section of the society to obtain sources for trade and business. This paper finds that there is sufficient scope of Islamic banking in the region.Keywords: Aurangabad, conventional banking, Islamic banking, Riba (interest)
Procedia PDF Downloads 2471330 Therapeutic Power of Words through Reading Writing and Storytelling
Authors: Sakshi Kaul, Sundeep Verma
Abstract:
The focus of the current paper is to evaluate the therapeutic power of words. This will be done by critically evaluating the impact reading, writing and storytelling have on individuals. When we read, tell or listen to a story we are exercising our imagination. Imagination becomes the source of activation of thoughts and actions. This enables and helps the reader, writer or the listener to express the suppressed emotions or desires. The stories told, untold may bring various human emotions and attributes to forth such as hope, optimism, fear, happiness. Each story narrated evokes different emotions, at times they help us unravel ourselves in the world of the teller thereby bringing solace. Stories heard or told add to individual’s life by creating a community around, giving wings of thoughts that enable individual to be more imaginative and creative thereby fostering positively and happiness. Reading if looked at from the reader’s point of view can broaden the horizon of information and ideas about facts and life laws giving more meaning to life. From ‘once upon a time’ to ‘to happily ever after’, all that stories talk about is life’s learning. The power of words sometimes may be negated, this paper would reiterate the power of words by critically evaluating how words can become powerful and therapeutic in various structures and forms in the society. There is a story behind every situation, action and reaction. Hence it is of prime importance to understand each story, to enable a person to deal with whatever he or she may be going through. For example, if a client is going through some trauma in his or her life, the counsellor needs to know exactly what is the turmoil that is being faced so that the client can be assisted accordingly. Counselling is considered a process of healing through words or as Talk therapy, where merely through words we try to heal the client. In a counselling session, the counsellor focuses on working with the clients to bring a positive change. The counsellor allows the client to express themselves which is referred to as catharsis. The words spoken, written or heard transcend to heal and can be therapeutic. The therapeutic power of words has been seen in various cultural practices and belief systems. The underlining belief that words have the power to heal, save and bring change has existed from ages. Many religious and spiritual practices also acclaim the power of the words. Through this empirical paper, we have tried to bring to light how reading, writing, and storytelling have been used as mediums of healing and have been therapeutic in nature.Keywords: reading, storytelling, therapeutic, words
Procedia PDF Downloads 2691329 UPPAAL-based Design and Analysis of Intelligent Parking System
Authors: Abobaker Mohammed Qasem Farhan, Olof M. A. Saif
Abstract:
The demand for parking spaces in urban areas, particularly in developing countries, has led to a significant issue in the absence of sufficient parking spaces in crowded areas, which results in daily traffic congestion as drivers search for parking. This not only affects the appearance of the city but also has indirect impacts on the economy, society, and environment. In response to these challenges, researchers from various countries have sought technical and intelligent solutions to mitigate the problem through the development of smart parking systems. This paper aims to analyze and design three models of parking lots, with a focus on parking time and security. The study used computer software and Uppaal tools to simulate the models and determine the best among them. The results and suggestions provided in the paper aim to reduce the parking problems and improve the overall efficiency and safety of the parking process. The conclusion of the study highlights the importance of utilizing advanced technology to address the pressing issue of insufficient parking spaces in urban areas.Keywords: preliminaries, system requirements, timed Au- tomata, Uppaal
Procedia PDF Downloads 1471328 Organization’s Ethics, Job Performance Satisfaction and Effects on Employees’ Engagement and Commitment
Authors: Anunya Thanasrisuebwong
Abstract:
This research paper aimed to find out how was the ethical climate in an organization and job performance satisfaction of employees affected employees’ engagement and commitment by using the case study of PTT Exploration and Production Public Company Limited, Thailand. The population of this research was 4,383 Thai employees of PTTEP, Thailand. From a total of 420 questionnaires sent out, 345 respondents replied. The statistics utilized was mean score and Multiple Regression Analysis. The findings revealed that the respondents had opinion towards ethical climate of their organization, job performance satisfaction and organization engagement and commitment at a high level. The test of hypothesis disclosed the determinant attributes of job performance satisfaction that affected the respondents’ overall level of organization engagement and commitment. The set of these determinant attributes consisted of employees’ responsibilities for duties, organization’s policies and practice, relationship with organization’s commanders, work security and stability, job description, career path and relationship with colleagues. These variables were able to predict the employees’ organization engagement and commitment at 50.6 percent.Keywords: ethical climate in organization, job performance satisfaction, organization engagement, commitment
Procedia PDF Downloads 2851327 Measuring Government’s Performance (Services) Oman Service Maturity Model (OSMM)
Authors: Angie Al Habib, Khalid Al Siyabi
Abstract:
To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.Keywords: government, maturity, Oman, performance, service
Procedia PDF Downloads 3661326 Decolonial Aesthetics in Ronnie Govender’s at the Edge and Other Cato Manor Stories
Authors: Rajendra Chetty
Abstract:
Decolonial aesthetics departs and delinks from colonial ideas about ‘the arts’ and the modernist/colonial work of aesthetics. Education is trapped in the western epistemic and hermeneutical vocabulary, hence it is necessary to introduce new concepts and work the entanglement between co-existing concepts. This paper will discuss the contribution of Ronnie Govender, a South African writer, to build decolonial sensibilities and delink from the grand narrative of the colonial and apartheid literary landscape in Govender’s text, At the Edge and other Cato Manor Stories. Govender uses the world of art to make a decolonial statement. Decolonial artists have to work in the entanglement of power and engage with a border epistemology. Govender’s writings depart from an embodied consciousness of the colonial wound and moves toward healing. Border thinking and doing (artistic creativity) is precisely the decolonial methodology posited by Linda T. Smith, where theory comes in the form of storytelling. Govender’s stories engage with the wounds infringed by racism and patriarchy, two pillars of eurocentric knowing, sensing, and believing that sustain a structure of knowledge. This structure is embedded in characters, institutions, languages that regulate and mange the world of the excluded. Healing is the process of delinking, or regaining pride, dignity, and humanity, not through the psychoanalytic cure, but the popular healer. The legacies of the community of Cato Manor that was pushed out of their land are built in his stories. Decoloniality then is a concept that carries the experience of liberation struggles and recognizes the strenuous conditions of marginalized people together with their strength, wisdom, and endurance. Govender’s unique performative prose reconstructs and resurrects the lives of the people of Cato Manor, their vitality and humor, pain and humiliation: a vibrant and racially integrated community destroyed by the regime’s notorious racial laws. The paper notes that Govender’s objective with his plays and stories was to open windows to both the pain and joy of life; a mission that is not didactic but to shine a torch on both mankind’s waywardness as well as its inspiring and often moving achievements against huge odds.Keywords: Govender, decoloniality, delinking, exclusion, racism, Cato Manor
Procedia PDF Downloads 1571325 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract
Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala
Abstract:
Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.Keywords: blockchain, data, data marketplace, smart contract, reputation system
Procedia PDF Downloads 1581324 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance
Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug
Abstract:
Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk
Procedia PDF Downloads 2241323 Study on Runoff Allocation Responsibilities of Different Land Uses in a Single Catchment Area
Authors: Chuan-Ming Tung, Jin-Cheng Fu, Chia-En Feng
Abstract:
In recent years, the rapid development of urban land in Taiwan has led to the constant increase of the areas of impervious surface, which has increased the risk of waterlogging during heavy rainfall. Therefore, in recent years, promoting runoff allocation responsibilities has often been used as a means of reducing regional flooding. In this study, the single catchment area covering both urban and rural land as the study area is discussed. Based on Storm Water Management Model, urban and rural land in a single catchment area was explored to develop the runoff allocation responsibilities according to their respective control regulation on land use. The impacts of runoff increment and reduction in sub-catchment area were studied to understand the impact of highly developed urban land on the reduction of flood risk of rural land at the back end. The results showed that the rainfall with 1 hour short delay of 2 years, 5 years, 10 years, and 25 years return period. If the study area was fully developed, the peak discharge at the outlet would increase by 24.46% -22.97% without runoff allocation responsibilities. The front-end urban land would increase runoff from back-end of rural land by 76.19% -46.51%. However, if runoff allocation responsibilities were carried out in the study area, the peak discharge could be reduced by 58.38-63.08%, which could make the front-end to reduce 54.05% -23.81% of the peak flow to the back-end. In addition, the researchers found that if it was seen from the perspective of runoff allocation responsibilities of per unit area, the residential area of urban land would benefit from the relevant laws and regulations of the urban system, which would have a better effect of reducing flood than the residential land in rural land. For rural land, the development scale of residential land was generally small, which made the effect of flood reduction better than that of industrial land. Agricultural land requires a large area of land, resulting in the lowest share of the flow per unit area. From the point of the planners, this study suggests that for the rural land around the city, its responsibility should be assigned to share the runoff. And setting up rain water storage facilities in the same way as urban land, can also take stock of agricultural land resources to increase the ridge of field for flood storage, in order to improve regional disaster reduction capacity and resilience.Keywords: runoff allocation responsibilities, land use, flood mitigation, SWMM
Procedia PDF Downloads 1041322 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 781321 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review
Authors: Zeeshan Hamid, Asher Ramish
Abstract:
The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care
Procedia PDF Downloads 3131320 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 198