Search results for: Indonesia Stock Exchange (IDX)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3146

Search results for: Indonesia Stock Exchange (IDX)

866 Preparation of Pegylated Interferon Alpha-2b with High Antiviral Activity Using Linear 20 KDa Polyethylene Glycol Derivative

Authors: Ehab El-Dabaa, Omnia Ali, Mohamed Abd El-Hady, Ahmed Osman

Abstract:

Recombinant human interferon alpha 2 (rhIFN-α2) is FDA approved for treatment of some viral and malignant diseases. Approved pegylated rhIFN-α2 drugs have highly improved pharmacokinetics, pharmacodynamics and therapeutic efficiency compared to native protein. In this work, we studied the pegylation of purified properly refolded rhIFN-α2b using linear 20kDa PEG-NHS (polyethylene glycol- N-hydroxysuccinimidyl ester) to prepare pegylated rhIFN-α2b with high stability and activity. The effect of different parameters like rhIFN-α2b final concentration, pH, rhIFN-α2b/PEG molar ratios and reaction time on the efficiency of pegylation (high percentage of monopegylated rhIFN-α2b) have been studied in small scale (100µl) pegylation reaction trials. Study of the percentages of different components of these reactions (mono, di, polypegylated rhIFN-α2b and unpegylated rhIFN-α2b) indicated that 2h is optimum time to complete the reaction. The pegylation efficiency increased at pH 8 (57.9%) by reducing the protein concentration to 1mg/ml and reducing the rhIFN-α2b/PEG ratio to 1:2. Using larger scale pegylation reaction (65% pegylation efficiency), ion exchange chromatography method has been optimized to prepare and purify the monopegylated rhIFN-α2b with high purity (96%). The prepared monopegylated rhIFN-α2b had apparent Mwt of approximately 65 kDa and high in vitro antiviral activity (2.1x10⁷ ± 0.8 x10⁷ IU/mg). Although it retained approximately 8.4 % of the antiviral activity of the unpegylated rhIFN-α2b, its activity is high compared to other pegylated rhIFN-α2 developed by using similar approach or higher molecular weight branched PEG.

Keywords: antiviral activity, rhIFN-α2b, pegylation, pegylation efficiency

Procedia PDF Downloads 177
865 The Application of Mapping, Practicing, Using Strategy with Instructional Materials Based on the School Curriculum toward the English Achievement of Indonesian EFL Students

Authors: Eny Syatriana

Abstract:

English proficiency of Indonesian secondary school students is below standard. The low proficiency may come from poor teaching materials that do not meet the students’ need. The main objective for English teachers is to improve the English proficiency of the students. The purpose of this study is to explore the application Mapping, Practicing, Using (MPU) strategy with Instructional Materials Based on the School Curriculum toward the English achievement of Indonesian EFL Students. This paper is part my dissertation entitles 'Designing instructional materials for secondary school students based on the school curriculum' consisting of need analysis, design, development, implementation, and evaluation; this paper discusses need analysis and creates a model of creating instructional materials through deep discussion among teachers of secondary schools. The subject consisted of six English teachers and students of three classes at three different secondary schools in Makassar, South Sulawesi, Indonesia. Pretest and posttest design were administered to see the effectiveness of the MPU strategy. Questionnaires were administered to see the teachers and students’ perception toward the instructional materials. The result indicates that the MPU strategy is effective in improving the English achievement; instructional materials with different strategies improve the English achievement of the students. Both teachers and students argue that the presented instructional materials are effective to be used in the teaching and learning process to increase the English proficiency of the students.

Keywords: proficiency, development, English for secondary school students, instructional materials

Procedia PDF Downloads 332
864 Hidden Markov Model for Financial Limit Order Book and Its Application to Algorithmic Trading Strategy

Authors: Sriram Kashyap Prasad, Ionut Florescu

Abstract:

This study models the intraday asset prices as driven by Markov process. This work identifies the latent states of the Hidden Markov model, using limit order book data (trades and quotes) to continuously estimate the states throughout the day. This work builds a trading strategy using estimated states to generate signals. The strategy utilizes current state to recalibrate buy/ sell levels and the transition between states to trigger stop-loss when adverse price movements occur. The proposed trading strategy is tested on the Stevens High Frequency Trading (SHIFT) platform. SHIFT is a highly realistic market simulator with functionalities for creating an artificial market simulation by deploying agents, trading strategies, distributing initial wealth, etc. In the implementation several assets on the NASDAQ exchange are used for testing. In comparison to a strategy with static buy/ sell levels, this study shows that the number of limit orders that get matched and executed can be increased. Executing limit orders earns rebates on NASDAQ. The system can capture jumps in the limit order book prices, provide dynamic buy/sell levels and trigger stop loss signals to improve the PnL (Profit and Loss) performance of the strategy.

Keywords: algorithmic trading, Hidden Markov model, high frequency trading, limit order book learning

Procedia PDF Downloads 151
863 Sustainable Investing and Corporate Performance: Evidence from Shariah Compliant Companies in Southeast Asia

Authors: Norashikin Ismail, Nadia Anridho

Abstract:

Sustainable investing is a responsible investment that focuses on Environmental, Social, and Governance (ESG) elements. ESG integration is essential in the investment process as it provides a positive contribution to the corporate performance for stakeholders, specifically investors. Sustainable investing is in line with the objectives of Shariah (Maqasid of Shariah), such as social inclusion as well as environmental preservation. This study attempts to evaluate the impact of ESG elements to the corporate financial performance among Shariah compliant stocks listed in two countries, namely Malaysia and Indonesia. The motivation of this study is to provide a further understanding in corporate sustainability for two different Islamic capital markets. The existence of the FTSE4Good Asean Index has played a vital role for ESG practices and eventually encouraged specific index for ESG and Shariah Compliant stocks. Our sample consists of 60 companies over the period 2010-2020 from two Southeast countries. We employ System Generalized Method of Moments (GMM) to reduce bias and more specific parameter estimation. Shariah Compliant companies tend to have higher ESG scores and are positively correlated to corporate financial performance. ESG integration with Shariah based investing would provide higher returns and lower risks for Muslim investors. Essentially, integrating ESG and Shariah, compliant companies lead to better financial performance.

Keywords: shariah compliant, southeast asia, corporate performance, sustainable investing

Procedia PDF Downloads 189
862 On the Causes of Boko Haram Terrorism: Socio-Economic versus Religious Injunctions

Authors: Sogo Angel Olofinbiyi

Abstract:

There have been widespread assumptions across the globe that the root cause of Boko Haram terrorism in Nigeria is religious rather than socio-economic. An investigation into this dichotomy allowed this study to fully demonstrate that the root cause of Boko Haram’s terrorist actions emanates from the non-fulfillment of socio-economic goals that are prompted by the violation of fundamental human rights, corruption, poverty, unconstitutional and undemocratic practices in the northern part of the Nigerian state. To achieve its aim of establishing the root cause of the terrorism crisis in the latter country, the study critically appraised the socio-economic context of the insurgency by adopting one-on-one in-depth interviews involving forty (40) participants to interrogate the phenomenon. Empirical evidence from the study demonstrated that the evolution of Boko Haram terrorism was a response to socio-economic phlebotomy, political and moral putrescence, and the dehumanization of people that stem from a combination of decades of mismanagement and pervasive corruption by various Nigerian leaders. The study concludes that, as long as the endemic socio-economic problems caused by global capitalism vis-a-vis unequal hegemonic power exchange as expressed in socio-political, ethno-religious and cultural forms persist in the Nigerian society, the terrorism insurgency will recur and remain an inevitable enterprise and indeed a normal social reaction to every undesirable state of affairs. Based on the findings, the study urges the need for the amelioration of the conditions of the vast majority of the Nigerian populace by making socio-economic facilities available to them through the political state.

Keywords: Boko Haram Terrorism, insurgency, socio-economic, religious injunctions

Procedia PDF Downloads 184
861 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 42
860 A Study on Exploring and Prioritizing Critical Risks in Construction Project Assessment

Authors: A. Swetha

Abstract:

This study aims to prioritize and explore critical risks in construction project assessment, employing the Weighted Average Index method and Principal Component Analysis (PCA). Through extensive literature review and expert interviews, project assessment risk factors were identified across Budget and Cost Management Risk, Schedule and Time Management Risk, Scope and Planning Risk, Safety and Regulatory Compliance Risk, Resource Management Risk, Communication and Stakeholder Management Risk, and Environmental and Sustainability Risk domains. A questionnaire was distributed to stakeholders involved in construction activities in Hyderabad, India, with 180 completed responses analyzed using the Weighted Average Index method to prioritize risk factors. Subsequently, PCA was used to understand relationships between these factors and uncover underlying patterns. Results highlighted dependencies on critical resources, inadequate risk assessment, cash flow constraints, and safety concerns as top priorities, while factors like currency exchange rate fluctuations and delayed information dissemination ranked lower but remained significant. These insights offer valuable guidance for stakeholders to mitigate risks effectively and enhance project outcomes. By adopting systematic risk assessment and management approaches, construction projects in Hyderabad and beyond can navigate challenges more efficiently, ensuring long-term viability and resilience.

Keywords: construction project assessment risk factor, risk prioritization, weighted average index, principal component analysis, project risk factors

Procedia PDF Downloads 41
859 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 295
858 Stimulating Policy for Attracting Foreign Direct Investment in Georgia

Authors: G. Erkomaishvili, M. Kobalava, T. Lazariashvili, N. Damenia

Abstract:

Current state of foreign direct investment (FDI) in Georgia is analyzed and evaluated in the paper, the existing legislative background for regulating investments and stimulating policies to attract investments are shown. It is noted that in developing countries encouragement of investment activity, support and implementation are of the most important tasks, implying a consistent investment policy, investor-friendly tax regime and the legal system, reducing administrative barriers and restrictions, fare competitive conditions and business development infrastructure. The work deals with the determining factor of FDIs and the main directions of stimulation, as well as prospective industries where new investments are needed. Contributing and hindering factors and stimulating measures are analyzed. As a result of the research, the direct and indirect factors attracting FDI have been identified. Facilitating factors to FDI inflow are as follows: simplicity of starting business, geopolitical location, low taxes, access to credit, ease of ownership registration, natural resources, low burden of regulations, low level of corruption and low crime rates. Hindering factors to FDI inflow are as follows: small market, lack of policy for attracting investments, low qualification of the workforce (despite the large number of unemployed people it is difficult to find workers with necessary special skills and qualifications), high interest rates, instability of national currency exchange rate, presence of conflict zones within the country and so forth.

Keywords: foreign direct investment, investor, investment attracting marketing policies, reinvestment

Procedia PDF Downloads 258
857 Principle Component Analysis on Colon Cancer Detection

Authors: N. K. Caecar Pratiwi, Yunendah Nur Fuadah, Rita Magdalena, R. D. Atmaja, Sofia Saidah, Ocky Tiaramukti

Abstract:

Colon cancer or colorectal cancer is a type of cancer that attacks the last part of the human digestive system. Lymphoma and carcinoma are types of cancer that attack human’s colon. Colon cancer causes deaths about half a million people every year. In Indonesia, colon cancer is the third largest cancer case for women and second in men. Unhealthy lifestyles such as minimum consumption of fiber, rarely exercising and lack of awareness for early detection are factors that cause high cases of colon cancer. The aim of this project is to produce a system that can detect and classify images into type of colon cancer lymphoma, carcinoma, or normal. The designed system used 198 data colon cancer tissue pathology, consist of 66 images for Lymphoma cancer, 66 images for carcinoma cancer and 66 for normal / healthy colon condition. This system will classify colon cancer starting from image preprocessing, feature extraction using Principal Component Analysis (PCA) and classification using K-Nearest Neighbor (K-NN) method. Several stages in preprocessing are resize, convert RGB image to grayscale, edge detection and last, histogram equalization. Tests will be done by trying some K-NN input parameter setting. The result of this project is an image processing system that can detect and classify the type of colon cancer with high accuracy and low computation time.

Keywords: carcinoma, colorectal cancer, k-nearest neighbor, lymphoma, principle component analysis

Procedia PDF Downloads 205
856 Assessing the Perceptions toward the Impacts of Tourism in Poverty Alleviation: A Basis for Pro-Poor Tourism Policy in Sta. Lucia, Guimba, Nueva Ecija

Authors: Lady Salvador Purganan, Jojo M. Villamin, Noel L. Lansang

Abstract:

Tourism is a multifaceted but interdependent industry. This industry is composed of four major players, the public sector, the private sector, the local community, and the tourists. Each player has a vital role in the success of delivering high-quality tourism products and activities. There are various manifestations of positive economic outcomes that benefit the local community. Pro-poor tourism development approach has a great potential to serve as an avenue for capacity building leading to economic independence since natural attractions and cultural resources are assets that can be capitalized on, especially by the poor, because it is more accessible to them compared to financial resources. In the National Tourism Development Plan 2016-2022, specific mechanisms are not reflected to combat and lower poverty incidence through tourism. The researcher used the multidimensional poverty theory and sustainable tourism theory to formulate indicators in the research instrument and social exchange theory. The expected output of the study is to unlock opportunities, specifically in Brgy. Sta. Lucia, Guimba, Nueva Ecija, by crafting policies taking into utmost consideration local community involvement and participation in the process of tourism development which is essential in attaining inclusive growth and sustainability. This study will apply the sequential explanatory design mixed-method approach.

Keywords: pro-poor tourism, poverty alleviation, livelihood opportunities, tourism development plan

Procedia PDF Downloads 100
855 Applied of LAWA Classification for Assessment of the Water by Nutrients Elements: Case Oran Sebkha Basin

Authors: Boualla Nabila

Abstract:

The increasing demand on water, either for the drinkable water supply, or for the agricultural and industrial custom, requires a very thorough hydrochemical study to protect better and manage this resource. Oran is relatively a city with the worst quality of the water. Recently, the growing populations may put stress on natural waters by impairing the quality of the water. Campaign of water sampling of 55 points capturing different levels of the aquifer system was done for chemical analyzes of nutriments elements. The results allowed us to approach the problem of contamination based on the largely uniform nationwide approach LAWA (LänderarbeitsgruppeWasser), based on the EU CIS guidance, has been applied for the identification of pressures and impacts, allowing for easy comparison. Groundwater samples were analyzed, also, for physico-chemical parameters such as pH, sodium, potassium, calcium, magnesium, chloride, sulphate, carbonate and bicarbonate. The analytical results obtained in this hydrochemistry study were interpreted using Durov diagram. Based on these representations, the anomaly of high groundwater salinity observed in Oran Sebkha basin was explained by the high chloride concentration and to the presence of inverse cation exchange reaction. Durov diagram plot revealed that the groundwater has been evolved from Ca-HCO3 recharge water through mixing with the pre-existing groundwater to give mixed water of Mg-SO4 and Mg-Cl types that eventually reached a final stage of evolution represented by a Na-Cl water type.

Keywords: contamination, water quality, nutrients elements, approach LAWA, durov diagram

Procedia PDF Downloads 276
854 Arsenic (III) Removal by Zerovalent Iron Nanoparticles Synthesized with the Help of Tea Liquor

Authors: Tulika Malviya, Ritesh Chandra Shukla, Praveen Kumar Tandon

Abstract:

Traditional methods of synthesis are hazardous for the environment and need nature friendly processes for the treatment of industrial effluents and contaminated water. Use of plant parts for the synthesis provides an efficient alternative method. In this paper, we report an ecofriendly and nonhazardous biobased method to prepare zerovalent iron nanoparticles (ZVINPs) using the liquor of commercially available tea. Tea liquor as the reducing agent has many advantages over other polymers. Unlike other polymers, the polyphenols present in tea extract are nontoxic and water soluble at room temperature. In addition, polyphenols can form complexes with metal ions and thereafter reduce the metals. Third, tea extract contains molecules bearing alcoholic functional groups that can be exploited for reduction as well as stabilization of the nanoparticles. Briefly, iron nanoparticles were prepared by adding 2.0 g of montmorillonite K10 (MMT K10) to 5.0 mL of 0.10 M solution of Fe(NO3)3 to which an equal volume of tea liquor was then added drop wise over 20 min with constant stirring. The color of the mixture changed from whitish yellow to black, indicating the formation of iron nanoparticles. The nanoparticles were adsorbed on montmorillonite K10, which is safe and aids in the separation of hazardous arsenic species simply by filtration. Particle sizes ranging from 59.08±7.81 nm were obtained which is confirmed by using different instrumental analyses like IR, XRD, SEM, and surface area studies. Removal of arsenic was done via batch adsorption method. Solutions of As(III) of different concentrations were prepared by diluting the stock solution of NaAsO2 with doubly distilled water. The required amount of in situ prepared ZVINPs supported on MMT K10 was added to a solution of desired strength of As (III). After the solution had been stirred for the preselected time, the solid mass was filtered. The amount of arsenic [in the form of As (V)] remaining in the filtrate was measured using ion chromatograph. Stirring of contaminated water with zerovalent iron nanoparticles supported on montmorillonite K10 for 30 min resulted in up to 99% removal of arsenic as As (III) from its solution at both high and low pH (2.75 and 11.1). It was also observed that, under similar conditions, montmorillonite K10 alone provided only <10% removal of As(III) from water. Adsorption at low pH with precipitation at higher pH has been proposed for As(III) removal.

Keywords: arsenic removal, montmorillonite K10, tea liquor, zerovalent iron nanoparticles

Procedia PDF Downloads 130
853 Sexting Phenomenon in Educational Settings: A Data Mining Approach

Authors: Koutsopoulou Ioanna, Gkintoni Evgenia, Halkiopoulos Constantinos, Antonopoulou Hera

Abstract:

Recent advances in Internet Computer Technology (ICT) and the ever-increasing use of technological equipment amongst adolescents and young adults along with unattended access to the internet and social media and uncontrolled use of smart phones and PCs have caused social problems like sexting to emerge. The main purpose of the present article is first to present an analytic theoretical framework of sexting as a recent social phenomenon based on studies that have been conducted the last decade or so; and second to investigate Greek students’ and also social network users, sexting perceptions and to record how often social media users exchange sexual messages and to retrace demographic variables predictors. Data from 1,000 students were collected and analyzed and all statistical analysis was done by the software package WEKA. The results indicate among others, that the use of data mining methods is an important tool to draw conclusions that could affect decision and policy making especially in the field and related social topics of educational psychology. To sum up, sexting lurks many risks for adolescents and young adults students in Greece and needs to be better addressed in relevance to the stakeholders as well as society in general. Furthermore, policy makers, legislation makers and authorities will have to take action to protect minors. Prevention strategies based on Greek cultural specificities are being proposed. This social problem has raised concerns in recent years and will most likely escalate concerns in global communities in the future.

Keywords: educational ethics, sexting, Greek sexters, sex education, data mining

Procedia PDF Downloads 182
852 The Utilization of Rain Water to Ground Water with Tube in the Area of Tourism in Yogyakarta

Authors: Kurniawan Agung Pambudi, Alfian Deo Pradipta

Abstract:

Yogyakarta is the famous tourism city in Indonesia. The Tugu Jogja is a tourism center located in Jetis. To support the tourism activities required facilities such as tourist hotel and guest house. The existence of tourism also has an impact on the environment. The surface of the land is covered by cement and a local company dealing in ceramics, then an infiltration process is not running. The existence of the building in layers resulting in the amount of water resource in Jetis decreases. The purpose of this research is to know the impact of the construction of the building in layers in Jetis. To obtain the data done by observation, measurements and taking the land profile, along with the interview to people in Jetis. The results of the study showed that the number of water sources in Jetis, Yogyakarta start decreases as a result of the construction of the building on stilts as a result, the height of the surface of the groundwater decreases and digging a pit must be in to get the source of the waters. Based on the results of research it can be concluded that the height of the surface of the groundwater decreases. To resolve the issue required a method to rainwater can seep into the ground for maximum. The rain that fell upon the precarious houses or other buildings is channeled toward the ground through the tubes with the depth of 1-2 meters. Rainwater will be absorbed into the land and increase the amount of ground water.

Keywords: rain water, tube, water resource, groundwater

Procedia PDF Downloads 223
851 Effect of Zinc-Lysine on Growth, Photosynthesis, Oxidative Stress and Antioxidant System and Chromium Uptake in Rice under Cr Stress

Authors: Shafaqat Ali, Afzal Hussain, Muhammad Rizwan, Longhua Wu

Abstract:

Chromium (Cr) is one of the widespread and toxic trace elements present in the agricultural land. Chromium can enter into the food chain mainly through agricultural crops grown on Cr-contaminated soils such as rice (Oryza sativa L.). The current study was done to evaluate the effects of increasing concentrations foliar applied zinc (Zn) chelated with lysine (Zn-lys) (0, 10, 20, and 30 mg L⁻¹) on rice biomass, photosynthesis, oxidative stress, key antioxidant enzyme activities and Cr uptake under increasing levels of Cr in the soil (0, 100, 500 mg kg⁻¹). Cr-induced toxicity reduced the height of plants, biomass, chlorophyll contents, gas exchange parameters, and antioxidant enzyme activities while increased the Cr concentrations and oxidative stress (malondialdehyde, electrolyte leakage, and H₂O₂) in shoots and roots than control plants. Foliar application of Zn-lys increased the plant growth, photosynthesis, Zn concentrations, and enzyme activities in rice seedlings. In addition, Zn-lys reduced the Cr concentrations and oxidative stress compared to the respective Cr treatments alone. The present results indicate that foliar Zn-lys stimulates the antioxidant defense system in rice, increase the rice growth while reduced the Cr concentrations in plants by promoting the Zn uptake and photosynthesis. Taken together, foliar spray of Zn-lys chelate can efficiently be employed for improving plant growth and Zn contents while reducing Cr concentration in rice grown in Cr-contaminated and Zn-deficient soils.

Keywords: antioxidants, chromium, zinc-lysine, oxidative stress, photosynthesis, tolerance

Procedia PDF Downloads 194
850 Evolution and Obstacles Encountered in the Realm of Sports Tourism in Pakistan

Authors: Muhammad Saleem

Abstract:

Tourism stands as one of the swiftly expanding sectors globally, contributing to 10% of the overall worldwide GDP. It holds a vital role in generating income, fostering employment opportunities, alleviating poverty, facilitating foreign exchange earnings, and advancing intercultural understanding. This industry encompasses a spectrum of activities, encompassing transportation, communication, hospitality, catering, entertainment, and advertising. The objective of this study is to assess the evolution and obstacles encountered by sports tourism in Pakistan. In pursuit of this objective, relevant literature has been scrutinized, while data has been acquired from 60 respondents, employing a simple random sampling approach for analysis. The survey comprised close-ended inquiries directed towards all participants. Analytical tools such as mean, mode, median, graphs, and percentages have been employed for data analysis. The findings revealed through robust analysis, indicate that the mean, mode, and median tools consistently yield results surpassing the 70% mark, underscoring that heightened development within sports tourism significantly augments its progress. Effective governance demonstrates a favorable influence on sports tourism, with increased government-provided safety and security potentially amplifying its expansion, thus attracting a higher number of tourists and consequently propelling the growth of the sports tourism sector. This study holds substantial significance for both academic scholars and industry practitioners within Pakistan's tourism landscape, as previous explorations in this realm have been relatively limited.

Keywords: obstacles-spots, evolution-tourism, sports-pakistan, sports-obstacles-pakistan

Procedia PDF Downloads 56
849 Design of Digital IIR Filter Using Opposition Learning and Artificial Bee Colony Algorithm

Authors: J. S. Dhillon, K. K. Dhaliwal

Abstract:

In almost all the digital filtering applications the digital infinite impulse response (IIR) filters are preferred over finite impulse response (FIR) filters because they provide much better performance, less computational cost and have smaller memory requirements for similar magnitude specifications. However, the digital IIR filters are generally multimodal with respect to the filter coefficients and therefore, reliable methods that can provide global optimal solutions are required. The artificial bee colony (ABC) algorithm is one such recently introduced meta-heuristic optimization algorithm. But in some cases it shows insufficiency while searching the solution space resulting in a weak exchange of information and hence is not able to return better solutions. To overcome this deficiency, the opposition based learning strategy is incorporated in ABC and hence a modified version called oppositional artificial bee colony (OABC) algorithm is proposed in this paper. Duplication of members is avoided during the run which also augments the exploration ability. The developed algorithm is then applied for the design of optimal and stable digital IIR filter structure where design of low-pass (LP) and high-pass (HP) filters is carried out. Fuzzy theory is applied to achieve maximize satisfaction of minimum magnitude error and stability constraints. To check the effectiveness of OABC, the results are compared with some well established filter design techniques and it is observed that in most cases OABC returns better or atleast comparable results.

Keywords: digital infinite impulse response filter, artificial bee colony optimization, opposition based learning, digital filter design, multi-parameter optimization

Procedia PDF Downloads 478
848 The Effect of Relocating a Red Deer Stag on the Size of Its Home Range and Activity

Authors: Erika Csanyi, Gyula Sandor

Abstract:

In the course of the examination, we sought to answer the question of how and to what extent the home range and daily activity of a deer stag relocated from its habitual surroundings changes. We conducted the examination in two hunting areas in Hungary, about 50 km from one another. The control area was in the north of Somogy County, while the sample area was an area of similar features in terms of forest cover, tree stock, agricultural structure, altitude above sea level, climate, etc. in the south of Somogy County. Three middle-aged red deer stags were captured with rocket nets, immobilized and marked with GPS-Plus Collars manufactured by Vectronic Aerospace Gesellschaft mit beschränkter Haftung. One captured species was relocated. We monitored deer movements over 24-hour periods at 3 months. In the course of the examination, we analysed the behaviour of the relocated species and those that remained in their original habitat, as well as the temporal evolution of their behaviour. We examined the characteristics of the marked species’ daily activities and the hourly distance they covered. We intended to find out the difference between the behaviour of the species remaining in their original habitat and of those relocated to a more distant, but similar habitat. In summary, based on our findings, it can be established that such enforced relocations to a different habitat (e.g., game relocation) significantly increases the home range of the species in the months following relocation. Home ranges were calculated using the full data set and the minimum convex polygon (MCP) method. Relocation did not increase the nocturnal and diurnal movement activity of the animal in question. Our research found that the home range of the relocated species proved to be significantly higher than that of those species that were not relocated. The results have been presented in tabular form and have also been displayed on a map. Based on the results, it can be established that relocation inherently includes the risk of falling victim to poaching, vehicle collision. It was only in the third month following relocation that the home range of the relocated species subsided to the level of those species that were not relocated. It is advisable to take these observations into consideration in relocating red deer for nature conservation or game management purposes.

Keywords: Cervus elaphus, home range, relocation, red deer stag

Procedia PDF Downloads 137
847 Decision Making to Study Abroad among Indonesian Student Migrants in Europe: The Role of Communication Technology

Authors: Inayah Hidayati

Abstract:

Innovation in communication technology has opened up opportunities for student to migrate and study abroad. The increasing number of Indonesian students migrating to study abroad suggests the importance of understanding the reason underline their movements. Objective: This research aims to explain the migration decision-making process of Indonesian student migrants in Europe. In detail, this research will consider the innovation in communication technology in the migration decision-making process of students who emigrated from Indonesia and how they use that in the context of the migration decision-making process. Methods: The data collected included qualitative data from in-depth interviews. An interview guide was formulated to facilitate the in-depth interviews and generate a better understanding of migration behavior. Expectation: 1). Innovation in communication technology help Indonesian student migrants on migration decision making process. 2). Student migrants use communication technology platforms for searching information about destination area. Result: Student migrant in Europe use their communication technology platforms to gain information before they choose that country for study. They use WhatsApp and LINE to making contact with their friends and colleagues in the destination country. WhatsApp and LINE group help Indonesian student to get information about school and daily life.

Keywords: international migration, student, decision making process, communication technology platforms

Procedia PDF Downloads 243
846 An Examination of the Impact of Sand Dunes on Soils, Vegetation and Water Resources as the Major Means of Livelihood in Gada Local Government Area of Sokoto State, Nigeria

Authors: Abubakar Aminu

Abstract:

Sand dunes, as a major product of desertification, is well known to affect soil resources, water resources and vegetation, especially in arid and semi-arid region; this scenario disrupt the livelihood security of people in the affected areas. The research assessed the episode of sand dune accumulation on water resources, soil and vegetation in Gada local government of Sokoto State, Nigeria. In this paper, both qualitative and quantitative methods were used to generate data which was analyzed and discussed. The finding of the paper shows that livelihood was affected by accumulations of sand dunes as water resources and soils were affected negatively thereby reducing crop yields and making livestock domestication a very difficult and expensive task; the finding also shows that 60% of the respondents agreed to planting of trees as the major solution to combat sand dunes accumulation. However, the soil parameters tested indicated low Organic carbon, low Nitrogen, low Potassium, Calcium and Phosphorus but higher values were recorded in Sodium and Cation exchange capacity which served as evidence of the high or strong aridity nature of the soil in the area. In line with the above, the researcher recommended a massive tree planting campaign to curtail desertification as well as using organic manures for higher agricultural yield and as such, improvement in livelihood security.

Keywords: soils, vegetatio, water, desertification

Procedia PDF Downloads 72
845 Determination of Heavy Metals in Canned Dry-Milk and Fish from Supermarkets in Addis Ababa

Authors: Kefyalew Muleta, Tetemke Mehari

Abstract:

Background: Human being require metallic elements such as copper and zinc up to certain limits that could cause problems if found in excess. Other metallic elements like cadmium and lead can be harmful to health if foodstuffs containing them are consumed regularly. Canned dry-milk and fish contain these metals in the journey from farm to fork. Objective: This study was designed to determine the concentration of Cd, Cu, Pb, and Zn in four brands of canned dry-milk and fish from supermarkets in Addis Ababa. Methods: Laboratory based cross-sectional study design was used to determine the concentration of the heavy metals in four different brands of canned dry-milk and fish imported from different country from February to March 2013. The foods brands were sampled by simple random sampling method from eight supermarkets in Addis Ababa and coded. Wet oxidation using HNO3 and H2O2 was used to extract the heavy metals from the foods samples and analyzed by Flame Atomic Absorption Spectroscopy. Conclusions: From this study, it can be concluded that the level of Cadmium and Copper residues in canned dry-milk significantly vary among brands; and the levels of copper residue significantly vary among brands of canned fish at 95 % level. The AM milk brand from Ethiopia was safe in cadmium level. The cadmium and lead level in the NF fish brands from Indonesia packed in vegetables oil, and the lead level in DF brand packed in brine are safe.

Keywords: AAS, canned dry milk, canned fish, Cd, Cu, Pb, Zn

Procedia PDF Downloads 420
844 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 59
843 Regional Trade Integration: Empirical Investigation of Trade within the European Union versus Association for South East Asian Nations

Authors: Sarina Zainab Shirazi

Abstract:

Abstract— With the advent of globalization, different countries have liberalized their trade policies to enhance economic integration and developmental processes but the advantages accrued vary greatly from region to region. This study specifically examines European Union (EU) and Association for South East Asian Nations (ASEAN), two regions that show contrasting integration patterns. EU shows most successful integrations versus the slower paced integration in the ASEAN region. A comprehensive panel data empirical investigation of EU and ASEAN in the context of economy size, geographical distances, language, ethnicity, common border and regional trade agreements (RTA) is conducted for a period of 1985 – 2015. The empirical investigation through the augmented gravity equation shows that the real effectiveness for enhanced intra-regional trade is significant when specific examination of export and import components is conducted in the presence of non-tariff barriers. These barriers surface in the form of terms of trade openness, inflation, exchange rate, common borders, common language, ethnic similarity, and presence of a formal regional trade agreement (RTA). Thus, these factors can be utilized by the EU and ASEAN regions in order to formulate effective policy tools to enhance trade within their respective spheres of influence.

Keywords: Association for South East Asian Nations, European Union, Gravity Model, Regional Trade

Procedia PDF Downloads 119
842 Heavy Metal Adsorption from Synthetic Wastewater Using Agro Waste-Based Nanoparticles: A Comparative Study

Authors: Nomthandazo Precious Sibiya, Thembisile Patience Mahlangu, Sudesh Rathilal

Abstract:

Heavy metal removal is critical in the wastewater treatment process due to its numerous harmful effects on human and aquatic life. There are several chemical and physical techniques for removing heavy metals from wastewater, including ion exchange, reverse osmosis, adsorption, electrodialysis, and ultrafiltration. However, adsorption technology has captivated researchers for years due to its low cost, high efficiency, and compatible with the environment. In this study, the adsorption effectiveness of three modified agro-waste materials was explored for the removal of lead from synthetic wastewater: banana peels (BP), orange peels (OP), and sugarcane bagasse (SB). The magnetite (Fe₃O₄) is incorporated with BP, OP, and SB at a ratio of 1:1 to create magnetic biosorbents. Characterization of biosorbents was carried out using and scanning electron microscopy (SEM) combined with energy-dispersive X-ray (EDX) to investigate surface morphology and elemental compositions, respectively. A series of batch experiments were carried out to investigate the effects of adsorbent mass, agitation time, and initial pH concentration on adsorption behaviour, as well as adsorption isotherms and kinetics. The removal efficiency of lead by the modified agro-waste materials proved to be superior to that of non-modified agro-waste materials. The proof of concept was achieved, and agro-waste materials can be paired with adsorption technology to effectively remove lead from aqueous media. The use of agricultural waste as biosorbents will aid in waste reduction and management.

Keywords: adsorption, isotherms, kinetics, agro waste, nanoparticles, batch

Procedia PDF Downloads 67
841 Mobile Augmented Reality for Collaboration in Operation

Authors: Chong-Yang Qiao

Abstract:

Mobile augmented reality (MAR) tracking targets from the surroundings and aids operators for interactive data and procedures visualization, potential equipment and system understandably. Operators remotely communicate and coordinate with each other for the continuous tasks, information and data exchange between control room and work-site. In the routine work, distributed control system (DCS) monitoring and work-site manipulation require operators interact in real-time manners. The critical question is the improvement of user experience in cooperative works through applying Augmented Reality in the traditional industrial field. The purpose of this exploratory study is to find the cognitive model for the multiple task performance by MAR. In particular, the focus will be on the comparison between different tasks and environment factors which influence information processing. Three experiments use interface and interaction design, the content of start-up, maintenance and stop embedded in the mobile application. With the evaluation criteria of time demands and human errors, and analysis of the mental process and the behavior action during the multiple tasks, heuristic evaluation was used to find the operators performance with different situation factors, and record the information processing in recognition, interpretation, judgment and reasoning. The research will find the functional properties of MAR and constrain the development of the cognitive model. Conclusions can be drawn that suggest MAR is easy to use and useful for operators in the remote collaborative works.

Keywords: mobile augmented reality, remote collaboration, user experience, cognition model

Procedia PDF Downloads 197
840 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 344
839 Comparative Study Using WEKA for Red Blood Cells Classification

Authors: Jameela Ali, Hamid A. Jalab, Loay E. George, Abdul Rahim Ahmad, Azizah Suliman, Karim Al-Jashamy

Abstract:

Red blood cells (RBC) are the most common types of blood cells and are the most intensively studied in cell biology. The lack of RBCs is a condition in which the amount of hemoglobin level is lower than normal and is referred to as “anemia”. Abnormalities in RBCs will affect the exchange of oxygen. This paper presents a comparative study for various techniques for classifying the RBCs as normal, or abnormal (anemic) using WEKA. WEKA is an open source consists of different machine learning algorithms for data mining applications. The algorithm tested are Radial Basis Function neural network, Support vector machine, and K-Nearest Neighbors algorithm. Two sets of combined features were utilized for classification of blood cells images. The first set, exclusively consist of geometrical features, was used to identify whether the tested blood cell has a spherical shape or non-spherical cells. While the second set, consist mainly of textural features was used to recognize the types of the spherical cells. We have provided an evaluation based on applying these classification methods to our RBCs image dataset which were obtained from Serdang Hospital-alaysia, and measuring the accuracy of test results. The best achieved classification rates are 97%, 98%, and 79% for Support vector machines, Radial Basis Function neural network, and K-Nearest Neighbors algorithm respectively.

Keywords: K-nearest neighbors algorithm, radial basis function neural network, red blood cells, support vector machine

Procedia PDF Downloads 410
838 Millenial Muslim Women’s Views on Religious Identity and Religious Leaders: The Role of the State on Religious Issues and Religious Radicalism in Jakarta

Authors: Achmad Muchadam Fahham, Sony Hendra Permana

Abstract:

Millennial Muslims are a generation of young people between 20-30 years. They will play an important role in various aspects of life for the next 10 to 20 years. In Indonesia, the population of this generation is quite large and in the next ten to twenty years they will occupy strategic position in various fields of social, economic and political life. One of the characteristics of the millenials generation are always connected to the internet and independence to learn anything from the internet. In terms of religion, the majority of millennial are Muslim. In digital era, the generation of millenial Muslim is vulnerable to the influence of radical Islamic thinking because of their easy access to that thought on social media, new media, and the books they read. This study seeks to examine the religious views of millennial Muslim women in four main focuses, namely religious identity, religious leaders, the role of the state on religious issues, and religious radicalism. This study was conducted with a qualitative approach, the data collection was carried out by the interview method. The study was conducted in Jakarta, mainly in religious study groups located in several mosques and shopping center in Jakarta. This study is expected to portray the religious views of millennial Muslim women, especially their commitment to Islamic identity, their views on the authority of religious leaders, the role of the state in various religious problems, and religious radicalism.

Keywords: millenial Muslims, radicalism, muslim mowen, religious identity

Procedia PDF Downloads 152
837 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136