Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5328

Search results for: cyber security awareness

3048 A Unified Approach for Digital Forensics Analysis

Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghite, Stavros Shiaeles

Abstract:

Digital forensics has become an essential tool in the investigation of cyber and computer-assisted crime. Arguably, given the prevalence of technology and the subsequent digital footprints that exist, it could have a significant role across almost all crimes. However, the variety of technology platforms (such as computers, mobiles, Closed-Circuit Television (CCTV), Internet of Things (IoT), databases, drones, cloud computing services), heterogeneity and volume of data, forensic tool capability, and the investigative cost make investigations both technically challenging and prohibitively expensive. Forensic tools also tend to be siloed into specific technologies, e.g., File System Forensic Analysis Tools (FS-FAT) and Network Forensic Analysis Tools (N-FAT), and a good deal of data sources has little to no specialist forensic tools. Increasingly it also becomes essential to compare and correlate evidence across data sources and to do so in an efficient and effective manner enabling an investigator to answer high-level questions of the data in a timely manner without having to trawl through data and perform the correlation manually. This paper proposes a Unified Forensic Analysis Tool (U-FAT), which aims to establish a common language for electronic information and permit multi-source forensic analysis. Core to this approach is the identification and development of forensic analyses that automate complex data correlations, enabling investigators to investigate cases more efficiently. The paper presents a systematic analysis of major crime categories and identifies what forensic analyses could be used. For example, in a child abduction, an investigation team might have evidence from a range of sources including computing devices (mobile phone, PC), CCTV (potentially a large number), ISP records, and mobile network cell tower data, in addition to third party databases such as the National Sex Offender registry and tax records, with the desire to auto-correlate and across sources and visualize in a cognitively effective manner. U-FAT provides a holistic, flexible, and extensible approach to providing digital forensics in technology, application, and data-agnostic manner, providing powerful and automated forensic analysis.

Keywords: digital forensics, evidence correlation, heterogeneous data, forensics tool

Procedia PDF Downloads 177
3047 Wheat Production and Market in Afghanistan

Authors: Fayiz Saifurahman, Noori Fida Mohammad

Abstract:

Afghanistan produces the highest rate of wheat, it is the first source of food, and food security in Afghanistan is dependent on the availability of wheat. Although Afghanistan is the main producer of wheat, on the other hand, Afghanistan is the largest importers of flour. The objective of this study is to assess the structure and dynamics of the wheat market in Afghanistan, can compute with foreign markets, and increase the level of production. To complete this, a broad series of secondary data was complied with, group discussions and interviews with farmers, agricultural and market experts. The research findings propose that; the government should adopt different policies to support the local market. The government should distribute the seed, support financially and technically to increase wheat production.

Keywords: Afghanistan, wheat, production , import

Procedia PDF Downloads 146
3046 Training Engineering Students in Sustainable Development

Authors: Hoong C. Chin, Soon H. Chew, Zhaoxia Wang

Abstract:

Work on sustainable developments and the call for action in education for sustainable development have been ongoing for a number of years. Training engineering students with the relevant competencies, particularly in sustainable development literacy, has been identified as an urgent task in universities. This requires not only a holistic, multi-disciplinary approach to education but also a suitable training environment to develop the needed skills and to inculcate the appropriate attitudes in students towards sustainable development. To demonstrate how this can be done, a module involving an overseas field trip was introduced in 2013 at the National University of Singapore. This paper provides details of the module and describes its training philosophy and methods. Measured against the student learning outcomes, stipulated by the Engineering Accreditation Board, the module scored well on all of them, particularly those related to complex problem solving, environmental and sustainability awareness, multi-disciplinary team work and varied-level communications.

Keywords: civil engineering education, socio-economically sustainable infrastructure, student learning outcome, sustainable development

Procedia PDF Downloads 327
3045 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 447
3044 Interpretive Structural Modeling Technique for Hierarchal Ranking of Barriers in Implementation ofGreen Supply Chain Management-Case of Indian Petroleum Industry

Authors: Kavish Kejriwal, Richa Grover

Abstract:

Consumer awareness and pending legislation have pushed environmental issues into the spotlight, making it imperative for organizations to have a plan of action for “going green.” This is the reason why Green Supply Chain Management has become the integral part of many organization with a goal to reduce cost, increase efficiency and be environmental friendly. Implementation of GSCM involves many factors which act as barriers, making it a tedious task. These barriers have different relationship among themselves creating different impact on implementation Green Supply Chain Management. This work focuses on determining those barriers which have essentially to be removed in the initial stages of GSCM adoption. In this work, the author has taken the case of a petroleum industry in order to come up with a solution. A DEMATEL approach is used to reach the solution.

Keywords: barriers, environment, green supply chain management, impact, interpretive structural modeling

Procedia PDF Downloads 257
3043 Penguins Search Optimization Algorithm for Chaotic Synchronization System

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.

Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization

Procedia PDF Downloads 180
3042 Urban Ecosystem Health and Urban Agriculture

Authors: Mahbuba Kaneez Hasna

Abstract:

Introductory Statement outlining the background: Little has been written about political ecology of urban gardening, such as a network of knowledge generation, technologies of food production and distribution, food consumption practices, and the regulation of ‘agricultural activities. For urban food gardens to sustain as a long-term food security enterprise, we will need to better understand the anthropological, ecological, political, and institutional factors influencing their development, management, and ongoing viability. Significance of the study: Dhaka as one of the fastest growing city. There are currently no studies regards to Bangladesh on how urban slum dwellerscope with the changing urban environment in the city, where they overcome challenges, and how they cope with the urban ecological cycle of food and vegetable production. It is also essential to understand the importance of their access to confined spaces in the slums they apply their indigenous knowledge. These relationships in nature are important factors in community and conservation ecology. Until now, there has been no significant published academic work on relationships between urban and environmental anthropology, urban planning, geography, ecology, and social anthropology with a focus on urban agriculture and how this contributes to the moral economies, indigenous knowledge, and government policies in order to improve the lives and livelihoods of slum dwellers surrounding parks and open spaces in Dhaka, Bangladesh. Methodology: it have applied participant observation, semi-structured questionnaire-based interviews, and focus group discussions to collect social data. Interviews were conducted with the urban agriculture practitioners who are slum dwellers who carry out their urban agriculture activities. Some of the interviews were conducted with non-government organisations (NGOs) and local and state government officials, using semi-structured interviews. Using these methods developed a clearer understanding of how green space cultivation, local economic self-reliance, and urban gardening are producing distinctive urban ecologies in Dhaka and their policy-implications on urban sustainability. Major findings of the study: The research provided an in-depth knowledge on the challenges that slum dwellers encounter in establishing and maintaining urban gardens, such as the economic development of the city, conflicting political agendas, and environmental constraints in areas within which gardening activities take place. The research investigated (i) How do slum dwellers perform gardening practices from rural areas to open spaces in the city? (ii) How do men and women’s ethno-botanical knowledge contribute to urban biodiversity; (iii) And how do slum dwellers navigate complex constellations of land use policy, competing political agendas, and conflicting land and water tenures to meet livelihood functions provided by their gardens. Concluding statement: Lack of infrastructure facilities such as water supply and sanitation, micro-drains and waste disposal areas, and poor access to basic health care services increase the misery of people in the slum areas. Lack of environmental health awareness information for farmers, such as the risks from the use of chemical pesticides in gardens and from grazing animals in contaminated fields or cropping and planting trees or vegetable in contaminated dumping grounds, can all cause high health risk to humans and their environment.

Keywords: gender, urban agriculture, ecosystem health, urban slum systems

Procedia PDF Downloads 65
3041 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 254
3040 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 375
3039 The Possibility of Content and Language Integrated Learning at Japanese Primary Schools

Authors: Rie Adachi

Abstract:

In Japan, it is required to improve students’ English communicative proficiency and the Education Ministry will start English education for the third grade and upper from year 2020 on. Considering the problems with the educational system, Content and Language Integrated Learning (CLIL) is more appropriate to be employed in elementary schools rather than just introducing English lessons. Effective CLIL takes place in the 4Cs Framework, and different strategies are used in various activities, such as arts and crafts, bodily expression, singing, playing roles, etc. After a CLIL workshop for local teachers focused on the 4Cs, the writer conducted a survey of the 36 participants using a questionnaire and found that they did not know the word CLIL, but seemed to have an interest after attending the workshop. The writer concluded that researchers and practitioners need to spread awareness of the 4Cs framework, to apply CLIL into Japanese educational context, to provide CLIL teacher training program and so on, in order to practice CLIL in Japanese elementary schools and nurture students with a global mindset.

Keywords: CLIL, 4Cs, homeroom teachers, intercultural understanding

Procedia PDF Downloads 157
3038 A Corpus-based Study of Adjuncts in Colombian English as a Second Language (ESL) Argumentative Essays

Authors: E. Velasco

Abstract:

Meeting high standards of writing in a Second Language (L2) is extremely important for many students who wish to undertake studies at universities in both English and non-English speaking countries. University lecturers in English speaking countries continue to express dissatisfaction with the apparent poor quality of essay writing skills displayed by English as a Second Language (ESL) students, whose essays are often criticised for their lack of cohesion and coherence. These critiques have extended to contexts such as Colombia, where many ESL students are criticised for their inability to write high-quality academic texts in L2-English, particularly at the tertiary level. If Colombian ESL students are expected to meet high standards of writing when studying locally and abroad, it makes sense to carry out specific research that can perhaps lead to recommendations to support their quest for improving argumentative strategies. Employing Corpus Linguistics methods within a Learner Corpus Research framework, and a combination of Log-Likelihood and Bayes Factor measures, this paper investigated argumentative essays written by Colombian ESL students. The study specifically aimed to analyse conjunctive adjuncts in argumentative essays to find out how Colombian ESL students connect their ideas in discourse. Results suggest that a) Colombian ESL learners need explicit instruction on specific areas of conjunctive adjuncts to counteract overuse, underuse and misuse; b) underuse of endophoric and evidential adjuncts highlights gaps between IELTS-like essays and good quality tertiary-level essays and published papers, and these gaps are linked to prior knowledge brought into writing task, rhetorical functions in writing, and research processes before writing takes place; c) both Colombian ESL learners and L1-English writers (in a reference corpus) overuse some adjuncts and underuse endophoric and evidential adjuncts, when compared to skilled L1-English and L2-English writers, so differences in frequencies of adjuncts has little to do with the writers’ L1, and differences are rather linked to types of essays writers produce (e.g. ESL vs. university essays). Ender Velasco: The pedagogical recommendations deriving from the study are that: a) Colombian ESL learners need to be shown that overuse is not the only way of giving cohesion to argumentative essays and there are other alternatives to cohesion (e.g., implicit adjuncts, lexical chains and collocations); b) syllabi and classroom input need to raise awareness of gaps in writing skills between IELTS-like and tertiary-level argumentative essays, and of how endophoric and evidential adjuncts are used to refer to anaphoric and cataphoric sections of essays, and to other people’s work or ideas; c) syllabi and classroom input need to include essay-writing tasks based on previous research/reading which learners need to incorporate into their arguments, and tasks that raise awareness of referencing systems (e.g., APA); d) classroom input needs to include explicit instruction on use of punctuation, functions and/or syntax with specific conjunctive adjuncts such as for example, for that reason, although, despite and nevertheless.

Keywords: argumentative essays, colombian english as a second language (esl) learners, conjunctive adjuncts, corpus linguistics

Procedia PDF Downloads 66
3037 Work Experience and Employability: Results and Evaluation of a Pilot Training Course on Skills for Company Tutors

Authors: Javier Barraycoa, Olga Lasaga

Abstract:

Work experience placements are one of the main routes to employment and acquiring professional experience for recent graduates. The effectiveness of these work experience placements is conditioned to the training in skills, especially teaching skills, of company tutors. For this reason, a manual specifically designed for training company tutors in these skills has been developed. Similarly, a pilot semi-attendance course to provide the resources that enable tutors to improve their role as instructors was carried out. The course was quantitatively and qualitatively evaluated with the aim of assessing its effectiveness, detecting shortcomings and areas to be improved, and revising the manual contents. One of the biggest achievements was the raising of awareness in the participating tutors of the importance of their work and of the need to develop teaching skills. As a result of this project, we have detected a need to design specific training supplements according to knowledge areas and sectors, to collate good practices and to create easily accessible audiovisual materials.

Keywords: company tutors, employability, teaching skills, work experience

Procedia PDF Downloads 232
3036 Study on Quality of Life among Patients Undergoing Hemodialysis in National Kidney Centre, Banasthali, Kathmandu

Authors: Tara Gurung, Suprina Prajapati

Abstract:

Health and well being of people is a crucial for accomplishing sustainable development goals of any country. The present study focuses on quality of life of patients undergoing hemodialysis. Hemodialysis is a life sustaining treatment for patients with end stage renal disease (ESRD). Hemodialysis can bring about significant impairment in health related quality of life (HRQOL). The purpose of this study was to assess the quality of life of hemodialysis patients undergoing hemodialysis. A descriptive cross-sectional research design was utilized in total 100 samples using random sampling technique. The findings revealed that the total quality of life of the patients was 30.41±3.99 out of 100. The total physical component score was statistically significant with education status of the patients where p value for t test was 0.03 (p=0.03) and occupation of the patients where p value for the ANOVA test was 0.007 (p=0.007). The study recommended that it would be better if awareness programs regarding chronic kidney disease and life style modification in hemodialysis patients is given to the patients so that it would help patients to maintain the HRQOL.

Keywords: health and well bing, hemodialysis, patients quality of life

Procedia PDF Downloads 123
3035 The Impact of Artificial Intelligence on Human Rights Development

Authors: Kerols Seif Said Botros

Abstract:

The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 33
3034 Redefining Doctors' Role in Terms of Medical Errors and Consumer Protection Act to Be in Line with Medical Ethics

Authors: Manushi Srivastava

Abstract:

Introduction: Doctor’s role, and relation with respect to patient care is at the core of medical ethics. The rapid pace of medical advances along with increasing consumer awareness about their rights and hike in cost of effective health care demand a robust, transparent and patient-friendly medical care system. However, doctors’ role performance is still in the frame of activity-passivity model of Doctor-Patient Relationship (DPR) where doctors act as parent and use to instruct their patients, without their consensus that is not going to help in the 21st century. Thus the current situation is a new challenge for traditional doctor-patient relationship after the introduction of Consumer Protection Act (CPA) in medical profession and the same is evidenced by increasing cases of medical litigation. To strengthen this system of medical services, the doctor plays a vital role, and the same should be reviewed in the present context. Objective: To understand the opinion of consultants regarding medical negligence and effect of Consumer Protection Act in terms of current practices of patient care. Method: This is a cross-sectional study in which both quantitative and qualitative methods are applied. Total 69 consultants were selected from multi-specialty hospitals of densely populated Varanasi city catering a population of about 1.8 million. Two-stage sampling was used for selection of respondents. At the first stage, selection of major wards (Medicine, Surgery, Ophthalmology, Gynaecology, Orthopaedics, and Paediatrics) was carried out, which are more susceptible to medical negligence. At the second stage, selection of consultants from the respective wards was carried out. In-depth Interviews were conducted with the help of semi-structured schedule. Two case studies of medical negligence were also carried out as part of the qualitative study. Analysis: Data were analyzed with the help of SPSS software (21.0 trial version). Semi-structured research tool was used to know consultant’s opinion about the pattern of medical negligence cases, litigations and claims made by patient community and inclusion of government medical services in CPA. Statistical analysis was done to describe data, and non-parametric test was used to observe the association between the variables. Analysis of Verbatim was used in case-study. Findings and Conclusion: Majority (92.8%) of consultants felt changes in the behaviour of community (patient) after implementation of CPA, as it had increased awareness about their rights. Less than half of the consultants opined that Medical Negligence is an Unintentional act of doctors and generally occurs due to communication gap and behavioural problem between doctor and patients. Experienced consultants ( > 10 years) pointed out that unethical practice by doctors and mal-intention of patient to harass doctors were additional reasons of Medical Negligence. In-depth interview revealed that now patients’ community expects more transparency and hence they demand cafeteria approach in diagnosis and management of cases. Thus as study results, we propose ‘Agreement Model’ of DPR to re-ensure ethical practice in medical profession.

Keywords: doctors, communication, consumer protection act (CPA), medical error

Procedia PDF Downloads 146
3033 Influence of HIV Testing on Knowledge of HIV/AIDS Prevention Practices and Transmission among Undergraduate Youths in North-West University, Mafikeng

Authors: Paul Bigala, Samuel Oladipo, Steven Adebowale

Abstract:

This study examines factors influencing knowledge of HIV/AIDS Prevention Practices and Transmission (KHAPPT) among young undergraduate students (15-24 years). Knowledge composite index was computed for 820 randomly selected students. Chi-square, ANOVA, and multinomial logistic regression were used for the analyses (α=.05). The overall mean knowledge score was 16.5±3.4 out of a possible score of 28. About 83% of the students have undergone HIV test, 21.0% have high KHAPPT, 18% said there is cure for the disease, 23% believed that asking for condom is embarrassing and 11.7% said it is safe to share unsterilized sharp objects with friends or family members. The likelihood of high KHAPPT was higher among students who have had HIV test (OR=3.314; C.I=1.787-6.145, p<0.001) even when other variables were used as control. The identified predictors of high KHAPPT were; ever had HIV test, faculty, and ever used any HIV/AIDS prevention services. North-West University Mafikeng should intensify efforts on the HIV/AIDS awareness program on the campus.

Keywords: HIV/AIDS knowledge, undergraduate students, HIV testing, Mafikeng

Procedia PDF Downloads 423
3032 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 56
3031 Assessing Musculoskeletal Disorder Prevalence and Heat-Related Symptoms: A Cross-sectional Comparison in Indian Farmers

Authors: Makkhan Lal Meena, R. C. Bairwa, G. S. Dangayach, Rahul Jain

Abstract:

The current study looked at the frequency of chronic illness conditions, accidents, health complaints, and ergonomic issues among 100 conventional and 100 greenhouse farmers. Data related to the health symptoms and ergonomic problems were collected through questionnaires by conducting direct interviews of farmers. According to the findings, symptoms of heat exposure (skin rashes, headache, dizziness, and lack of appetite) were substantially higher among conventional farmers than greenhouse farmers. The greenhouse farmers reported much more pain, numbness, or weakness in wrists/hands, fingers, upper back, hips, and ankles/feet than conventional farmers. The findings of the study suggest that suitable ergonomic knowledge and awareness campaign programs concentrating on safety at work, particularly low back pain, should be implemented in workplaces to allow for earlier detection of symptoms among the greenhouse farmers.

Keywords: accident, conventional farmer, ergonomics, health symptoms, greenhouse farmers, pesticide

Procedia PDF Downloads 246
3030 Correlates of Tourism and Power Alleviation: A Case Study of Osun Osogbo

Authors: Mohood A. Bamidele, Fadairo O. Olokesunsi, Muhammed A. Yunus

Abstract:

This research work focuses on tourism and poverty alleviation in Osun State, it delves in the tourism resources of the state and strategic framework that has been put in place to manage the cultural base tourism that is most prominent in the state. The major instrument used for data collection was questionnaire which was designed for the area and data collected were analyzed using statistical table and chi-square analysis. The result revealed that tourism is under development in Osun State and the tourism potential of the state is yet to be exploited, this is due to lack of appropriate policy to master the development and management of tourism resources, poor publicity, awareness, and lack of adequate basic infrastructure. The research work, therefore, recommended, that, there should be proper and appropriate policy, and that the government should take a leading step to develop tourism in Osun State by creating a workable environment to the private sector and given a substantial budgetary allocation to the tourism in the state.

Keywords: appropriate policy, poor publicity, poverty alleviation, substantial budgetary allocation

Procedia PDF Downloads 272
3029 Managing Expatriates' Return: Repatriation Practices in a Sample of Firms in Portugal

Authors: Ana Pinheiro, Fatima Suleman

Abstract:

Literature has revealed strong awareness of companies in regard of expatriation, but issues associated with repatriation of employees after an international assignment have been overlooked. Repatriation is one of the most challenging human resource practices that affect how companies benefit from acquired skills and high potential employees; and gain competitive advantage through network developed during expatriation. However, empirical evidence achieved so far suggests that expatriates have been disappointed because companies lack an effective repatriation strategy. Repatriates’ professional and emotional needs are often unrecognized, while repatriation is perceived as a non-issue by companies. The underlying assumption is that the return to parent company, and original country, culture and language does not demand for any particular support. Unfortunately, this basic view has non-negligible consequences on repatriates, especially on expatriate retention and turnover rates after expatriation. The goal of our study is to examine the specific policies and practices adopted by companies to support employees after an international assignment. We assume that expatriation is process which ends with repatriation. The latter is such a crucial issue as the expatriation and require due attention through appropriate design of human resource management policies and tools. For this purpose, we use data from a qualitative research based on interviews to a sample of firms operating in Portugal. We attempt to compare how firms accommodate the concerns with repatriation in their policies and practices. Therefore, the interviews collect data on both expatriation and repatriation process, namely the selection and skills of candidates to expatriation, training, mentoring, communication and pay policies. Portuguese labor market seems to be an interesting case study for mainly two reasons. On the one hand, Portuguese Government is encouraging companies to internationalize in the context of an external market-oriented growth model. On the other hand, expatriation is being perceived as a job opportunity in the context of high unemployment rates of both skilled and non-skilled. This is an ongoing research and the data collected until now indicate that companies follow the pattern described in the literature. The interviewed companies recognize the higher relevance of repatriation process than expatriation, but disregard specific human resource policies. They have perceived that unfavorable labor market conditions discourage mobility across companies. It should be stressed that companies underline that employees enhanced the relevance of stable jobs and attach far less importance to career development and other benefits after expatriation. However, there are still cases of turnover and difficulties of retention. Managers’ report non-negligible cases of turnover associated with lack of effective repatriation programs and non-recognition of good performance. Repatriates seem to having acquired entrepreneurial spirit and skills and often create their own company. These results suggest that even in the context of worsening labor market conditions, there should be greater awareness of the need to retain talents, experienced and highly skills employees. Ultimately, other companies poach invaluable assets, while internationalized companies risk being training providers.

Keywords: expatriates, expatriation, international management, repatriation

Procedia PDF Downloads 324
3028 Convergence of Strategic Tasks of Business Tourism and Hotel Industry Development: The Case of Georgia

Authors: Nana Katsitadze, Tamar Atanelishvili, Mariam Kutateladze, Alexandre Tushishvili

Abstract:

In the modern world, tourism has emerged as one of the most powerful economic sectors, and due to its high economic performance, it is attractive to the countries with various levels of economic development. The purpose of the present paper, dedicated to discussing the current problems of tourism development, is to find ways which will contribute to bringing more benefits to the country from the sector. Georgia has been successfully developing leisure tourism for the last ten years, and at the next stage of development business, tourism gains particular importance for Georgia as a means of mitigating the negative socio-economic effects caused by the seasonality of tourism and as a high-cost tourism market. Therefore, the object of the paper is to study the factors that contribute to the development of business tourism. The paper uses the research methods such as system analysis, synthesis, analogy, as well as historical, comparative, economic, and statistical methods of analysis. The information base for the research is made up of the statistics on the functioning of the tourism market of Georgia and foreign countries as well as official data provided by international organizations in the field of tourism. Based on the experience of business tourism around the world and identifying the successful start of business tourism development in Georgia and its causing factors, a business tourism development model for Georgia has been developed. The model might be useful as a methodological material for developing a business tourism development concept for the countries with limited financial resources but rich in tourism resources like Georgia. On the initial stage of development (in absence of conventional centers), the suggested concept of business tourism development involves organizing small and medium-sized meetings both in large cities and in regions by using high-class hotel infrastructure and event management services. Relocation of small meetings to the regions encourages inclusive development of the sector based on increasing the awareness of these regions as tourist sites as well as the increase in employment and sales of other tourism or consumer products. Business tourism increases the number of hotel visitors in the non-seasonal period and improves hotel performance indicators, which enhances the attractiveness of investing in the hotel business. According to the present concept of business tourism development, at the initial stage, development of business tourism is based on the existing markets, including internal market, neighboring markets and the markets of geographically relatively near countries and at the next stage, the concept involves generating tourists from other relatively distant target markets. As a result, by gaining experience in business tourism, enhancing professionalism, increasing awareness and stimulating infrastructure development, the country will prepare the basis to move to a higher stage of tourism development. In addition, the experience showed that for attracting large customers, peculiarities of the field require activation of state policy and active use of marketing mechanisms and tools of the state.

Keywords: hotel industry development, MICE model, MICE strategy, MICE tourism in Georgia

Procedia PDF Downloads 138
3027 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 250
3026 Environmental Degradation in Niger-Delta and Sustainable Development in Nigeria: Issues for Consideration

Authors: Peter Okpamen

Abstract:

The issue of environmental degradation in Nigeria is of serious concern. The colonial period brought a major change in environmental awareness and relationship with the environment. This period introduced a model of development, the major thrust of which was the exploration and transformation of natural and human resources for the benefit of the colonial masters. There is abundant evidence in the literature that there are various manifestations of environmental degradation in Nigeria, which have resulted in the various problems found throughout the Nigeria national space. The idea of the environment acting as a constraint to the growth of human activity has given way to the contrary. Environmental education, going by the literature, exists at the primary, secondary and tertiary institutions. In short, the 1st National conference on environmental education gave several suggestions on how it could be realised. Thus, to realise sustainable environmental development we need to accelerate the process of providing basic education for both the old and young. Environmental education should cover the whole federation, and resources should be made available for the training of environmental education teachers and research into environmental education for the development of appropriate learning resources.

Keywords: degradation, development, education, environment, sustainable

Procedia PDF Downloads 395
3025 A Meta Regression Analysis to Detect Price Premium Threshold for Eco-Labeled Seafood

Authors: Cristina Giosuè, Federica Biondo, Sergio Vitale

Abstract:

In the last years, the consumers' awareness for environmental concerns has been increasing, and seafood eco-labels are considered as a possible instrument to improve both seafood markets and sustainable fishing management. In this direction, the aim of this study was to carry out a meta-analysis on consumers’ willingness to pay (WTP) for eco-labeled wild seafood, by a meta-regression. Therefore, only papers published on ISI journals were searched on “Web of Knowledge” and “SciVerse Scopus” platforms, using the combinations of the following key words: seafood, ecolabel, eco-label, willingness, WTP and premium. The dataset was built considering: paper’s and survey’s codes, year of publication, first author’s nationality, species’ taxa and family, sample size, survey’s continent and country, data collection (where and how), gender and age of consumers, brand and ΔWTP. From analysis the interest on eco labeled seafood emerged clearly, in particular in developed countries. In general, consumers declared greater willingness to pay than that actually applied for eco-label products, with difference related to taxa and brand.

Keywords: eco label, meta regression, seafood, willingness to pay

Procedia PDF Downloads 107
3024 Solutions for Comfort and Safety on Vibrations Resulting from the Action of the Wind on the Building in the Form of Portico with Four Floors

Authors: G. B. M. Carvalho, V. A. C. Vale, E. T. L. Cöuras Ford

Abstract:

With the aim of increasing the levels of comfort and security structures, the study of dynamic loads on buildings has been one of the focuses in the area of control engineering, civil engineering and architecture. Thus, this work presents a study based on simulation of the dynamics of buildings in the form of portico subjected to wind action, besides presenting an action of passive control, using for this the dynamics of the structure, consequently representing a system appropriated on environmental issues. These control systems are named the dynamic vibration absorbers.

Keywords: dynamic vibration absorber, structure, comfort, safety, wind behavior, structure

Procedia PDF Downloads 391
3023 Identification of Factors Influencing Costs in Green Projects

Authors: Nazirah Zainul Abidin, Nurul Zahirah Mokhtar Azizi

Abstract:

Cost has always been the leading concern in green building development. The perception that construction cost for green building is higher than conventional buildings has only made the discussion of green building cost more difficult. Understanding the factors that will influence the cost of green construction is expected to shed light into what makes green construction more or at par with conventional projects, or perhaps, where cost can be optimised. This paper identifies the elements of cost before shifting the attention to the influencing factors. Findings from past studies uncovered various factors related to cost which are grouped into five focal themes i.e. awareness, knowledge, financial, technical, and government support. A conceptual framework is produced in a form of a flower diagram indicating the cost influencing factors of green building development. These factors were found to be both physical and non-physical aspects of a project. The framework provides ground for the next stage of research that is to further explore how these factors influence the project cost and decision making.

Keywords: green project, factors influencing cost, hard cost, soft cost

Procedia PDF Downloads 323
3022 Accounting as Addressed in the Qur’aan

Authors: Shahriar M. Saadullah, Abdul-Quddoos Abdul-Basith, Zaki K. Abushawish

Abstract:

As a part of academic research in Islamic Accounting it is important to know how the word Accounting is discussed in the Qur’aan. This paper identifies and analyzes the word Accounting in the Qur’aan, which is significant to know and understand. The paper uses a methodology of identifying the root word of Accounting Hasaba (حسب) in the Qur’aan with the help of Islam 360 software and analyzes the use of the relevant words derived from the root word. Then the paper attempts to connect the findings to the contemporary Accounting issues. The paper finds that the root word of Accounting Hasaba (حسب) appears in the Qur’aan 109 times but it is only used in the sense Account, Accountable, or Accounting 45 times. These words appear in 44 different verses in the Qur’aan, appearing twice in one of the verses. The paper divides these verses into 8 different themes namely, Day of Accounting, without any Accounting, Accounting of Time, Self-Accounting, Swift in Accounting, Accounting is only with God, Awareness and the Good Accounting, and Heedlessness and the Bad Accounting. The way the words Account, Accounting, and Accountable is discussed in the Qur’aan links to the contemporary accounting issues including Ethics, Agency Theory, and Internal Control. The links discovered in the paper clearly shows the timeless nature of the message of the Qur’aan.

Keywords: accounting, contemporary accounting issues, Qur'aan, root word of accounting hasaba

Procedia PDF Downloads 401
3021 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act

Authors: Maria Jędrzejczak, Patryk Pieniążek

Abstract:

The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.

Keywords: data protection law, personal data, AI law, personal data breach

Procedia PDF Downloads 45
3020 Cloud-Based Mobile-to-Mobile Computation Offloading

Authors: Ebrahim Alrashed, Yousef Rafique

Abstract:

Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.

Keywords: computational offloading, power conservation, cloud, sandboxing

Procedia PDF Downloads 372
3019 Innovative Communication for Promoting Tourism in Southern Thailand

Authors: Pitimanus Bunlue

Abstract:

This research aim (1) to determine the content of communication, social capital and cultural capital to promote tourism in the province to create awareness, motivation and desire to tourists visiting Thailand (2) to evaluate the performance of innovation communication social capital and cultural capital to promote tourism southern of Thailand. This research is a qualitative research. A research synthesis projects on social capital and cultural capital by use focus group discussions with media professionals and academics to communicate using a random sample specific. The result show that (1) Innovative communication, social capital and cultural capital and effective communication innovations after everyone wants to travel to Ranong province is the very highest level. (2) Information and experience about Ranong at a high level. (3) The data shows the strengths of each of the attractions at a high level. (4) The data shows a lifestyle that is unique to the province is moderate.

Keywords: innovative communication, promoting tourism, southern of Thailand, social capital

Procedia PDF Downloads 261