Search results for: ecosystem services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4604

Search results for: ecosystem services

2204 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 196
2203 Use of Proton Pump Inhibitors Medications during the First Years of Life and Late Complications

Authors: Kamelia Hamza

Abstract:

Background: Proton pump inhibitors (PPIs) are the most prescribed drug classes for pediatric gastroesophageal reflux disease (GERD).Many patients are treated with these drugs for atypical manifestations attributed to gastroesophageal reflux (GER), even in the absence of proved causal relationship. There is an impression of increase use of PPI's treatment for reflux in "clalit health services," the largest health organization in Israel. In the recent years, the medicine is given without restriction, it's not limited to pediatric gastroenterologists only, but pediatricians and family doctors. The objective of this study is to evaluate the hypothesis that exposure to PPIs during the first year of life is associated with an increased risk of developing late adverse diseases: pneumonia, asthma, AGE, IBD, celiac disease, allergic disorders, obesity, attention deficit hyperactivity disorders (ADHD), autism spectrum disorders (ASD). Methods: The study is a retrospective case-control cohort study based on a computerized database of Clalit Health Services (CHS). It includes 9844 children born between 2002-2018 and reported to complain of at least one of the symptoms (reflux/ spitting up, irritability, feeding difficulties, colics). The study population included the study group (n=4922) of children exposed to PPIs at any time prior to the first year of life and a control group (n=4922) child not exposed to PPIs who were matched to each case of the study group on age, race, socioeconomic status, and year of birth. The prevalence of late complications/diseases in the study group was compared with the prevalence of late complications/diseases diagnosis between 2002-2020 in the control group. Odds ratios and 95% confidence intervals were calculated by using logistic regression models. Results: We found that compared to the control group, children exposed to PPIs in the first year of life had an increased risk of developing several late complications/ disorders: pneumonia, asthma, various allergies (urticaria, allergic rhinitis, or allergic conjunctivitis) OR, inhalant allergies, and food allergies. In addition, they showed an increased risk of being diagnosed with ADHD or ASD, but children exposed to PPIs in the first year of life had decrease the risk of obesity by 17% (OR 0.825, 95%CI 0.697-0.976). Conclusions: We found significant associations between the use of PPIs during the first year of life and subsequent development of late complications/diseases such as respiratory diseases, allergy diseases, ADHD, and ASD. More studies are needed to prove causality and determine the mechanism behind the effect of PPIs and the development of late complications.

Keywords: acid suppressing medications, proton pump inhibitors, histamine 2 blocker, late complications, gastroesophageal reflux, gastroesophageal reflux disease, acute gastroenteritis, community acquired pneumonia, asthma, allergic diseases, obesity, inflammatory bowel diseases, ulcerative colitis, crohn disease, attention deficit hyperactivity disorders, autism spectrum disorders

Procedia PDF Downloads 91
2202 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling

Authors: Ansari Mohammad Reza, Hiroko Ono

Abstract:

In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.

Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities

Procedia PDF Downloads 172
2201 Predictors, Barriers, and Facilitators to Refugee Women’s Employment and Economic Inclusion: A Mixed Methods Systematic Review

Authors: Areej Al-Hamad, Yasin Yasin, Kateryna Metersky

Abstract:

This mixed-method systematic review and meta-analysis provide an encompassing understanding of the barriers, facilitators, and predictors of refugee women's employment and economic inclusion. The study sheds light on the complex interplay of sociocultural, personal, political, and environmental factors influencing these outcomes, underlining the urgent need for a multifaceted, tailored approach to devising strategies, policies, and interventions aimed at boosting refugee women's economic empowerment. Our findings suggest that sociocultural factors, including gender norms, societal attitudes, language proficiency, and social networks, profoundly shape refugee women's access to and participation in the labor market. Personal factors such as age, educational attainment, health status, skills, and previous work experience also play significant roles. Political factors like immigration policies, regulations, and rights to work, alongside environmental factors like labor market conditions, availability of employment opportunities, and access to resources and support services, further contribute to the complex dynamics influencing refugee women's economic inclusion. The significant variability observed in the impacts of these factors across different contexts underscores the necessity of adopting population and region-specific strategies. A one-size-fits-all approach may prove to be ineffective due to the diversity and unique circumstances of refugee women across different geographical, cultural, and political contexts. The study's findings have profound implications for policy-making, practice, education, and research. The insights garnered a call for coordinated efforts across these domains to bolster refugee women's economic participation. In policy-making, the findings necessitate a reassessment of current immigration and labor market policies to ensure they adequately support refugee women's employment and economic integration. In practice, they highlight the need for comprehensive, tailored employment services and interventions that address the specific barriers and leverage the facilitators identified. In education, they underline the importance of language and skills training programs that cater to the unique needs and circumstances of refugee women. Lastly, in research, they emphasize the need for ongoing investigations into the multifaceted factors influencing refugee women's employment experiences, allowing for continuous refinement of our understanding and interventions. Through this comprehensive exploration, the study contributes to ongoing efforts aimed at creating more inclusive, equitable societies. By continually refining our understanding of the complex factors influencing refugee women's employment experiences, we can pave the way toward enhanced economic empowerment for this vulnerable population.

Keywords: refugee women, employment barriers, systematic review, employment facilitators

Procedia PDF Downloads 74
2200 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 352
2199 Managing the Cloud Procurement Process: Findings from a Case Study

Authors: Andreas Jede, Frank Teuteberg

Abstract:

Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.

Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study

Procedia PDF Downloads 388
2198 Becoming Academic in the Entrepreneurial University: Researcher Identities and Research Impact Development

Authors: Victoria G. Mountford-Brown

Abstract:

The concept of the Entrepreneurial University and emphasis on higher education institutions as both hives of innovation and as producers of future innovators accord special significance to the role of academic researchers in future economic and social prosperity. Researcher development in the UK has embedded an emphasis or ‘enterprise lens’ on developing the capabilities of researchers to support a stable economy whilst providing solutions to societal challenges. However, the notion of the ‘entrepreneurial university’ and what that represents to many academics is met with tension and (dis)engagement in the premises of the ‘knowledge economy’ or ‘academic capitalism.’ Set in a landscape of UK higher education wherein the increasing emphasis on research impact, coupled with increasing competition for scarce funding, has created a ‘climate of performativity’. This research seeks to better understand the ways in which academic identities are (re)constructed in the everyday experiences of doctoral (PGR) and early career researchers (ECRs) as they navigate what is referred to by some as the ‘academic hunger games’. These daily pressures and high expectations of success are part of the identity work PGRs/ECRs undergo. This is often fraught with tension and struggles to adapt to the research environment suggesting a reason for imposter phenomenon to be rife in academia – particularly (but not exclusively) in the early stages of development. This pilot study involves qualitative semi-structured exploratory interviews with a mixed gendered sample of participants from a variety of subject disciplines who have taken part in an intensive 3-day innovation and enterprise program for PGR and ECRs premised on developing personal and research impact. The research seeks to better understand the processes of identity formation of becoming academic and offers a commentary on the notions of ‘imposter phenomenon’ and the exchange and development of resources or capital needed to ‘play the game’ in academia in the context of the ‘entrepreneurial university’. It explores ongoing (re)constructions of what it means to be an academic and the different ways in which social identities may embody and challenge the development of entrepreneurial academic identities. As such, it aims to contribute to our understanding of the innovation ecosystem of academia and the prosperity of academic researchers.

Keywords: entreprenruial development, higher education, identities, researcher development

Procedia PDF Downloads 90
2197 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers

Authors: Sally Selden, Jyoti Aggarwal

Abstract:

The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.

Keywords: multigenerational workforce, leadership, generational differences, federal workforce

Procedia PDF Downloads 216
2196 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 252
2195 Translation Training in the AI Era

Authors: Min Gao

Abstract:

In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.

Keywords: job market of translation, large language model, translation ethics, translation training

Procedia PDF Downloads 63
2194 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 353
2193 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 134
2192 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 369
2191 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 260
2190 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 294
2189 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 122
2188 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 165
2187 Welfare State and Income Distribution to School-Age Children

Authors: Kanyarat Bussaban, Siriporn Poolsuwan

Abstract:

This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.

Keywords: inequality, income distribution, quality of school-age children lives, welfare state

Procedia PDF Downloads 367
2186 An Assessment of the Impacts of Agro-Ecological Practices towards the Improvement of Crop Health and Yield Capacity: A Case of Mopani District, Limpopo, South Africa

Authors: Tshilidzi C. Manyanya, Nthaduleni S. Nethengwe, Edmore Kori

Abstract:

The UNFCCC, FAO, GCF, IPCC and other global structures advocate for agro-ecology do address food security and sovereignty. However, most of the expected outcomes concerning agro-ecological were not empirically tested for universal application. Agro-ecology is theorised to increase crop health over ago-ecological farms and decrease over conventional farms. Increased crop health means increased carbon sequestration and thus less CO2 in the atmosphere. This is in line with the view that global warming is anthropogenically enhanced through GHG emissions. Agro-ecology mainly affects crop health, soil carbon content and yield on the cultivated land. Economic sustainability is directly related to yield capacity, which is theorized to increase by 3-10% in a space of 3 - 10 years as a result of agro-ecological implementation. This study aimed to empirically assess the practicality and validity of these assumptions. The study utilized mainly GIS and RS techniques to assess the effectiveness of agro-ecology in crop health improvement from satellite images. The assessment involved a longitudinal study (2013 – 2015) assessing the changes that occur after a farm retrofits from conventional agriculture to agro-ecology. The assumptions guided the objectives of the study. For each objective, an agro-ecological farm was compared with a conventional farm in the same climatic conditional occupying the same general location. Crop health was assessed using satellite images analysed through ArcGIS and Erdas. This entailed the production of NDVI and Re-classified outputs of the farm area. The NDVI ranges of the entire period of study were thus compared in a stacked histogram for each farm to assess for trends. Yield capacity was calculated based on the production records acquired from the farmers and plotted in a stacked bar graph as percentages of a total for each farm. The results of the study showed decreasing crop health trends over 80% of the conventional farms and an increase over 80% of the organic farms. Yield capacity showed similar patterns to those of crop health. The study thus showed that agro-ecology is an effective strategy for crop-health improvement and yield increase.

Keywords: agro-ecosystem, conventional farm, dialectical, sustainability

Procedia PDF Downloads 212
2185 Isolation, Identification and Screening of Pectinase Producing Fungi Isolated from Apple (Malus Domestica)

Authors: Shameel Pervez, Saad Aziz Durrani, Ibatsam Khokhar

Abstract:

Pectinase is an enzyme that breaks down pectin, a compound responsible for structural integrity of the plant. Pectin is difficult to break down mechanically and the cost is very high, that is why many industries including food industries use pectinase enzyme produced by microbes for pectin breakdown. Apple (Malus domestica) is an important fruit in terms of market value. Every year, millions of apples are wasted due to post-harvest rot caused by fungi. Fungi are natural decomposers of our ecosystem and are infamous for post-harvest rot of apple fruit but at the same time they are prized for their high production of valuable extracellular enzymes such as pectinase. In this study, fungi belonging to different genus were isolated from rotten apples. Rotten samples of apple were picked from different markets of Lahore. After surface sterilization, the rotten parts were cut into small pieces and placed onto MEA media plates for three days. Afterwards, distinct colonies were picked and purified by sub-culturing. The isolates were identified to genus level through the study of basic colony morphology and microscopic features. The isolates were then subjected to screening for pectinase activity on MS media to compare pectinase production and were then subsequently tested for pathogenic activity through wound suspension method to evaluate the pathogenic activity of isolates in comparison with their pectinolytic activity. A total of twelve fungal strains were isolates from rotten apples. They were belonging to genus Penicillium, Alternaria, Paecilomyces and Rhizopus. Upon screening for pectinolytic activity, isolates Pen 1, Pen 4, and Rz showed high pectinolytic activity and were further subjected to DNA isolation and partial sequencing for species identification. The results of partial sequencing were combined with in-depth study of morphological features revealing Pen 1 as Penicillium janthinellum, Pen 4 as Penicillium griseofulvum, and Rz as Rhizopus microsporus. Pathogenic activity of all twelve isolates was evaluated. Penicillium spp. were highly pathogenic and destructive and same was the case with Paecilomyces sp. and Rhizopus sp. However, Alternaria spp. were found to be more consistent in their pathogenic activity, on all types of apples.

Keywords: apple, pectinase, fungal pathogens, penicillium, rhizopus

Procedia PDF Downloads 58
2184 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 313
2183 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 289
2182 Sensor Data Analysis for a Large Mining Major

Authors: Sudipto Shanker Dasgupta

Abstract:

One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.

Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data

Procedia PDF Downloads 400
2181 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 341
2180 Application of Metroxylon Sagu Waste in Textile Process

Authors: Nazlina Shaari

Abstract:

Sustainability is economic, social and environmental systems that make up the community in providing a healthy, productive, meaningful life for all community residents, present and future. The environmental profile of goods and services that satisfy our individual and societal needs were shaped by design activities. The integration of environmental aspect of product design, especially in textiles present much confusion surrounds the incorporation of environmental objectives into the design process. This paper explores the effective use of waste materials that can contribute to the development of more environmentally responsible practice in textile sector. It introduces key elements of the ecological approach and innovative ideas from waste to wealth. The paper focuses on the potential methods of utilizing sago residue as a natural colour enhancer in natural dyeing process. It will discover the potential of waste materials to be fully utilized to attempt to make the production of that textile more environmentally friendly.

Keywords: sustainability, textiles, waste materials, environmentally friendly

Procedia PDF Downloads 309
2179 The Need to Teach the Health Effects of Climate Change in Medical Schools

Authors: Ábrám Zoltán

Abstract:

Introduction: Climate change is now a major health risk, and its environmental and health effects have become frequently discussed topics. The consequences of climate change are clearly visible in natural disasters and excess deaths caused by extreme weather conditions. Global warming and the increasingly frequent extreme weather events have direct, immediate effects or long-term, indirect effects on health. For this reason, it is a need to teach the health effects of climate change in medical schools. Material and methods: We looked for various surveys, studies, and reports on the main pathways through which global warming affects health. Medical schools face the challenge of teaching the health implications of climate change and integrating knowledge about the health effects of climate change into medical training. For this purpose, there were organised World Café workshops for three target groups: medical students, academic staff, and practising medical doctors. Results: Among the goals of the research is the development of a detailed curriculum for medical students, which serves to expand their knowledge in basic education. At the same time, the project promotes the increase of teacher motivation and the development of methodological guidelines for university teachers; it also provides further training for practicing doctors. The planned teaching materials will be developed in a format suitable for traditional face-to-face teaching, as well as e-learning teaching materials. CLIMATEMED is a project based on the cooperation of six universities and institutions from four countries, the aim of which is to improve the curriculum and expand knowledge about the health effects of climate change at medical universities. Conclusions: In order to assess the needs, summarize the proposals, to develop the necessary strategy, World Café type, one-and-a-half to two-hour round table discussions will take place separately for medical students, academic staff, and practicing doctors. The CLIMATEMED project can facilitate the integration of knowledge about the health effects of climate change into curricula and can promote practical use. The avoidance of the unwanted effects of global warming and climate change is not only a public matter, but it is also a challenge to change our own lifestyle. It is the responsibility of all of us to protect the Earth's ecosystem and the physical and mental health of ourselves and future generations.

Keywords: climate change, health effects, medical schools, World Café, medical students

Procedia PDF Downloads 76
2178 Alcohol and Tobacco Influencing Prevalence of Hypertension among 15-54 Old Indian Men: An Application of Discriminant Analysis Using National Family Health Survey, 2015-16

Authors: Chander Shekhar, Jeetendra Yadav, Shaziya Allarakha

Abstract:

Hypertension has been described as an 'iceberg disease' as those who suffered are ignored and hence usually seek healthcare services at a very late stage. It is estimated that more than 2 million Indians are suffering from hypertensive heart disease that contributed to above 0.13 million deaths in 2016. The paper study aims to know the prevalence of Hypertension in India and its variation by socioeconomic backgrounds and to find out risk factors discriminating hypertension with special emphasis on consumption of tobacco and alcohol among men aged 15-54 years in India. The paper uses NFHS (2015-16) data. The paper used binary logistic regression and discriminant analysis to find significant predictors and discriminants of interest. The prevalence of hypertension was 16.5% in the study population. The results suggest that consumption of alcohol and tobacco are significant discriminant characteristics in carrying hypertension irrespective of what socioeconomic background characteristic he possesses.

Keywords: hypertention, alcohol, tobacco, discriminant

Procedia PDF Downloads 139
2177 Attitudes, Knowledge and Perceptions towards Cervical Cancer Messages among Female University Students

Authors: Anne Nattembo

Abstract:

Cervical cancer remains a major public health problem in developing countries, especially in Africa. Effective cervical cancer prevention communication requires identification of behaviors, attitudes and increasing awareness of a given population; thus this study focused on investigating awareness, attitudes, and behavior among female university students towards cervical cancer messages. The study objectives sought to investigate the communication behavior of young adults towards cervical cancer, to understand female students recognition of cervical cancer as a problem, to identify the frames related to cervical cancer and their impact towards audience communication and participation behaviors, to identify the factors that influence behavioral intentions and level of involvement towards cervical cancer services and to make recommendations on how to improve cervical cancer communication towards female university students. The researcher obtained data using semi-structured interviews and focus group discussions targeting 90 respondents. The semi-structured in-depth interviews were carried out through one-on-one discussions basis using a set of prepared questions among 53 respondents. All interviews were audio-tape recorded. Each interview was directly typed into Microsoft Word. 4 focus group discussions were conducted with a total of 37 respondents; 2 female only groups with 10 respondents in one and 9 respondents in another, 1 mixed with 12 participants 5 of whom were male, and 1 male only group with 6 participants. The key findings show that the participants preferred to receive and access cervical cancer information from doctors although they were mainly receiving information from the radio. In regards to the type of public the respondents represent, majority of the respondents were non-publics in the sense that they did not have knowledge about cervical cancer, had low levels of involvement and had high constraint recognition their cervical cancer knowledge levels. The researcher identified the most salient audience frames among female university students towards cervical cancer and these included; death, loss, and fear. These frames did not necessarily make cervical cancer an issue of concern among the female university students but rather an issue they distanced themselves from as they did not perceive it as a risk. The study also identified the constraints respondents face in responding to cervical cancer campaign calls-to-action which included; stigma, lack of knowledge and access to services as well as lack of recommendation from doctors. In regards to sex differences, females had more knowledge about cervical cancer than the males. In conclusion the study highlights the importance of interpersonal communication in risk or health communication with a focus on health providers proactively sharing cervical cancer prevention information with their patients. Health provider’s involvement in cervical cancer is very important in influencing behavior and compliance of cervical cancer calls-to-action. The study also provides recommendations for designing effective cervical cancer campaigns that will positively impact on the audience such as packaging cervical cancer messages that also target the males as a way of increasing their involvement and more campaigns to increase awareness of cervical cancer as well as designing positive framed messages to counter the negative audience frames towards cervical cancer.

Keywords: cervical cancer communication, health communication, university students, risk communication

Procedia PDF Downloads 223
2176 Carbon Footprint Assessment and Application in Urban Planning and Geography

Authors: Hyunjoo Park, Taehyun Kim, Taehyun Kim

Abstract:

Human life, activity, and culture depend on the wider environment. Cities offer economic opportunities for goods and services, but cannot exist in environments without food, energy, and water supply. Technological innovation in energy supply and transport speeds up the expansion of urban areas and the physical separation from agricultural land. As a result, division of urban agricultural areas causes more energy demand for food and goods transport between the regions. As the energy resources are leaking all over the world, the impact on the environment crossing the boundaries of cities is also growing. While advances in energy and other technologies can reduce the environmental impact of consumption, there is still a gap between energy supply and demand by current technology, even in technically advanced countries. Therefore, reducing energy demand is more realistic than relying solely on the development of technology for sustainable development. The purpose of this study is to introduce the application of carbon footprint assessment in fields of urban planning and geography. In urban studies, carbon footprint has been assessed at different geographical scales, such as nation, city, region, household, and individual. Carbon footprint assessment for a nation and a city is available by using national or city level statistics of energy consumption categories. By means of carbon footprint calculation, it is possible to compare the ecological capacity and deficit among nations and cities. Carbon footprint also offers great insight on the geographical distribution of carbon intensity at a regional level in the agricultural field. The study shows the background of carbon footprint applications in urban planning and geography by case studies such as figuring out sustainable land-use measures in urban planning and geography. For micro level, footprint quiz or survey can be adapted to measure household and individual carbon footprint. For example, first case study collected carbon footprint data from the survey measuring home energy use and travel behavior of 2,064 households in eight cities in Gyeonggi-do, Korea. Second case study analyzed the effects of the net and gross population densities on carbon footprint of residents at an intra-urban scale in the capital city of Seoul, Korea. In this study, the individual carbon footprint of residents was calculated by converting the carbon intensities of home and travel fossil fuel use of respondents to the unit of metric ton of carbon dioxide (tCO₂) by multiplying the conversion factors equivalent to the carbon intensities of each energy source, such as electricity, natural gas, and gasoline. Carbon footprint is an important concept not only for reducing climate change but also for sustainable development. As seen in case studies carbon footprint may be measured and applied in various spatial units, including but not limited to countries and regions. These examples may provide new perspectives on carbon footprint application in planning and geography. In addition, additional concerns for consumption of food, goods, and services can be included in carbon footprint calculation in the area of urban planning and geography.

Keywords: carbon footprint, case study, geography, urban planning

Procedia PDF Downloads 285
2175 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 267