Search results for: derivative security price
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4212

Search results for: derivative security price

1782 Rohingya Problem and the Impending Crisis: Outcome of Deliberate Denial of Citizenship Status and Prejudiced Refugee Laws in South East Asia

Authors: Priyal Sepaha

Abstract:

A refugee crisis is manifested by challenges, both for the refugees and the asylum giving state. The situation turns into a mega-crisis when the situation is prejudicially handled by the home state, inappropriate refugee laws, exploding refugee population, and above all, no hope of any foreseeable solution or remedy. This paper studies the impact on the capability of stateless Rohingyas to migrate and seek refuge due to the enforcement of rigid criteria of movement imposed both by Myanmar as well as the adjoining countries in the name of national security. This theoretical study identifies the issues and the key factors and players which have precipitated the crisis. It further discusses the possible ramifications in the home, asylum giving, and the adjoining countries for not discharging their roles aptly. Additionally, an attempt has been made to understand the scarce response given to the impending crisis by the regional organizations like SAARC, ASEAN and CHOGAM as well as international organizations like United Nations Human Rights Council, Security Council, Office of High Commissioner for Refugees and so on, in the name of inadequacy of monetary funds and physical resources. Based on the refugee laws and practices pertaining to the case of Rohingyas, this paper analyses that the Rohingya Crisis is in dire need of an effective action plan to curb and resolve the biggest humanitarian crisis situation of the century. This mounting human tragedy can be mitigated permanently, by strengthening existing and creating new interdependencies among all stakeholders, as further ignorance can drive the countries of the Indian Sub-continent, in particular, and South East Asia, by and large into a violent civil war for seizing long-awaited civil rights by the marginalized Rohingyas. To curb this mass crisis, it will require the application of coercive pressure and diplomatic pursuance on the home country to acknowledge the rights of its fleeing citizens. This further necessitates mustering adequate monetary funds and physical resources for the asylum providing state. Additional challenges such as devising mechanisms for the refugee’s safe return, comprehensive planning for their holistic economic development and rehabilitation plan are needed. These, however, can only come into effect with a conscious strive by the regional and international community to fulfil their assigned role.

Keywords: asylum, citizenship, crisis, humanitarian, human rights, refugee, rohingya

Procedia PDF Downloads 132
1781 The Situation of Transgender Individuals Was Worsened During Covid-19

Authors: Kajal Attri

Abstract:

Introduction: Transgender people are considered third gender in India, although they still face identification issues and alienated from society. Furthermore, they face several challenges, including discrimination in employment, resources, education, and property as a result, most transgender people make a living through begging at traffic lights, trains, and buses; attending auspicious occasions such as childbirth and weddings; and engaging in sex work, which includes both home-based and street-based sex work. During COVID-19, maintaining social distance exacerbates transgender people's circumstances and prevents them from accessing health care services, sexual reassignment surgery, identity-based resources, government security, and financial stability. Nonetheless, the pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. This study focuses on how we missed transgender people during COVID-19 to provide better facilities to cope with this situation when they are already the most vulnerable segment of the society. Methodology: The research was conducted using secondary data from published publications and grey literature obtained from four databases: Pubmed, Psychinfo, Science direct, and Google scholar. The literature included total 25 articles that met the inclusion criteria for a review. Result and Discussion: Transgender people, who are considered the most vulnerable sector of society, have already faced several obstacles as a result of the outbreak. The analysis underscores the difficulties that transgender persons faced during COVID-19, such as, They had trouble accessing the government's social security programmes during the lockdown, which provide rations and pensions since they lack the necessary identifying cards. The impact of COVID-19 leaves transgender people at heightened risk of poverty and ill health because they exist on the margins of society, those livelihood base on sex work, begging, and participation on auspicious occasions. They had a significant risk of contracting SARS-CoV2 because they lived in congested areas or did not have permanent shelter, and they were predominantly infected with HIV, cancer, and other non-communicable illnesses. The pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. Conclusion: The study comes forward with useful suggestions based on content analysis and information to reduce the existing woes of transgenders during any pandemic like COVID-19.

Keywords: COVID-19, transgender, lockdown, transwomen, stigmatization

Procedia PDF Downloads 75
1780 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 545
1779 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 102
1778 The Implications of Some Social Variables in Increasing the Unemployed in Egypt

Authors: Mohamed Elkhouli

Abstract:

This research sets out to identify some social factors or variables that may need to be controlled in order to decrease the volume of unemployed in Egypt. As well as, it comes to investigate the relationship between a set of social variables and unemployment issue in Egypt in the sake of determining the most important social variables influencing the rise of unemployed during the time series targeted (2002-2012). Highlighting the unemployment issue is becoming an increasingly important topic in all countries throughout the world resulting from expand their globalization efforts. In general, the study tries to determine what the most social priorities are likely to adopt seriously by the Egypt's government in order to solve the unemployed problem. The results showed that the low value for both of small projects and the total value of disbursed social security respectively have significant impact on increasing the No. of unemployed in Egypt, according to the target period by the current study.

Keywords: Egypt, social status, unemployment, unemployed

Procedia PDF Downloads 326
1777 Technological Innovation and Efficiency of Production of the Greek Aquaculture Industry

Authors: C. Nathanailides, S. Anastasiou, A. Dimitroglou, P. Logothetis, G. Kanlis

Abstract:

In the present work we reviewed historical data of the Greek Marine aquaculture industry including adoption of new methods and technological innovation. The results indicate that the industry exhibited a rapid rise in production efficiency, employment and adoption of new technologies which reduced outbreaks of diseases, reduced production risk and the price of the farmed fish. The improvements of total quality practices and technological input on the Greek Aquaculture industry include improved survival, growth and body shape of farmed fish, which resulted from development of new aquaculture feeds and the genetic selection of the bloodstock. Also improvements in the quality of the final product were achieved via technological input in the methods and technology applied during harvesting, packaging, and transportation-preservation of farmed fish ensuring high quality of the product from the fish farm to the plate of the consumers. These parameters (health management, nutrition, genetics, harvesting and post-harvesting methods and technology) changed significantly over the last twenty years and the results of these improvements are reflected in the production efficiency of the Aquaculture industry and the quality of the final product. It is concluded that the Greek aquaculture industry exhibited a rapid growth, adoption of technologies and supply was stabilized after the global financial crisis, nevertheless, the development of the Greek aquaculture industry is currently limited by international trade sanctions, credit crunch, and increased taxation and not by limited technology or resources.

Keywords: innovation, aquaculture, total quality, management

Procedia PDF Downloads 372
1776 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 517
1775 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 73
1774 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 203
1773 Agritourism Potentials in Oman: An Overview with Visionary for Adoption

Authors: A. Al Hinai, H. Jayasuriya, H. Kotagama

Abstract:

Most Gulf Cooperation Council (GCC) countries with oil-based economy like Oman are looking for other potential revenue generation options as the crude oil price is regularly fluctuating due to changing geopolitical environment. Oman has advantage of possessing world-heritage nature tourism hotspots around the country and the government is making investments and strategies to uplift the tourism industry following Oman Vision 2040 strategies. Oman’s agriculture is not significantly contributing to the economy, but possesses specific and diversified arid cropping systems. Oman has modern farms; nevertheless some of the agricultural production activities are done with cultural practices and styles that would be attractive to tourists. The aim of this paper is to investigate the potentials for promoting agritourism industry in Oman; recognize potential sites, commodities and activities, and predict potential revenue generation as a projection from that of the tourism sector. Moreover, the study enables to foresee possible auxiliary advantages of agritourism such as, empowerment of women and youth, enhancement in the value-addition industry for agricultural produce through technology transfer and capacity building, and producing export quality products. Agritourism could increase employability, empowerment of women and youth, improve value-addition industry and export-oriented agribusiness. These efforts including provision of necessary technology-transfer and capacity-building should be rendered by the collaboration of academic institutions, relevant ministries and other public and private sector stakeholders.

Keywords: agritourism, nature-based tourism, potentials, revenue generation, value addition

Procedia PDF Downloads 137
1772 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 314
1771 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 57
1770 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 165
1769 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 150
1768 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 425
1767 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 19
1766 Re-Invent Corporate Governance - Ethical Way

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.

Keywords: business, entrepreneur, ethics, governance, transparency.

Procedia PDF Downloads 75
1765 Possible Number of Dwelling Units Using Waste Plastic Bottle for Construction

Authors: Dibya Jivan Pati, Kazuhisa Iki, Riken Homma

Abstract:

Unlike other metro cities of India, Bhubaneswar–the capital city of Odisha, is expected to reach 1-million-mark population by now. The demands of dwelling unit requirement mostly among urban poor belonging to Economically Weaker section (EWS) and Low Income groups (LIG) is becoming a challenge due to high housing cost and rents. As a matter of fact, it’s also noted that, with increase in population, the solid waste generation also increases subsequently affecting the environment due to inefficiency in collection of waste by local government bodies. Methods of utilizing Solid Waste - especially in form of Plastic bottles, Glass bottles and Metal cans (PGM) are now widely used as an alternative material for construction of low-cost building by Non-Government Organizations (NGOs) in developing countries like India to help the urban poor afford a shelter. The application of disposed plastic bottle used in construction of single dwelling significantly reduces the overall cost of construction to as much as 14% compared to traditional construction material. Therefore, considering its cost-benefit result, it’s possible to provide housing to EWS and LIGs at an affordable price. In this paper, we estimated the quantity of plastic bottles generated in Bhubaneswar which further helped to estimate the possible number of single dwelling unit that can be constructed on yearly basis so as to refrain from further housing shortage. The estimation results will be practically used for planning and managing low-cost housing business by local government and NGOs.

Keywords: construction, dwelling unit, plastic bottle, solid waste generation, groups

Procedia PDF Downloads 475
1764 Sustainability of Photovoltaic Recycling Planning

Authors: Jun-Ki Choi

Abstract:

The usage of valuable resources and the potential for waste generation at the end of the life cycle of photovoltaic (PV) technologies necessitate a proactive planning for a PV recycling infrastructure. To ensure the sustainability of PV in large scales of deployment, it is vital to develop and institute low-cost recycling technologies and infrastructure for the emerging PV industry in parallel with the rapid commercialization of these new technologies. There are various issues involved in the economics of PV recycling and this research examine those at macro and micro levels, developing a holistic interpretation of the economic viability of the PV recycling systems. This study developed mathematical models to analyze the profitability of recycling technologies and to guide tactical decisions for allocating optimal location of PV take-back centers (PVTBC), necessary for the collection of end of life products. The economic decision is usually based on the level of the marginal capital cost of each PVTBC, cost of reverse logistics, distance traveled, and the amount of PV waste collected from various locations. Results illustrated that the reverse logistics costs comprise a major portion of the cost of PVTBC; PV recycling centers can be constructed in the optimally selected locations to minimize the total reverse logistics cost for transporting the PV wastes from various collection facilities to the recycling center. In the micro- process level, automated recycling processes should be developed to handle the large amount of growing PV wastes economically. The market price of the reclaimed materials are important factors for deciding the profitability of the recycling process and this illustrates the importance of the recovering the glass and expensive metals from PV modules.

Keywords: photovoltaic, recycling, mathematical models, sustainability

Procedia PDF Downloads 255
1763 Ifrs Adoption, Enforcement, and the Value Relevant of Accounting Amounts: The Particular Case of South Africa

Authors: Edward Chamisa, Colin C. Smith, Hamutyinei H. Pamburai, Abdul C. Abdulla

Abstract:

South Africa (SA) adopted International Financial Reporting Standards (IFRS) for listed firms effective 1 January 2005. However, it was not until 2011 that substantial financial reporting enforcement changes were introduced, which were meant to ensure compliance with IFRS. This innovative setting allows us to examine the value relevance of accounting amounts during the (1) pre-IFRS adoption period (2002-2004); (2) post-IFRS adoption, but pre-enforcement changes period (2006-2010); and (3) post-enforcement changes period (2011-2012). The results show that accounting amounts were most value relevant in the post-enforcement changes period (R2, 75.5%) compared to both the pre-IFRS adoption period (adjusted R2 is 24.3%) and the period after IFRS adoption but before enforcement changes (adjusted R2 is 37.5%). Also, during the 2008 financial crisis, the equity book value per share was significantly value relevant (at 1%) but not earnings per share, whereas before the crisis, the opposite was true. We make two important contributions to the literature. First, we identify SA as an innovative setting that allows researchers to examine separately the effects of IFRS adoption and enforcement changes on capital markets and accounting quality. This is a departure from prior studies that are dominated by the European Union setting, where IFRS adoption occurred contemporaneously with enforcement and other regulatory changes. Second, we provide preliminary findings which suggest that while the adoption of IFRS seems to have improved the financial reporting quality of accounting amounts of SA listed firms, its impact appears to be limited unless combined with effective enforcement.

Keywords: international financial reporting standards (ifrs), ifrs adoption, financial reporting enforcement, value relevance, price model, equity book value, earnings per share

Procedia PDF Downloads 70
1762 Designing Web Application to Simulate Agricultural Management for Smart Farmer: Land Development Department’s Integrated Management Farm

Authors: Panasbodee Thachaopas, Duangdorm Gamnerdsap, Waraporn Inthip, Arissara Pungpa

Abstract:

LDD’s IM Farm or Land Development Department’s Integrated Management Farm is the agricultural simulation application developed by Land Development Department relies on actual data in simulation game to grow 12 cash crops which are rice, corn, cassava, sugarcane, soybean, rubber tree, oil palm, pineapple, longan, rambutan, durian, and mangosteen. Launching in simulation game, players could select preferable areas for cropping from base map or Orthophoto map scale 1:4,000. Farm management is simulated from field preparation to harvesting. The system uses soil group, and present land use database to facilitate player to know whether what kind of crop is suitable to grow in each soil groups and integrate LDD’s data with other agencies which are soil types, soil properties, soil problems, climate, cultivation cost, fertilizer use, fertilizer price, socio-economic data, plant diseases, weed, pest, interest rate for taking on loan from Bank for Agriculture and Agricultural Cooperatives (BAAC), labor cost, market prices. These mentioned data affect the cost and yield differently to each crop. After completing, the player will know the yield, income and expense, profit/loss. The player could change to other crops that are more suitable to soil groups for optimal yields and profits.

Keywords: agricultural simulation, smart farmer, web application, factors of agricultural production

Procedia PDF Downloads 198
1761 Cryptocurrency as a Payment Method in the Tourism Industry: A Comparison of Volatility, Correlation and Portfolio Performance

Authors: Shu-Han Hsu, Jiho Yoon, Chwen Sheu

Abstract:

With the rapidly growing of blockchain technology and cryptocurrency, various industries which include tourism has added in cryptocurrency as the payment method of their transaction. More and more tourism companies accept payments in digital currency for flights, hotel reservations, transportation, and more. For travellers and tourists, using cryptocurrency as a payment method has become a way to circumvent costs and prevent risks. Understanding volatility dynamics and interdependencies between standard currency and cryptocurrency is important for appropriate financial risk management to assist policy-makers and investors in marking more informed decisions. The purpose of this paper has been to understand and explain the risk spillover effects between six major cryptocurrencies and the top ten most traded standard currencies. Using data for the daily closing price of cryptocurrencies and currency exchange rates from 7 August 2015 to 10 December 2019, with 1,133 observations. The diagonal BEKK model was used to analyze the co-volatility spillover effects between cryptocurrency returns and exchange rate returns, which are measures of how the shocks to returns in different assets affect each other’s subsequent volatility. The empirical results show there are co-volatility spillover effects between the cryptocurrency returns and GBP/USD, CNY/USD and MXN/USD exchange rate returns. Therefore, currencies (British Pound, Chinese Yuan and Mexican Peso) and cryptocurrencies (Bitcoin, Ethereum, Ripple, Tether, Litecoin and Stellar) are suitable for constructing a financial portfolio from an optimal risk management perspective and also for dynamic hedging purposes.

Keywords: blockchain, co-volatility effects, cryptocurrencies, diagonal BEKK model, exchange rates, risk spillovers

Procedia PDF Downloads 143
1760 Design and Modeling of Light Duty Trencher

Authors: Yegetaneh T. Dejenu, Delesa Kejela, Abdulak Alemu

Abstract:

From the earliest time of humankind, the trenches were used for water to flow along and for soldiers to hide in during enemy attacks. Now a day due to civilization, the needs of the human being become endless, and the living condition becomes sophisticated. The unbalance between the needs and resource obligates them to find the way to manage this condition. The attempt to use the scares resource in very efficient and effective way makes the trench an endeavor practice in the world in all countries. A trencher is a construction equipment used to dig trenches, especially for laying pipes or cables, installing drainage, irrigation, installing fencing, and in preparation for trench warfare. It is a machine used to make a ditch by cutting the soil ground and effectively used in agricultural irrigation. The most common types of trencher are wheel trencher, chain trencher, micro trencher, portable trencher. In Ethiopia people have been trenching the ditch for many purposes and the tools they are using are Pickaxe, Shovel and some are using Micro Excavators. The adverse effect of using traditional equipment is, time and energy consuming, less productive, difficult and more man power is required. Hence it is necessary to design and produce low price, and simple machine to narrow this gap. Our objective is to design and model a light duty trencher that is used for trenching the ground or soil for making ditch and used for agricultural, ground cabling, ground piping, and drainage system. The designed machine trenches, maximum of 1-meter depth, 30 cm width, and the required length. The working mechanism is fully hydraulic, and the engine with 12.7 hp will provide suitable power for the pump that delivers 23 l/min at 1500 rpm to drive hydraulic motors and actuators.

Keywords: hydraulics, modelling, trenching, ditch

Procedia PDF Downloads 215
1759 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights

Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel

Abstract:

Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.

Keywords: e-commerce, regression, clustering, k-means

Procedia PDF Downloads 18
1758 Device to Alert and Fire Prevention through Temperature Monitoring and Gas Detection

Authors: Dêivisson Alves Anjos, Blenda Fonseca Aires Teles, Queitiane Castro Costa

Abstract:

Fire is one of the biggest dangers for factories, warehouses, mills, among other places, causing unimaginable damage, because besides the material damage also directly affects the lives of workers who are likely to suffer death or very serious consequences. This protection of the lives of these people should be taken seriously, always seeking safety. Thus investment in security and monitoring equipment must be high, so you can prevent or reduce the impacts of a possible fire. Our device, made in PIC micro controller monitors the temperature and the presence of gas in the environment, it sends the data via Bluetooth device to a developed in LabVIEW interface saves these data continuously and alert if the temperature exceeds the allowed or some gas is detected. Currently the device is in operation and can perform several tests, as well as use in different areas for which you need anti-fire protection.

Keywords: pic, bluetooth, fire, temperature, gas, LabVIEW

Procedia PDF Downloads 532
1757 The Ethical and Social Implications of Using AI in Healthcare: A Literature Review

Authors: Deepak Singh

Abstract:

AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use.

Keywords: AI, healthcare, telemedicine, telehealth, ethics, security, privacy, patient, rights, safety

Procedia PDF Downloads 140
1756 Effects of Nut Quality and Yield by Raising Poultry in Chestnut Tree Plantation

Authors: Yunmi Park, Mahn-Jo Kim

Abstract:

The purpose of this research is to find out the effect of raising poultry in environment-friendly producing area to fruit quality and crop within chestnut tree yield. This study was conducted on chestnut tree cultivation sites raising poultry at intervals of five to ten days for three years in the mountainous area which was located in the middle corner of Chungcheongbuk-do province, Korea. The quality of chestnut fruit and the control effects of harmful insects have been investigated between the sites raising poultry and control sites for three years. As a result, the harvest yielded were two to five kilograms higher in the chestnut tree cultivation sites raising poultry compared with the control site without poultry. Also, for the purposes of determining the price when selling, the ratio of the biggest fruit is higher by 3% to 14% in the chestnut tree cultivation sites raising poultry. In order to investigate the effects of pest control through raising poultry, the ratio of harmful insect species to treatment sites was relatively low compared to control site. The appreciable result is that the control effect of larvae of the chestnut leaf-cut weevil was higher in the position where raising the poultry of 4 to 5 weeks compared to the position where raising the poultry of 12 weeks. This study found that the spread of poultry in the cultivation of chestnut trees increased the fruit quality by improving the size of fruits and lowering the dosage of harmful insect, chestnut leaf-cut weevil. Also, the eco-friendly chicken produced by these mountainous regions is expected to contribute to enhancing the incomes of the farmers by differentiating themselves from existing products.

Keywords: chestnut tree, environment-friendly, fruit quality, raising poultry

Procedia PDF Downloads 286
1755 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 583
1754 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 288
1753 Vibrational Spectra and Nonlinear Optical Investigations of a Chalcone Derivative (2e)-3-[4-(Methylsulfanyl) Phenyl]-1-(3-Bromophenyl) Prop-2-En-1-One

Authors: Amit Kumar, Archana Gupta, Poonam Tandon, E. D. D’Silva

Abstract:

Nonlinear optical (NLO) materials are the key materials for the fast processing of information and optical data storage applications. In the last decade, materials showing nonlinear optical properties have been the object of increasing attention by both experimental and computational points of view. Chalcones are one of the most important classes of cross conjugated NLO chromophores that are reported to exhibit good SHG efficiency, ultra fast optical nonlinearities and are easily crystallizable. The basic structure of chalcones is based on the π-conjugated system in which two aromatic rings are connected by a three-carbon α, β-unsaturated carbonyl system. Due to the overlap of π orbitals, delocalization of electronic charge distribution leads to a high mobility of the electron density. On a molecular scale, the extent of charge transfer across the NLO chromophore determines the level of SHG output. Hence, the functionalization of both ends of the π-bond system with appropriate electron donor and acceptor groups can enhance the asymmetric electronic distribution in either or both ground and excited states, leading to an increased optical nonlinearity. In this research, the experimental and theoretical study on the structure and vibrations of (2E)-3-[4-(methylsulfanyl) phenyl]-1-(3-bromophenyl) prop-2-en-1-one (3Br4MSP) is presented. The FT-IR and FT-Raman spectra of the NLO material in the solid phase have been recorded. Density functional theory (DFT) calculations at B3LYP with 6-311++G(d,p) basis set were carried out to study the equilibrium geometry, vibrational wavenumbers, infrared absorbance and Raman scattering activities. The interpretation of vibrational features (normal mode assignments, for instance) has an invaluable aid from DFT calculations that provide a quantum-mechanical description of the electronic energies and forces involved. Perturbation theory allows one to obtain the vibrational normal modes by estimating the derivatives of the Kohn−Sham energy with respect to atomic displacements. The molecular hyperpolarizability β plays a chief role in the NLO properties, and a systematical study on β has been carried out. Furthermore, the first order hyperpolarizability (β) and the related properties such as dipole moment (μ) and polarizability (α) of the title molecule are evaluated by Finite Field (FF) approach. The electronic α and β of the studied molecule are 41.907×10-24 and 79.035×10-24 e.s.u. respectively, indicating that 3Br4MSP can be used as a good nonlinear optical material.

Keywords: DFT, MEP, NLO, vibrational spectra

Procedia PDF Downloads 221