Search results for: Shamir's secret sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1145

Search results for: Shamir's secret sharing

905 Digital Learning Repositories for Vocational Teaching and Knowledge Sharing

Authors: Prachyanun Nilsook, Panita Wannapiroon

Abstract:

The purpose of this research is to study a Digital Learning Repository System (DLRS) on vocational teachers and teaching in Thailand. The innobpcd.net is a DLRS being utilized by the Office of Vocational Education Commission and operationalized by the Bureau of Personnel Competency Development for vocational education teachers. The aim of the system is to support and enhance the process of vocational teaching and to improve staff development by providing teachers with a variety of network connections and information. The system provides centralized hosting and access to content, and the ability to share digital objects or files, to set permissions and controls for access to content that can be used vocational education teachers for their teaching and for their own development. The elements of DLRS include; Digital learning system, Media Library, Knowledge-based system and Mobile Application. The system aims to link vocational teachers to the most effective emerging technologies available for learning, so they are better resourced to support their vocational students. The initial results from this evaluation indicate that there is a range of services provided by the system being used by vocational teachers and this paper indicates which facilities have the greatest usage and impact on vocational teaching in Thailand.

Keywords: digital learning repositories, vocational education, knowledge sharing, learning objects

Procedia PDF Downloads 448
904 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 165
903 Error Analysis of Wavelet-Based Image Steganograhy Scheme

Authors: Geeta Kasana, Kulbir Singh, Satvinder Singh

Abstract:

In this paper, a steganographic scheme for digital images using Integer Wavelet Transform (IWT) is proposed. The cover image is decomposed into wavelet sub bands using IWT. Each of the subband is divided into blocks of equal size and secret data is embedded into the largest and smallest pixel values of each block of the subband. Visual quality of stego images is acceptable as PSNR between cover image and stego is above 40 dB, imperceptibility is maintained. Experimental results show better tradeoff between capacity and visual perceptivity compared to the existing algorithms. Maximum possible error analysis is evaluated for each of the wavelet subbands of an image.

Keywords: DWT, IWT, MSE, PSNR

Procedia PDF Downloads 482
902 Low Pricing Strategy of Forest Products in Community Forestry Program: Subsidy to the Forest Users or Loss of Economy?

Authors: Laxuman Thakuri

Abstract:

Community-based forest management is often glorified as one of the best forest management alternatives in the developing countries like Nepal. It is also believed that the transfer of forest management authorities to local communities is decisive to take efficient decisions, maximize the forest benefits and improve the people’s livelihood. The community forestry of Nepal also aims to maximize the forest benefits; share them among the user households and improve their livelihood. However, how the local communities fix the price of forest products and local pricing made by the forest user groups affects to equitable forest benefits-sharing among the user households and their livelihood improvement objectives, the answer is largely silent among the researchers and policy-makers alike. This study examines local pricing system of forest products in the lowland community forestry and its effects on equitable benefit-sharing and livelihood improvement objectives. The study discovered that forest user groups fixed the price of forest products based on three criteria: i) costs incur in harvesting, ii) office operation costs, and iii) livelihood improvement costs through community development and income generating activities. Since user households have heterogeneous socio-economic conditions, the forest user groups have been applied low pricing strategy even for high-value forest products that the access of socio-economically worse-off households can be increased. However, the results of forest products distribution showed that as a result of low pricing strategy the access of socio-economically better-off households has been increasing at higher rate than worse-off and an inequality situation has been created. Similarly, the low pricing strategy is also found defective to livelihood improvement objectives. The study suggests for revising the forest products pricing system in community forest management and reforming the community forestry policy as well.

Keywords: community forestry, forest products pricing, equitable benefit-sharing, livelihood improvement, Nepal

Procedia PDF Downloads 283
901 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 102
900 Blind Data Hiding Technique Using Interpolation of Subsampled Images

Authors: Singara Singh Kasana, Pankaj Garg

Abstract:

In this paper, a blind data hiding technique based on interpolation of sub sampled versions of a cover image is proposed. Sub sampled image is taken as a reference image and an interpolated image is generated from this reference image. Then difference between original cover image and interpolated image is used to embed secret data. Comparisons with the existing interpolation based techniques show that proposed technique provides higher embedding capacity and better visual quality marked images. Moreover, the performance of the proposed technique is more stable for different images.

Keywords: interpolation, image subsampling, PSNR, SIM

Procedia PDF Downloads 561
899 [Keynote Talk]: Knowledge Codification and Innovation Success within Digital Platforms

Authors: Wissal Ben Arfi, Lubica Hikkerova, Jean-Michel Sahut

Abstract:

This study examines interfirm networks in the digital transformation era, and in particular, how tacit knowledge codification affects innovation success within digital platforms. Hence, one of the most important features of digital transformation and innovation process outcomes is the emergence of digital platforms, as an interfirm network, at the heart of open innovation. This research aims to illuminate how digital platforms influence inter-organizational innovation through virtual team interactions and knowledge sharing practices within an interfirm network. Consequently, it contributes to the respective strategic management literature on new product development (NPD), open innovation, industrial management, and its emerging interfirm networks’ management. The empirical findings show, on the one hand, that knowledge conversion may be enhanced, especially by the socialization which seems to be the most important phase as it has played a crucial role to hold the virtual team members together. On the other hand, in the process of socialization, the tacit knowledge codification is crucial because it provides the structure needed for the interfirm network actors to interact and act to reach common goals which favor the emergence of open innovation. Finally, our results offer several conditions necessary, but not always sufficient, for interfirm managers involved in NPD and innovation concerning strategies to increasingly shape interconnected and borderless markets and business collaborations. In the digital transformation era, the need for adaptive and innovative business models as well as new and flexible network forms is becoming more significant than ever. Supported by technological advancements and digital platforms, companies could benefit from increased market opportunities and creating new markets for their innovations through alliances and collaborative strategies, as a mode of reducing or eliminating uncertainty environments or entry barriers. Consequently, an efficient and well-structured interfirm network is essential to create network capabilities, to ensure tacit knowledge sharing, to enhance organizational learning and to foster open innovation success within digital platforms.

Keywords: interfirm networks, digital platform, virtual teams, open innovation, knowledge sharing

Procedia PDF Downloads 110
898 The Search for an Alternative to Tabarru` in Takaful Models

Authors: Abu Umar Faruq Ahmad, Muhammad Ayub

Abstract:

Tabarru` (unilateral gratuitous contribution) is thought to be the basic concept that distinguishes Takaful from conventional non-Sharīʿah compliant insurance. The Sharīʿah compliance of its current practice has been questioned in the premise that, a) it is a form of commutative contract; b) it is akin to the commercial corporate structure of insurance companies due to following the same marketing strategies, allocation to reserves, sharing of underwriting surplus by the companies one way or the other, providing loans to the Takaful funds, and resultantly absorbing the underwriting losses. The Sharīʿah scholars are of the view that the relationship between participants in Takaful should be in the form of commitment to donate, under which a contributor makes commitments himself to donate a sum of money for mutual help and cooperation on the condition that the balance, if any, should be returned to him. With the aim of finding solutions to the above mentioned concerns and other Sharīʿah related issues the study seeks to investigate whether the Takaful companies are functioning in accordance with the Islamic principles of brotherhood, solidarity, and cooperative risk sharing. Given that it discusses the cooperative model of Takaful to address the current and future Sharīʿah related and legal concerns. The study proposed an alternative model and considers it to best serve the objectives of Takaful which operates on the basis of ta`awun or mutual co-operation.

Keywords: hibah, musharakah ta`awuniyyah, Tabarru`, Takaful

Procedia PDF Downloads 425
897 Smartphone Photography in Urban China

Authors: Wen Zhang

Abstract:

The smartphone plays a significant role in media convergence, and smartphone photography is reconstructing the way we communicate and think. This article aims to explore the smartphone photography practices of urban Chinese smartphone users and images produced by smartphones from a techno-cultural perspective. The analysis consists of two types of data: One is a semi-structured interview of 21 participants, and the other consists of the images created by the participants. The findings are organised in two parts. The first part summarises the current tendencies of capturing, editing, sharing and archiving digital images via smartphones. The second part shows that food and selfie/anti-selfie are the preferred subjects of smartphone photographic images from a technical and multi-purpose perspective and demonstrates that screenshots and image texts are new genres of non-photographic images that are frequently made by smartphones, which contributes to improving operational efficiency, disseminating information and sharing knowledge. The analyses illustrate the positive impacts between smartphones and photography enthusiasm and practices based on the diffusion of innovation theory, which also makes us rethink the value of photographs and the practice of ‘photographic seeing’ from the screen itself.

Keywords: digital photography, image-text, media convergence, photographic- seeing, selfie/anti-selfie, smartphone, technological innovation

Procedia PDF Downloads 337
896 The Effects of Relationship Banking on the Financial Performance of SMEs in Kenya

Authors: Abraham Rotich

Abstract:

The purpose of this study was to determine the effects of relationship banking on the financial performance of SMEs. The paper attempted to establish the link between the constructs of relationship banking and SME performance. The study was guided by relationship lending, relationship monitoring, relationship risk sharing and bundle of products as independent variables while financial performance will be the dependent variable. The study used a quasi experimental design with population being the 620 SMEs who have a relationship banking arrangement with banks in Nairobi. The study used stratified sampling to pick a sample of 235. The population of interest will be the CEOs of the respective companies. The basis of stratification is the sectors in which the SMEs operate in. The study will use a questionnaire to collect data. The questionnaire will have both open and close ended questions. A pilot study will be conducted to test reliability and validity of questionnaire. The data was analyzed using descriptive statistics. Regression analysis was employed to test if there is a relationship between the dependent and the independent variable. The study found evidence that relationship banking positively impacts on financial performance of SMEs. Specifically, the study established that each component of relationship banking in this study i.e relationship lending, monitoring, bundle of products and risk sharing positively affects financial performance.

Keywords: relationship banking, SMEs, financial performance, entrepreneurial orientation

Procedia PDF Downloads 294
895 The Influence of Language on Music Consumption in Japan: An Experimental Study

Authors: Timur Zhukov, Yuko Yamashita

Abstract:

Music as a product of hedonic consumption has been researched at least since the early 20th century, but little light has been shed on how language affects its consumption process. At the intersection of music consumption, language impact, and consumer behavior, this research explores the influence of language on music consumption in Japan. Its aim is to clarify how listening to music in different languages affects the listener’s purchase intention and sharing intention by conducting a survey where respondents listen to three versions of the same song in different languages in random order. It uses an existing framework that views the flow of music consumption as a combination of responses (emotional response, sensory response, imaginal response, analytical responses) affecting the experiential response, which then affects the overall affective response, followed by the need to reexperience and lastly the purchase intention. In this research, the sharing intention has been added to the model to better fit the modern consumption model (e.g., AISAS). This research shows how positive and negative emotions and imaginal and analytical responses change depending on the language and what impact it has on consumer behavior. It concludes by proposing how modern music businesses can learn from the language differences and cater to the needs of the audiences who speak different languages.

Keywords: AISAS, consumer behavior, first language, music consumption, second language

Procedia PDF Downloads 119
894 Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility

Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad

Abstract:

File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.

Keywords: wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD Protocol, DHT

Procedia PDF Downloads 459
893 Factors Influencing an Implementation of Financial Participation Programmes in Polish Companies - Some Relationships

Authors: Maciej Kozlowski, Agnieszka Piotrowska-Piatek

Abstract:

Purpose: This article analyses the most important financial participation programmes (FPP) in Poland to show the relationship between the programmes applied and the socio-economic results of enterprises and assesses the impact of participation on these results and the impact of selected factors on the introduction of FPP. Methodology: The research has been based on a questionnaire answered by senior management of listed Polish companies that had at least one out of three major FPPs in operation, namely share ownership, profit-sharing, or a stock option scheme. Findings: The results of the empirical study conducted indicate the existence of some peculiar relationships. The vast majority of schemes in Polish public companies are aimed at the participation of the management personnel; these programmes are narrow-based (only for management) and rather hermetic, with a high concentration of stocks or shares in the hands of the management. Conclusion: FPPs generally have a positive influence on enterprise functioning. However, the effects are more social than economic (no significant economic improvement after programme implementation). The paper contributes to the debate about financial participation and suggests actions to popularize these programmes on a wider scale.

Keywords: financial participation, profit sharing, stock options, worker attitude, worker ownership

Procedia PDF Downloads 119
892 Clique and Clan Analysis of Patient-Sharing Physician Collaborations

Authors: Shahadat Uddin, Md Ekramul Hossain, Arif Khan

Abstract:

The collaboration among physicians during episodes of care for a hospitalised patient has a significant contribution towards effective health outcome. This research aims at improving this health outcome by analysing the attributes of patient-sharing physician collaboration network (PCN) on hospital data. To accomplish this goal, we present a research framework that explores the impact of several types of attributes (such as clique and clan) of PCN on hospitalisation cost and hospital length of stay. We use electronic health insurance claim dataset to construct and explore PCNs. Each PCN is categorised as ‘low’ and ‘high’ in terms of hospitalisation cost and length of stay. The results from the proposed model show that the clique and clan of PCNs affect the hospitalisation cost and length of stay. The clique and clan of PCNs show the difference between ‘low’ and ‘high’ PCNs in terms of hospitalisation cost and length of stay. The findings and insights from this research can potentially help the healthcare stakeholders to better formulate the policy in order to improve quality of care while reducing cost.

Keywords: clique, clan, electronic health records, physician collaboration

Procedia PDF Downloads 127
891 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 146
890 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy

Authors: Ilhan Keskin, Hasan Bulent Kantarci

Abstract:

In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.

Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates

Procedia PDF Downloads 504
889 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 8
888 Impacts of Community Forest on Forest Resources Management and Livelihood Improvement of Local People in Nepal

Authors: Samipraj Mishra

Abstract:

Despite the successful implementation of community forestry program, a number of pros and cons have been raised on Terai community forestry in the case of lowland locally called Terai region of Nepal, which is climatically belongs to tropical humid and possessed high quality forests in terms of ecology and economy. The study aims to investigate the local pricing strategy of forest products and its impacts on equitable forest benefit sharing, collection of community fund and carrying out livelihood improvement activities. The study was carried out on six community forests revealed that local people have substantially benefited from the community forests. However, being the region is heterogeneous by socio-economic conditions and forest resources have higher economical potential, the decision of low pricing strategy made by the local people have created inequality problems while sharing the forest benefits, and poorly contributed to community fund collection and consequently carrying out limited activities of livelihood improvement. The paper argued that the decision of low pricing strategy of forest products is counter-productive to promote the equitable benefit sharing in the areas of heterogeneous socio-economic conditions with high value forests. The low pricing strategy has been increasing accessibility of better off households at higher rate than poor; as such households always have higher affording capacity. It is also defective to increase the community fund and carry out activities of livelihood improvement effectively. The study concluded that unilateral decentralized forest policy and decision-making autonomy to the local people seems questionable unless their decision-making capacities are enriched sufficiently. Therefore, it is recommended that empowerment of decision-making capacity of local people and their respective institutions together with policy and program formulation are prerequisite for efficient and equitable community forest management and its long-term sustainability.

Keywords: community forest, livelihood, socio-economy, pricing system, Nepal

Procedia PDF Downloads 256
887 The Impact of Artificial Intelligence on Legislations and Laws

Authors: Keroles Akram Saed Ghatas

Abstract:

The near future will bring significant changes in modern organizations and management due to the growing role of intangible assets and knowledge workers. The area of copyright, intellectual property, digital (intangible) assets and media redistribution appears to be one of the greatest challenges facing business and society in general and management sciences and organizations in particular. The proposed article examines the views and perceptions of fairness in digital media sharing among Harvard Law School's LL.M.s. Students, based on 50 qualitative interviews and 100 surveys. The researcher took an ethnographic approach to her research and entered the Harvard LL.M. in 2016. at, a Face book group that allows people to connect naturally and attend in-person and private events more easily. After listening to numerous students, the researcher conducted a quantitative survey among 100 respondents to assess respondents' perceptions of fairness in digital file sharing in various contexts (based on media price, its availability, regional licenses, copyright holder status, etc.). to understand better . .). Based on the survey results, the researcher conducted long-term, open-ended and loosely structured ethnographic interviews (50 interviews) to further deepen the understanding of the results. The most important finding of the study is that Harvard lawyers generally support digital piracy in certain contexts, despite having the best possible legal and professional knowledge. Interestingly, they are also more accepting of working for the government than the private sector. The results of this study provide a better understanding of how “fairness” is perceived by the younger generation of lawyers and pave the way for a more rational application of licensing laws.

Keywords: cognitive impairments, communication disorders, death penalty, executive function communication disorders, cognitive disorders, capital murder, executive function death penalty, egyptian law absence, justice, political cases piracy, digital sharing, perception of fairness, legal profession

Procedia PDF Downloads 40
886 Studying the Load Sharing and Failure Mechanism of Hybrid Composite Joints Using Experiment and Finite Element Modeling

Authors: Seyyed Mohammad Hasheminia, Heoung Jae Chun, Jong Chan Park, Hong Suk Chang

Abstract:

Composite joints have been getting attention recently due to their high specific mechanical strength to weight ratio that is crucial for structures such as aircrafts and automobiles. In this study on hybrid joints, quasi-static experiments and finite element analysis were performed to investigate the failure mechanism of hybrid composite joint with respect to the joint properties such as the adhesive material, clamping force, and joint geometry. The outcomes demonstrated that the stiffness of the adhesive is the most imperative design parameter. In this investigation, two adhesives with various stiffness values were utilized. Regarding the joints utilizing the adhesive with the lower stiffness modulus, it was observed that the load was exchanged promptly through the adhesive since it was shared more proficiently between the bolt and adhesive. This phenomenon permitted the hybrid joints with low-modulus adhesive to support more prominent loads before failure when contrasted with the joints that utilize the stiffer adhesive. In the next step, the stress share between the bond and bolt as a function of various design parameters was studied using a finite element model in which it was understood that the geometrical parameters such as joint overlap and width have a significant influence on the load sharing between the bolt and the adhesive.

Keywords: composite joints, composite materials, hybrid joints, single-lap joint

Procedia PDF Downloads 388
885 How Does Paradoxical Leadership Enhance Organizational Success?

Authors: Wageeh A. Nafei

Abstract:

This paper explores the role of Paradoxical Leadership (PL) in enhancing Organizational Success (OS) at private hospitals in Egypt. Based on the collected data from employees in private hospitals (doctors, nursing staff, and administrative staff). The researcher has adopted a sampling method to collect data for the study. The appropriate statistical methods, such as Alpha Correlation Coefficient (ACC), Confirmatory Factor Analysis (CFA), and Multiple Regression Analysis (MRA), are used to analyze the data and test the hypotheses. The research has reached a number of results, the most important of which are (1) there is a statistical relationship between the independent variable represented by PL and the dependent variable represented by Organizational Success (OS). The paradoxical leader encourages employees to express their opinions and builds a work environment characterized by flexibility and independence. Also, the paradoxical leader works to support specialized work teams, which leads to the creation of new ideas, on the one hand, and contributes to the achievement of outstanding performance on the other hand. (2) the mentality of the paradoxical leader is flexible and capable of absorbing all suggestions from all employees. Also, the paradoxical leader is interested in enhancing cooperation among them and provides an opportunity to transfer experience and increase knowledge-sharing. Also, the sharing of knowledge creates the necessary diversity that helps the organization to obtain rich external information and enables the organization to deal with a rapidly changing environment. (3) The PL approach helps in facing the paradoxical demands of employees. A paradoxical leader plays an important role in reducing the feeling of instability in the work environment and lack of job security, reducing negative feelings for employees, restoring balance in the work environment, improving the well-being of employees, and increasing the degree of job satisfaction of employees in the organization. The study referred to a number of recommendations, the most important of which are (1) the leaders of the organizations must listen to the views of employees and their needs and move away from the official method of control. The leader should give sufficient freedom to employees to participate in decision-making and maintain enough space among them. The treatment between the leaders and employees must be based on friendliness, (2) the need for organizational leaders to pay attention to sharing knowledge among employees through training courses. The leader should make sure that every information provided by the employee is valuable and useful, which can be used to solve a problem that may face his/her colleagues at work, (3) the need for organizational leaders to pay attention to sharing knowledge among employees through brainstorming sessions. The leader should ensure that employees obtain knowledge from their colleagues and share ideas and information among them. This is in addition to motivating employees to complete their work in a new creative way, which leads to employees’ not feeling bored of repeating the same routine procedures in the organization.

Keywords: paradoxical leadership, organizational success, human resourece, management

Procedia PDF Downloads 44
884 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 457
883 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 49
882 E–Learning System in Virtual Learning Environment to Develop Problem Solving Ability and Team Learning for Learners in Higher Education

Authors: Noawanit Songkram

Abstract:

This paper is a report on the findings of a study conducted on e–learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education. The methodology of this study was R&D research. The subjects were 18 undergraduate students in Faculty of Education, Chulalongkorn University in the academic year of 2013. The research instruments were a problem solving ability assessment, a team learning evaluation form, and an attitude questionnaire. The data was statistically analyzed using mean, standard deviation, one way repeated measure ANOVA and t–test. The research findings discovered the e –learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education consisted of five components:(1) online collaborative tools, (2) active learning activities, (3) creative thinking, (4) knowledge sharing process, (5) evaluation and nine processes which were (1) preparing in group working, (2) identifying interested topic, (3) analysing interested topic, (4) collecting data, (5) concluding idea (6) proposing idea, (7) creating workings, (8) workings evaluation, (9) sharing knowledge from empirical experience.

Keywords: e-learning system, problem solving ability, team leaning, virtual learning environment

Procedia PDF Downloads 424
881 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 69
880 Thailand’s Education Cooperation with Neighboring Countries: The Key Factors to Strengthen the “Soft Power” Relationship

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the model of education cooperation during Thailand and neighbor countries, especially the countries which the territory-cohesion border with Thailand used “Soft Power” to enhance the good relationship. This research employed qualitative method, analyzed and synthesized the content of cooperation projects, policies, laws, relevant theories, relevant research papers and documents and used SWOT analysis. The research findings revealed that Thailand’s education cooperation projects with neighbor countries had two characteristics: 1) education cooperation projects/programs were a part in economic cooperation projects, and 2) there were directly education cooperation projects. The suggested education cooperation model was based on the concept of “Soft Power”, thus the determination of action plans or projects as key factors of public and private organizations should be based on sincere participation among people, communities and relevant organizations of the neighbor countries. Adoption of education-cultural exchange, learning and sharing process is a key to strengthen good relationship of the countries’ cooperation. The roles of education in this included sharing and acceptance of culture and local wisdom, human resource development, knowledge management, integration and networking building could enhance relationship between agents of related organizations of Thailand and neighbors countries.

Keywords: education, soft-power, relationship, cooperation, Thailand neighboring countries

Procedia PDF Downloads 342
879 Turbulent Channel Flow Synthesis using Generative Adversarial Networks

Authors: John M. Lyne, K. Andrea Scott

Abstract:

In fluid dynamics, direct numerical simulations (DNS) of turbulent flows require large amounts of nodes to appropriately resolve all scales of energy transfer. Due to the size of these databases, sharing these datasets amongst the academic community is a challenge. Recent work has been done to investigate the use of super-resolution to enable database sharing, where a low-resolution flow field is super-resolved to high resolutions using a neural network. Recently, Generative Adversarial Networks (GAN) have grown in popularity with impressive results in the generation of faces, landscapes, and more. This work investigates the generation of unique high-resolution channel flow velocity fields from a low-dimensional latent space using a GAN. The training objective of the GAN is to generate samples in which the distribution of the generated samplesis ideally indistinguishable from the distribution of the training data. In this study, the network is trained using samples drawn from a statistically stationary channel flow at a Reynolds number of 560. Results show that the turbulent statistics and energy spectra of the generated flow fields are within reasonable agreement with those of the DNS data, demonstrating that GANscan produce the intricate multi-scale phenomena of turbulence.

Keywords: computational fluid dynamics, channel flow, turbulence, generative adversarial network

Procedia PDF Downloads 186
878 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 418
877 Effect of Combining Return Policy and Early Order Commitment on Supply Chain Performance

Authors: Hamed Homaei, Seyed Reza Hejazi, Iraj Mahdavi

Abstract:

Return policy (RP) is a strategy for supply chain coordination, whereby the retailer returns the unsold products to the manufacturer or the manufacturer offers a credit on unsold products to the retailer at the end of selling season. Early order commitment (EOC) is another efficient mechanism for channel coordination wherein the retailer commits to purchasing from the manufacturer a fixed order quantity a few periods in advance of the regular delivery lead time. This paper studies the coordination issue of a two-level supply chain with one retailer and one manufacturer through combining two mentioned contracts. The main purpose of this paper is to present an analytical model to show that how the contract which is created by combining RP and EOC can improve supply chain performance. Numerical analyses show that the supply chain coordination through mentioned contract in compare with EOC mechanism, can improve supply chain performance under certain ranges of model parameters. Furthermore, some numerical analyses are done to determine the best buyback price in order to achieve maximum cost saving in the supply chain. Finally, a revenue sharing scheme is presented in order to achieve a win-win condition in the supply chain.

Keywords: supply chain coordination, early order commitment, return policy, revenue sharing

Procedia PDF Downloads 269
876 Local Pricing Strategy Should Be the Entry Point of Equitable Benefit Sharing and Poverty Reduction in Community Based Forest Management: Some Evidences from Lowland Community Forestry in Nepal

Authors: Dhruba Khatri

Abstract:

Despite the short history of community based forest management, the community forestry program of Nepal has produced substantial positive effects to organize the local people at a local level institution called Community Forest User Group and manage the local forest resources in the line of poverty reduction since its inception in 1970s. Moreover, each CFUG has collected a community fund from the sale of forest products and non-forestry sources as well and the fund has played a vital role to improve the livelihood of user households living in and around the forests. The specific study sites were selected based on the criteria of i) community forests having dominancy of Sal forests, and ii) forests having 3-5 years experience of community forest management. The price rates of forest products fixed by the CFUGs and the distribution records were collected from the respective community forests. Nonetheless, the relation between pricing strategy and community fund collection revealed that the small change in price of forest products could greatly affect in community fund collection and carry out of forest management, community development, and income generation activities in the line of poverty reduction at local level.

Keywords: benefit sharing, community forest, equitable, Nepal

Procedia PDF Downloads 366