Search results for: cloud compliance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1407

Search results for: cloud compliance

1167 The Effect of Taxpayer Political Beliefs on Tax Evasion Behavior: An Empirical Study Applied to Tunisian Case

Authors: Nadia Elouaer

Abstract:

Tax revenue is the main state resource and one of the important variables in tax policy. Nevertheless, this resource is continually decreasing, so it is important to focus on the reasons for this decline. Several studies show that the taxpayer is reluctant to pay taxes, especially in countries at risk or in countries in transition, including Tunisia. This study focuses on the tax evasion behavior of a Tunisian taxpayer under the influence of his political beliefs, as well as the influence of different tax compliance variables. Using a questionnaire, a sample of 500 Tunisian taxpayers is used to examine the relationship between political beliefs and taxpayer affiliations and tax compliance variables, as well as the study of the causal link between political beliefs and fraudulent behavior. The data were examined using correlation, factor, and regression analysis and found a positive and statistically significant relationship between the different tax compliance variables and the tax evasion behavior. There is also a positive and statistically significant relationship between tax evasion and political beliefs and affiliations. The study of the relationship between political beliefs and compliance variables shows that they are closely related. The conclusion is to admit that tax evasion and political beliefs are closely linked, and the government should update its tax policy and modernize its administration in order to strengthen the credibility and disclosure of information in order to restore a relationship of trust between public authorities and the taxpayer.

Keywords: fiscal policy, political beliefs, tax evasion, taxpayer behavior

Procedia PDF Downloads 136
1166 Genuine Domestic Change or Fake Compliance: Political Pervasiveness in the Serbian Media

Authors: Aleksandra Dragojlov

Abstract:

Since the election of Aleksandar Vučić and the Progressives, Serbia has witnessed a slow decline in media freedom, which has been worse than in the 1990s. Although the government adopted a package of three laws in August 2014 to bring the media landscape up to European standards, the implementation of the laws has been limited and marginal, with the progressives engaging in fake compliance. The adoption of the new media strategy for 2020-2025 in 2020 has not led to genuine domestic reform and compliance with EU conditionality. In fact, the EU Commission and journalists’ associations in Serbia have criticised the decline in Serbia’s media freedom citing continued attacks on journalists and indirect political and economic control through advertising and project co-financing, which continue to be features of the Serbian media landscape. In the absence of clear and credible EU conditionality, the decline of media freedom is in the eye of the beholder, where the gap between public engagements with Serbian politicians and the critical stance of progress reports regarding the degradation of the media have enabled Serbian elites to exploit this ambiguity to continue their strategy of fake compliance vis-a-vis rule of law. This study used a mixed methods approach combining both primary and secondary sources with those semi-structured interviews via Zoom, email, and in person with EU and Serbian officials and journalists. Our findings add to the studies where the lack of clear and credible conditionality has allowed Serbia politicians to exploit them in a manner that would suit their own interests, finding new means to retain their control over the media. We argued and concluded that it is this discrepancy between public engagements with Serbia and the progress reports in the area of freedom of expression that has not led to genuine domestic media reforms in Serbia and instead allowed Serbian elites to engage in a strategy of fake and even non-compliance towards media freedom conditionality.

Keywords: media freedom, EU conditionality, Serbia, fake compliance, EU integration, Chapter 23, justice and fundamental rights

Procedia PDF Downloads 80
1165 Prediction of Positive Cloud-to-Ground Lightning Striking Zones for Charged Thundercloud Based on Line Charge Model

Authors: Surajit Das Barman, Rakibuzzaman Shah, Apurv Kumar

Abstract:

Bushfire is known as one of the ascendant factors to create pyrocumulus thundercloud that causes the ignition of new fires by pyrocumulonimbus (pyroCb) lightning strikes and creates major losses of lives and property worldwide. A conceptual model-based risk planning would be beneficial to predict the lightning striking zones on the surface of the earth underneath the pyroCb thundercloud. PyroCb thundercloud can generate both positive cloud-to-ground (+CG) and negative cloud-to-ground (-CG) lightning in which +CG tends to ignite more bushfires and cause massive damage to nature and infrastructure. In this paper, a simple line charge structured thundercloud model is constructed in 2-D coordinates using the method of image charge to predict the probable +CG lightning striking zones on the earth’s surface for two conceptual thundercloud charge configurations: titled dipole and conventional tripole structure with excessive lower positive charge regions that lead to producing +CG lightning. The electric potential and surface charge density along the earth’s surface for both structures via continuously adjusting the position and the charge density of their charge regions is investigated. Simulation results for tilted dipole structure confirm the down-shear extension of the upper positive charge region in the direction of the cloud’s forward flank by 4 to 8 km, resulting in negative surface density, and would expect +CG lightning to strike within 7.8 km to 20 km around the earth periphery in the direction of the cloud’s forward flank. On the other hand, the conceptual tripole charge structure with enhanced lower positive charge region develops negative surface charge density on the earth’s surface in the range |x| < 6.5 km beneath the thundercloud and highly favors producing +CG lightning strikes.

Keywords: pyrocumulonimbus, cloud-to-ground lightning, charge structure, surface charge density, forward flank

Procedia PDF Downloads 100
1164 Fire Safety Engineering of Wood Dust Layer or Cloud

Authors: Marzena Półka, Bożena Kukfisz

Abstract:

This paper presents an analysis of dust explosion hazards in the process industries. It includes selected testing method of dust explosibility and presentation two of them according to experimental standards used by Department of Combustion and Fire Theory in The Main School of Fire Service in Warsaw. In the article are presented values of maximum acceptable surface temperature (MAST) of machines operating in the presence of dust cloud and chosen dust layer with thickness of 5 and 12,5mm. The comparative analysis, points to the conclusion that the value of the minimum ignition temperature of the layer (MITL) and the minimum ignition temperature of dust cloud (MTCD) depends on the granularity of the substance. Increasing the thickness of the dust layer reduces minimum ignition temperature of dust layer. Increasing the thickness of dust at the same time extends the flameless combustion and delays the ignition.

Keywords: fire safety engineering, industrial hazards, minimum ignition temperature, wood dust

Procedia PDF Downloads 306
1163 Prevalence of Anxiety among End Stage Renal Disease Patients and Its Association with Patient Compliance to Hemodialysis and Physician Instructions

Authors: Mohammed Asiri, Saleh Alsuwayt, Mohammed Bin Mugren, Abdulmalik Almufarrih, Tariq Alotaibi, Saad Almodameg

Abstract:

Background: End-stage renal disease is a major public health concern with high incidence and mortality rate. Most of ESRD patients are on hemodialysis therapy which is a long-term treatment that disturbs patients’ lifestyle. As a result, he will be susceptible to develop psychiatric disorders like anxiety that may direct him to non-compliance on physician instructions and hemodialysis therapy. Although there are studies conducted on psychiatric issues in hemodialysis patients, but few studies focused on the effect of anxiety disorder and the patient’s compliance. Hence, we are interested in determining the prevalence of anxiety disorder among hemodialysis patients in Saudi Arabia, as well as in defining the correlation between anxiety disorder and compliance on physician instructions and hemodialysis therapy. We hypothesize that our study will show a higher prevalence of anxiety in hemodialysis patients than in general population. Also, we expect the anxiety to have a negative impact on their compliance. Methodology: We used a cross-sectional study design carried out at dialysis unit of four major hospitals in Riyadh, KSA. We interviewed 235 End Stage Renal Disease male and female patients who are on hemodialysis. We divided the patients into two categories according to their compliance. we used modified general questionnaire to get their demographic data, then we used a psychometric response scale called visual analog scale (VAS) to assess patient’s compliance to hemodialysis and physician’s instructions. Also, we used the Arabic validated version of the hospital anxiety and depression scale (HAD scale) used mainly for anxiety assessment. Results: The overall response rate was 54%. Respondents included 147 (62.6%) males and 88 (37.4%) females. The prevalence of anxiety among hemodialysis patients is 13.3%. According to visual analog scale, we found that 189 compliant patients and 45 non-compliant patients. For HAD scale, the mean ± standard deviation of the total score for females was (4.44 ± 4.7) and it’s higher than males which was 2.65 ± 3.08 (P-value= 0.002). The mean ± standard deviation of HAD score in the non-compliant group was (5.88  4.88) and it was higher than the compliant group (2.7  3.32) (P-value= 0.004). Among non-complaint group, 33.3% of anxious patients were males and 66.6% were females. There was a negative correlation between HAD score of anxiety and visual analog scale (R= - 0.285). Conclusion: We conclude that there is a high prevalence of anxiety among patients with End Stage Renal Disease that was higher in females with association of non-compliance to physician’s instructions and hemodialysis therapy.

Keywords: anxiety, end-stage renal disease, renal failure, anxiety disorder

Procedia PDF Downloads 257
1162 Arterial Compliance Measurement Using Split Cylinder Sensor/Actuator

Authors: Swati Swati, Yuhang Chen, Robert Reuben

Abstract:

Coronary stents are devices resembling the shape of a tube which are placed in coronary arteries, to keep the arteries open in the treatment of coronary arterial diseases. Coronary stents are routinely deployed to clear atheromatous plaque. The stent essentially applies an internal pressure to the artery because its structure is cylindrically symmetrical and this may introduce some abnormalities in final arterial shape. The goal of the project is to develop segmented circumferential arterial compliance measuring devices which can be deployed (eventually) in vivo. The segmentation of the device will allow the mechanical asymmetry of any stenosis to be assessed. The purpose will be to assess the quality of arterial tissue for applications in tailored stents and in the assessment of aortic aneurism. Arterial distensibility measurement is of utmost importance to diagnose cardiovascular diseases and for prediction of future cardiac events or coronary artery diseases. In order to arrive at some generic outcomes, a preliminary experimental set-up has been devised to establish the measurement principles for the device at macro-scale. The measurement methodology consists of a strain gauge system monitored by LABVIEW software in a real-time fashion. This virtual instrument employs a balloon within a gelatine model contained in a split cylinder with strain gauges fixed on it. The instrument allows automated measurement of the effect of air-pressure on gelatine and measurement of strain with respect to time and pressure during inflation. Compliance simple creep model has been applied to the results for the purpose of extracting some measures of arterial compliance. The results obtained from the experiments have been used to study the effect of air pressure on strain at varying time intervals. The results clearly demonstrate that with decrease in arterial volume and increase in arterial pressure, arterial strain increases thereby decreasing the arterial compliance. The measurement system could lead to development of portable, inexpensive and small equipment and could prove to be an efficient automated compliance measurement device.

Keywords: arterial compliance, atheromatous plaque, mechanical symmetry, strain measurement

Procedia PDF Downloads 265
1161 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 367
1160 Cloud Support for Scientific Workflow Execution: Prototyping Solutions for Remote Sensing Applications

Authors: Sofiane Bendoukha, Daniel Moldt, Hayat Bendoukha

Abstract:

Workflow concepts are essential for the development of remote sensing applications. They can help users to manage and process satellite data and execute scientific experiments on distributed resources. The objective of this paper is to introduce an approach for the specification and the execution of complex scientific workflows in Cloud-like environments. The approach strives to support scientists during the modeling, the deployment and the monitoring of their workflows. This work takes advantage from Petri nets and more pointedly the so-called reference nets formalism, which provides a robust modeling/implementation technique. RENEWGRASS is a tool that we implemented and integrated into the Petri nets editor and simulator RENEW. It provides an easy way to support not experienced scientists during the specification of their workflows. It allows both modeling and enactment of image processing workflows from the remote sensing domain. Our case study is related to the implementation of vegetation indecies. We have implemented the Normalized Differences Vegetation Index (NDVI) workflow. Additionally, we explore the integration possibilities of the Cloud technology as a supplementary layer for the deployment of the current implementation. For this purpose, we discuss migration patterns of data and applications and propose an architecture.

Keywords: cloud computing, scientific workflows, petri nets, RENEWGRASS

Procedia PDF Downloads 436
1159 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 125
1158 Assessing Knowledge and Compliance of Motor Riders on Road Safety Regulations in Hohoe Municipality of Ghana: A Cross-Sectional Quantitative Study

Authors: Matthew Venunye Fianu, Jerry Fiave, Ebenezer Kye-Mensah, Dacosta Aboagye, Felix Osei-Sarpong

Abstract:

Introduction: Road traffic accidents involving motorbikes are a priority public health concern in Ghana. While there are local initiatives to address this public health challenge, little is known about motor riders’ knowledge and compliance with road safety regulations (RSR) and their association with RTAs. The aim of this study was, therefore, to assess motorbike riders’ knowledge and compliance with RSRs. Methodology: Motorbike riders in Hohoe Municipality were randomly sampled in a cross-sectional study in June 2022. Data were collected from 237 riders using a questionnaire designed in Kobocollect and administered by ten research assistants. A score of 70% or less is considered low for knowledge and compliance. The data were exported into Excel and imported into STATA 17 for analysis. A chi-square test was performed to generate descriptive and inferential statistics to establish the association between independent and dependent variables. Results: All 237 respondents were male, and each of them completed the questionnaire representing a 100% response rate. Participants who had knowledge about speed limit at different segments of the road were 59(24.9%), the use of helmet were 124 (52.3%), and alcohol use were 152 (64.1%). Participants who complied with regulations on speed limits, helmet use, and alcohol use were 108 (45.6%), 179(75.5%), and 168(70.8%), respectively. Riders who had at least junior high school education were 2.43 times more likely to adhere to RSR [cOR =2.43(95%CI= 1.15-6.33) p= 0.023] than those who had less education. Similarly, riders who had high knowledge about RSR were 2.07 times more likely to comply with RSR than those who had less knowledge [AOR= -2.07 (95% CI= 0.34-0.97), p=0.038]. Conclusion: Motor riders in the Hohoe Municipality had low knowledge as well as low compliance with road safety regulations. This could be a contributor to road traffic accidents. It is therefore recommended that road safety regulatory authorities and relevant stakeholders enhance the enforcement of RSR. There should also be country-specific efforts to increase awareness among all motor riders, especially those with less than junior high school education.

Keywords: compliance, motor riders, road safety regulations, road traffic accident

Procedia PDF Downloads 73
1157 Improving Compliance in Prescribing Regular Medications for Surgical Patients: A Quality Improvement Project in the Surgical Assessment Unit

Authors: Abdullah Tahir

Abstract:

The omission of regular medications in surgical patients poses a significant challenge in healthcare settings and is associated with increased morbidity during hospital stays. Human factors such as high workload, poor communication, and emotional stress are known to contribute to these omissions, particularly evident in the surgical assessment unit (SAU) due to its high patient burden and long wait times. This study aimed to quantify and address the issue by implementing targeted interventions to enhance compliance in prescribing regular medications for surgical patients at Stoke Mandeville Hospital, United Kingdom. Data were collected on 14 spontaneous days between April and May 2023, and the frequency of prescription omissions was recorded using a tally chart. Subsequently, informative posters were introduced in the SAU, and presentations were given to the surgical team to emphasize the importance of compliance in this area. The interventions were assessed using a second data collection cycle, again over 14 spontaneous days in May 2023. Results demonstrated an improvement from 40% (60 out of 150) to 74% (93 out of 126) of patients having regular medications prescribed at the point of clerking. These findings highlight the efficacy of frequent prompts and awareness-raising interventions in increasing workforce compliance and addressing the issue of prescription omissions in the SAU.

Keywords: prescription omissions, quality improvement, regular medication, surgical assessment unit

Procedia PDF Downloads 63
1156 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 142
1155 Use of Cloud-Based Virtual Classroom in Connectivism Learning Process to Enhance Information Literacy and Self-Efficacy for Undergraduate Students

Authors: Kulachai Kultawanich, Prakob Koraneekij, Jaitip Na-Songkhla

Abstract:

The way of learning has been changed into a new paradigm since the improvement of network and communication technology, so learners have to interact with massive amount of the information. Thus, information literacy has become a critical set of abilities required by every college and university in the world. Connectivism is considered to be an alternative way to design information literacy course in online learning environment, such as Virtual Classroom (VC). With the change of learning pedagogy, VC is employed to improve the social capability by integrating cloud-based technology. This paper aims to study the use of Cloud-based Virtual Classroom (CBVC) in Connectivism learning process to enhance information literacy and self-efficacy of twenty-one undergraduate students who registered in an e-publishing course at Chulalongkorn University. The data were gathered during 6 weeks of the study by using the following instruments: (1) Information literacy test (2) Information literacy rubrics (3) Information Literacy Self-Efficacy (ILSE) Scales and (4) Questionnaire. The result indicated that students have information literacy and self-efficacy posttest mean scores higher than pretest mean scores at .05 level of significant after using CBVC in Connectivism learning process. Additionally, the study identified that the Connectivism learning process proved useful for developing information rich environment and a sense of community, and the CBVC proved useful for developing social connection.

Keywords: cloud-based, virtual classroom, connectivism, information literacy

Procedia PDF Downloads 444
1154 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 422
1153 A Study on the HTML5 Based Multi Media Contents Authority Tool

Authors: Heesuk Seo, Yongtae Kim

Abstract:

Online learning started in the 1990s, the spread of the Internet has been through the era of e-learning paradigm of online education in the era of smart learning change. Reflecting the different nature of the mobile to anywhere anytime, anywhere was also allows the form of learning, it was also available through the learning content and interaction. We are developing a cloud system, 'TLINKS CLOUD' that allows you to configure the environment of the smart learning without the need for additional infrastructure. Using the big-data analysis for e-learning contents, we provide an integrated solution for e-learning tailored to individual study.

Keywords: authority tool, big data analysis, e-learning, HTML5

Procedia PDF Downloads 396
1152 An Exploratory Study of Effects of Parenting Styles on Maternal Expectation and Perception of Compliance among Adolescents

Authors: Anton James

Abstract:

This study explored the contribution of parenting styles in the Maternal Perception of Compliance Model (MPCM). This model explores maternal expectations to illustrate the formation of maternal perception of severity of noncompliance in adolescent children. The methodology consisted of three stages: In the first stage, a focus group was held, and the data was analysed to fine-tune the interview schedule. In the second stage, a single interview was held, and the interview schedule was further modified. The third and the final stage consisted of interviewing six mothers who had adolescent children. They were chosen with ‘maximum variation’ approach to represent three tiered socioeconomic statuses, and Asian, white and black ethnicities. The data was thematically analysed in a hybrid fashion: inductive coding and deductive assignment of codes into discrete parenting styles. The study found: a) parenting styles are not always discrete and sometimes it can be mixed. b) The parenting styles are influenced by culture, socioeconomic status, transgenerational knowledge, academic knowledge, observational knowledge, self-reflective knowledge, and parental anxiety. c) The parenting style functioned a mediating mechanism where it attempted to converge discrepancies between parental expectations of compliance with maternal perception of severity of noncompliance. The findings of parenting styles were discussed in relation to MPCM.

Keywords: compliance, expectation, parenting styles, perception

Procedia PDF Downloads 770
1151 Flexible 3D Virtual Desktop Using Handles for Cloud Environments

Authors: J. K. Lee, S. L. Lee

Abstract:

Due to the improvement in performance of computer hardware and the development of operating systems, a multi-tasking for several programs has become one of the basic functions to computer users. It is natural for computer users to want more functional, convenient, and visual GUI functions (Graphic User Interface). In this paper, a 3D virtual desktop system was proposed to meet users’ requirements for cloud environments such as a virtual desktop function in the Windows environment. The proposed system uses the handles of the windows to hide or restore several windows. It connects the list of task spaces using the circular double linked list to manage the handles. Each handle list is registered in the corresponding task space being executed. The 3D virtual desktop is efficient and flexible in handling the numbers of task spaces and can help users to work under more comfortable environments. Acknowledgment: This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korea government (MSIP) (NRF-2015R1D1A1A01057680).

Keywords: virtual desktop, GUI, cloud, virtualization

Procedia PDF Downloads 197
1150 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 465
1149 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 97
1148 Assessment of the Impact of Social Compliance Certification on Abolition of Forced Labour and Discrimination in the Garment Manufacturing Units in Bengaluru: A Perspective of Women Sewing Operators

Authors: Jonalee Das Bajpai, Sandeep Shastri

Abstract:

The Indian Textile and Garment Industry is one of the major contributors to the country’s economy. This industry is also one of the largest labour intensive industries after agriculture and livestock. This Indian garment industry caters to both the domestic and international market. Although this industry comes under the purview of Indian Labour Laws and other voluntary work place standards yet, this industry is often criticized for the undue exploitation of the workers. This paper explored the status of forced labour and discrimination at work place in the garment manufacturing units in Bengaluru. This study is conducted from the perspective of women sewing operators as majority of operators in Bengaluru are women. The research also explored to study the impact of social compliance certification in abolishing forced labour and discrimination at work place. Objectives of the Research: 1. To study the impact of 'Social Compliance Certification' on abolition of forced labour among the women workforce. 2. To study the impact of 'Social Compliance Certification' on abolition of discrimination at workplace among the women workforce. Sample Size and Data Collection Techniques: The main backbone of the data which is the primary data was collected through a structured questionnaire. The questionnaire attempted to explore the extent of prevalence of forced labour and discrimination against women workers from the perspective of women workers themselves. The sample size for the same was 600 (n) women sewing operators from the garment industry with minimum one year of work experience. Three hundred samples were selected from units with Social Compliance Certification like SA8000, WRAP, BSCI, ETI and so on. Other three hundred samples were selected from units without Social Compliance Certification. Out of these three hundred samples, one hundred and fifty samples were selected from units with Buyer’s Code of Conduct and another one hundred and fifty were from domestic units that do not come under the purview of any such certification. The responses of the survey were further authenticated through on sight visit and personal interactions. Comparative analysis of the workplace environment between units with Social Compliance certification, units with Buyer’s Code of Conduct and domestic units that do not come under the purview of any such voluntary workplace environment enabled to analyze the impact of Social Compliance certification on abolition of workplace environment and discrimination at workplace. Correlation analysis has been conducted to measure the relationship between impact of forced labour and discrimination at workplace on the level of job satisfaction. The result displayed that abolition of forced labour and abolition of discrimination at workplace have a higher level of job satisfaction among the women workers.

Keywords: discrimination, garment industry, forced labour, social compliance certification

Procedia PDF Downloads 185
1147 Energy Efficiency in Hot Arid Climates Code Compliance and Enforcement for Residential Buildings

Authors: Mohamed Edesy, Carlo Cecere

Abstract:

This paper is a part of an ongoing research that proposes energy strategies for residential buildings in hot arid climates. In Egypt, the residential sector is dominated by increase in consumption rates annually. A building energy efficiency code was introduced by the government in 2005; it indicates minimum design and application requirements for residential buildings. Submission is mandatory and should lead to about 20% energy savings with an increase in comfort levels. However, compliance is almost nonexistent, electricity is subsidized and incentives to adopt energy efficient patterns are very low. This work presents an overview of the code and analyzes the impact of its introduction on different sectors. It analyses compliance barriers and indicates challenges that stand in the way of a realistic enforcement. It proposes an action plan for immediate code enforcement, updating current code to include retrofit, and development of rating systems for buildings. This work presents a broad national plan for energy efficiency empowerment in the residential sector.

Keywords: energy efficiency, housing, energy policies, code enforcement

Procedia PDF Downloads 330
1146 Dyadic Video Evidence on How Emotions in Parent Verbal Bids Affect Child Compliance in a British Sample

Authors: Iris Sirirada Pattara-Angkoon, Rory Devine, Anja Lindberg, Wendy Browne, Sarah Foley, Gabrielle McHarg, Claire Hughes

Abstract:

Introduction: The “Terrible Twos” is a phrase used to describe toddlers 18-30 months old. It characterizes a transition from high dependency to their caregivers in infancy to more autonomy and mastery of the body and environment. Toddlers at this age may also show more willfulness and stubbornness that could predict a future trajectory leading to conduct disorders. Thus, an important goal for this age group is to promote responsiveness to their caregivers (i.e., compliance). Existing literature tends to focus on praise to increase desirable child behavior. However, this relationship is not always straightforward as some studies have found no or negative association between praise and child compliance. Research suggests positive emotions and affection showed through body language (e.g., smiles) and actions (e.g., hugs, kisses) along with positive parent-child relationship can strengthen the praise and child compliance association. Nonetheless, few studies have examined the influences of positive emotionality within the speech. This is important as implementing verbal positive emotionality is easier than physical adjustments. The literature also tends not to include fathers in the study sample as mothers were traditionally the primary caregiver. However, as child-caring duties are increasing shared equally between mothers and fathers, it is important to include fathers within the study as studies have frequently found differences between female and male caregiver characteristics. Thus, the study will address the literary gap in two ways: 1. explore the influences of positive emotionality in parental speech and 2. include an equal sample of mothers and fathers. Positive emotionality is expected to positively correlate with and predict child compliance. Methodology: This study analyzed toddlers (18-24 months) in their dyadic interactions with mothers and fathers. A Duplo (block) task was used where parents had to work with their children to build the Duplo according to the given photo for four minutes. Then, they would be told to clean up the blocks. Parental positive emotionality in different speech types (e.g., bids, praises, affirmations) and child compliance were measured. Results: The study found that mothers (M = 28.92, SD = 12.01) were significantly more likely than fathers (M = 23.01, SD = 12.28) to use positive verbal emotionality in their speech, t(105) = 4.35, p< .001. High positive emotionality in bids during Duplo task and Clean Up was positively correlated with more child compliance in each task, r(273) = .35, p< .001 and r(264) = .58, p< .001, respectively. Overall, parental positive emotionality in speech significantly predicted child compliance, F(6, 218) = 13.33, p< .001, R² = .27) with emotionality in verbal bids (t = 6.20, p< .001) and affirmations (t = 3.12, p = .002) being significant predictors. Conclusion: Positive verbal emotions may be useful for increasing compliance in toddlers. This can be beneficial for compliance interventions as well as to the parent-child relationship quality through reduction of conflict and child defiance. As this study is correlational in nature, it will be important for future research to test the directional influence of positive emotionality within speech.

Keywords: child temperament, compliance, positive emotion, toddler, verbal bids

Procedia PDF Downloads 167
1145 Learning from the Positive to Encourage Compliance with Workplace Health and Safety

Authors: Amy Williamson, Kerry Armstrong, Jason Edwards, Patricia Obst

Abstract:

Australian national policy endorses a responsive approach to work health and safety (WHS) regulation, combining positive motivators (education and guidance), with compliance monitoring and enforcement to encourage and secure compliance with legislation. Despite theoretical support for responsive regulation, there is limited evidence regarding how to achieve best results in practice. Using positive psychology as a novel paradigm, this study aims to investigate how non-punitive regulatory interactions can be improved to further encourage regulatory compliance in the construction industry. As part of a larger project, semi-structured interviews were conducted with 35 inspectorate staff and 11 managers in the Australian (Queensland) construction industry. Using an inductive, grounded approach, an in-depth qualitative investigation was conducted to identify the positive psychological principles which underpin effective use of the non-punitive aspects of responsive regulation. Results highlighted the importance of effective engagement between inspectors and industry managers. This involved the need to interact cooperatively and encourage compliance with WHS legislation. Several strategies were identified that assisted regulatory interactions and the ability of inspectors to engage. The importance of communication and interpersonal skills was reported to be critical to any interaction, regardless of the nature of the visit and regulatory tools used. In particular, the use of clear and open communication fostered trust and rapport which facilitated more positive interactions. The importance of respect and empathy was also highlighted. The need for provision of guidance and direction on how to achieve compliance was also reported. This related to ensuring companies understand their WHS obligations, providing specific advice regarding how to rectify a breach and meet compliance requirements, and ensuring sufficient follow up to confirm that compliance is successfully achieved. In the absence of imminent risk, allowing companies the opportunity to comply before further action is taken was also highlighted. Increased proactive engagement with industry to educate and promote the vision of safety at work was also reported. Finally, provision of praise and positive feedback was reported to assist interactions and encourage the continuation of good practices. Evidence from positive psychology and organisational psychology was obtained to support the use of each strategy in practice. In particular, the area of positive leadership provided a useful framework to consider the factors and conditions that drive positive interactions within the context of work health and safety and the specific relationship between inspectors and industry managers. This study provides fresh insight into key psychological principles which support non-punitive regulatory interactions in the area of workplace health and safety. The findings of this research contribute to a better understanding of how inspectors can enhance the efficacy of their regulatory interactions to improve compliance with legislation. Encouraging and assisting compliance through effective non-punitive activity offers a sustainable pathway for promoting safety and preventing fatalities and injuries in the construction industry.

Keywords: engagement, non-punitive approaches to compliance, positive interactions in the workplace, work health and safety compliance

Procedia PDF Downloads 138
1144 3D Point Cloud Model Color Adjustment by Combining Terrestrial Laser Scanner and Close Range Photogrammetry Datasets

Authors: M. Pepe, S. Ackermann, L. Fregonese, C. Achille

Abstract:

3D models obtained with advanced survey techniques such as close-range photogrammetry and laser scanner are nowadays particularly appreciated in Cultural Heritage and Archaeology fields. In order to produce high quality models representing archaeological evidences and anthropological artifacts, the appearance of the model (i.e. color) beyond the geometric accuracy, is not a negligible aspect. The integration of the close-range photogrammetry survey techniques with the laser scanner is still a topic of study and research. By combining point cloud data sets of the same object generated with both technologies, or with the same technology but registered in different moment and/or natural light condition, could construct a final point cloud with accentuated color dissimilarities. In this paper, a methodology to uniform the different data sets, to improve the chromatic quality and to highlight further details by balancing the point color will be presented.

Keywords: color models, cultural heritage, laser scanner, photogrammetry

Procedia PDF Downloads 269
1143 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 80
1142 Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities

Authors: Jeana Cadby, Kae Miyazawa

Abstract:

With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector.

Keywords: cloud computing, environmental benefits, mobile technology, women

Procedia PDF Downloads 153
1141 A Novel Meta-Heuristic Algorithm Based on Cloud Theory for Redundancy Allocation Problem under Realistic Condition

Authors: H. Mousavi, M. Sharifi, H. Pourvaziri

Abstract:

Redundancy Allocation Problem (RAP) is a well-known mathematical problem for modeling series-parallel systems. It is a combinatorial optimization problem which focuses on determining an optimal assignment of components in a system design. In this paper, to be more practical, we have considered the problem of redundancy allocation of series system with interval valued reliability of components. Therefore, during the search process, the reliabilities of the components are considered as a stochastic variable with a lower and upper bounds. In order to optimize the problem, we proposed a simulated annealing based on cloud theory (CBSAA). Also, the Monte Carlo simulation (MCS) is embedded to the CBSAA to handle the random variable components’ reliability. This novel approach has been investigated by numerical examples and the experimental results have shown that the CBSAA combining MCS is an efficient tool to solve the RAP of systems with interval-valued component reliabilities.

Keywords: redundancy allocation problem, simulated annealing, cloud theory, monte carlo simulation

Procedia PDF Downloads 402
1140 Defining a Reference Architecture for Predictive Maintenance Systems: A Case Study Using the Microsoft Azure IoT-Cloud Components

Authors: Walter Bernhofer, Peter Haber, Tobias Mayer, Manfred Mayr, Markus Ziegler

Abstract:

Current preventive maintenance measures are cost intensive and not efficient. With the available sensor data of state of the art internet of things devices new possibilities of automated data processing emerge. Current advances in data science and in machine learning enable new, so called predictive maintenance technologies, which empower data scientists to forecast possible system failures. The goal of this approach is to cut expenses in preventive maintenance by automating the detection of possible failures and to improve efficiency and quality of maintenance measures. Additionally, a centralization of the sensor data monitoring can be achieved by using this approach. This paper describes the approach of three students to define a reference architecture for a predictive maintenance solution in the internet of things domain with a connected smartphone app for service technicians. The reference architecture is validated by a case study. The case study is implemented with current Microsoft Azure cloud technologies. The results of the case study show that the reference architecture is valid and can be used to achieve a system for predictive maintenance execution with the cloud components of Microsoft Azure. The used concepts are technology platform agnostic and can be reused in many different cloud platforms. The reference architecture is valid and can be used in many use cases, like gas station maintenance, elevator maintenance and many more.

Keywords: case study, internet of things, predictive maintenance, reference architecture

Procedia PDF Downloads 232
1139 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 133
1138 Lactational Amenorrhea Method for Family Planning: An Evaluation of Compliance in the Philippines

Authors: Ellen Bautista, Rebecca M. Flueckiger, Easter Dasmarinas, Rajeev Colaco, Fulbert Alec R. Gillego, Alma M. Lozada, Cristina Bisson

Abstract:

Lactational Amenorrhea Method (LAM) for family planning is at least 98% effective at preventing pregnancy when all criteria are met; (1) the mother is exclusively or nearly exclusively breastfeeding, (2) the mother is amenorrheic (not menstruating), and (3) the baby is six months old or younger. LAM is particularly suited for women interested in family planning accepted by religious authorities. As a majority catholic nation, LAM is a common and accepted form of family planning in the Philippines. The USAID funded, LuzonHealth project conducted a prospective evaluation in Legazpi City to inform the enhancement of guidelines aimed at increasing LAM compliance and encouraging a second form of contraceptive once LAM protection expires. LAM compliance, reasons for non-compliance, family planning referral and uptake of secondary modern family planning methods were tracked over a nine-month period among 521 postpartum women. The evaluation found that at three months postpartum, 97% of women either met LAM criteria or had shifted to a non-LAM modern family planning method. In month six 87% of women no longer met LAM criteria and of these only 35% had shifted to an alternative modern family planning method. This means that at six-months postpartum 65% of the women in this evaluation were not protected against pregnancy through modern family planning methods. By postpartum month nine, 70% of the women had been referred to family planning counseling, yet of those referred only 34% reported using modern family planning methods. This evaluation clearly indicates scale-up of non-LAM modern family planning does not sufficiently complement the scale-down of LAM compliance. There is a need to increase client knowledge and understanding of LAM as a temporary family planning method with a strong focus on preparing to shift to another form of modern family planning once LAM protection expires. Additionally, there is great need to restructure the referral mechanism to ensure efficacy and quality of care.

Keywords: Philippines, family planning, lactational amenorrhea method, contraceptives

Procedia PDF Downloads 226