Search results for: private security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4462

Search results for: private security

1762 A Multi-Dimensional Neural Network Using the Fisher Transform to Predict the Price Evolution for Algorithmic Trading in Financial Markets

Authors: Cristian Pauna

Abstract:

Trading the financial markets is a widespread activity today. A large number of investors, companies, public of private funds are buying and selling every day in order to make profit. Algorithmic trading is the prevalent method to make the trade decisions after the electronic trading release. The orders are sent almost instantly by computers using mathematical models. This paper will present a price prediction methodology based on a multi-dimensional neural network. Using the Fisher transform, the neural network will be instructed for a low-latency auto-adaptive process in order to predict the price evolution for the next period of time. The model is designed especially for algorithmic trading and uses the real-time price series. It was found that the characteristics of the Fisher function applied at the nodes scale level can generate reliable trading signals using the neural network methodology. After real time tests it was found that this method can be applied in any timeframe to trade the financial markets. The paper will also include the steps to implement the presented methodology into an automated trading system. Real trading results will be displayed and analyzed in order to qualify the model. As conclusion, the compared results will reveal that the neural network methodology applied together with the Fisher transform at the nodes level can generate a good price prediction and can build reliable trading signals for algorithmic trading.

Keywords: algorithmic trading, automated trading systems, financial markets, high-frequency trading, neural network

Procedia PDF Downloads 162
1761 Impact of Climate Change on Crop Production: Climate Resilient Agriculture Is the Need of the Hour

Authors: Deepak Loura

Abstract:

Climate change is considered one of the major environmental problems of the 21st century and a lasting change in the statistical distribution of weather patterns over periods ranging from decades to millions of years. Agriculture and climate change are internally correlated with each other in various aspects, as the threat of varying global climate has greatly driven the attention of scientists, as these variations are imparting a negative impact on global crop production and compromising food security worldwide. The fast pace of development and industrialization and indiscriminate destruction of the natural environment, more so in the last century, have altered the concentration of atmospheric gases that lead to global warming. Carbon dioxide (CO₂), methane (CH₄), and nitrous oxide (NO) are important biogenic greenhouse gases (GHGs) from the agricultural sector contributing to global warming and their concentration is increasing alarmingly. Agricultural productivity can be affected by climate change in 2 ways: first, directly, by affecting plant growth development and yield due to changes in rainfall/precipitation and temperature and/or CO₂ levels, and second, indirectly, there may be considerable impact on agricultural land use due to snow melt, availability of irrigation, frequency and intensity of inter- and intra-seasonal droughts and floods, soil organic matter transformations, soil erosion, distribution and frequency of infestation by insect pests, diseases or weeds, the decline in arable areas (due to submergence of coastal lands), and availability of energy. An increase in atmospheric CO₂ promotes the growth and productivity of C3 plants. On the other hand, an increase in temperature, can reduce crop duration, increase crop respiration rates, affect the equilibrium between crops and pests, hasten nutrient mineralization in soils, decrease fertilizer- use efficiencies, and increase evapotranspiration among others. All these could considerably affect crop yield in long run. Climate resilient agriculture consisting of adaptation, mitigation, and other agriculture practices can potentially enhance the capacity of the system to withstand climate-related disturbances by resisting damage and recovering quickly. Climate resilient agriculture turns the climate change threats that have to be tackled into new business opportunities for the sector in different regions and therefore provides a triple win: mitigation, adaptation, and economic growth. Improving the soil organic carbon stock of soil is integral to any strategy towards adapting to and mitigating the abrupt climate change, advancing food security, and improving the environment. Soil carbon sequestration is one of the major mitigation strategies to achieve climate-resilient agriculture. Climate-smart agriculture is the only way to lower the negative impact of climate variations on crop adaptation before it might affect global crop production drastically. To cope with these extreme changes, future development needs to make adjustments in technology, management practices, and legislation. Adaptation and mitigation are twin approaches to bringing resilience to climate change in agriculture.

Keywords: climate change, global warming, crop production, climate resilient agriculture

Procedia PDF Downloads 75
1760 The Impact of Preference-Based Employee Deployment toward Employee Satisfaction and Organizational Performance: Case Study in Directorate General of State Asset Management, Ministry of Finance of the Republic of Indonesia

Authors: Rahmat Irawan, Mundhir Hanifsyam Harahap, Andar Ristabet Hesda

Abstract:

As a public sector organization in Indonesia, Directorate General of State Asset Management (DGSAM) which is a unit under the Ministry of Finance of The Republic of Indonesia, has many constraints in managing its employees. While private organizations are able to conduct a human resource management as the best practice, DGSAM is limited by many regulations, especially about punishment and lay off policy for under-performance employees. Therefore, since 2015, DGSAM tries to implement a new and uncommon approach considering employees’ preference to encourage the motivation and performance of employees. DGSAM’s employees may propose the job places, and DGSAM considers them in deciding employees deployment. This study tries to determine the impact of preference-based approach toward employees’ satisfaction and organizational performance. This study uses quantitative approaches by regression analysis to measure the impact of deployment toward satisfaction of deployed employees and performance change of related units in DGSAM. The result of this study shows that preference-based approach significantly improves employees’ satisfaction and performance of related units as well. Based on the results of this study, it can be suggested that the approach is able to be implemented in the wider scope of the Ministry of Finance of The Republic of Indonesia and whole public sector organization in Indonesia. However, this study only focuses on short term measurement, so it is suggested to do further study to analyze the long-term impact.

Keywords: employee deployment, employee satisfaction, human resource management, organizational performance, preference-based approach

Procedia PDF Downloads 333
1759 Primary Level Teachers’ Response to Gender Representation in Textbook Contents

Authors: Pragya Paneru

Abstract:

This paper explores ten primary teachers’ views on gender representation in primary-level textbooks altogether. Data was collected from the teachers who taught in private schools in Kailali and Kathmandu District. This research uses a semi-structured interview method to obtain information regarding teachers’ attitudes toward gender representations in textbook content. The interview data were analysed by using critical skills of qualitative research analysis methods, as suggested by Saldana and Omasta (2018). The findings revealed that most of the teachers were unaware and regarded gender issues as insignificant to discuss in primary-level classes. Most of them responded to the questions personally and claimed that there were no gender issues in their classrooms. Some of the teachers connected gender issues with contexts other than textbook representations, such as school discrimination in the distribution of salary among male and female teachers, school practices of awarding girls rather than boys as the most disciplined students, following girls’ first rule in the assembly marching, encouraging only girls in the stage shows, and involving students in gender-specific activities such as decorating works for girls and physical tasks for boys. The interview also revealed teachers’ covert gendered attitudes in their remarks. Nevertheless, most of the teachers accepted that gender-biased contents have an impact on learners, and this problem can be solved with more gender-centred research in the education field, discussions, and training to increase awareness regarding gender issues. Agreeing with the suggestion of teachers, this paper recommends proper training and awareness regarding how to confront gender issues in textbooks.

Keywords: content analysis, gender equality, school education, critical awareness

Procedia PDF Downloads 96
1758 Impulsivity, Emotional Regulation, Problematic Mukbang Watching and Eating Disorders in University Students

Authors: Aqsa Butt, Nida Zafar

Abstract:

The study assesses the relationship between impulsivity, emotional regulation, problematic mukbang watching, and eating disorders in university students. It was hypothesized there is likely to be a relationship between impulsivity, emotional regulation, problematic mukbang watching, and eating disorders in university students; impulsivity and emotional regulation would predict problematic mukbang watching in university students; problematic mukbang watching would predict eating disorders in university students. A correlational research design was used. A sample of 200 students was taken from different public and private universities in Lahore. Emotional regulation questionnaire (Gross & John, 2003), Abbreviated Barrat Impulsiveness Scale (Christopher et al., 2014), Problematic Mukbang Watching Scale (Kircaburun et al., 2020), and Eating Disorder Diagnostic Scale (Stice et al., 2004) were used for assessment. Results showed a significant positive relationship between impulsivity and expressive suppression with problematic mukbang watching. However, there is a significant negative relationship between cognitive reappraisal and problematic mukbang watching. Problematic mukbang is significantly positively related to bulimia nervosa and binge eating. Furthermore, impulsivity and expressive suppression are significant positive predictors of problematic mukbang watching, and cognitive reappraisal is a significant negative predictor of problematic mukbang watching. Additionally, problematic mukbang watching significantly positively predicts bulimia nervosa and binge eating. The research has important implications for university students to understand that excessive watching of such videos can lead to eating disorders such as bulimia nervosa and binge eating. This research provides an understanding of the effects of Mukbang watching, and it also adds to the existing body of knowledge on eating disorders.

Keywords: impulsivity, emotional regulation, problematic Mukbang watching eating disorders, students

Procedia PDF Downloads 65
1757 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 122
1756 Evaluation and Analysis of Light Emitting Diode Distribution in an Indoor Visible Light Communication

Authors: Olawale J. Olaluyi, Ayodele S. Oluwole, O. Akinsanmi, Johnson O. Adeogo

Abstract:

Communication using visible light VLC is considered a cutting-edge technology used for data transmission and illumination since it uses less energy than radio frequency (RF) technology and has a large bandwidth, extended lifespan, and high security. The room's irregular distribution of small base stations, or LED array distribution, is the cause of the obscured area, minimum signal-to-noise ratio (SNR), and received power. In order to maximize the received power distribution and SNR at the center of the room for an indoor VLC system, the researchers offer an innovative model for the placement of eight LED array distributions in this work. We have investigated the arrangement of the LED array distribution with regard to receiving power to fill the open space in the center of the room. The suggested LED array distribution saved 36.2% of the transmitted power, according to the simulation findings. Aside from that, the entire room was equally covered. This leads to an increase in both received power and SNR.

Keywords: visible light communication (VLC), light emitted diodes (LED), optical power distribution, signal-to-noise ratio (SNR).

Procedia PDF Downloads 92
1755 Exploring Utility and Intrinsic Value among UAE Arabic Teachers in Integrating M-Learning

Authors: Dina Tareq Ismail, Alexandria A. Proff

Abstract:

The United Arab Emirates (UAE) is a nation seeking to advance in all fields, particularly education. One area of focus for UAE 2021 agenda is to restructure UAE schools and universities by equipping them with highly developed technology. The agenda also advises educational institutions to prepare students with applicable and transferrable Information and Communication Technology (ICT) skills. Despite the emphasis on ICT and computer literacy skills, there exists limited empirical data on the use of M-Learning in the literature. This qualitative study explores the motivation of higher primary Arabic teachers in private schools toward implementing and integrating M-Learning apps in their classrooms. This research employs a phenomenological approach through the use of semistructured interviews with nine purposefully selected Arabic teachers. The data were analyzed using a content analysis via multiple stages of coding: open, axial, and thematic. Findings reveal three primary themes: (1) Arabic teachers with high levels of procedural knowledge in ICT are more motivated to implement M-Learning; (2) Arabic teachers' perceptions of self-efficacy influence their motivation toward implementation of M-Learning; (3) Arabic teachers implement M-Learning when they possess high utility and/or intrinsic value in these applications. These findings indicate a strong need for further training, equipping, and creating buy-in among Arabic teachers to enhance their ICT skills in implementing M-Learning. Further, given the limited availability of M-Learning apps designed for use in the Arabic language on the market, it is imperative that developers consider designing M-Learning tools that Arabic teachers, and Arabic-speaking students, can use and access more readily. This study contributes to closing the knowledge gap on teacher-motivation for implementing M-Learning in their classrooms in the UAE.

Keywords: ICT skills, m-learning, self-efficacy, teacher-motivation

Procedia PDF Downloads 107
1754 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform

Authors: Nemi Bhattarai

Abstract:

In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.

Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor

Procedia PDF Downloads 467
1753 Accounting for Rice Productivity Heterogeneity in Ghana: The Two-Step Stochastic Metafrontier Approach

Authors: Franklin Nantui Mabe, Samuel A. Donkoh, Seidu Al-Hassan

Abstract:

Rice yields among agro-ecological zones are heterogeneous. Farmers, researchers and policy makers are making frantic efforts to bridge rice yield gaps between agro-ecological zones through the promotion of improved agricultural technologies (IATs). Farmers are also modifying these IATs and blending them with indigenous farming practices (IFPs) to form farmer innovation systems (FISs). Also, different metafrontier models have been used in estimating productivity performances and their drivers. This study used the two-step stochastic metafrontier model to estimate the productivity performances of rice farmers and their determining factors in GSZ, FSTZ and CSZ. The study used both primary and secondary data. Farmers in CSZ are the most technically efficient. Technical inefficiencies of farmers are negatively influenced by age, sex, household size, education years, extension visits, contract farming, access to improved seeds, access to irrigation, high rainfall amount, less lodging of rice, and well-coordinated and synergized adoption of technologies. Albeit farmers in CSZ are doing well in terms of rice yield, they still have the highest potential of increasing rice yield since they had the lowest TGR. It is recommended that government through the ministry of food and agriculture, development partners and individual private companies promote the adoption of IATs as well as educate farmers on how to coordinate and synergize the adoption of the whole package. Contract farming concept and agricultural extension intensification should be vigorously pursued to the latter.

Keywords: efficiency, farmer innovation systems, improved agricultural technologies, two-step stochastic metafrontier approach

Procedia PDF Downloads 270
1752 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 255
1751 Setswana Speech Rhythm Development in High-Socioeconomic Status Setswana-English Bilingual Children

Authors: Boikanyego Sebina

Abstract:

The present study investigates the effects of socioeconomic status (SES) and bilingualism on the Setswana speech rhythm of Batswana (citizens) children aged 6-7 years with typical development born and residing in Botswana. Botswana is a country in which there is a diglossic Setswana/English language setting, where English is the dominant high-status language in educational and public contexts. Generally, children from low SES have lower linguistic and cognitive profiles than their age-matched peers from high SES. A greater understanding of these variables would allow educators to distinguish between underdeveloped language skills in children due to impairment and environmental issues for them to successfully enroll children in language development enhancement programs specific to the child’s needs. There are 20 participants: 10 high SES private English-medium educated early sequential Setswana-English bilingual children, taught full-time in English (L2) from the age of 3 years, and for whom English has become dominant; and 10 low SES children who are educated in public schools for whom English is considered a learner language, i.e., L1 Setswana is dominant. The aim is to see whether SES and bilingualism, have had an effect on the Setswana speech rhythm of children in either group. The study primarily uses semi-spontaneous speech based on the telling of the wordless picture storybook. A questionnaire is used to elicit the language use pattern of the children and that of their parents, as well as the education level of the parents and the school the children attend. A comparison of the rhythm shows that children from high SES have a lower durational variability than those from low SES. The findings of the study are that the low durational variability by children from high SES may suggest an underdeveloped rhythm. In conclusion, the results of the present study are against the notion that children from high SES outperform those from low SES in linguistic development.

Keywords: bilingualism, Setswana English, socio-economic status, speech-rhythm

Procedia PDF Downloads 68
1750 Interpolation Issue in PVNPG-14M Application for Technical Control of Artillery Fire

Authors: Martin Blaha, Ladislav Potužák, Daniel Holesz

Abstract:

This paper focused on application support for technical control of artillery units – PVNPG-14M, especially on interpolation issue. Artillery units of the Army of the Czech Republic, reflecting the current global security neighborhood, can be used outside the Czech Republic. The paper presents principles, evolution and calculation in the process of complete preparation. The paper presents expertise using of application of current artillery communication and information system and suggests the perspective future system. The paper also presents problems in process of complete preparing of fire especially problems in permanently information (firing table) and calculated values. The paper presents problems of current artillery communication and information system and suggests requirements of the future system.

Keywords: Fire for Effect, Application, Fire Control, Interpolation method, Software development.

Procedia PDF Downloads 324
1749 Entrepreneurship in Pakistan: Opportunities and Challenges

Authors: Bushra Jamil, Nudrat Baqri, Muhammad Hassan Saeed

Abstract:

Entrepreneurship is creating or setting up a business not only for the purpose of generating profit but also for providing job opportunities. Entrepreneurs are problem solvers and product developers. They use their financial asset for hiring a professional team and combine the innovation, knowledge, and leadership leads to a successful startup or a business. To be a successful entrepreneur, one should be people-oriented and have perseverance. One must have the ability to take risk, believe in his/her potential, and have the courage to move forward in all circumstances. Most importantly, have the ability to take risk and can assess the risk. For STEM students, entrepreneurship is of specific importance and relevance as it helps them not just to be able to solve real life existing complications but to be able to recognize and identify emerging needs and glitches. It is becoming increasingly apparent that in today’s world, there is a need as well as a desire for STEM and entrepreneurship to work together. In Pakistan, entrepreneurship is slowly emerging, yet we are far behind. It is high time that we should introduce modern teaching methods and inculcate entrepreneurial initiative in students. A course on entrepreneurship can be included in the syllabus, and we must invite businessmen and policy makers to motivate young minds for entrepreneurship. This must be pitching competitions, opportunities to win seed funding, and facilities of incubation centers. In Pakistan, there are many good public sector research institutes, yet there is a void gap in the private sector. Only few research institute are meant for research and development. BJ Micro Lab is one of them. It is SECP registered company and is working in academia to promote and facilitate research in STEM. BJ Micro Lab is a women led initiative, and we are trying to promote research as a passion, not as an arduous burden. For this, we are continuously arranging training workshops and sessions. More than 100 students have been trained in ten different workshops arranged at BJ Micro Lab.

Keywords: entrepreneurship, STEM, challenges, oppurtunties

Procedia PDF Downloads 131
1748 Performance and Emission Characteristics of Diesel Engine Fuelled with Palm Biodiesel Blends

Authors: Jalpit B. Prajapati, Ketankumar G. Patel

Abstract:

Palm oil may be employed in diesel engine as an alternative fuel. Biofuel has so far been backed by government policies in the quest for low carbon fuel in the near future and promises to ensure energy security through partially replacing fossil fuels. This paper presents an experimental investigation of performance and emission characteristics by using palm oil in diesel engine. The properties of palm oil can be compared favorably with the characteristics required for internal combustion engine fuels especially diesel engine. Experiments will be performed for fixed compression ratio i.e. 18 using biodiesel-diesel blends i.e. B0, B10, B20, B30, B40, B50 with load variation from no load to full load and compared with base cases i.e. engine using diesel as a fuel. The parameters studied in performance characteristics are brake power, brake specific fuel consumption and brake thermal efficiency, in emission characteristics are carbon monoxide, unburnt hydrocarbons and nitrogen oxide. After experimental results B20 (20% palm oil and 80% diesel) is best in performance, but NOx formation is little higher in B20.

Keywords: palm biodiesel, performance, emission, diesel-biodiesel blend

Procedia PDF Downloads 370
1747 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 358
1746 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 174
1745 Monocular 3D Person Tracking AIA Demographic Classification and Projective Image Processing

Authors: McClain Thiel

Abstract:

Object detection and localization has historically required two or more sensors due to the loss of information from 3D to 2D space, however, most surveillance systems currently in use in the real world only have one sensor per location. Generally, this consists of a single low-resolution camera positioned above the area under observation (mall, jewelry store, traffic camera). This is not sufficient for robust 3D tracking for applications such as security or more recent relevance, contract tracing. This paper proposes a lightweight system for 3D person tracking that requires no additional hardware, based on compressed object detection convolutional-nets, facial landmark detection, and projective geometry. This approach involves classifying the target into a demographic category and then making assumptions about the relative locations of facial landmarks from the demographic information, and from there using simple projective geometry and known constants to find the target's location in 3D space. Preliminary testing, although severely lacking, suggests reasonable success in 3D tracking under ideal conditions.

Keywords: monocular distancing, computer vision, facial analysis, 3D localization

Procedia PDF Downloads 143
1744 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 99
1743 School Partners in Initial Teacher Education: An Including or Excluding Approach When Engaging Schools

Authors: Laila Niklasson

Abstract:

The aim of the study is to critically discuss how partner schools are engaged during Initial teacher education, ITE. The background is an experiment in Sweden where the practicum organization is reorganized due to a need to enhance quality during practicum. It is a national initiative from the government, supported by the National Agency of Education and lasts 2014-2019. The main features are concentration of students to school with a certain amount of mentors, mentors who have a mentor education and teachers with relevant subject areas and where there could be a mentor team with a leader at the school. An expected outcome is for example that the student teachers should be engaged in peer-learning. The schools should be supported by extra lectures from university teachers during practicum and also extra research projects where the schools should be engaged. A case study of one university based ITE was carried out to explore the consequences for the schools not selected. The result showed that from engaging x schools in a region, x was engaged. The schools are both in urban and rural areas, mainly in the latter. There is also a tendency that private schools are not engaged. On a unit level recruitment is perceived as harder for schools not engaged. In addition they cannot market themselves as ´selected school´ which can affect parent´s selection of school for their children. Also, on unit level, but with consequences for professional development, they are not selected for research project and thereby are not fully supported during school development. The conclusion is that from an earlier inclusive approach concerning professions where all teachers were perceived as possible mentors, there is a change to an exclusive approach where selected schools and selected teachers should be engaged. The change could be perceived as a change in governance mentality, but also in how professions are perceived, and development work is pursued.

Keywords: initial teacher education, practicum schools, profession, quality development

Procedia PDF Downloads 143
1742 A Folk Theorem with Public Randomization Device in Repeated Prisoner’s Dilemma under Costly Observation

Authors: Yoshifumi Hino

Abstract:

An infinitely repeated prisoner’s dilemma is a typical model that represents teamwork situation. If both players choose costly actions and contribute to the team, then both players are better off. However, each player has an incentive to choose a selfish action. We analyze the game under costly observation. Each player can observe the action of the opponent only when he pays an observation cost in that period. In reality, teamwork situations are often costly observation. Members of some teams sometimes work in distinct rooms, areas, or countries. In those cases, they have to spend their time and money to see other team members if they want to observe it. The costly observation assumption makes the cooperation difficult substantially because the equilibrium must satisfy the incentives not only on the action but also on the observational decision. Especially, it is the most difficult to cooperate each other when the stage-game is prisoner's dilemma because players have to communicate through only two actions. We examine whether or not players can cooperate each other in prisoner’s dilemma under costly observation. Specifically, we check whether symmetric Pareto efficient payoff vectors in repeated prisoner’s dilemma can be approximated by sequential equilibria or not (efficiency result). We show the efficiency result without any randomization device under certain circumstances. It means that players can cooperate with each other without any randomization device even if the observation is costly. Next, we assume that public randomization device is available, and then we show that any feasible and individual rational payoffs in prisoner’s dilemma can be approximated by sequential equilibria under a specific situation (folk theorem). It implies that players can achieve asymmetric teamwork like leadership situation when public randomization device is available.

Keywords: cost observation, efficiency, folk theorem, prisoner's dilemma, private monitoring, repeated games.

Procedia PDF Downloads 242
1741 Student's Difficulties with Classes That Involve Laboratory Education Approach

Authors: Kayondoamunmose Kamafrika

Abstract:

Experimental based Engineering education approach plays a vital role in the development of student’s deep understanding of both social and physical sciences. Experimental based education approach through laboratory class activities prepare students to meet national demand for high-tech skilled individuals in the government and private sector. However, students across the country are faced with difficulties in classes that involve laboratory activities: poor experimental based exposure in their early development of student’s education-life-cycle, lack of student engagement in scientific method practical thinking approach, lack of communication between students and the instructor during class, a large number of students in one classroom, lack of instruments and improper equipment calibration. The purpose of this paper is to help students develop their own scientific knowledge and understanding, develop their methodologies in the design of experiments, collect and analyze data, write laboratory reports, present and explain their findings. Experimental based laboratory activities allow students to learn with high-level understanding as well as engage in the design processes of constructing knowledge through practical means of doing science. Experimental based education systems approach will act as a catalyst in the development of practical-based-educational methodologies in social and physical science and engineering domain of learning; thereby, converting laboratory classes into pilot industries and students into professional experts in finding a solution for complex problems, research, and development of super high- tech systems.

Keywords: experimental, engineering, innovation, practicability

Procedia PDF Downloads 192
1740 Influence of Some Chemical Drinking Water Parameters on Germ Count in Nalout Region, Libya

Authors: Dukali Abujnah, Mokhtar Blgacem Halbuda

Abstract:

Water is one of the world's natural resources. It is an essential source for the maintenance of human, animal, and plant life. It has a significant impact on the country's economy and all human activities. Over the past twenty years, pressure on water resources has increased due to population and industrial growth and increasing demand for agricultural and household products, which has become a major concern of the international community. The aim of this study is the physical and bacteriological analysis of drinking water in the city of Value. The study covered different locations in the city. Thirty-six groundwater samples were taken from wells and various tanks owned by the State and private wells, and the Ain Thalia spring and other samples were taken from underground water tanks. It fills up with rainwater during the rainy season. These samples were analyzed for their physical, chemical, and biological status and the results were compared to Libyan and World Health Organization drinking water specifications to assess the quality of drinking water in the city of Value. Physical and chemical analysis of water samples showed acceptable values for acidity and electrical conductivity, and turbidity was found in water samples collected from underground reservoirs compared to Libyan and World Health Organization standards. The highest levels of electrical conductivity and alkalinity, TDS, and water hardness in the samples collected were below the maximum acceptable levels for drinking water as recommended by Libyan and World Health Organization specifications. The biological test results also showed that the water samples were free of intestinal bacteria.

Keywords: quality, agriculture, region, reservoir, evaluation

Procedia PDF Downloads 92
1739 A Parking Demand Forecasting Method for Making Parking Policy in the Center of Kabul City

Authors: Roien Qiam, Shoshi Mizokami

Abstract:

Parking demand in the Central Business District (CBD) has enlarged with the increase of the number of private vehicles due to rapid economic growth, lack of an efficient public transport and traffic management system. This has resulted in low mobility, poor accessibility, serious congestion, high rates of traffic accident fatalities and injuries and air pollution, mainly because people have to drive slowly around to find a vacant spot. With parking pricing and enforcement policy, considerable advancement could be found, and on-street parking spaces could be managed efficiently and effectively. To evaluate parking demand and making parking policy, it is required to understand the current parking condition and driver’s behavior, understand how drivers choose their parking type and location as well as their behavior toward finding a vacant parking spot under parking charges and search times. This study illustrates the result from an observational, revealed and stated preference surveys and experiment. Attained data shows that there is a gap between supply and demand in parking and it has maximized. For the modeling of the parking decision, a choice model was constructed based on discrete choice modeling theory and multinomial logit model estimated by using SP survey data; the model represents the choice of an alternative among different alternatives which are priced on-street, off-street, and illegal parking. Individuals choose a parking type based on their preference concerning parking charges, searching times, access times and waiting times. The parking assignment model was obtained directly from behavioral model and is used in parking simulation. The study concludes with an evaluation of parking policy.

Keywords: CBD, parking demand forecast, parking policy, parking choice model

Procedia PDF Downloads 199
1738 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 242
1737 Inclusivity in Public Spaces through Architecture: A Case of Transgender Community in India

Authors: Sakshi Dhruve, Ar. Sarang Barbarwar

Abstract:

Public spaces are the locus of activity and interaction in any urban area. Such spaces provide identity to cities, towns or neighborhoods and define the people and culture over there. Inclusiveness is one of the core aspects of public or community spaces. With its humongous population and rapidly expanding urban areas, India needs more inclusivity in public spaces to attain true equitable development. The aim of the paper is to discuss the sensitivity of public spaces in India to the transgender community. The study shows how this community was legally included as ‘Third Gender’ in country’s legislation yet lacks social acceptance and security. It shows the challenges and issues faced by them at public spaces. The community was studied on ethnographic basis to understand their culture, lifestyle, requirements, etc. The findings have indicated towards a social stigma from people and insensitivity in designing of civic spaces. The larger objective of the study is also to provide recommendations on the design aspects and interventions in public places to increase their inclusiveness towards the transgender society.

Keywords: community spaces, ethnographic, stigma, Third Gender community

Procedia PDF Downloads 287
1736 Tourism Qualification and Academics' Opinions about the Influence of Employability Skills on Graduates' Ability to Secure Jobs in the Tourism Industry

Authors: Nicola Wakelin-Theron

Abstract:

This study focuses on higher education institutions in South Africa, with the view to understanding how tourism as a study discipline has evolved over the years, as well as the influence of employability skills on graduates’ ability to secure jobs in the tourism industry. Indeed, the employability landscape is becoming more complex; hence, it is imperative for higher education institutions to equip students with employability skills while going through their academic programmes and during their transition from higher education to the world of work. Employability – which is regarded as an empowerment mechanism and a key to job security – is a set of achievements which increases the probability for graduates to find and maintain employment. A quantitative research method was used to obtain the necessary information. Data were collected through a web-based, online survey questionnaire directed to academics from various public higher education institutions in South Africa that offer tourism as a qualification. The key findings revealed that academics are of the opinion that there are 5 skills that are influential in obtaining a position within the tourism industry.

Keywords: employability, industry skills, tourism industry, tourism qualification

Procedia PDF Downloads 418
1735 Next Generation UK Storm Surge Model for the Insurance Market: The London Case

Authors: Iacopo Carnacina, Mohammad Keshtpoor, Richard Yablonsky

Abstract:

Non-structural protection measures against flooding are becoming increasingly popular flood risk mitigation strategies. In particular, coastal flood insurance impacts not only private citizens but also insurance and reinsurance companies, who may require it to retain solvency and better understand the risks they face from a catastrophic coastal flood event. In this context, a framework is presented here to assess the risk for coastal flooding across the UK. The area has a long history of catastrophic flood events, including the Great Flood of 1953 and the 2013 Cyclone Xaver storm, both of which led to significant loss of life and property. The current framework will leverage a technology based on a hydrodynamic model (Delft3D Flexible Mesh). This flexible mesh technology, coupled with a calibration technique, allows for better utilisation of computational resources, leading to higher resolution and more detailed results. The generation of a stochastic set of extra tropical cyclone (ETC) events supports the evaluation of the financial losses for the whole area, also accounting for correlations between different locations in different scenarios. Finally, the solution shows a detailed analysis for the Thames River, leveraging the information available on flood barriers and levees. Two realistic disaster scenarios for the Greater London area are simulated: In the first scenario, the storm surge intensity is not high enough to fail London’s flood defences, but in the second scenario, London’s flood defences fail, highlighting the potential losses from a catastrophic coastal flood event.

Keywords: storm surge, stochastic model, levee failure, Thames River

Procedia PDF Downloads 232
1734 Improving Health Care and Patient Safety at the ICU by Using Innovative Medical Devices and ICT Tools: Examples from Bangladesh

Authors: Mannan Mridha, Mohammad S. Islam

Abstract:

Innovative medical technologies offer more effective medical care, with less risk to patient and healthcare personnel. Medical technology and devices when properly used provide better data, precise monitoring and less invasive treatments and can be more targeted and often less costly. The Intensive Care Unit (ICU) equipped with patient monitoring, respiratory and cardiac support, pain management, emergency resuscitation and life support devices is particularly prone to medical errors for various reasons. Many people in the developing countries now wonder whether their visit to hospital might harm rather than help them. This is because; clinicians in the developing countries are required to maintain an increasing workload with limited resources and absence of well-functioning safety system. A team of experts from the medical, biomedical and clinical engineering in Sweden and Bangladesh have worked together to study the incidents, adverse events at the ICU in Bangladesh. The study included both public and private hospitals to provide a better understanding for physical structure, organization and practice in operating processes of care, and the occurrence of adverse outcomes the errors, risks and accidents related to medical devices at the ICU, and to develop a ICT based support system in order to reduce hazards and errors and thus improve the quality of performance, care and cost effectiveness at the ICU. Concrete recommendations and guidelines have been made for preparing appropriate ICT related tools and methods for improving the routine for use of medical devices, reporting and analyzing of the incidents at the ICU in order to reduce the number of undetected and unsolved incidents and thus improve the patient safety.

Keywords: intensive care units, medical errors, medical devices, patient care and safety

Procedia PDF Downloads 149
1733 Significance of the 2015 Comprehensive Strategic Partnership Agreement to the Foreign Policies of Australia and Singapore in the Indo-Pacific Region

Authors: Iraj Musa Dawaari

Abstract:

Australia and Singapore signed the Comprehensive Strategic Partnership (CSP) agreement on 29th June 2015. This agreement aims to strengthen security, defense, diplomatic, economic, education, and innovation cooperation, as well as people-to-people relations between the two states. The purpose of this study is to examine rationales underpinning the (2015 CSP) agreement in order to better understand the national and foreign policy priorities of both Australia and Singapore in the period leading up to the signing of the agreement and in the period since. This research project will seek to establish how both countries’ national and foreign policy priorities have developed in recent years in the light of growing tensions between China and the US in the Indo-Pacific region and how the CSP agreement has influenced these priorities. This project also seeks to better understand and analyse why both states signed the CSP agreement in 2015.

Keywords: Australia, Singapore, foreign policy, partnership, USA, China, Indo-Pacific Region

Procedia PDF Downloads 140