Search results for: sense of security
1731 Testing for Endogeneity of Foreign Direct Investment: Implications for Economic Policy
Authors: Liwiusz Wojciechowski
Abstract:
Research background: The current knowledge does not give a clear answer to the question of the impact of FDI on productivity. Results of the empirical studies are still inconclusive, no matter how extensive and diverse in terms of research approaches or groups of countries analyzed they are. It should also take into account the possibility that FDI and productivity are linked and that there is a bidirectional relationship between them. This issue is particularly important because on one hand FDI can contribute to changes in productivity in the host country, but on the other hand its level and dynamics may imply that FDI should be undertaken in a given country. As already mentioned, a two-way relationship between the presence of foreign capital and productivity in the host country should be assumed, taking into consideration the endogenous nature of FDI. Purpose of the article: The overall objective of this study is to determine the causality between foreign direct investment and total factor productivity in host county in terms of different relative absorptive capacity across countries. In the classic sense causality among variables is not always obvious and requires for testing, which would facilitate proper specification of FDI models. The aim of this article is to study endogeneity of selected macroeconomic variables commonly being used in FDI models in case of Visegrad countries: main recipients of FDI in CEE. The findings may be helpful in determining the structure of the actual relationship between variables, in appropriate models estimation and in forecasting as well as economic policymaking. Methodology/methods: Panel and time-series data techniques including GMM estimator, VEC models and causality tests were utilized in this study. Findings & Value added: The obtained results allow to confirm the hypothesis states the bi-directional causality between FDI and total factor productivity. Although results differ from among countries and data level of aggregation implications may be useful for policymakers in case of providing foreign capital attracting policy.Keywords: endogeneity, foreign direct investment, multi-equation models, total factor productivity
Procedia PDF Downloads 2011730 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 1031729 Evaluating the Impact of English Immersion in Kolkata’s High-Cost Private Schools
Authors: Ashmita Bhattacharya
Abstract:
This study aims to investigate whether the English immersion experience offered by Kolkata’s high-cost private English-medium schools lead to additive or subtractive language learning outcomes for students. In India, English has increasingly become associated with power, social status, and socio-economic mobility. As a result, a proliferation of English-medium schools has emerged across Kolkata and the wider Indian context. While in some contexts, English language learning can be an additive experience, in others, it can be subtractive where proficiency in English is developed at the expense of students’ native language proficiency development. Subtractive educational experiences can potentially have severe implications, including heritage language loss, detachment from cultural roots, and a diminished sense of national identity. Thus, with the use of semi-structured interviews, the language practices and lived experiences of 12 former students who attended high-cost private English-medium schools in Kolkata were thoroughly explored. The data collected was thematically coded and analysis was conducted using the Thematic Analysis approach. The findings indicate that the English immersion experience at Kolkata’s high-cost private English-medium schools provide a subtractive language learning experience to students. Additionally, this study suggests that robust home-based support for native languages might be crucial for mitigating the effects of subtractive English education. Furthermore, the study underscores the importance of integrating opportunities within schools that promote Indian languages and cultures as it can create a more positive, inclusive, and culturally responsive environment. Finally, although subject to further evaluation, the study recommends the implementation of bilingual and multilingual educational systems and provides suggestions for future research in this area.Keywords: bilingual education, English immersion, language loss, multilingual education, subtractive language learning
Procedia PDF Downloads 331728 The Political Pedagogy of Everyday Life in the French Revolution
Authors: Michael Ruiz
Abstract:
Many scholars view the French Revolution as the origins of ‘modern nationalism,’ citing the unprecedented rhetorical power of ‘the nation’ and the emergence of a centralized, modern nation-state during this time. They have also stressed the role of public education in promoting a national language and creating a sense of shared national identity among the masses. Yet as many cultural historians have shown, revolutionary leaders undertook an unprecedented campaign to overhaul French culture in the 1790s in order to cultivate these national ideals and inspire Republican virtues, in what has been called ‘political pedagogy.’ In contrast to scholars of nationalism, who emphasize formal education, revolutionaries attempted to translate abstract ideas of equality and liberty into palpable representations that would inundate everyday life, thereby serving as pedagogical tools. Material culture and everyday life became state apparatuses not just for winning over citizens’ hearts and minds, but for influencing the very formation of the citizen and their innermost ‘self.’ This paper argues that nationalism began in 1789, when ‘the self’ became a political concern and its formation a state project for cultivating political legitimacy. By broadening the meaning of ‘political pedagogy,’ this study brings together scholarship on nationalism with cultural history, thereby highlighting nations and nationalism as banal, palpable, quotidian phenomena and historicizing the complex emergence of ‘modern nationalism.’ Moreover, because the contemporary view of material culture and pedagogy was highly gendered, this study shows the role of culture in the development of a homosocial, male-dominated public sphere in the 19th century. The legacy of the French Revolution’s concern with culture thus persists as much in our vocabulary for political expression as it does in the material world, remaining deeply embedded in everyday day life as a crucial, nearly-invisible, component of nationalism.Keywords: French Revolution, nationalism, political culture, material culture
Procedia PDF Downloads 1441727 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market
Authors: Brian Basvi
Abstract:
A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.Keywords: fundamental analysis, stock valuation, EPS, share pricing
Procedia PDF Downloads 511726 Cloud Computing in Data Mining: A Technical Survey
Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham
Abstract:
Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.Keywords: cloud computing, data mining, computing models, cloud services
Procedia PDF Downloads 4821725 Data Hiding by Vector Quantization in Color Image
Authors: Yung Gi Wu
Abstract:
With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.Keywords: data hiding, vector quantization, watermark, color image
Procedia PDF Downloads 3681724 Global Gender Differences in Job Satisfaction in the Hospitality Industry
Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller
Abstract:
Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.Keywords: job satisfaction, gender, hospitality, global comparisons
Procedia PDF Downloads 1391723 Self-Determination and Mental Disorders: Phenomenological Approach
Authors: Neringa Bagdonaite
Abstract:
Background: The main focus of this paper is to explore how self-determination interplays in suicidal and addictive context leading one to autonomously choose self-destructive addictive behaviour or suicidal intentions. Methods: Phenomenological descriptions of the experiential structure of self-determination in addiction and suicidal mental life are used. The phenomenological method describes structures of mental life from the first-person-perspective, with a focus on how an experienced object is given in a subject’s conscious experience. Results: A sense of self-determination in the context of suicidal and addictive behaviour is possibly impaired. In the context of suicide, it's proposed that suicide is always experienced at least minimally self-determined, as it's the last freely discovered self-efficient behaviour, in terms of radically changing one's desperate mental state. Suicide can never be experienced as fully self-determined because no future retrospective re-evaluation of behaviour is possible. Understanding self-determination in addiction is challenging because addicts perceive themselves and experience situations differently depending on: (I) their level of intoxication; (II) whether the situation is in the moment or in retrospect; and (III) the goals set out in that situation. Furthermore, within phenomenology addiction is described as an embodied custom, which‘s acquired and established while performing 'psychotropic technique'. The main goal of performing such a technique is to continue 'floating in an indifference state' or being 'comfortably numb'. Conclusions: Based on rich phenomenological descriptions of the studied phenomenon, this paper draws on the premise that to experience self-determination in both suicide and addiction, underlying desperate or negative emotional states are needed. Such underlying desperate or negative mental life experiences are required for one to pre-reflectively evaluate suicide or addictive behaviours as positive, relieving or effective in terms of changing one's emotional states. Such pre-reflective positive evaluations serve as the base for the continuation of behaviour and later are identified reflectively.Keywords: addiction, phenomenology, self-determination, self-effectivity, suicide
Procedia PDF Downloads 1651722 Exploring Twitter Data on Human Rights Activism on Olympics Stage through Social Network Analysis and Mining
Authors: Teklu Urgessa, Joong Seek Lee
Abstract:
Social media is becoming the primary choice of activists to make their voices heard. This fact is coupled by two main reasons. The first reason is the emergence web 2.0, which gave the users opportunity to become content creators than passive recipients. Secondly the control of the mainstream mass media outlets by the governments and individuals with their political and economic interests. This paper aimed at exploring twitter data of network actors talking about the marathon silver medalists on Rio2016, who showed solidarity with the Oromo protesters in Ethiopia on the marathon race finish line when he won silver. The aim is to discover important insight using social network analysis and mining. The hashtag #FeyisaLelisa was used for Twitter network search. The actors’ network was visualized and analyzed. It showed the central influencers during first 10 days in August, were international media outlets while it was changed to individual activist in September. The degree distribution of the network is scale free where the frequency of degrees decay by power low. Text mining was also used to arrive at meaningful themes from tweet corpus about the event selected for analysis. The semantic network indicated important clusters of concepts (15) that provided different insight regarding the why, who, where, how of the situation related to the event. The sentiments of the words in the tweets were also analyzed and indicated that 95% of the opinions in the tweets were either positive or neutral. Overall, the finding showed that Olympic stage protest of the marathoner brought the issue of Oromo protest to the global stage. The new research framework is proposed based for event-based social network analysis and mining based on the practical procedures followed in this research for event-based social media sense making.Keywords: human rights, Olympics, social media, network analysis, social network ming
Procedia PDF Downloads 2591721 Concept Analysis of Professionalism in Teachers and Faculty Members
Authors: Taiebe Shokri, Shahram Yazdani, Leila Afshar, Soleiman Ahmadi
Abstract:
Introduction: The importance of professionalism in higher education not only determines the appropriate and inappropriate behaviors and guides faculty members in the implementation of professional responsibilities, but also guarantees faculty members' adherence to professional principles and values, ensures the quality of teaching and facilitator will be the teaching-learning process in universities and will increase the commitment to meet the needs of students as well as the development of an ethical culture based on ethics. Therefore, considering the important role of medical education teachers to prepare teachers and students in the future, the need to determine the concept of professional teacher and teacher, and the characteristics of teacher professionalism, we have explained the concept of professionalism in teachers in this study. Methods: The concept analysis method used in this study was Walker and Avant method which has eight steps. Walker and Avant state the purpose of concept analysis as follows: The process of distinguishing between the defining features of a concept and its unrelated features. The process of concept analysis includes selecting a concept, determining the purpose of the analysis, identifying the uses of the concept, determining the defining features of the concept, identifying a model, identifying boundary and adversarial items, identifying the precedents and consequences of the concept, and defining empirical references. is. Results: Professionalism in its general sense, requires deep knowledge, insight, creating a healthy and safe environment, honesty and trust, impartiality, commitment to the profession and continuous improvement, punctuality, criticism, professional competence, responsibility, and Individual accountability, especially in social interactions, is an effort for continuous improvement, the acquisition of these characteristics is not easily possible and requires education, especially continuous learning. Professionalism is a set of values, behaviors, and relationships that underpin public trust in teachers.Keywords: concept analysis, medical education, professionalism, faculty members
Procedia PDF Downloads 1581720 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain
Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas
Abstract:
Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency
Procedia PDF Downloads 1561719 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups
Authors: John Hardy
Abstract:
Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism
Procedia PDF Downloads 2941718 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)
Authors: Hafiza Khaddija Saman, Muhammad Sufyan
Abstract:
The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.Keywords: protocol, MANET, ad-Hoc, communication
Procedia PDF Downloads 2661717 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies
Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell
Abstract:
Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.Keywords: smart farming, Internet of Things, communication layer, cyber-attack
Procedia PDF Downloads 2461716 Integrating Best Practices for Construction Waste in Quality Management Systems
Authors: Paola Villoria Sáez, Mercedes Del Río Merino, Jaime Santa Cruz Astorqui, Antonio Rodríguez Sánchez
Abstract:
The Spanish construction industry generates large volumes of waste. However, despite the legislative improvements introduced for construction and demolition waste (CDW), construction waste recycling rate remains well below other European countries and also below the target set for 2020. This situation can be due to many difficulties. i.e.: The difficulty of onsite segregation or the estimation in advance of the total amount generated. Despite these difficulties, the proper management of CDW must be one of the main aspects to be considered by the construction companies. In this sense, some large national companies are implementing Integrated Management Systems (IMS) including not only quality and safety aspects, but also environment issues. However, although this fact is a reality for large construction companies still the vast majority of companies need to adopt this trend. In short, it is common to find in small and medium enterprises a decentralized management system: A single system of quality management, another for system safety management and a third one for environmental management system (EMS). In addition, the EMSs currently used address CDW superficially and are mainly focus on other environmental concerns such as carbon emissions. Therefore, this research determines and implements a specific best practice management system for CDW based on eight procedures in a Spanish Construction company. The main advantages and drawbacks of its implementation are highlighted. Results of this study show that establishing and implementing a CDW management system in building works, improve CDW quantification as the company obtains their own CDW generation ratio. This helps construction stakeholders when developing CDW Management Plans and also helps to achieve a higher adjustment of CDW management costs. Finally, integrating this CDW system with the EMS of the company favors the cohesion of the construction process organization at all stages, establishing responsibilities in the field of waste and providing a greater control over the process.Keywords: construction and demolition waste, waste management, best practices, waste minimization, building, quality management systems
Procedia PDF Downloads 5351715 The Lasting Impact of Parental Conflict on Self-Differentiation of Young Adult OffspringThe Lasting Impact of Parental Conflict on Self-Differentiation of Young Adult Offspring
Authors: A. Benedetto, P. Wong, N. Papouchis, L. W. Samstag
Abstract:
Bowen’s concept of self-differentiation describes a healthy balance of autonomy and intimacy in close relationships, and it has been widely researched in the context of family dynamics. The current study aimed to clarify the impact of family dysfunction on self-differentiation by specifically examining conflict between parents, and by including young adults, an underexamined age group in this domain (N = 300; ages 18 to 30). It also identified a protective factor for offspring from conflictual homes. The 300 young adults (recruited online through Mechanical Turk) completed the Differentiation of Self Inventory (DSI), the Children’s Perception of Interparental Conflict Scale (CPIC), the Parental Bonding Instrument (PBI), and the Symptom Checklist-90-Revised (SCL-90-R). Analyses revealed that interparental conflict significantly impairs self-differentiation among young adult offspring. Specifically, exposure to parental conflict showed a negative impact on young adults’ sense of self, emotional reactivity, and interpersonal cutoff in the context of close relationships. Parental conflict was also related to increased psychological distress among offspring. Surprisingly, the study found that parental divorce does not impair self-differentiation in offspring, demonstrating the distinctly harmful impact of conflict. These results clarify a unique type of family dysfunction that impairs self-differentiation, specifically in distinguishing it from parental divorce; it examines young adults, a critical age group not previously examined in this domain; and it identifies a moderating protective factor (a strong parent-child bond) for offspring exposed to conflict. Overall, results suggest the need for modifications in parental behavior in order to protect offspring at risk of lasting emotional and interpersonal damage.Keywords: divorce, family dysfunction, parental conflict, parent-child bond, relationships, self-differentiation, young adults
Procedia PDF Downloads 1581714 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition
Authors: Arūnas Burinskas
Abstract:
Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.Keywords: Bertrand and Cournot Competition, competition model, industry 4.0, industrial organisation, monopolistic competition
Procedia PDF Downloads 1441713 Self-Congruence and Oppositional Brand Loyalty: The Role of Consumer Engagement, Consumer Brand Identification and Gender
Authors: Muhammad Sheeraz, Mehwish Ejaz
Abstract:
This study endeavors to enhance the understanding of the determinants of oppositional brand loyalty, particularly within the context of fans of a sports brand. The primary focus is on investigating how oppositional brand loyalty fosters rivalry among the fans and exploring the interplay between various variables, namely self-congruence, consumer brand identification, consumer brand engagement, and narcissism, in influencing the likelihood of endorsing a rival team. The research adopts a cross-sectional survey methodology, employing a structured questionnaire distributed both online and onsite to gather responses from a representative sample of 460 PSL fans in Pakistan. The data collection process involved obtaining responses from diverse settings, including universities, shopping malls, and other public spaces frequented by PSL enthusiasts. Participants were prompted to indicate their allegiance to a specific PSL team and subsequently respond to the questionnaire based on their preferences. The findings of the study reveal that narcissism, as a moderating factor, exhibits no significant influence on consumer brand identification, consumer brand engagement, and oppositional brand loyalty. However, it does emerge as a significant moderator in the relationship between self-congruence and consumer brand identification. Particularly, consumers express brand identification through self-congruence, elucidating the existence of oppositional sentiments among PSL fans and their counterparts supporting rival teams. The implications of these results underscore the importance for marketers to establish a brand identity that resonates with consumers on a personal level. Such an approach fosters a strong sense of identification with the brand, prompting consumers to vigorously defend and support their favored brands, even in the face of opposition from rival teams. Marketers are encouraged to focus on cultivating long-term consumer loyalty, as it proves pivotal in maintaining a competitive advantage over industry counterparts.Keywords: oppositional brand loyalty, consumer brand identification, consumer brand engagement, narcissism, self-congruence
Procedia PDF Downloads 751712 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing
Authors: G. Rajeshwari, V. D. M. Jabez Daniel
Abstract:
Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag
Procedia PDF Downloads 3071711 Integrated Approach Towards Safe Wastewater Reuse in Moroccan Agriculture
Authors: Zakia Hbellaq
Abstract:
The Mediterranean region is considered a hotbed for climate change. Morocco is a semi-arid Mediterranean country facing water shortages and poor water quality. Its limited water resources limit the activities of various economic sectors. Most of Morocco's territory is in arid and desert areas. The potential water resources are estimated at 22 billion m3, which is equivalent to about 700 m3/inhabitant/year, and Morocco is in a state of structural water stress. Strictly speaking, the Kingdom of Morocco is one of the “very riskiest” countries, according to the World Resources Institute (WRI), which oversees the calculation of water stress risk in 167 countries. The surprising results of the Institute (WRI) rank Morocco as one of the riskiest countries in terms of water scarcity, ranking 3.89 out of 5, thus occupying the 23rd place out of a total of 167 countries, which indicates that the demand for water exceeds the available resources. Agriculture with a score of 3.89 is most affected by water stress from irrigation and places a heavy burden on the water table. Irrigation is an unavoidable technical need and has undeniable economic and social benefits given the available resources and climatic conditions. Irrigation, and therefore the agricultural sector, currently uses 86% of its water resources, while industry uses 5.5%. Although its development has undeniable economic and social benefits, it also contributes to the overfishing of most groundwater resources and the surprising decline in levels and deterioration of water quality in some aquifers. In this context, REUSE is one of the proposed solutions to reduce the water footprint of the agricultural sector and alleviate the shortage of water resources. Indeed, wastewater reuse, also known as REUSE (reuse of treated wastewater), is a step forward not only for the circular economy but also for the future, especially in the context of climate change. In particular, water reuse provides an alternative to existing water supplies and can be used to improve water security, sustainability, and resilience. However, given the introduction of organic trace pollutants or, organic micro-pollutants, the absorption of emerging contaminants, and decreasing salinity, it is possible to tackle innovative capabilities to overcome these problems and ensure food and health safety. To this end, attention will be paid to the adoption of an integrated and attractive approach, based on the reinforcement and optimization of the treatments proposed for the elimination of the organic load with particular attention to the elimination of emerging pollutants, to achieve this goal. , membrane bioreactors (MBR) as stand-alone technologies are not able to meet the requirements of WHO guidelines. They will be combined with heterogeneous Fenton processes using persulfate or hydrogen peroxide oxidants. Similarly, adsorption and filtration are applied as tertiary treatment In addition, the evaluation of crop performance in terms of yield, productivity, quality, and safety, through the optimization of Trichoderma sp strains that will be used to increase crop resistance to abiotic stresses, as well as the use of modern omics tools such as transcriptomic analysis using RNA sequencing and methylation to identify adaptive traits and associated genetic diversity that is tolerant/resistant/resilient to biotic and abiotic stresses. Hence, ensuring this approach will undoubtedly alleviate water scarcity and, likewise, increase the negative and harmful impact of wastewater irrigation on the condition of crops and the health of their consumers.Keywords: water scarcity, food security, irrigation, agricultural water footprint, reuse, emerging contaminants
Procedia PDF Downloads 1661710 A Monolithic Arbitrary Lagrangian-Eulerian Finite Element Strategy for Partly Submerged Solid in Incompressible Fluid with Mortar Method for Modeling the Contact Surface
Authors: Suman Dutta, Manish Agrawal, C. S. Jog
Abstract:
Accurate computation of hydrodynamic forces on floating structures and their deformation finds application in the ocean and naval engineering and wave energy harvesting. This manuscript presents a monolithic, finite element strategy for fluid-structure interaction involving hyper-elastic solids partly submerged in an incompressible fluid. A velocity-based Arbitrary Lagrangian-Eulerian (ALE) formulation has been used for the fluid and a displacement-based Lagrangian approach has been used for the solid. The flexibility of the ALE technique permits us to treat the free surface of the fluid as a Lagrangian entity. At the interface, the continuity of displacement, velocity and traction are enforced using the mortar method. In the mortar method, the constraints are enforced in a weak sense using the Lagrange multiplier method. In the literature, the mortar method has been shown to be robust in solving various contact mechanics problems. The time-stepping strategy used in this work reduces to the generalized trapezoidal rule in the Eulerian setting. In the Lagrangian limit, in the absence of external load, the algorithm conserves the linear and angular momentum and the total energy of the system. The use of monolithic coupling with an energy-conserving time-stepping strategy gives an unconditionally stable algorithm and allows the user to take large time steps. All the governing equations and boundary conditions have been mapped to the reference configuration. The use of the exact tangent stiffness matrix ensures that the algorithm converges quadratically within each time step. The robustness and good performance of the proposed method are demonstrated by solving benchmark problems from the literature.Keywords: ALE, floating body, fluid-structure interaction, monolithic, mortar method
Procedia PDF Downloads 2771709 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation
Authors: Venkata Venugopal Rao Gudlur
Abstract:
The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework
Procedia PDF Downloads 1051708 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream
Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang
Abstract:
Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.Keywords: H.264, video bitstream, video object tracking, sports training
Procedia PDF Downloads 4291707 ‘An Invisible Labyrinth of Time’: Temporal Disjunction in J.M. Coetzee’s Dusklands
Authors: Barbara Janari
Abstract:
This paper focuses on temporality in J.M. Coetzee’s first novel, Dusklands, to argue that the novel’s fractured, disjointed temporality is intricately linked to the representations of the war in Vietnam and the colonial project in South Africa. The disrupted temporalities in the novel eschew chronological plots and linear time in favour of narratives that subvert the notion of historical progress to suggest instead the coextensive, multivalent ways in which the past and present interpenetrate one another. The disruption of temporal flow in the novel is evident in its form – the novel comprises two novellas that are juxtaposed, with the first part (‘The Vietnam War’) set centuries before the second part (‘The Narrative of Jacobus Coetzee’). The juxtaposition of the two novellas suggests history’s sometimes overlapping and lateral, rather than linear, movement. The novel’s form is extended in its montage narrative structure, which works to extend its temporal range. The temporal disjunction is reinforced, firstly, by Coetzee’s textual strategies, which include the subversion and critique of realism, parody, repetition, and the narrative technique of montage, and secondly, by the novel’s thematic concerns, which focus on the ways in which American domination can be linked to the colonial quest from earlier times. The complex structure of various strands and levels of authorship slows down the narrative’s temporal flow, requiring the reader to spend a fair amount of time unraveling the various parts of the narrative and relating them to each other. The structure epitomizes reflexive referencing, in which the reader can only make sense of the narrative by going back and forth and connecting various parts of it. The narrative structure also emphasizes the underlying similarities in the brutality that marked these two distinct historical events, epitomized by the drive towards subjection and domination by the novel’s two protagonists, Eugene Dawn and Jacobus Coetzee. The links and overlapping strands between the two novellas emphasize the ways in which the historical truth of colonial discourse becomes as much a myth as the propaganda program in Vietnam.Keywords: disjunction, juxtaposition, montage, temporality
Procedia PDF Downloads 681706 Multi-Functional Metal Oxides as Gas Sensors, Photo-Catalysts and Bactericides
Authors: Koyar Rane
Abstract:
Nano- to submicron size particles of narrow particle size distribution of semi-conducting TiO₂, ZnO, NiO, CuO, Fe₂O₃ have been synthesized by novel hydrazine method and tested for their gas sensing, photocatalytic and bactericidal activities and the behavior found to be enhanced when the oxides in the thin film forms, that obtained in a specially built spray pyrolysis reactor. Hydrazine method is novel in the sense, say, the UV absorption edge of the white pigment grade wide band gap (~3.2eV) TiO₂ and ZnO shifted to the visible region turning into yellowish particles, indicating modification occurring the band structure. The absorption in the visible region makes these oxides visible light sensitive photocatalysis in degrading pollutants, especially the organic dyes which otherwise increase the chemical oxygen demand of the drinking water, enabling the process feasible not under the harsh energetic UV radiation regime. The electromagnetic radiations on irradiation produce electron-hole pairs Semiconductor + hν → e⁻ + h⁺ The electron-hole pairs thus produced form Reactive Oxygen Species, ROS, on the surface of the semiconductors, O₂(adsorbed)+e⁻ → O₂• - superoxide ion OH-(surface)+h⁺ →•OH - Hydroxyl radical The ROS attack the organic material and micro-organisms. Our antibacterial studies indicate the metal oxides control the Biological Oxygen Demand (BOD) of drinking water which had beyond the safe level normally found in the municipal supply. Metal oxides in the thin film form show overall enhanced properties and the films are reusable. The results of the photodegradation and antibactericidal studies are discussed. Gas sensing studies too have been done to find the versatility of the multifunctional metal oxides.Keywords: hydrazine method, visible light sensitive, photo-degradation of dyes, water/airborne pollutant
Procedia PDF Downloads 1631705 Understanding Natural Resources Governance in Canada: The Role of Institutions, Interests, and Ideas in Alberta's Oil Sands Policy
Authors: Justine Salam
Abstract:
As a federal state, Canada’s constitutional arrangements regarding the management of natural resources is unique because it gives complete ownership and control of natural resources to the provinces (subnational level). However, the province of Alberta—home to the third largest oil reserves in the world—lags behind comparable jurisdictions in levying royalties on oil corporations, especially oil sands royalties. While Albertans own the oil sands, scholars have argued that natural resource exploitation in Alberta benefits corporations and industry more than it does Albertans. This study provides a systematic understanding of the causal factors affecting royalties in Alberta to map dynamics of power and how they manifest themselves during policy-making. Mounting domestic and global public pressure led Alberta to review its oil sands royalties twice in less than a decade through public-commissioned Royalty Review Panels, first in 2007 and again in 2015. The Panels’ task was to research best practices and to provide policy recommendations to the Government through public consultations with Albertans, industry, non-governmental organizations, and First Nations peoples. Both times, the Panels recommended a relative increase to oil sands royalties. However, irrespective of the Reviews’ recommendations, neither the right-wing 2007 Progressive Conservative Party (PC) nor the left-wing 2015 New Democratic Party (NDP) government—both committed to increase oil sands royalties—increased royalty intake. Why did two consecutive political parties at opposite ends of the political spectrum fail to account for the recommendations put forward by the Panel? Through a qualitative case-study analysis, this study assesses domestic and global causal factors for Alberta’s inability to raise oil sands royalties significantly after the two Reviews through an institutions, interests, and ideas framework. Indeed, causal factors can be global (e.g. market and price fluctuation) or domestic (e.g. oil companies’ influence on the Alberta government). The institutions, interests, and ideas framework is at the intersection of public policy, comparative studies, and political economy literatures, and therefore draws multi-faceted insights into the analysis. To account for institutions, the study proposes to review international trade agreements documents such as the North American Free Trade Agreement (NAFTA) because they have embedded Alberta’s oil sands into American energy security policy and tied Canadian and Albertan oil policy in legal international nods. To account for interests, such as how the oil lobby or the environment lobby can penetrate governmental decision-making spheres, the study draws on the Oil Sands Oral History project, a database of interviews from government officials and oil industry leaders at a pivotal time in Alberta’s oil industry, 2011-2013. Finally, to account for ideas, such as how narratives of Canada as a global ‘energy superpower’ and the importance of ‘energy security’ have dominated and polarized public discourse, the study relies on content analysis of Alberta-based pro-industry newspapers to trace the prevalence of these narratives. By mapping systematically the nods and dynamics of power at play in Alberta, the study sheds light on the factors that influence royalty policy-making in one of the largest industries in Canada.Keywords: Alberta Canada, natural resources governance, oil sands, political economy
Procedia PDF Downloads 1361704 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research
Authors: Arpita Mitra
Abstract:
The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.Keywords: terrorism, reintegration, young returnees, criminology
Procedia PDF Downloads 631703 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection
Authors: Hongyu Chen, Li Jiang
Abstract:
Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers
Procedia PDF Downloads 1311702 Climate Change and Food Security: Effects of Ozone on Crops in North-West Pakistan
Authors: Muhammad Nauman Ahmad, Patrick Büker, Sofia Khalid, Leon Van Den Berg, Hamid Ullah Shah, Abdul Wahid, Lisa Emberson, Sally A. Power, Mike Ashmore
Abstract:
Although ozone is well-documented to affect crop yields in the densely populated Indo-Gangetic Plain, there is little knowledge of its effects around cities in more remote areas of South Asia. We surveyed crops around the city of Peshawar, Pakistan for visible injury, linking this to passive measurements of ozone concentrations. Foliar injury was found in the field on potato, onion and cotton when the mean monthly ozone concentration reached 35-55ppb. The symptoms on onion were reproduced in ozone fumigation experiments, which also showed that daytime ozone concentrations of 60ppb and above significantly reduce the growth of Pakistani varieties of both spinach (Beta vulgaris) and onion. Aphid infestation on spinach was also reduced at these elevated ozone concentrations. The ozone concentrations in Peshawar are comparable to those through many parts of northern south Asia, where ozone may therefore be a significant threat to sensitive vegetable crops in peri-urban regions.Keywords: ozone, air pollution, vegetable crops, peshawar, south asia
Procedia PDF Downloads 742