Search results for: security concerns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4502

Search results for: security concerns

1712 Enhancing Warehousing Operation In Cold Supply Chain Through The Use Of IOT And Lifi Technologies

Authors: Sarah El-Gamal, Passent Hossam, Ahmed Abd El Aziz, Rojina Mahmoud, Ahmed Hassan, Dalia Hilal, Eman Ayman, Hana Haytham, Omar Khamis

Abstract:

Several concerns fall upon the supply chain, especially the cold supply chain. According to the literature, the main challenges in the cold supply chain are the distribution and storage phases. In this research, researchers focused on the storage area, which contains several activities such as the picking activity that faces a lot of obstacles and challenges The implementation of IoT solutions enables businesses to monitor the temperature of food items, which is perhaps the most critical parameter in cold chains. Therefore, researchers proposed a practical solution that would help in eliminating the problems related to ineffective picking for products, especially fish and seafood products, by using IoT technology, most notably LiFi technology. Thus, guaranteeing sufficient picking, reducing waste, and consequently lowering costs. A prototype was specially designed and examined. This research is a single case study research. Two methods of data collection were used; observation and semi-structured interviews. Semi-structured interviews were conducted with managers and decision maker at Carrefour Alexandria to validate the problem and the proposed practical solution using IoTandLiFi technology. A total of three interviews were conducted. As a result, a SWOT analysis was achieved in order to highlight all the strengths and weaknesses of using the recommended Lifi solution in the picking process. According to the investigations, it was found that the use of IoT and LiFi technology is cost effective, efficient, and reduces human errors, minimize the percentage of product waste and thus save money and cost. Thus, increasing customer satisfaction and profits gained.

Keywords: cold supply chain, picking process, temperature control, IOT, warehousing, LIFI

Procedia PDF Downloads 189
1711 A Systematic Categorization of Arguments against the Vision Zero Goal: A Literature Review

Authors: Henok Girma Abebe

Abstract:

The Vision Zero is a long-term goal of preventing all road traffic fatalities and serious injuries which was first adopted in Sweden in 1997. It is based on the assumption that death and serious injury in the road system is morally unacceptable. In order to approach this end, vision zero has put in place strategies that are radically different from the traditional safety work. The vision zero, for instance, promoted the adoption of the best available technology to promote safety, and placed the ultimate responsibility for traffic safety on system designers. Despite Vision Zero’s moral appeal and its expansion to different safety areas and also parts of the world, important philosophical concerns related to the adoption and implementation of the vision zero remain to be addressed. Moreover, the vision zero goal has been criticized on different grounds. The aim of this paper is to identify and systematically categorize criticisms that have been put forward against vision zero. The findings of the paper are solely based on a critical analysis of secondary sources and snowball method is employed to identify the relevant philosophical and empirical literatures. Two general categories of criticisms on the vision zero goal are identified. The first category consists of criticisms that target the setting of vision zero as a ‘goal’ and some of the basic assumptions upon which the goal is based. Among others, the goal of achieving zero fatalities and serious injuries, together with vision zero’s lexicographical prioritization of safety has been criticized as unrealistic. The second category consists of criticisms that target the strategies put in place to achieve the goal of zero fatalities and serious injuries. For instance, Vision zero’s responsibility ascription for road safety and its rejection of cost-benefit analysis in the formulation and adoption of safety measures has both been criticized as counterproductive. In this category also falls the criticism that Vision Zero safety measures tend to be too paternalistic. Significant improvements have been recorded in road safety work since the adoption of vision zero, however, for the vision zero to even succeed more, it is important that issues and criticisms of philosophical nature associated with it are identified and critically dealt with.

Keywords: criticisms, systems approach, traffic safety, vision zero

Procedia PDF Downloads 298
1710 Analysis of Two-Echelon Supply Chain with Perishable Items under Stochastic Demand

Authors: Saeed Poormoaied

Abstract:

Perishability and developing an intelligent control policy for perishable items are the major concerns of marketing managers in a supply chain. In this study, we address a two-echelon supply chain problem for perishable items with a single vendor and a single buyer. The buyer adopts an aged-based continuous review policy which works by taking both the stock level and the aging process of items into account. The vendor works under the warehouse framework, where its lot size is determined with respect to the batch size of the buyer. The model holds for a positive and fixed lead time for the buyer, and zero lead time for the vendor. The demand follows a Poisson process and any unmet demand is lost. We provide exact analytic expressions for the operational characteristics of the system by using the renewal reward theorem. Items have a fixed lifetime after which they become unusable and are disposed of from the buyer's system. The age of items starts when they are unpacked and ready for the consumption at the buyer. When items are held by the vendor, there is no aging process which results in no perishing at the vendor's site. The model is developed under the centralized framework, which takes the expected profit of both vendor and buyer into consideration. The goal is to determine the optimal policy parameters under the service level constraint at the retailer's site. A sensitivity analysis is performed to investigate the effect of the key input parameters on the expected profit and order quantity in the supply chain. The efficiency of the proposed age-based policy is also evaluated through a numerical study. Our results show that when the unit perishing cost is negligible, a significant cost saving is achieved.

Keywords: two-echelon supply chain, perishable items, age-based policy, renewal reward theorem

Procedia PDF Downloads 141
1709 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 42
1708 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 363
1707 A Multi-Output Network with U-Net Enhanced Class Activation Map and Robust Classification Performance for Medical Imaging Analysis

Authors: Jaiden Xuan Schraut, Leon Liu, Yiqiao Yin

Abstract:

Computer vision in medical diagnosis has achieved a high level of success in diagnosing diseases with high accuracy. However, conventional classifiers that produce an image to-label result provides insufficient information for medical professionals to judge and raise concerns over the trust and reliability of a model with results that cannot be explained. In order to gain local insight into cancerous regions, separate tasks such as imaging segmentation need to be implemented to aid the doctors in treating patients, which doubles the training time and costs which renders the diagnosis system inefficient and difficult to be accepted by the public. To tackle this issue and drive AI-first medical solutions further, this paper proposes a multi-output network that follows a U-Net architecture for image segmentation output and features an additional convolutional neural networks (CNN) module for auxiliary classification output. Class activation maps are a method of providing insight into a convolutional neural network’s feature maps that leads to its classification but in the case of lung diseases, the region of interest is enhanced by U-net-assisted Class Activation Map (CAM) visualization. Therefore, our proposed model combines image segmentation models and classifiers to crop out only the lung region of a chest X-ray’s class activation map to provide a visualization that improves the explainability and is able to generate classification results simultaneously which builds trust for AI-led diagnosis systems. The proposed U-Net model achieves 97.61% accuracy and a dice coefficient of 0.97 on testing data from the COVID-QU-Ex Dataset which includes both diseased and healthy lungs.

Keywords: multi-output network model, U-net, class activation map, image classification, medical imaging analysis

Procedia PDF Downloads 200
1706 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 133
1705 Academic Success, Problem-Based Learning and the Middleman: The Community Voice

Authors: Isabel Medina, Mario Duran

Abstract:

Although Problem-based learning provides students with multiple opportunities for rigorous instructional experiences in which students are challenged to address problems in the community; there are still gaps in connecting community leaders to the PBL process. At a south Texas high school, community participation serves as an integral component of the PBL process. Problem-based learning (PBL) has recently gained momentum due to the increase in global communities that value collaboration and critical thinking. As an instructional approach, PBL engages high school students in meaningful learning experiences. Furthermore, PBL focuses on providing students with a connection to real-world situations that require effective peer collaboration. For PBL leaders, providing students with a meaningful process is as important as the final PBL outcome. To achieve this goal, STEM high school strategically created a space for community involvement to be woven within the PBL fabric. This study examines the impact community members had on PBL students attending a STEM high school in South Texas. At STEM High School, community members represent a support system that works through the PBL process to ensure students receive real-life mentoring from business and industry leaders situated in the community. A phenomenological study using a semi-structured approach was used to collect data about students’ perception of community involvement within the PBL process for one South Texas high school. In our proposed presentation, we will discuss how community involvement in the PBL process academically impacted the educational experience of high school students at STEM high school. We address the instructional concerns PBL critics have with the lack of direct instruction, by providing a representation of how STEM high school utilizes community members to assist in impacting the academic experience of students.

Keywords: phenomenological, STEM education, student engagement, community involvement

Procedia PDF Downloads 90
1704 Analyzing Mexican Adaptation of Shakespeare: A Study of Onstage Violence in Richard III and Its Impact on Mexican Viewers

Authors: Nelya Babynets

Abstract:

Shakespeare and Mexican theatregoers have enjoyed quite a complex relationship. Shakespearean plays have appeared on the Mexican stage with remarkable perseverance, yet with mixed success. Although Shakespeare has long been a part of the global cultural marketplace and his works are celebrated all around the world, the adaptation of his plays on the contemporary Mexican stage is always an adventure, since the works of this early modern author are frequently seen as the legacy of a ‘high’, but obsolete, culture, one that is quite distant from the present-day viewers’ daily experiences and concerns. Moreover, Mexican productions of Shakespeare are presented mostly in Peninsular Spanish, a language similar yet alien to the language spoken in Mexico, one that does not wholly fit into the viewers’ cultural praxis. This is the reason why Mexican dramatic adaptations of Shakespearean plays tend to replace the cultural references of the original piece with ones that are more significant and innate to Latin American spectators. This paper analyses the new Mexican production of Richard III adapted and directed by Mauricio Garcia Lozano, which employs onstage violence - a cultural force that is inherent to all human beings regardless of their beliefs, ethnic background or nationality - as the means to make this play more relevant to a present-day audience. Thus, this paper addresses how the bloody bombast of staged murders helps to avoid the tyranny of a rigid framework of fixed meanings that denies the possibility of an intercultural appropriation of this European play written over four hundred years ago. The impact of violence displayed in Garcia Lozano’s adaptation of Richard III on Mexican audiences will also be examined. This study is particularly relevant in Mexico where the term ‘tragedy’ has become a commonplace and where drug wars and state-sanctioned violence have already taken the lives of many people.

Keywords: audience, dramatic adaptation, Shakespeare, viewer

Procedia PDF Downloads 457
1703 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 152
1702 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 289
1701 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 260
1700 The Nexus Between the Rise of Autocratisation and the Deeper Level of BRI Engagement

Authors: Dishari Rakshit, Mitchell Gallagher

Abstract:

The global landscape is witnessing a disconcerting surge in democratic backsliding, engendering concerns over the rise of autocratisation. This research demonstrates the intricate relationship between a nation's domestic propensity for autocratic governance and its trade relations with China. Giving prominence to Belt and Road Initiative (BRI) investments, this study adopts a rigorous neorealist framework to discern the complexities of nations' economic interests amidst an anarchic milieu and how these interests may transcend steadfast adherence to democratic principles. The burgeoning bipolarity in the international political setting serves as a backdrop to our inquiry. To operationalise our hypothesis, we conduct a large-scale 'N' study, encompassing a comprehensive global dataset comprising countries' democracy indicators, total trade volume with China, and cumulative Chinese BRI investments over a substantial temporal expanse. By meticulously examining BRI signatories’, we aim to ascertain the potential accentuation of democratic backsliding among these nations. To test our empirical underpinning, we will validate our findings through cogent case studies. Our analysis adds to the scholarship on multifaceted interactions between trade dynamics and democratic governance within the fabric of the international political landscape. In its culmination, the paper addresses the question- has the erstwhile grandeur of bipolarity resurfaced in the contemporary global panorama? Concurrently, we explore the nexus between the ascendant wave of autocratisation as a by-product of the Beijing Consensus? Pertinent to policymakers, our discoveries stand poised to furnish a comprehensive grasp of the manifold implications arising from the deepening entanglements with China under the auspices of the BRI.

Keywords: democracy, autocracy, china, belt road initiative, international political economy

Procedia PDF Downloads 69
1699 Determination of Authorship of the Works Created by the Artificial Intelligence

Authors: Vladimir Sharapaev

Abstract:

This paper seeks to address the question of the authorship of copyrighted works created solely by the artificial intelligence or with the use thereof, and proposes possible interpretational or legislative solutions to the problems arising from the plurality of the persons potentially involved in the ultimate creation of the work and division of tasks among such persons. Being based on the commonly accepted assumption that a copyrighted work can only be created by a natural person, the paper does not deal with the issues regarding the creativity of the artificial intelligence per se (or the lack thereof), and instead focuses on the distribution of the intellectual property rights potentially belonging to the creators of the artificial intelligence and/or the creators of the content used for the formation of the copyrighted work. Moreover, the technical development and rapid improvement of the AI-based programmes, which tend to be reaching even greater independence on a human being, give rise to the question whether the initial creators of the artificial intelligence can be entitled to the intellectual property rights to the works created by such AI at all. As the juridical practice of some European courts and legal doctrine tends to incline to the latter opinion, indicating that the works created by the AI may not at all enjoy copyright protection, the questions of authorships appear to be causing great concerns among the investors in the development of the relevant technology. Although the technology companies dispose with further instruments of protection of their investments, the risk of the works in question not being copyrighted caused by the inconsistency of the case law and a certain research gap constitutes a highly important issue. In order to assess the possible interpretations, the author adopted a doctrinal and analytical approach to the research, systematically analysing the European and Czech copyright laws and case law in some EU jurisdictions. This study aims to contribute to greater legal certainty regarding the issues of the authorship of the AI-created works and define possible clues for further research.

Keywords: artificial intelligence, copyright, authorship, copyrighted work, intellectual property

Procedia PDF Downloads 120
1698 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 241
1697 Gamipulation: Exploring Covert Manipulation Through Gamification in the Context of Education

Authors: Aguiar-Castillo Lidia, Perez-Jimenez Rafael

Abstract:

The integration of gamification in educational settings aims to enhance student engagement and motivation through game design elements in learning activities. This paper introduces "Gamipulation," the subtle manipulation of students via gamification techniques serving hidden agendas without explicit consent. It highlights the need to distinguish between beneficial and exploitative uses of gamification in education, focusing on its potential to psychologically manipulate students for purposes misaligned with their best interests Through a literature review and expert interviews, this study presents a conceptual framework outlining gamipulation's features. It examines ethical concerns like gradually introducing desired behaviors, using distraction to divert attention from significant learning objectives, immediacy of rewards fostering short-term engagement over long-term learning, infantilization of students, and exploitation of emotional responses over reflective thinking. Additionally, it discusses ethical issues in collecting and utilizing student data within gamified environments. Key findings suggest that while gamification can enhance motivation and engagement, there's a fine line between ethical motivation and unethical manipulation. The study emphasizes the importance of transparency, respect for student autonomy, and alignment with educational values in gamified systems. It calls for educators and designers to be aware of gamification's manipulative potential and strive for ethical implementation that benefits students. In conclusion, this paper provides a framework for educators and researchers to understand and address gamipulation's ethical challenges. It encourages developing ethical guidelines and practices to ensure gamification in education remains a tool for positive engagement and learning rather than covert manipulation.

Keywords: gradualness, distraction, immediacy, infantilization, emotion

Procedia PDF Downloads 26
1696 Students' Online Evaluation: Impact on the Polytechnic University of the Philippines Faculty's Performance

Authors: Silvia C. Ambag, Racidon P. Bernarte, Jacquelyn B. Buccahi, Jessica R. Lacaron, Charlyn L. Mangulabnan

Abstract:

This study aimed to answer the query, “What is the impact of Students Online Evaluation on PUP Faculty’s Performance?” The problem of the study was resolve through the objective of knowing the perceived impact of students’ online evaluation on PUP faculty’s performance. The objectives were carried through the application of quantitative research design and by conducting survey research method. The researchers utilized primary and secondary data. Primary data was gathered from the self-administered survey and secondary data was collected from the books, articles on both print-out and online materials and also other theses related study. Findings revealed that PUP faculty in general stated that students’ online evaluation made a highly positive impact on their performance based on their ‘Knowledge of Subject’ and ‘Teaching for Independent Learning’, giving a highest mean of 3.62 and 3.60 respectively., followed by the faculty’s performance which gained an overall means of 3.55 and 3.53 are based on their ‘Commitment’ and ‘Management of Learning’. From the findings, the researchers concluded that Students’ online evaluation made a ‘Highly Positive’ impact on PUP faculty’s performance based on all Four (4) areas. Furthermore, the study’s findings reveal that PUP faculty encountered many problems regarding the students’ online evaluation; the impact of the Students’ Online Evaluation is significant when it comes to the employment status of the faculty; and most of the PUP faculty recommends reviewing the PUP Online Survey for Faculty Evaluation for improvement. Hence, the researchers recommend the PUP Administration to revisit and revise the PUP Online Survey for Faculty Evaluation, specifically review the questions and make a set of questions that will be appropriate to the discipline or field of the faculty. Also, the administration should fully orient the students about the importance, purpose and impact of online faculty evaluation. And lastly, the researchers suggest the PUP Faculty to continue their positive performance and continue on being cooperative with the administrations’ purpose of addressing the students’ concerns and for the students, the researchers urged them to take the online faculty evaluation honestly and objectively.

Keywords: on-line Evaluation, faculty, performance, Polytechnic University of the Philippines (PUP)

Procedia PDF Downloads 405
1695 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 380
1694 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing

Authors: G. Rajeshwari, V. D. M. Jabez Daniel

Abstract:

Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.

Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag

Procedia PDF Downloads 304
1693 Commentary on Successful and Emerging Bullying Control Programs: A Comparison between Eighteen Bullying Interventions Applied Worldwide

Authors: Sohni Siddiqui, Anja Schultze-Krumbholz

Abstract:

Our lives now revolve more around online-related tasks, as the internet has become a necessity. One of the disturbance concerns with high internet usage is the multiplication of cyber-associated risky behaviors such as cyber aggression and/or cyberbullying. Cyber Bullying is an emerging issue that needs immediate attention from many stakeholders such as parents, doctors, school administrators, policymakers, researchers, and others, especially in the COVID-19 pandemic when online learning has been adopted as an instructional strategy, and there is a continuous rise in cyberbullying cases. The aim of the article is to review existing successful and emerging interventions designed to control bullying and cyberbullying by engaging individuals through teachers’ professional development and adopting a whole-school approach. The study identified the strengths and limitations of the programs and suggested improvements to existing interventions. Preparing interventions with a strong theoretical framework, integrating applications of emerging theories in interventions, promoting proactive and reactive strategies in combination, beginning with the baseline needs assessment surveys, reducing digital time and digital divide among parents and children, promoting the concept of lead trainer, peer trainer, and hot spots, focusing on physical activities, use of landmarks are some of the recommendations proposed by authors. In addition to face-to-face intervention, the researchers recommend updating and improving previous intervention programs with games and apps. Especially in the time of pandemic crises, when face-to-face interactions are limited and cyberbullying is triggered, the use of apps, web-based interventions, and games can be an effective way to control electronic perpetration and victimization.

Keywords: anti bullying programs, cyber bullying, individualized trainings, teachers’ professional development, whole school interventions

Procedia PDF Downloads 149
1692 Integrated Approach Towards Safe Wastewater Reuse in Moroccan Agriculture

Authors: Zakia Hbellaq

Abstract:

The Mediterranean region is considered a hotbed for climate change. Morocco is a semi-arid Mediterranean country facing water shortages and poor water quality. Its limited water resources limit the activities of various economic sectors. Most of Morocco's territory is in arid and desert areas. The potential water resources are estimated at 22 billion m3, which is equivalent to about 700 m3/inhabitant/year, and Morocco is in a state of structural water stress. Strictly speaking, the Kingdom of Morocco is one of the “very riskiest” countries, according to the World Resources Institute (WRI), which oversees the calculation of water stress risk in 167 countries. The surprising results of the Institute (WRI) rank Morocco as one of the riskiest countries in terms of water scarcity, ranking 3.89 out of 5, thus occupying the 23rd place out of a total of 167 countries, which indicates that the demand for water exceeds the available resources. Agriculture with a score of 3.89 is most affected by water stress from irrigation and places a heavy burden on the water table. Irrigation is an unavoidable technical need and has undeniable economic and social benefits given the available resources and climatic conditions. Irrigation, and therefore the agricultural sector, currently uses 86% of its water resources, while industry uses 5.5%. Although its development has undeniable economic and social benefits, it also contributes to the overfishing of most groundwater resources and the surprising decline in levels and deterioration of water quality in some aquifers. In this context, REUSE is one of the proposed solutions to reduce the water footprint of the agricultural sector and alleviate the shortage of water resources. Indeed, wastewater reuse, also known as REUSE (reuse of treated wastewater), is a step forward not only for the circular economy but also for the future, especially in the context of climate change. In particular, water reuse provides an alternative to existing water supplies and can be used to improve water security, sustainability, and resilience. However, given the introduction of organic trace pollutants or, organic micro-pollutants, the absorption of emerging contaminants, and decreasing salinity, it is possible to tackle innovative capabilities to overcome these problems and ensure food and health safety. To this end, attention will be paid to the adoption of an integrated and attractive approach, based on the reinforcement and optimization of the treatments proposed for the elimination of the organic load with particular attention to the elimination of emerging pollutants, to achieve this goal. , membrane bioreactors (MBR) as stand-alone technologies are not able to meet the requirements of WHO guidelines. They will be combined with heterogeneous Fenton processes using persulfate or hydrogen peroxide oxidants. Similarly, adsorption and filtration are applied as tertiary treatment In addition, the evaluation of crop performance in terms of yield, productivity, quality, and safety, through the optimization of Trichoderma sp strains that will be used to increase crop resistance to abiotic stresses, as well as the use of modern omics tools such as transcriptomic analysis using RNA sequencing and methylation to identify adaptive traits and associated genetic diversity that is tolerant/resistant/resilient to biotic and abiotic stresses. Hence, ensuring this approach will undoubtedly alleviate water scarcity and, likewise, increase the negative and harmful impact of wastewater irrigation on the condition of crops and the health of their consumers.

Keywords: water scarcity, food security, irrigation, agricultural water footprint, reuse, emerging contaminants

Procedia PDF Downloads 157
1691 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 100
1690 Impacts on Atmospheric Mercury from Changes in Climate, Land Use, Land Cover, and Wildfires

Authors: Shiliang Wu, Huanxin Zhang, Aditya Kumar

Abstract:

There have been increasing concerns on atmospheric mercury as a toxic and bioaccumulative pollutant in the global environment. Global change, including changes in climate change, land use, land cover and wildfires activities can all have significant impacts on atmospheric mercury. In this study, we use a global chemical transport model (GEOS-Chem) to examine the potential impacts from global change on atmospheric mercury. All of these factors in the context of global change are found to have significant impacts on the long-term evolution of atmospheric mercury and can substantially alter the global source-receptor relationships for mercury. We also estimate the global Hg emissions from wildfires for present-day and the potential impacts from the 2000-2050 changes in climate, land use and land cover and Hg anthropogenic emissions by combining statistical analysis with global data on vegetation type and coverage as well as fire activities. Present global Hg wildfire emissions are estimated to be 612 Mg year-1. Africa is the dominant source region (43.8% of global emissions), followed by Eurasia (31%) and South America (16.6%). We find significant perturbations to wildfire emissions of Hg in the context of global change, driven by the projected changes in climate, land use and land cover and Hg anthropogenic emissions. 2000-2050 climate change could increase Hg emissions by 14% globally. Projected changes in land use by 2050 could decrease the global Hg emissions from wildfires by 13% mainly driven by a decline in African emissions due to significant agricultural land expansion. Future land cover changes could lead to significant increases in Hg emissions over some regions (+32% North America, +14% Africa, +13% Eurasia). Potential enrichment of terrestrial ecosystems in 2050 in response to changes in Hg anthropogenic emissions could increase Hg wildfire emissions both globally (+28%) and regionally. Our results indicate that the future evolution of climate, land use and land cover and Hg anthropogenic emissions are all important factors affecting Hg wildfire emissions in the coming decades.

Keywords: climate change, land use, land cover, wildfires

Procedia PDF Downloads 323
1689 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream

Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang

Abstract:

Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.

Keywords: H.264, video bitstream, video object tracking, sports training

Procedia PDF Downloads 427
1688 Exploring the Concerns and Practices Associated with Organ Transplantation in the Context of Muslims in Pakistan from an Anthropological Perspective

Authors: Qurratulain Faheem

Abstract:

The human body often serves as a reference point to analyse the notions of self and society. Situating on Merleau-Ponty and Bourdieu theories of embodiments, this research explores the notions around the human body and its influence on the ethical considerations in regards to organ transplantation among the Muslim communities in Pakistan. The context of Pakistan makes an intriguing case study as cadaveric organ transplantation is not in practise. Whereas living organ transplantation is commonly is practised between family members only. These contradictory practices apparently rests on the ideologies around the human body and religious beliefs as well the personal judgements and authority of healthcare professionals. This research is a year-long ethnographic study carried out as part of doctoral studies. An anthropological approach towards organ transplantation in Pakistan brought forward various socio-cultural notions around the human body and selfhood that serve as a framework around biomedical ethical issues in various societies. Further, it surface the contradictions and issues associated with organ transplantation that makes it a dilemma situated in a nexus of various socio-cultural and political factors rather seeing it as an isolated health concern. This research is a novel study on the subject of organ transplantation in the context of Pakistan but also put forward ethnographic data that could serve as a reference in other religious societies. Further, the ethnographic data bring forward experiences and stories of organ receivers, organ donors, religious leaders, healthcare professionals, and the general public, which aspire to encourage biomedical ethicists and social-scientists to consider ethnography as a research methodology and rely upon people’s lived experiences while establishing policies and practices around biomedical ethical issues.

Keywords: Gender, organ transplantation, muslims, pakistan, organ donation, bioethics, culture and religion, gender

Procedia PDF Downloads 114
1687 New Biobased(Furanic-Sulfonated) Poly(esteramide)s

Authors: Souhir Abid

Abstract:

The growing interest in vegetal biomass as an alternative for fossil resources has stimulated the development of numerous classes of monomers. Polymers from renewable resources have attracted an increasing amount of attention over the last two decades, predominantly due to two major reasons (i) firstly environmental concerns, and (ii) secondly the use of monomers from renewable feedstock is a steadily growing field of interest in order to reduce the amount of petroleum consumed in the chemical industry and to open new high-value-added markets to agriculture. Furanic polymers have been considered as alternative environmentally friendly polymers. In our earlier work, modifying furanic polyesters by incorporation of amide functions along their backbone, lead to a particular class of polymer ‘poly(ester-amide)s’, was investigated to combine the excellent mechanical properties of polyamides and the biodegradability of polyesters. As a continuation of our studies on this family of polymer, a series of furanic poly(ester-amide)s bearing sulfonate groups in the main chain were synthesized from 5,5’-Isopropylidene-bis(ethyl 2-furoate), dimethyl 5-sodiosulfoisophthalate, ethylene glycol and hexamethylene diamine by melt polycondensation using zinc acetate as a catalyst. In view of the complexity of the NMR spectrum analysis of the resulting sulfonated poly(ester-amide)s, we found that it is useful to prepare initially the corresponding homopolymers: sulfonated polyesters and polyamides. Structural data of these polymers will be used as a basic element in 1H NMR characterization. The hydrolytic degradation in acidic aqueous conditions (pH = 4,35 ) at 37 °C over the period of four weeks show that the mechanism of the hydrolysis of poly(ester amide)s was elucidated in relation with the microstructure. The strong intermolecular hydrogen bonding interactions between amide functions and water molecules increases the hydrophilicity of the macromolecular chains and consequently their hydrolytic degradation.

Keywords: furan, hydrolytic degradation, polycondensation, poly(ester amide)

Procedia PDF Downloads 293
1686 Advanced Lithium Recovery from Brine: 2D-Based Ion Selectivity Membranes

Authors: Nour S. Abdelrahman, Seunghyun Hong, Hassan A. Arafat, Daniel Choi, Faisal Al Marzooqi

Abstract:

Abstract—The advancement of lithium extraction methods from water sources, particularly saltwater brine, is gaining prominence in the lithium recovery industry due to its cost-effectiveness. Traditional techniques like recrystallization, chemical precipitation, and solvent extraction for metal recovery from seawater or brine are energy-intensive and exhibit low efficiency. Moreover, the extensive use of organic solvents poses environmental concerns. As a result, there's a growing demand for environmentally friendly lithium recovery methods. Membrane-based separation technology has emerged as a promising alternative, offering high energy efficiency and ease of continuous operation. In our study, we explored the potential of lithium-selective sieve channels constructed from layers of 2D graphene oxide and MXene (transition metal carbides and nitrides), integrated with surface – SO₃₋ groups. The arrangement of these 2D sheets creates interplanar spacing ranging from 0.3 to 0.8 nm, which forms a barrier against multivalent ions while facilitating lithium-ion movement through nano capillaries. The introduction of the sulfonate group provides an effective pathway for Li⁺ ions, with a calculated binding energy of Li⁺ – SO³⁻ at – 0.77 eV, the lowest among monovalent species. These modified membranes demonstrated remarkably rapid transport of Li⁺ ions, efficiently distinguishing them from other monovalent and divalent species. This selectivity is achieved through a combination of size exclusion and varying binding affinities. The graphene oxide channels in these membranes showed exceptional inter-cation selectivity, with a Li⁺/Mg²⁺ selectivity ratio exceeding 104, surpassing commercial membranes. Additionally, these membranes achieved over 94% rejection of MgCl₂.

Keywords: ion permeation, lithium extraction, membrane-based separation, nanotechnology

Procedia PDF Downloads 70
1685 Understanding Natural Resources Governance in Canada: The Role of Institutions, Interests, and Ideas in Alberta's Oil Sands Policy

Authors: Justine Salam

Abstract:

As a federal state, Canada’s constitutional arrangements regarding the management of natural resources is unique because it gives complete ownership and control of natural resources to the provinces (subnational level). However, the province of Alberta—home to the third largest oil reserves in the world—lags behind comparable jurisdictions in levying royalties on oil corporations, especially oil sands royalties. While Albertans own the oil sands, scholars have argued that natural resource exploitation in Alberta benefits corporations and industry more than it does Albertans. This study provides a systematic understanding of the causal factors affecting royalties in Alberta to map dynamics of power and how they manifest themselves during policy-making. Mounting domestic and global public pressure led Alberta to review its oil sands royalties twice in less than a decade through public-commissioned Royalty Review Panels, first in 2007 and again in 2015. The Panels’ task was to research best practices and to provide policy recommendations to the Government through public consultations with Albertans, industry, non-governmental organizations, and First Nations peoples. Both times, the Panels recommended a relative increase to oil sands royalties. However, irrespective of the Reviews’ recommendations, neither the right-wing 2007 Progressive Conservative Party (PC) nor the left-wing 2015 New Democratic Party (NDP) government—both committed to increase oil sands royalties—increased royalty intake. Why did two consecutive political parties at opposite ends of the political spectrum fail to account for the recommendations put forward by the Panel? Through a qualitative case-study analysis, this study assesses domestic and global causal factors for Alberta’s inability to raise oil sands royalties significantly after the two Reviews through an institutions, interests, and ideas framework. Indeed, causal factors can be global (e.g. market and price fluctuation) or domestic (e.g. oil companies’ influence on the Alberta government). The institutions, interests, and ideas framework is at the intersection of public policy, comparative studies, and political economy literatures, and therefore draws multi-faceted insights into the analysis. To account for institutions, the study proposes to review international trade agreements documents such as the North American Free Trade Agreement (NAFTA) because they have embedded Alberta’s oil sands into American energy security policy and tied Canadian and Albertan oil policy in legal international nods. To account for interests, such as how the oil lobby or the environment lobby can penetrate governmental decision-making spheres, the study draws on the Oil Sands Oral History project, a database of interviews from government officials and oil industry leaders at a pivotal time in Alberta’s oil industry, 2011-2013. Finally, to account for ideas, such as how narratives of Canada as a global ‘energy superpower’ and the importance of ‘energy security’ have dominated and polarized public discourse, the study relies on content analysis of Alberta-based pro-industry newspapers to trace the prevalence of these narratives. By mapping systematically the nods and dynamics of power at play in Alberta, the study sheds light on the factors that influence royalty policy-making in one of the largest industries in Canada.

Keywords: Alberta Canada, natural resources governance, oil sands, political economy

Procedia PDF Downloads 132
1684 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 128
1683 Social Appearance Concerns among College Students

Authors: Koninika Mukherjee, Dilwar Hussain

Abstract:

Introduction: One of the most prevalent psychopathologies among the youth is social anxiety. The presence of comorbid disorders further complicates diagnosis and treatment. One of the most commonly co-occurring disorders, along with social anxiety, is related to eating behavior. Objective: Identifying the risk and protective factors and the mechanism through which the effect of these disorders might help in treatment and prevention. So, the stated objective of the present study is to investigate the role of fear of negative evaluation and social appearance anxiety in the relationship of parental bonding with social anxiety and comorbid disordered eating. Method: A cross-sectional study was conducted with 411 Indian undergraduates. Data collection was done with the help of self-report measures like the social interaction anxiety scale, parental bonding instrument, brief fear of negative evaluation, social appearance anxiety scale, and the eating attitudes test. SPSS Amos 22.0 version was used for path analyses. Results: Out of the different dimensions of parental bonding, only maternal care and the father’s granting of behavioural freedom proved significant in the development and maintenance of social anxiety and disordered eating behaviour and symptoms. Fear of negative evaluation and social appearance anxiety mediated the impact of the mother’s care on social anxiety and comorbid disordered eating. However, only fear of negative evaluation seemed to mediate the effect of paternal granting of behavioral freedom on social anxiety and comorbid issues. Implications: One of the vital contributions of this study is looking at perceived maternal and paternal bonding separately in the path model. Identifying parenting dimensions significantly related to social anxiety and comorbid disorders can aid in establishing consensus around operational definitions and in the formulation of comprehensive assessments. Future Directions: Future research can include both participant and parental perceptions of parental bonding.

Keywords: social anxiety, disordered eating, fear of negative evaluation, social appearance anxiety

Procedia PDF Downloads 66