Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4796

Search results for: security and protection

1916 Determinants of Mobile Payment Adoption among Retailers in Ghana

Authors: Ibrahim Masud, Yusheng Kong, Adam Diyawu Rahman

Abstract:

Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context.

Keywords: mobile payment, retailers, structural equation modeling, technology acceptance model

Procedia PDF Downloads 169
1915 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 333
1914 Emerging Policy Landscape of Rare Disease Registries in India: An Analysis in Evolutionary Policy Perspective

Authors: Yadav Shyamjeet Maniram

Abstract:

Despite reports of more than seventy million population of India affected by rare diseases, it rarely figured on the agenda of the Indian scientist and policymakers. Hitherto ignored, a fresh initiative is being attempted to establish the first national registry for rare diseases. Though there are registries for rare diseases, established by the clinicians and patient advocacy groups, they are isolated, scattered and lacks information sharing mechanism. It is the first time that there is an effort from the government of India to make an initiative on the rare disease registries, which would be more formal and systemic in nature. Since there is lack of epidemiological evidence for the rare disease in India, it is interesting to note how rare disease policy is being attempted in the vacuum of evidence required for the policy process. The objective of this study is to analyse rare disease registry creation and implementation from the parameters of evolutionary policy perspective in the absence of evidence for the policy process. This study will be exploratory and qualitative in nature, primarily based on the interviews of stakeholders involved in the rare disease registry creation and implementation. Some secondary data will include various documents related to rare disease registry. The expected outcome of this study would be on the role of stakeholders in the generation of evidence for the rare disease registry creation and implementation. This study will also try to capture negotiations and deliberations on the ethical issues in terms of data collection, preservation, and protection.

Keywords: evolutionary policy perspective, evidence for policy, rare disease policy, rare disease in India

Procedia PDF Downloads 204
1913 An Integrated Lightweight Naïve Bayes Based Webpage Classification Service for Smartphone Browsers

Authors: Mayank Gupta, Siba Prasad Samal, Vasu Kakkirala

Abstract:

The internet world and its priorities have changed considerably in the last decade. Browsing on smart phones has increased manifold and is set to explode much more. Users spent considerable time browsing different websites, that gives a great deal of insight into user’s preferences. Instead of plain information classifying different aspects of browsing like Bookmarks, History, and Download Manager into useful categories would improve and enhance the user’s experience. Most of the classification solutions are server side that involves maintaining server and other heavy resources. It has security constraints and maybe misses on contextual data during classification. On device, classification solves many such problems, but the challenge is to achieve accuracy on classification with resource constraints. This on device classification can be much more useful in personalization, reducing dependency on cloud connectivity and better privacy/security. This approach provides more relevant results as compared to current standalone solutions because it uses content rendered by browser which is customized by the content provider based on user’s profile. This paper proposes a Naive Bayes based lightweight classification engine targeted for a resource constraint devices. Our solution integrates with Web Browser that in turn triggers classification algorithm. Whenever a user browses a webpage, this solution extracts DOM Tree data from the browser’s rendering engine. This DOM data is a dynamic, contextual and secure data that can’t be replicated. This proposal extracts different features of the webpage that runs on an algorithm to classify into multiple categories. Naive Bayes based engine is chosen in this solution for its inherent advantages in using limited resources compared to other classification algorithms like Support Vector Machine, Neural Networks, etc. Naive Bayes classification requires small memory footprint and less computation suitable for smartphone environment. This solution has a feature to partition the model into multiple chunks that in turn will facilitate less usage of memory instead of loading a complete model. Classification of the webpages done through integrated engine is faster, more relevant and energy efficient than other standalone on device solution. This classification engine has been tested on Samsung Z3 Tizen hardware. The Engine is integrated into Tizen Browser that uses Chromium Rendering Engine. For this solution, extensive dataset is sourced from dmoztools.net and cleaned. This cleaned dataset has 227.5K webpages which are divided into 8 generic categories ('education', 'games', 'health', 'entertainment', 'news', 'shopping', 'sports', 'travel'). Our browser integrated solution has resulted in 15% less memory usage (due to partition method) and 24% less power consumption in comparison with standalone solution. This solution considered 70% of the dataset for training the data model and the rest 30% dataset for testing. An average accuracy of ~96.3% is achieved across the above mentioned 8 categories. This engine can be further extended for suggesting Dynamic tags and using the classification for differential uses cases to enhance browsing experience.

Keywords: chromium, lightweight engine, mobile computing, Naive Bayes, Tizen, web browser, webpage classification

Procedia PDF Downloads 161
1912 Arbitration in Foreign Investment: The Need for Equitable Treatment between the Investor and the Host State

Authors: Maria João Mimoso, Bárbara Magalhães Bravo

Abstract:

This study aims to analyse the phenomenon of arbitration as a paradigm in solving emerging controversies of foreign investment. We will present their benefits and demonstrate their contribution to greater legal certainty in economic relations. This article explores the legal relevant concepts under a strictly conceptual methodology, preparing future research to be developed under more developed comparative law methodologies. The review of national and international literature and jurisprudence will reveal the importance of arbitration in the field of international economic relations, presenting it as an alternative dispute resolution. Globalization imposes new forms of investment protection and appeals to other forms of dispute settlement, primarily to prevent, among other problems, the possible bias of the recipient country's investment tribunals. Characterization of foreign investment, its regulatory sources, their characteristics and the need for intervention of an entity capable of resolving disputes between the parties involved: State investor reception; Investor (of a nationality other than the latter); State of the investor's nationality, and sometimes a ‘subsidiary’ local foreign investor. The ICSID (International Settlement of Investment Disputes) arbitration as a means of resolving investment litigations covered by bilateral treaties (BIT) and investment contracts calls for a delimitation of these two figures in order to clarify the scope of the arbitration under the aegis of the World Bank and to make it more secure in the view of the sovereign power of the States.

Keywords: arbitration, contract, foreign, investment, disputes

Procedia PDF Downloads 263
1911 Soil and Environmental Management Awareness as Professional Competency of the Agricultural Extension Officers for Their Plans Implementation

Authors: Muhammad Zafarullah Khan

Abstract:

Agricultural Extension Officers’ (AEOs) competency level in soil and environmental management awareness is important for interacting with farming communities of different types of soil. Questionnaire was developed for all AEOs for data collection to know the present position and needed position of competency on Likert scale from 01-05 by assigning very low (01) and very high (05). Wide gap was found in competency of suitability of various soil types for horticultural and agronomic crops and reclamation of saline soil. We observed that suitability ranking of various soil types for horticultural crops (Diff. = 1.21), agronomic crops (Diff. = 1.20) and soil borne diseases (Diff. = 1.19) were the top three important competencies where training or improvement is needed. To better fill this gap we recommend that professional qualification of AEOs should be enhanced and training opportunities should be provided to them particularly to deal with soil and environmental management awareness. Thus training opportunities may increase their competency and will add highly skilled manpower to the system for sustainable development to protect environment. It is therefore, recommended that AEOs may be provided pre and in service trainings of soil environmental management in order to equip them with a capacity to work with farming community effectively to boost the living standard of farming community and alleviate poverty for environmental protection.

Keywords: professional competency, agricultural extension officers, soil and environmental management awareness, plans implementation

Procedia PDF Downloads 386
1910 The Impact of Social Media Exposure on COVID- 19 Vaccine Hesitancy “A Comparative Study on the Public in Egypt and the United Arab Emirates”

Authors: Lamiaa Shehata

Abstract:

The current (COVID-19) pandemic is one of the international crises, and a lot of efforts have been directed toward the improvement of efficient vaccines, however vaccine hesitancy is one of the universal menaces that make the fulfillment of society immunity very hard. The World Health Organization acknowledges vaccine hesitancy as the society’s maximum risk to people's health protection, especially in little and moderate-revenue nations. Social media is strong in observing audience behaviors and evaluating the circulation, which would supply useful data for strategy makers. It has a significant function in spreading facts during the pandemic, it could assist to boost protective manners. The objective of this study is to determine the effects of social media exposure on vaccine hesitancy. Data were collected using a survey in a form of a structured questionnaire conducted during December 2021- January 2022 using convenient sampling techniques (680) in Egypt and the United Arab Emirates. The results revealed that there was a significant relationship between the high exposure to social media and the refusal of the Covid19 vaccine also, the percentage of the refusal of the vaccine is higher in Egypt, however, UAE forced people to take the vaccine. Furthermore, public attitudes toward COVID-19 vaccination vary from gender and region. In conclusion, policymakers must adjust their policies through the use of social media to immediate actions to vaccine-related news to support vaccination approval.

Keywords: COVID-19, hesitancy, social media, vaccine

Procedia PDF Downloads 132
1909 The Use of Learning Management Systems during Emerging the Tacit Knowledge

Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu

Abstract:

Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.

Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory

Procedia PDF Downloads 374
1908 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 316
1907 Energy Service Companies as a Facilitator for Implementation of Energy-Environment Conventions

Authors: Bahareh Arghand

Abstract:

The establishment of rules and regulations for more effective energy-environment interactions are essential to achieving sustainable development. Sustainable development requires mechanisms that can promote compliance in energy-environment conventions. There are many binding agreements and non-binding instruments at regional and international levels on energy and the environment. These conventions try to decrease conflicts of interest between energy, environment and economic by legal principles and practical mechanisms. The major core of conventions is their implementations because the poor implementation and enforcement power affect their success. In this regard, the main goal of this study is proposing the effective implementation mechanisms. Energy service companies' (ESCOs) activities can improve energy efficiency and decrease the environmental degradations. Therefore, it can be proposed and assessed the merit mechanism of ESCO performance as a facilitator to implement energy-environment conventions. An assessment of ESCO performance, including its potentials, problems, and limitations, as a facilitator for effective implementation of the energy-environment convention, is included. This study is oriented towards effective development and application of laws and the function of ESCOs as appropriate economic instruments and facilitator for implementation of energy-environment conventions. The resulting system of close cooperation between the energy-environment conventions and ESCOs is geared toward advancing environmental protection and economic factors by the transfer of environmentally-sound technologies that meet sustainable development objectives.

Keywords: energy-environment conventions, energy service company, facilitator mechanism, sustainable development

Procedia PDF Downloads 176
1906 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 145
1905 Effect of Coronary Insulators in Increasing the Lifespan of Electrolytic Cells: Short-circuit and Heat Resistance

Authors: Robert P. Dufresne, Hamid Arabzadeh

Abstract:

The current study investigates the effectiveness of a new form of permanent baseboard insulators with an umbrella action, hereinafter referred to as Coronary Insulator, in supporting and protecting the assembly of electrodes immersed in an electrolytic cell and in increasing the lifespan of the lateral sides of the electrolytic cell, in both electro-winning and electro-refinery method. The advantages of using a coronary insulator in addition to the top capping board (equipotential insulator) were studied compared to the conventional assembly of an electrolytic cell. Then, a thermal imaging technique was utilized during high-temperature thermal (heat transfer) tests for sample cell walls with and without coronary insulators in their assembly to show the effectiveness of coronary insulators in protecting the cell wall under extreme conditions. It was shown that, unlike the conventional assembly, which is highly prone to damages to the cell wall under thermal shocks, the presence of coronary insulator can significantly increase the level of protection of the cell due to their ultra-high thermal and chemical resistance, as well as decreasing the replacement frequency of insulators to almost zero. Besides, the results of the study showed that the test assembly with the coronary insulator provides better consistency in positioning and, subsequently, better contact, compared to the conventional method, which reduces the chance of electric short-circuit in the system.

Keywords: capping board, coronary insulator, electrolytic cell, thermal shock.

Procedia PDF Downloads 185
1904 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 245
1903 Protein Stabilized Foam Structures as Protective Carrier Systems during Microwave Drying of Probiotics

Authors: Jannika Dombrowski, Sabine Ambros, Ulrich Kulozik

Abstract:

Due to the increasing popularity of healthy products, probiotics are still of rising importance in food manufacturing. With the aim to amplify the field of probiotic application to non-chilled products, the cultures have to be preserved by drying. Microwave drying has proved to be a suitable technique to achieve relatively high survival rates, resulting from drying at gentle temperatures, among others. However, diffusion limitation due to compaction of cell suspension during drying can prolong drying times as well as deteriorate product properties (grindability, rehydration performance). Therefore, we aimed to embed probiotics in an aerated matrix of whey proteins (surfactants) and di-/polysaccharides (foam stabilization, probiotic protection) during drying. As a result of the manifold increased inner surface of the cell suspension, drying performance was enhanced significantly as compared to non-foamed suspensions. This work comprises investigations on suitable foam matrices, being stable under vacuum (variation of protein concentration, type and concentration of di-/polysaccharide) as well as development of an applicable microwave drying process in terms of microwave power, chamber pressure and maximum product temperatures. Performed analyses included foam characteristics (overrun, drainage, firmness, bubble sizes), and properties of the dried cultures (survival, activity). In addition, efficiency of the drying process was evaluated.

Keywords: foam structure, microwave drying, polysaccharides, probiotics

Procedia PDF Downloads 255
1902 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 68
1901 The Effect of Intimate Partner Violence on Child Abuse in South Korea: Focused on the Moderating Effects of Patriarchal Attitude and Informal Social Control

Authors: Hye Lin Yang, Clifton R. Emery

Abstract:

Purpose: The purpose of this study is to examine the effects of intimate partner violence on child abuse, whether patriarchal attitude and informal social control moderate the relationship between intimate partner violence and child abuse. This study was conducted with data from The Seoul Families and Neighborhoods Study (SFNS). The SFNS is a representative random probability 3-stage cluster sample of 541 cohabiting couples in Seoul, South Korea collected in 2012. To verify research models, Random effect analysis were used. All analyses were performed using the Stata program. Results: Crucial findings are the following. First, intimate partner violence showed a significantly positive relationship with Child abuse. Second, there are significant moderating effects of informal social control on intimate partner violence - child abuse. Third, there are significant moderating effects of patriarchal attitude on intimate partner violence - child abuse. In other words, Patriarchal attitude is a significant risk factor of child abuse and informal social control is a significant Protection factor of child abuse. Based on results, the policy and practical implications for preventing child abuse, promoting informal social control were discussed.

Keywords: Intimate partner violence, child abuse, informal social control, patriarchal attitude

Procedia PDF Downloads 293
1900 Analysis of Spatial Form and Gene of Historical and Cultural Settlements in Mountainous Areas: Illustrated by the Example of Anju Ancient Town

Authors: Sun Gang

Abstract:

A variety of functional spaces are distributed on the vast mountain waterfront. Their functional positioning presents a spontaneous form of settlement space, and the construction features show a passive impact on the natural environment. As the precious heritage of inheriting human civilization and promoting historical culture, the traditional settlement space in mountainous areas is also the local expression of landscape pattern pattern gene. Under the impact of rapid urban construction and the stimulation of the transformation of social consumption demand, the original texture, scale and ecology of the traditional mountain settlement space, especially the historical and cultural settlement space, have been affected, and the decline of characteristics hinders the development. This paper selects Anju Ancient Town, the fourth largest ancient city in China, which is located in the city of mountains and waters as the research object, and combines spatial analysis and other methods to study the characteristics and causes of its spatial morphology, analyze the internal logic in its formation and development process, build a genetic analysis map, explore the possibility of settlement inheritance and development, and provide reference for the construction, protection and inheritance of traditional mountain settlements.

Keywords: mountain traditional settlement, historical and cultural settlement space, spatial form, spatial gene

Procedia PDF Downloads 86
1899 Analysis of Genetic Variations in Camel Breeds (Camelus dromedarius)

Authors: Yasser M. Saad, Amr A. El Hanafy, Saleh A. Alkarim, Hussein A. Almehdar, Elrashdy M. Redwan

Abstract:

Camels are substantial providers of transport, milk, sport, meat, shelter, security and capital in many countries, particularly in Saudi Arabia. Inter simple sequence repeat technique was used to detect the genetic variations among some camel breeds (Majaheim, Safra, Wadah, and Hamara). Actual number of alleles, effective number of alleles, gene diversity, Shannon’s information index and polymorphic bands were calculated for each evaluated camel breed. Neighbor-joining tree that re-constructed for evaluated these camel breeds showed that, Hamara breed is distantly related from the other evaluated camels. In addition, the polymorphic sites, haplotypes and nucleotide diversity were identified for some camelidae cox1 gene sequences (obtained from NCBI). The distance value between C. bactrianus and C. dromedarius (0.072) was relatively low. Analysis of genetic diversity is an important way for conserving Camelus dromedarius genetic resources.

Keywords: camel, genetics, ISSR, neighbor-joining

Procedia PDF Downloads 466
1898 Polish Authorities Towards Refugee Crises

Authors: Klaudia Gołębiowska

Abstract:

This article analyzes the actions of Poland's ruling party facing two refugee crises. These crises emerged almost one after the other within a few months. The first concerned irregular migrants from various countries, including the Middle East, seeking to cross the Polish border from the territory of Belarus. The second was caused by Russia's full-scale invasion of Ukraine. I aim to show the evolution of the discourse and law towards immigrants and refugees by the party Prawo i Sprawiedliwość (PiS, ang. Law and Justice), which has been in power in Poland since 2015. The authorities, in power since 2015, have radically changed its anti-immigrant discourse towards the exodus of civilians from Ukraine. Research questions are the following: What were the roots of the refugee crises in Poland in 2021 and 2022? What legal or illegal measures were taken in Poland to deal with the refugee crises? The methods of qualitative source analysis and process tracing. From the first days of the war in Ukraine, not only was aid organised for Ukrainians, but they were also given access to public services and education. All refugees were granted temporary international protection. At the same time, the basic physiological needs of those on the Polish-Belarusian border were ignored. Moreover, illegal pushbacks were used against those coming mainly from the Middle East, pushing them into the territory of Belarus, where they were often subjected to torture and inhumane treatment. The Polish government justified such treatment on the grounds that these people were part of a 'hybrid war' waged by Russia and Belarus using migrants. Only Ukrainians were treated as 'real' refugees in the analyzed crises at the Polish borders.

Keywords: refugee, irregular migrants, hybrid war, migrants

Procedia PDF Downloads 58
1897 Assessment of Smart Mechatronics Application in Agriculture

Authors: Sairoel Amertet, Girma Gebresenbet

Abstract:

Smart mechatronics systems in agriculture can be traced back to the mid-1980s, when research into automated fruit harvesting systems began in Japan, Europe, and the United States. Since then, impressive advances have been made in smart mechatronics systems. Furthermore, smart mechatronics systems are promising areas, and as a result, we were intrigued to learn more about them. Consequently, the purpose of this study was to examine the smart mechatronic systems that have been applied to agricultural areas so far, with inspiration from the smart mechatronic system in other sectors. To get an overview of the current state of the art, benefits and drawbacks of smart mechatronics systems, various approaches were investigated. Moreover, smart mechatronic modules and various networks applied in agriculture processing were examined. Finally, we explored how the data retrieved using the one-way analysis of variance related to each other. The result showed that there were strongly related keywords for different journals. With the virtually limited use of sophisticated mechatronics in the agricultural industry and, at the same time, the low production rate, the demand for food security has fallen dramatically. Therefore, the application of smart mechatronics systems in agricultural sectors would be taken into consideration in order to overcome these issues.

Keywords: mechatronics, robotic, robotic system, automation, agriculture mechanism

Procedia PDF Downloads 75
1896 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 174
1895 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 119
1894 “It Takes a Community to Save a Child”: A Qualitative Analysis of Child Trafficking Interventions from Practitioner Perspectives

Authors: Crispin Rakibu Mbamba

Abstract:

Twenty-two years after the adoption of the United Nation Trafficking Protocol, evidence suggest that child trafficking continues to rise. Community level factors, like poverty which creates the conditions for children’s vulnerability is key to the rise in trafficking cases in Ghana. Albeit, growing evidence suggestthat despite the vulnerabilities, communities have the capacity to prevent and address child trafficking issues. This study contributes to this positive agenda by exploring the ways in which communities (and the key actors) in Ghana contribute to child trafficking interventions.The study objective is explored through in-depth interviews with practitioners (including social workers) from an organization working in trafficking hotspots in Ghana. Interviews wereanalyzed thematically with the help of HyperRESEARCH software. From the in-depth interviews, three themes were identified as the ways in which communities are involved in child trafficking interventions: 1) engagement of community leaders, 2) community-led anti-trafficking committees and 3) knowledge about trafficking. Albeit the cultural differences, evidence on the instrumental role of community chiefs and leaders provide important learning on how to harness trafficking intervention measures and ensure better child protection practices. Based on the findings, we recommend the need to intensify trafficking awareness campaigns in rural communities where education is lacking to contribute to United Nations (UN) promoting Just, Peaceful and Inclusive societies’ mandate.

Keywords: child trafficking, community interventions, knowledge on trafficking, human trafficking intervention

Procedia PDF Downloads 110
1893 An Occupational Analysis on Chikankari Industry Workers in Lucknow City, India

Authors: Mahvish Anjum

Abstract:

India is a land of craftsmen and a hub of many popular embroidery clusters. Chikankari is the name given to the delicate art of hand embroidery, traditionally practiced in the city of Lucknow and its environs. Chikankari not only provide employment to 250,000 artisans of different crafts but people from non-craft base also earn their livelihood by associating themselves with this craft. People working in this sector are exploited in term of working hours, low and irregular income, unsatisfactory work conditions, no legal protection and exposed to occupational health hazards. The present paper is an attempt to analyse occupational profile of workers engaged in Chikan embroidery industry. Being an empirical study, the entire work is based upon primary sources of data which have collected through field survey. Purposive random sampling has used for selection of data. Total 150 workers have surveyed through questionnaire technique in Lucknow city during October-November, 2017. For analysis of data Z-score, ANOVA, and Pearson correlation techniques are used. The result of present study indicates that artisans are exploited by the middle man and face the problem of late payment and long working hours because they are not directly associated with the manufacturers. Work conditions of the workers are quite poor such as improper ventilation, poor light and unhygienic conditions that adversely affect the health of workers.

Keywords: artisans, socio-economic status, unorganized industry, work condition

Procedia PDF Downloads 157
1892 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 126
1891 Zingiberofficinale Potential Effect on Nephrin mRNA Expression in Cisplatin Induced Nephrotoxicity

Authors: Nadia A. Mohamed, Mehrevan M. Abdel-Moniem

Abstract:

Zingiber officinale (ginger) has been cultivated for medicinal purposes due to their various proprieties both in vitro and in vivo, so we designed to evaluate the ginger’s potential effect on nephrin m RNA expression in cisplatin-induced nephrotoxic rats. Method: Forty male albino rats were divided into group I was injected (IP) with one ml saline, group II(cisplatin) injected (IP) with a single dose of 12 mg/kg cisplatin, group III (ginger) received (PO) 310 mg/kg for 30 successive days, and group IV(cisplatin and ginger) rats received ginger extract (310 mg/kg) daily for 20 successive days (PO), and then on day 20 of ginger extract administration each rat was injected(IP) with a single dose of 12 mg/kg cisplatin. The blood was sampled to assess urea, creatinine (SC), while the levels of malondialdehyde (MDA), nitric oxide (NO) and paraoxonase (PON1) were measured in kidney tissue homogenate. Expression of urinary nephrin gene (nephrin mRNA) was detected using qRT-PCR. Results: Treatment with ginger significantly decreased the levels of kidney function parameters as well as MDA and NO elevated by cisplatin injection, while PON1 was significantly reduced in the cisplatin group. However, the protection of male rats with ginger significantly increased the levels of nephrin gene expression and PON1 compared with the cisplatin-treated group. Our results generated a proposal on the ameliorating effect of ginger on nephrin mRNA gene expression reduction in cisplatin-induced nephrotoxicity.

Keywords: nephrin mRNA, ginger, cisplatin, nephrotoxicity

Procedia PDF Downloads 142
1890 Economic and Social Well-Being for Migrant Workers: Asian Experiences

Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam

Abstract:

In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.

Keywords: Asia, economic well-being, social well-being, migrant workers, human rights

Procedia PDF Downloads 316
1889 Kids and COVID-19: They are Winning with Their Immunity

Authors: Husham Bayazed, Fatimah Yousif

Abstract:

Purpose of Presentation: The infant immune system has a reputation for being weak and underdeveloped when compared to the adult immune system, but the comparison isn’t quite fair. At the start, as the COVID-19 pandemic drags on and evolves, many Pediatricians and kids' parents have been left with renewed questions about the consequences and sequel of infection on children and the steps to be taken if their child has the symptoms of COVID-19 or tests positive. Recent Findings Literature reviews and recent studies revealed that children are better than adults at controlling SARS-CoV-2. There was conflicting evidence on age-related differences in ACE2 expression in the nose and lungs. But scientists who measured the ‘viral load’ in children's upper airways have seen no clear difference between children and adults. Moreover, the hypothesis is that kids might be more exposed to other coronaviruses common cold, with a production of ready protective antibodies to lock on to the pandemic coronavirus. But the evidence suggests that adults also have this immunity too. Strikingly, these ‘cross-reactive’ antibodies don’t offer any special protection. Summary One of the few silver linings of the Covid-19 pandemic is that children are relatively spared. The kid's Innate Immunity is hardly the whole story, the innate immune response against SARS-CoV-2 infection is early initiative calm with low immunological tone to prevent an overactive immunity and with rapidly repair damage to the lungs in contrast to stormy waves in adults. Therefore, Kids are at much lower risk of Covid-19 infection, and they are still winning the battle against Covid-19 with their innate immunity.

Keywords: Covid-19, kids, ACE2 receptors, immunity

Procedia PDF Downloads 87
1888 Security Over OFDM Fading Channels with Friendly Jammer

Authors: Munnujahan Ara

Abstract:

In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers.

Keywords: fading parallel channels, wire-tap channel, OFDM, secrecy capacity, power allocation

Procedia PDF Downloads 494
1887 Nanosilver Containing Biodegradable Bionanocomposites for Antimicrobial Application: Design, Preparation and Study

Authors: Nino Kupatadze, Shorena Tskhadadze, Mzevinar Bedinashvili, David Tugushi, Ramaz Katsarava

Abstract:

Surgical device-associated infection and biofilm formation are some of the major problems in biomedicine for today. The losing protection ability of conventional antimicrobial-drugs leads to the challenges in the current antibiotic therapy, the most serious of which is antibiotic resistance. Our strategy to overcome the biofilm formation consists in coating devices with polymeric film containing nanosilver(AgNPs) as a bactericidal agent. Such bionanocomposites are also promising as wound dressing materials. For this purpose, we have developed a new generation of AgNPs containing polymeric composites in which amino acid based biodegradable poly(ester amide)s (PEAs) were served as both matrices and AgNPs stabilizers. The AgNPs were formed by photochemical (daylight) reduction of AgNO3 in ethanol solution. The formation of AgNPs was monitored by coloring the solution in brownish-red and appearance of the absorption maximum at 420-430 nm in UV spectrum. Comparative studies of PEAs with polyvinylpyrrolidone (PVP) as particle stabilizers were carried out. It was found that PVP is better stabilizer in terms of particles yield and stability. Therefore, in subsequent experiments blends of PEAs and PVP were used as stabilizers for fabricating AgNPs. As expected, PVP increased the stabilizing effect and this apparently observed in the UV spectrum of the samples after 7 h daylight irradiation: for pure PVP λmax = 430 nm, D = 2.03, for pure PEA λmax= 420 nm, D = 0.65, and for the blend of PVP and PEA λmax = 435 nm, D = 1.88. Further study of the obtained nanobiocomposites is in progress now.

Keywords: biodegradation, bionanocompositions, polymer, nanosilver

Procedia PDF Downloads 340