Search results for: enhancing security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4788

Search results for: enhancing security

1848 Investigating the Role of Emergency Nurses and Disaster Preparedness during Mass Gathering in Saudi Arabia

Authors: Fuad Alzahrani, Yiannis Kyratsis

Abstract:

Although emergency nurses, being the frontline workers in mass-gatherings, are essential for providing an effective public health response, little is known about the skills that emergency nurses have, or require, in order to respond effectively to a disaster event. This paper is designed to address this gap in the literature by conducting an empirical study on emergency nurses’ preparedness at the mass-gathering event of Hajj in Mecca city. To achieve this aim, this study conducted a cross-sectional survey among 106 emergency department nurses in all the public hospitals in Mecca in 2014. The results revealed that although emergency nurses’ role understanding is high; they have limited knowledge and awareness of how to respond appropriately to mass-gathering disaster events. To address this knowledge gap, the top three most beneficial types of education and training courses suggested are: hospital education sessions, the Emergency Management Saudi Course and workshop; and short courses in disaster management. Finally, recommendations and constructive strategies are developed to provide the best practice in enhancing disaster preparedness. This paper adds to the body of knowledge regarding emergency nurses and mass gathering disasters. This paper measures the level of disaster knowledge, previous disaster response experience and disaster education and training amongst emergency nurses in Mecca, Saudi Arabia. It is anticipated that this study will provide a foundation for future studies aimed at better preparing emergency nurses for disaster response. This paper employs new strategies to improve the emergency nurses’ response during mass gatherings for the Hajj. Increasing the emergency nurses’ knowledge will develop their effective responses in mass-gathering disasters.

Keywords: emergency nurses, mass-gatherings, hajj, disaster preparedness, disaster knowledge, perceived role, disaster training, previous disaster response experience

Procedia PDF Downloads 425
1847 Advancing Spatial Mapping and Monitoring of Illegal Landfills for Deprived Urban Areas in Romania

Authors: ȘercăIanu Mihai, Aldea Mihaela, Iacoboaea Cristina, Luca Oana, Nenciu Ioana

Abstract:

The emergence and neutralization of illegal waste dumps represent a global concern for waste management ecosystems with a particularly pronounced impact on disadvantaged communities. All over the world, and in this particular case in Romania, a relevant number of people resided in houses lacking any legal forms such as land ownership documents or building permits. These areas are referred to as “informal settlements”. An increasing number of regions and cities in Romania are struggling to manage their waste dumps, especially in the context of increasing poverty and lack of regulation related to informal settlements. An example of such informal settlement can be found at the terminus of Bistra Street in Câlnic, which falls under the jurisdiction of the Municipality of Reșița in Caras Severin County. The article presents a case study that focuses on employing remote sensing techniques and spatial data to monitor and map illegal waste practices, with subsequent integration into a geographic information system tailored for the Reșița community. In addition, the paper outlines the steps involved in devising strategies aimed at enhancing waste management practices in disadvantaged areas, aligning with the shift toward a circular economy. Results presented in the paper contain a spatial mapping and visualization methodology calibrated with in situ data collection applicable for identifying illegal landfills. The emergence and neutralization of illegal dumps pose a challenge in the field of waste management. These approaches, which prove effective where conventional solutions have failed, need to be replicated and adopted more wisely.

Keywords: waste dumps, waste management, monitoring, GIS, informal settlements

Procedia PDF Downloads 79
1846 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 335
1845 The Influence of Steel Connection on Fire Resistance of Composite Steel-Framed Buildings

Authors: Mohammed Kadhim, Zhaohui Huang

Abstract:

Steel connections can play an important role in enhancing the robustness of structures under fire conditions. Therefore, it is significant to examine the influence of steel connections on the fire resistance of composite steel-framed buildings. In this paper, both the behavior of steel connections and their influence on composite steel frame are analyzed using the non-linear finite element computer software VULCAN at ambient and elevated temperatures. The chosen frame is subjected to ISO834 fire. The comparison between end plate connections, pinned connection, and rigid connection has been carried out. By applying different compartment fires, some cases are studied to show the behavior of steel connection when the fire is applied at certain beams. In addition, different plate thickness and deferent applied loads have been analyzed to examine the behavior of chosen steel connection under ISO834 fire. It was found from the analytical results that the beam with extended end plate is stronger and has better performance in terms of axial forces than those beams with flush end plate connection. It was also found that extended end plate connection has highest limiting temperatures compared to the flush end plate connection. In addition, it was found that the performance of end-plate connections is very close to rigid connection and very far from pinned connections. Furthermore, plate thickness has less effect on the influence of steel connection on fire resistance. In conclusion, the behavior of composite steel framed buildings is largely dependent on the steel connection due to their high impact under fire condition. It is recommended to consider the extended end-plate in the design proposes because of its higher properties compared to the flush end plate connection. Finally, this paper shows a steel connection has an important effect on the fire resistance of composite steel framed buildings.

Keywords: composite steel-framed buildings, connection behavior, end-plate connections, finite element modeling, fire resistance

Procedia PDF Downloads 156
1844 Usage of Military Continuity Management System for Supporting of Emergency Management

Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova

Abstract:

Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).

Keywords: business continuity management system, emergency management, military, nuclear safety

Procedia PDF Downloads 453
1843 Investments in Petroleum Industry Abnormally Normal: A Case Study Based on Petroleum and Natural Gas Companies in India

Authors: Radhika Ramanchi

Abstract:

The oil market during 2014-2015 in India with large price fluctuations is very confusing to individual investor. The drop in oil prices supported stocks of some oil marketing companies (OMCs) like Bharat Petroleum Corporation, Hindustan Petroleum Corporation (HPCL) and Indian Oil Corporation etc their shares rose 84.74%, 128.63% and 59.16%, respectively. Lower oil prices, and lower current account, a smaller subsidy burden are the reasons for outperformance. On the other hand, lower crude prices giving downward pressure on upstream companies like Oil and Natural Gas Corp. Ltd (ONGC) and Reliance Petroleum (RIL) Oil India Ltd (OIL). Not having clarity on a subsidy sharing mechanism is the reason for downward trend on these stocks. Shares of ONGC and RIL have underperformed so far in 2015. When the oil price fall profits of the companies will effect, generate less money and may cut their dividends in Long run. In this situation this paper objective is to study investment strategies in oil marketing companies, by applying CAPM and Security Market Line.

Keywords: petrol industry, price fluctuations, sharp single index model, SML, Markowitz model

Procedia PDF Downloads 217
1842 The Impact of Cognitive Load on Deceit Detection and Memory Recall in Children’s Interviews: A Meta-Analysis

Authors: Sevilay Çankaya

Abstract:

The detection of deception in children’s interviews is essential for statement veracity. The widely used method for deception detection is building cognitive load, which is the logic of the cognitive interview (CI), and its effectiveness for adults is approved. This meta-analysis delves into the effectiveness of inducing cognitive load as a means of enhancing veracity detection during interviews with children. Additionally, the effectiveness of cognitive load on children's total number of events recalled is assessed as a second part of the analysis. The current meta-analysis includes ten effect sizes from search using databases. For the effect size calculation, Hedge’s g was used with a random effect model by using CMA version 2. Heterogeneity analysis was conducted to detect potential moderators. The overall result indicated that cognitive load had no significant effect on veracity outcomes (g =0.052, 95% CI [-.006,1.25]). However, a high level of heterogeneity was found (I² = 92%). Age, participants’ characteristics, interview setting, and characteristics of the interviewer were coded as possible moderators to explain variance. Age was significant moderator (β = .021; p = .03, R2 = 75%) but the analysis did not reveal statistically significant effects for other potential moderators: participants’ characteristics (Q = 0.106, df = 1, p = .744), interview setting (Q = 2.04, df = 1, p = .154), and characteristics of interviewer (Q = 2.96, df = 1, p = .086). For the second outcome, the total number of events recalled, the overall effect was significant (g =4.121, 95% CI [2.256,5.985]). The cognitive load was effective in total recalled events when interviewing with children. All in all, while age plays a crucial role in determining the impact of cognitive load on veracity, the surrounding context, interviewer attributes, and inherent participant traits may not significantly alter the relationship. These findings throw light on the need for more focused, age-specific methods when using cognitive load measures. It may be possible to improve the precision and dependability of deceit detection in children's interviews with the help of more studies in this field.

Keywords: deceit detection, cognitive load, memory recall, children interviews, meta-analysis

Procedia PDF Downloads 53
1841 The Early Pleistocene Mustelidae and Hyaena Record of the Yuanmou Basin

Authors: Arya Farjand

Abstract:

This study delves into the Early Pleistocene fauna of the Yuanmou Basin, highlighting two significant findings. The first is the discovery of exceptionally well-preserved canid coprolites, which provide a rare glimpse into the diet and ecological niche of these ancient carnivores. The analysis of these coprolites has revealed a diet rich in diverse prey species, suggesting a complex food web and a dynamic ecological environment. This discovery not only sheds light on the dietary habits of these canids but also offers broader insights into the region's ecological dynamics during the Early Pleistocene. Additionally, the preservation of these coprolites allows for detailed study of the carnivore's role in the ecosystem, including their interactions with other species and the overall health of the environment. The second major finding is the identification of a mustelid species, Eirictis yuanmouensis, from the same fossil horizon as the coprolites. This discovery is crucial for understanding the diversity and evolution of Mustelidae in the region. The detailed analysis of cranial and dental morphology of Eirictis yuanmouensis indicates unique adaptations that suggest a specialized ecological niche. This finding, in conjunction with the coprolite analysis, provides a comprehensive view of the ecological niches occupied by both mustelids and hyenas, enhancing our understanding of their adaptations and interactions within this paleoenvironment. The study's significance is further amplified by the analysis of pollen data from the same horizon, which indicates a paleoenvironment characterized by rapid climatic changes and a dominant semiarid climate. This combination of faunal and floral data paints a detailed picture of the Early Pleistocene environment in the Yuanmou Basin, offering valuable insights into the interactions between different carnivore species and their adaptation strategies in response to changing environmental conditions.

Keywords: Yuanmou Basin, coprolite, Hyaena, eirictis yuanmouensis, early pleistocene

Procedia PDF Downloads 23
1840 Community Activism for Sustainable Forest Management in Nepal: Lessons fromTarpakha Community Forest Siranchok, Gorkha

Authors: Prem Bahadur Giri, Trilochana Pokhrel

Abstract:

The nationalization of forest during early 1960s had become a counterproductive for the conservation of forest in Nepal. Realizing this fact, the Government of Nepal initiated a paradigm shift from government-controlled forestry system to people’s direct participation for managing forestry, conceptualizing community forest approach in the early 1980s. The community forestry approach is expected to promote sustainable forest management, restoring degraded forests for enhancing the forest condition on one hand, and on the other, improvement of livelihoods, particularly of low-income people and forest dependent communities, as well as promoting community ownership to forest. As a result, establishment of community forests started and had taken faster momentum in Nepal. Of the total land in Nepal, forest occupies 6.5 million hectares which is around 45 percent of the forest area. Of the total forest area 1.8 million hectarehas been handed-over to community management. A total of 19,361 ‘community forest users groups’ are already created to manage the community forest.Tostreamlinethe governance of community forest, the enactment of ‘Forest Act 1993’ provides a clear legal basis for managing community forest in Nepal. This article is based on an in-depth study taking a case of Tarpakha Community Forest (TCF) located in Siranchok Rural Municipality of Gorkha District in Nepal. It mainly discusses on to extent the TCF able to achieve twin objectives of this community forest for catalyzing socio-economic improvement of the targeted community and conservation of forest. The primary information was generated through in-depth interviews along with group discussion with members, management committee, and other relevant stakeholders. The findings reveal that there is significant improvement of regeneration of forest and also changes in the socio-economic status of local community. However, coordination with local municipality and forest governing entities is still weak.

Keywords: community forest, nepal, socio-economic benefit, sustainable forest management

Procedia PDF Downloads 79
1839 Population Dynamics and Diversity of Beneficial Arthropods in Pummelo (Citrus maxima) under Perennial Peanut, Arachis pintoi Cover Crop

Authors: Larry V. Aceres, Jesryl B. Paulite, Emelie M. Pelicano, J. B. Anciano, J. A. Esteban

Abstract:

Enhancing the population of beneficial arthropods under less diverse agroecosystem is the most sought by many researchers and plant growers. This strategy was done through the establishment of pintoi peanut, Arachis pintoi as live mulch or cover crop in pummelo orchard of the University of Southeastern Philippines (USeP), Mabini, Compostela Valley Province, Philippines. This study was conducted to compare and compute population dynamics and diversity of beneficial arthropods in pummelo in with and without Arachis pintoi cover crop. Data collections were done for the 12-month period (from June 2013 to May 2014) at the pummelo orchard of USeP Mabini Campus, COMVAL Province, Philippines and data were analyzed using the Independent Samples T-Test to compare the effect of the presence and absence of Arachis pintoi on beneficial arthropods incidence in pummelo orchard. Moreover, diversity and family richness analyses were computed using the Margalef’s diversity index for family richness; the Shannon index of general diversity and the evenness index; and the Simpson index of dominance. Results revealed numerically and statistically higher density of important beneficial arthropods such as microhymenopterans, macrohymenopterans, spiders, tachinid flies and ground beetles were recorded in pummelo orchard with Arachis pintoi than from without Arachis pintoi cover crop for the 12-month observation period. Further, the result of the study revealed the high family richness and diversity index with more or less even distribution of individuals within the family and low dominance index were documented in pummelo with Arachis pintoi cover crop than from pummelo without Arachis pintoi cover crop. The study revealed that planting A. pintoi in pummelo orchard could enhance natural enemy populations.

Keywords: Arachis pintoi, cover crop, beneficial arthropods, pummelo

Procedia PDF Downloads 319
1838 Adding Business Value in Enterprise Applications through Quality Matrices Using Agile

Authors: Afshan Saad, Muhammad Saad, Shah Muhammad Emaduddin

Abstract:

Nowadays the business condition is so quick paced that enhancing ourselves consistently has turned into a huge factor for the presence of an undertaking. We can check this for structural building and significantly more so in the quick-paced universe of data innovation and programming designing. The lithe philosophies, similar to Scrum, have a devoted advance in the process that objectives the enhancement of the improvement procedure and programming items. Pivotal to process enhancement is to pick up data that grants you to assess the condition of the procedure and its items. From the status data, you can design activities for the upgrade and furthermore assess the accomplishment of those activities. This investigation builds a model that measures the product nature of the improvement procedure. The product quality is dependent on the useful and auxiliary nature of the product items, besides the nature of the advancement procedure is likewise vital to enhance programming quality. Utilitarian quality covers the adherence to client prerequisites, while the auxiliary quality tends to the structure of the product item's source code with reference to its practicality. The procedure quality is identified with the consistency and expectedness of the improvement procedure. The product quality model is connected in a business setting by social occasion the information for the product measurements in the model. To assess the product quality model, we investigate the information and present it to the general population engaged with the light-footed programming improvement process. The outcomes from the application and the client input recommend that the model empowers a reasonable evaluation of the product quality and that it very well may be utilized to help the persistent enhancement of the advancement procedure and programming items.

Keywords: Agile SDLC Tools, Agile Software development, business value, enterprise applications, IBM, IBM Rational Team Concert, RTC, software quality, software metrics

Procedia PDF Downloads 172
1837 An Evolutionary Perspective on the Role of Extrinsic Noise in Filtering Transcript Variability in Small RNA Regulation in Bacteria

Authors: Rinat Arbel-Goren, Joel Stavans

Abstract:

Cell-to-cell variations in transcript or protein abundance, called noise, may give rise to phenotypic variability between isogenic cells, enhancing the probability of survival under stress conditions. These variations may be introduced by post-transcriptional regulatory processes such as non-coding, small RNAs stoichiometric degradation of target transcripts in bacteria. We study the iron homeostasis network in Escherichia coli, in which the RyhB small RNA regulates the expression of various targets as a model system. Using fluorescence reporter genes to detect protein levels and single-molecule fluorescence in situ hybridization to monitor transcripts levels in individual cells, allows us to compare noise at both transcript and protein levels. The experimental results and computer simulations show that extrinsic noise buffers through a feed-forward loop configuration the increase in variability introduced at the transcript level by iron deprivation, illuminating the important role that extrinsic noise plays during stress. Surprisingly, extrinsic noise also decouples of fluctuations of two different targets, in spite of RyhB being a common upstream factor degrading both. Thus, phenotypic variability increases under stress conditions by the decoupling of target fluctuations in the same cell rather than by increasing the noise of each. We also present preliminary results on the adaptation of cells to prolonged iron deprivation in order to shed light on the evolutionary role of post-transcriptional downregulation by small RNAs.

Keywords: cell-to-cell variability, Escherichia coli, noise, single-molecule fluorescence in situ hybridization (smFISH), transcript

Procedia PDF Downloads 160
1836 The Evaluation of Islamic Concept in Contemporary Mosque Design with the Case of Study: Jogokariyan Mosque Yogyakarta Indonesia

Authors: Ibrahim Malik, M. Ikramullah al Kambuna

Abstract:

Today the crisis of understanding in Islamic values has been extended to the architectural design. The majority of Muslim Architects when they designed Islamic Architectural building always stuck in cultural symbols, forms of facade, carvings calligraphy, and all of things which intimately associated with middle eastern culture. As well as the interpretation of symbols form, by designing a dome in every mosque, calligraphy carving in the interior of the mosque, and the other elements in the building which interpreted to the middle east culture. So here there are problems in understanding the meaning of Islam with Kaffah (overall), which appeared a distortion of understanding to distinguish between cultural and theological values in a design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with case studies in Jogokariyan Mosque Yogyakarta Indonesia. The building evaluation are focused in building function , aesthetic, comfort, and security. And finally from this research should be found the results of the integrated design evaluation of a contemporary mosque which based on the study of the Quran and Hadith.

Keywords: evaluation, islamic concept, mosque, Hadith, Quran

Procedia PDF Downloads 497
1835 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis

Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh

Abstract:

WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.

Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication

Procedia PDF Downloads 520
1834 Rights-Based Approach to Artificial Intelligence Design: Addressing Harm through Participatory ex ante Impact Assessment

Authors: Vanja Skoric

Abstract:

The paper examines whether the impacts of artificial intelligence (AI) can be meaningfully addressed through the rights-based approach to AI design, investigating in particular how the inclusive, participatory process of assessing the AI impact would make this viable. There is a significant gap between envisioning rights-based AI systems and their practical application. Plausibly, internalizing human rights approach within AI design process might be achieved through identifying and assessing implications of AI features human rights, especially considering the case of vulnerable individuals and communities. However, there is no clarity or consensus on how such an instrument should be operationalised to usefully identify the impact, mitigate harms and meaningfully ensure relevant stakeholders’ participation. In practice, ensuring the meaningful inclusion of those individuals, groups, or entire communities who are affected by the use of the AI system is a prerequisite for a process seeking to assess human rights impacts and risks. Engagement in the entire process of the impact assessment should enable those affected and interested to access information and better understand the technology, product, or service and resulting impacts, but also to learn about their rights and the respective obligations and responsibilities of developers and deployers to protect and/or respect these rights. This paper will provide an overview of the study and practice of the participatory design process for AI, including inclusive impact assessment, its main elements, propose a framework, and discuss the lessons learned from the existing theory. In addition, it will explore pathways for enhancing and promoting individual and group rights through such engagement by discussing when, how, and whom to include, at which stage of the process, and what are the pre-requisites for meaningful and engaging. The overall aim is to ensure using the technology that works for the benefit of society, individuals, and particular (historically marginalised) groups.

Keywords: rights-based design, AI impact assessment, inclusion, harm mitigation

Procedia PDF Downloads 149
1833 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria

Authors: William Abiodun Duyile

Abstract:

It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.

Keywords: sea power, naval power, land locked states, warship

Procedia PDF Downloads 134
1832 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 289
1831 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 570
1830 Towards Sustainable Consumption: A Framework for Assessing Supplier's Commitment

Authors: O. O. Oguntoye

Abstract:

Product consumption constitutes an important consideration for sustainable development. Seeing how product consumption could be highly unsustainable, coupled with how existing policies on corporate responsibility do not particularly address the consumption aspect of product lifecycle, conducting this research became necessary. The research makes an attempt to provide a framework by which to gauge corporate responsibility of product suppliers in terms of their commitment towards the sustainable consumption of their products. Through an exploration of relevant literature, independently established ideas with which to assess a given product supplier were galvanised into a four-criterion framework. The criteria are: (1) Embeddedness of consumption as a factor in corporate sustainability policy, (2) Level of understanding of consumption behaviour, (3) Breadth of behaviour-influencing strategies adopted, and (4) Inclusiveness for all main dimensions of sustainability. This resulting framework was then applied in a case study involving a UK-based furniture supplier where interviews and content analysis of corporate documents were used as the mode for primary data collection. From the case study, it was found that the supplier had performed to different levels across the four themes of the assessment. Two major areas for improvement were however identified – one is for the furniture supplier to focus more proactively on understanding consumption behaviour and, two is for it to widen the scope of its current strategies for enhancing sustainable consumption of supplied furniture. As a generalisation, the framework presented here makes it possible for companies to reflect with a sense of guidance, how they have demonstrated commitment towards sustainable consumption through their values, culture, and operations. It also provides a foundation for developing standardized assessment which the current widely used frameworks such as the GRI, the Global Compact, and others do not cover. While these popularly used frameworks mainly focus on sustainability of companies within the production and supply chain management contexts (i.e. mostly ‘upstream’), the framework here provides an extension by bringing the ‘downstream’ or consumer bit into light.

Keywords: corporate sustainability, design for sustainable consumption, extended producer responsibility, sustainable consumer behaviour

Procedia PDF Downloads 416
1829 Liminal Disabled Tweens’ Identification with Disney Animations in Algeria

Authors: Selma Aitsaid

Abstract:

Disney canon texts, mainly animations, are believed to have authority over children’s identities. However, most research on Disney tends to focus either on textual analysis, or Western and non-western adult audiences. In fact, there is a lack of scholarship on Disney child audiences from non-western countries though children are believed to be Disney‘s main target audience, and Disney is a global corporation that appeals to audiences from all over the world as well. Therefore, qualitative research was conducted by interviewing around twenty five Algerian disabled tweens between the age 11 to 14 on their familiarity and identification with Disney animations. The reason behind choosing disabled children is because minority groups have not been interviewed on their possible interpretations of Disney animations despite the fact that these texts have been interpreted by some scholars as being inclusive of minority groups such as queer and disabled people. To that end, this project aims to decolonize disability and Global Southern Academia by three ways. The first way is to uncover inequalities of the metropolitan thought enshrined in the global power of the metropole vis a vis the subaltern. This approach was called postcolonialism. The second way is to value non-western academic and non-academic resources. This is the project of ‘indigenous knowledge. The third way is to analyse the forms of knowledge that were produced by intellectuals in colonized countries as a response to Western Academic hegemony. Consequently, this research endeavored to unravel the inequality, the dynamics of neocolonialism and subordination to colonial discourses within the Algerian discourse on disability and other knowledge such as tweenhood, childhood and non-western viewership, which are mainly defined through Western lenses. Algerian resources were included with the aim of enhancing an academic collaboration between the North and South as well. The findings showed that the postcolonial context had an impact on how children perceive Disney animations. They also demonstrated that children are able to negotiate the meaning of Disney texts within their own context.

Keywords: child audiences, Algeria, childhood, disability, Disney animations, global South, postcolonialism, tweens, Western hegemony

Procedia PDF Downloads 113
1828 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 95
1827 An AI-generated Semantic Communication Platform in HCI Course

Authors: Yi Yang, Jiasong Sun

Abstract:

Almost every aspect of our daily lives is now intertwined with some degree of human-computer interaction (HCI). HCI courses draw on knowledge from disciplines as diverse as computer science, psychology, design principles, anthropology, and more. Our HCI courses, named the Media and Cognition course, are constantly updated to reflect state-of-the-art technological advancements such as virtual reality, augmented reality, and artificial intelligence-based interactions. For more than a decade, our course has used an interest-based approach to teaching, in which students proactively propose some research-based questions and collaborate with teachers, using course knowledge to explore potential solutions. Semantic communication plays a key role in facilitating understanding and interaction between users and computer systems, ultimately enhancing system usability and user experience. The advancements in AI-generated technology, which have gained significant attention from both academia and industry in recent years, are exemplified by language models like GPT-3 that generate human-like dialogues from given prompts. Our latest version of the Human-Computer Interaction course practices a semantic communication platform based on AI-generated techniques. The purpose of this semantic communication is twofold: to extract and transmit task-specific information while ensuring efficient end-to-end communication with minimal latency. An AI-generated semantic communication platform evaluates the retention of signal sources and converts low-retain ability visual signals into textual prompts. These data are transmitted through AI-generated techniques and reconstructed at the receiving end; on the other hand, visual signals with a high retain ability rate are compressed and transmitted according to their respective regions. The platform and associated research are a testament to our students' growing ability to independently investigate state-of-the-art technologies.

Keywords: human-computer interaction, media and cognition course, semantic communication, retainability, prompts

Procedia PDF Downloads 108
1826 Patient Perspectives on the Role of Orthopedic Nurse Practitioners: A Cross-Sectional Study

Authors: Merav Ben Natan, May Revach, Or Sade, Yaniv Yonay, Yaron Berkovich

Abstract:

Background: The inclusion of nurse practitioners (NPs) specializing in orthopedics holds promise for enhancing the quality of care for orthopedic patients. Understanding patients’ perspectives on this role is crucial for evaluating the feasibility and acceptance of integrating NPs into orthopedic settings. This study aims to explore the receptiveness of orthopedic patients to treatment by orthopedic NPs and examines potential associations between patients’ willingness to engage with NPs, their familiarity with the NP role, perceptions of nursing, and satisfaction with orthopedic nursing care. Methods: This cross-sectional study involved patients admitted to an orthopedic department at a central Israeli hospital between January and February 2023. Data was collected using a validated questionnaire consisting of five sections, reviewed by content experts. Statistical analyses were conducted using SPSS and included descriptive statistics, independent samples t-tests, Pearson correlations, and linear regression. Results: Participants in the study showed a moderate willingness to receive treatment from orthopedic NPs, with more than two-thirds expressing strong openness. Patients were generally receptive to NPs performing various clinical tasks, though there was less enthusiasm for NPs’ involvement in medication management and preoperative evaluations. Positive attitudes towards nurses and familiarity with the NP role were significant predictors of patient receptiveness to NP treatment. Conclusion: Patient acceptance of orthopedic NPs varies across different aspects of care. While there is a general willingness to receive care from NPs, these nuanced preferences must be considered when implementing NPs in orthopedic settings. Awareness and positive perceptions of the NP role play crucial roles in shaping patients’ willingness to engage with NPs.

Keywords: orthopedic nurse practitioners, patient receptiveness, perceptions of nursing, clinical tasks

Procedia PDF Downloads 24
1825 Incorporation of Growth Factors onto Hydrogels via Peptide Mediated Binding for Development of Vascular Networks

Authors: Katie Kilgour, Brendan Turner, Carly Catella, Michael Daniele, Stefano Menegatti

Abstract:

In vivo, the extracellular matrix (ECM) provides biochemical and mechanical properties that are instructional to resident cells to form complex tissues with characteristics to develop and support vascular networks. In vitro, the development of vascular networks can be guided by biochemical patterning of substrates via spatial distribution and display of peptides and growth factors to prompt cell adhesion, differentiation, and proliferation. We have developed a technique utilizing peptide ligands that specifically bind vascular endothelial growth factor (VEGF), erythropoietin (EPO), or angiopoietin-1 (ANG1) to spatiotemporally distribute growth factors to cells. This allows for the controlled release of each growth factor, ultimately enhancing the formation of a vascular network. Our engineered tissue constructs (ETCs) are fabricated out of gelatin methacryloyl (GelMA), which is an ideal substrate for tailored stiffness and bio-functionality, and covalently patterned with growth factor specific peptides. These peptides mimic growth factor receptors, facilitating the non-covalent binding of the growth factors to the ETC, allowing for facile uptake by the cells. We have demonstrated in the absence of cells the binding affinity of VEGF, EPO, and ANG1 to their respective peptides and the ability for each to be patterned onto a GelMA substrate. The ability to organize growth factors on an ETC provides different functionality to develop organized vascular networks. Our results demonstrated a method to incorporate biochemical cues into ETCs that enable spatial and temporal control of growth factors. Future efforts will investigate the cellular response by evaluating gene expression, quantifying angiogenic activity, and measuring the speed of growth factor consumption.

Keywords: growth factor, hydrogel, peptide, angiogenesis, vascular, patterning

Procedia PDF Downloads 159
1824 Bahrain Experience in Supporting Small and Medium Enterprises by the Utilization of E-Government

Authors: Najla Alhkalaf

Abstract:

The focus of this study is answering the following question: How do e-government services in Bahrain support the productivity of SMEs? This study examines the current E-government function in enhancing SME productivity in Bahrain through analysing the efficiency of e- government by viewing its facilitators and barriers from the perspective of different stakeholders. The study aims to identify and develop best practice guidelines with the end-goal of creating a standardised channel of communication between e-government and SMEs that fulfil the requirement of SME owners, and thus achieve the prime objective of e-government. E-government services for SMEs have been offered in Bahrain since 2005. However, the current services lack the required mechanism for SMEs to fully take advantage of these services because of lagging communication between service provider and end-user. E-government employees believe that a lack of awareness and trust are the main stumbling block, whereas the SME owners believe that there is a lack of sufficiency in the content and efficiency provided through e- services. A questionnaire has been created based on a pilot study that highlighted the main indicators of e-government efficiency and SMEs productivity as well as previous studies conducted on this subject. This allowed for quantitative data to be extracted. Also interviews were conducted with SME owners and government employees from both case studies, which formed the qualitative data for this study. The findings portray that both the service provider and service receiver largely agree on the existence of most of the technical and administrative barriers. However, the data reflects a level of dissatisfaction from the SME side, which contradicts with the perceived level of satisfaction from the government employees. Therefore, the data supports the argument that assures the existence of a communication gap between stakeholders. To this effect, this research would help build channels of communication between stakeholders, and then induces a plan unlocking the potential of e-government application. The conclusions of this study will help devise an optimised E-government strategy for Bahrain.

Keywords: e-government, SME, e-services, G2B, government employees' perspective, entrepreneurs' perspective, enterprise

Procedia PDF Downloads 230
1823 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 36
1822 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 477
1821 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 360
1820 Market Chain Analysis of Onion: The Case of Northern Ethiopia

Authors: Belayneh Yohannes

Abstract:

In Ethiopia, onion production is increasing from time to time mainly due to its high profitability per unit area. Onion has a significant contribution to generating cash income for farmers in the Raya Azebo district. Therefore, enhancing onion producers’ access to the market and improving market linkage is an essential issue. Hence, this study aimed to analyze structure-conduct-performance of onion market and identifying factors affecting the market supply of onion producers. Data were collected from both primary and secondary sources. Primary data were collected from 150 farm households and 20 traders. Four onion marketing channels were identified in the study area. The highest total gross margin is 27.6 in channel IV. The highest gross marketing margin of producers of the onion market is 88% in channel II. The result from the analysis of market concentration indicated that the onion market is characterized by a strong oligopolistic market structure, with the buyers’ concentration ratio of 88.7 in Maichew town and 82.7 in Mekelle town. Lack of capital, licensing problems, and seasonal supply was identified as the major entry barrier to onion marketing. Market conduct shows that the price of onion is set by traders while producers are price takers. Multiple linear regression model results indicated that family size in adult equivalent, irrigated land size, access to information, frequency of extension contact, and ownership of transport significantly determined the quantity of onion supplied to the market. It is recommended that strengthening and diversifying extension services in information, marketing, post-harvest handling, irrigation application, and water harvest technology is highly important.

Keywords: oligopoly, onion, market chain, multiple linear regression

Procedia PDF Downloads 137
1819 Changing Subjective Well-Being and Social Trust in China: 2010-2020

Authors: Mengdie Ruan

Abstract:

The authors investigate how subjective well-being (SWB) and social trust changed in China over the period 2010–2020 by relying on data from six rounds of the China Family Panel Studies (CFPS), then re-examine Easterlin’s hypothesis for China, with a more focus on the role of social trust and estimate income-compensating differentials for social trust. They find that the evolution of well-being is not sensitive to the measures of well-being one uses. Specifically, self-reported life satisfaction scores and hedonic happiness scores experienced a significant increase across all income groups from 2010 to 2020. Social trust seems to have increased based on CFPS in China for all socioeconomic classes in recent years, and male, urban resident individuals with higher income have a higher social trust at a given point in time and over time. However, when we use an alternative measure of social trust, out-group trust, which is a more valid measure of generalized trust and represents “most people”, social trust in China literally declines, and the level is extremely low. In addition, this paper also suggests that in the typical query on social trust, the term "most people" mostly denotes in-groups in China, which contrasts sharply with most Western countries where it predominantly connotes out-groups. Individual fixed effects analysis of well-being that controls for time-invariant variables reveals social trust and relative social status are important correlates of life satisfaction and happiness, whereas absolute income plays a limited role in boosting an individual’s well-being. The income-equivalent value for social capital is approximately tripling of income. It has been found that women, urban and coastal residents, and people with higher income, young people, those with high education care more about social trust in China, irrespective of measures on SWB. Policy aiming at preserving and enhancing SWB should focus on social capital besides economic growth.

Keywords: subjective well-being, life satisfaction, happiness, social trust, China

Procedia PDF Downloads 72