Search results for: compromise
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 223

Search results for: compromise

223 Optimization of the Measure of Compromise as a Version of Sorites Paradox

Authors: Aleksandar Hatzivelkos

Abstract:

The term ”compromise” is mostly used casually within the social choice theory. It is usually used as a mere result of the social choice function, and this omits its deeper meaning and ramifications. This paper is based on a mathematical model for the description of a compromise as a version of the Sorites paradox. It introduces a formal definition of d-measure of divergence from a compromise and models a notion of compromise that is often used only colloquially. Such a model for vagueness phenomenon, which lies at the core of the notion of compromise enables the introduction of new mathematical structures. In order to maximize compromise, different methods can be used. In this paper, we explore properties of a social welfare function TdM (from Total d-Measure), which is defined as a function which minimizes the total sum of d-measures of divergence over all possible linear orderings. We prove that TdM satisfy strict Pareto principle and behaves well asymptotically. Furthermore, we show that for certain domain restrictions, TdM satisfy positive responsiveness and IIIA (intense independence of irrelevant alternatives) thus being equivalent to Borda count on such domain restriction. This result gives new opportunities in social choice, especially when there is an emphasis on compromise in the decision-making process.

Keywords: borda count, compromise, measure of divergence, minimization

Procedia PDF Downloads 98
222 Ethnic Minority, Oil Theft and Insecurity in the North: Where the Gap and the Compromise are

Authors: Elaiho Osaruwense, Ajuzie Godson Chidiebere

Abstract:

Nigeria of at least 250 ethnic group a have suffered a lot of social, economic and political setback especially in the regime of oil and gas, that are exploited from the minority region of the Niger south -south areas. The rate of insecurity in the north gives a lot of questioning and concern, with the series of killings by the Boko Haram in some part of the north etc. the fact still remains on how the gap and the compromise will be reconciling especially with the incoming president of Muhammadu Buhari with all the problems which was not resolve by the past administration (President Ebele Jonathan), considering the configuration and the character of the Nigerian state. This paper tends to critically evaluate all this problems, assertion, proffering possible solution.

Keywords: ethnic minority, oil theft, insecurity, the gap and the compromise

Procedia PDF Downloads 311
221 Robust State feedback Controller for an Active Suspension System

Authors: Hussein Altartouri

Abstract:

The purpose of this paper is to present a modeling and control of the active suspension system using robust state feedback controller implemented for a half car model. This system represents a mechatronic system which contains all the essential components to be considered a complete mechatronic system. This system must adapt different conditions which are difficult to compromise, such as disturbances, slippage, and motion on rough road (that contains rocks, stones, and other miscellanies). Some current automobile suspension systems use passive components only by utilizing spring and damping coefficient with fixed rates. Vehicle suspensions systems are used to provide good road handling and improve passenger comfort. Passive suspensions only offer compromise between these two conflicting criteria. Active suspension poses the ability to reduce the traditional design as a compromise between handling and comfort by directly controlling the suspensions force actuators. In this study, the robust state feedback controller implemented to the active suspensions system for half car model.

Keywords: half-car model, active suspension system, state feedback, road profile

Procedia PDF Downloads 367
220 Impulsivity Leads to Compromise Effect

Authors: Sana Maidullah, Ankita Sharma

Abstract:

The present study takes naturalistic decision-making approach to examine the role of personality in information processing in consumer decision making. In the technological era, most of the information comes in form of HTML or similar language via the internet; processing of this situation could be ambiguous, laborious and painful. The present study explores the role of impulsivity in creating an extreme effect on consumer decision making. Specifically, the study explores the role of impulsivity in extreme effect, i.e., extremeness avoidance (compromise effect) and extremeness seeking; the role of demographic variables, i.e. age and gender, in the relation between impulsivity and extreme effect. The study was conducted with the help of a questionnaire and two experiments. The experiment was designed in the form of two shopping websites with two product types: Hotel choice and Mobile choice. Both experimental interfaces were created with the Xampp software, the frontend of interfaces was HTML CSS JAVASCRIPT and backend was PHP MySQL. The mobile experiment was designed to measure the extreme effect and hotel experiment was designed to measure extreme effect with alignability of attributes. To observe the possibilities of the combined effect of individual difference and context effects, the manipulation of price, a number of alignable attributes and number of the non-alignable attributes is done. The study was conducted on 100 undergraduate and post-graduate engineering students within the age range of 18-35. The familiarity and level of use of internet and shopping website were assessed and controlled in the analysis. The analysis was done by using a t-test, ANOVA and regression analysis. The results indicated that the impulsivity leads to compromise effect and at the same time it also increases the relationship between alignability of attribute among choices and the compromise effect. The demographic variables were found to play a significant role in the relationship. The subcomponents of impulsivity were significantly influencing compromise effect, but the cognitive impulsivity was significant for women, and motor impulsivity was significant for males only. The impulsivity was significantly positively predicted by age, though there were no significant gender differences in impulsivity. The results clearly indicate the importance of individual factors in decision making. The present study, with precise and direct results, provides a significant suggestion for market analyst and business providers.

Keywords: impulsivity, extreme effect, personality, alignability, consumer decision making

Procedia PDF Downloads 162
219 Preventing Farmer-Herder Conflicts in Ghana: A Constellation of Local Strategies and Solutions

Authors: Abdulai Abubakari

Abstract:

The rollercoaster relationship between farmers and herders in Sub-Saharan Africa has compelled most governments to undertake different mitigating strategies. Over the past two decades, the expulsion of migrant herdsmen, the killing of cattle and human beings, and fines have been used by the state and aggrieved individuals to resolve the conflicts. Unlike this paper, most of the research conducted on this subject matter has been largely theoretical and lacks practical solutions to the conflicts. This paper is unique because it focuses on concrete strategies and practical solutions to ending the century-old phenomenon of farmer-herder conflicts in Ghana. The paper employed power or compete (fight) theory as well as compromise and negotiation theories in the analyses. The paper employed, basically, socio-anthropological methods: interviews, focus group discussions, and observations to gather data. The paper found that compromises through negotiation with the stakeholders are the best ways of resolving these conflicts. Through this, we support the compromise and negotiation approach rather than expulsion to resolve farmer-herder conflicts.

Keywords: farmer-herder, conflict, prevention, strategies, stakeholders

Procedia PDF Downloads 21
218 Pure Scalar Equilibria for Normal-Form Games

Authors: Herbert W. Corley

Abstract:

A scalar equilibrium (SE) is an alternative type of equilibrium in pure strategies for an n-person normal-form game G. It is defined using optimization techniques to obtain a pure strategy for each player of G by maximizing an appropriate utility function over the acceptable joint actions. The players’ actions are determined by the choice of the utility function. Such a utility function could be agreed upon by the players or chosen by an arbitrator. An SE is an equilibrium since no players of G can increase the value of this utility function by changing their strategies. SEs are formally defined, and examples are given. In a greedy SE, the goal is to assign actions to the players giving them the largest individual payoffs jointly possible. In a weighted SE, each player is assigned weights modeling the degree to which he helps every player, including himself, achieve as large a payoff as jointly possible. In a compromise SE, each player wants a fair payoff for a reasonable interpretation of fairness. In a parity SE, the players want their payoffs to be as nearly equal as jointly possible. Finally, a satisficing SE achieves a personal target payoff value for each player. The vector payoffs associated with each of these SEs are shown to be Pareto optimal among all such acceptable vectors, as well as computationally tractable.

Keywords: compromise equilibrium, greedy equilibrium, normal-form game, parity equilibrium, pure strategies, satisficing equilibrium, scalar equilibria, utility function, weighted equilibrium

Procedia PDF Downloads 87
217 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 66
216 The Production, Negotiation and Resistance of Short Video Producers

Authors: Cui Li, Xu Yuping

Abstract:

Based on the question of, "Are short video creators who are digital workers controlled by platform rules?" this study discusses the specific ways of platform rules control and the impact on short video creators. Based on the theory of digital labor, this paper adopts the method of in-depth interview and participant observation and chooses 24 producers of short video content of Tiktok to conduct in-depth interview. At the same time, through entering the short video creation field, the author carries on the four-month field investigation, obtains the creation process related data, and analyzes how the short video creator, as the digital labor, is controlled by the platform rule, as well as the creator in this process of compromise and resistance, a more comprehensive presentation of the short video creators of the labor process. It is found that the short video creators are controlled by the platform rules, mainly in the control of traffic rules, and the creators create content, compromise and resist under the guidance of traffic. First, while the platform seems to offer a flexible and autonomous way for creators to monetize, the threshold for participating in the event is actually very high for creators, and the rules for monetizing the event are vague. Under the influence of the flow rule, the creator is faced unstable incomes and high costs. Therefore, creators have to follow the rules of traffic to guide their own creation, began to flow-oriented content production, mainly reflected in the need to keep up-to-date, the pursuit of traffic to ride on the hot spots, in order to flow regardless, set up people "Born for the show", by the label solidified content creation. Secondly, the irregular working hours lead to the extension and overwork of the working hours, which leads to the internal friction of the short video creators at the spiritual level, and finally leads to the Rat Race of video creation. Thirdly, the video creator has completed the internalization and compromise of the platform rules in practice, which promotes the creator to continue to create independently, and forms the intrinsic motive force of the creator. Finally, the rule-controlled short video creators resist and fight in flexible ways, make use of the mechanism and rules of the platform to carry on the second creation, carry on the routine production, purchase the false flow, transfer the creation position to maintain own creation autonomy.

Keywords: short videos, tiktok, production, digital labors

Procedia PDF Downloads 31
215 Compromising Quality of Life in Low Income Settlemnt’s: The Case of Ashrayan Prakalpa Prakalpa, Khulna

Authors: Salma Akter, Md. Kamal Uddin

Abstract:

Ashrayan (shelter) Prakalpa – a fully subsidized ‘integrated poverty eradication program’ through the provisioning of shelter of Bangladesh Government (GoB) targeting the internally displaced and homeless. In spite of the inclusiveness (poverty alleviation, employment opportunity, Tenure ship and training) of the shelter policy, dwellers are not merely questioned by the issue of 'the quality of life' .This study demonstrates how top-down policies, ambiguous ownership status of land and dwelling environments lead to ‘everyday compromise’ by the grassroots in both subjective (satisfaction, comfort and safety) and objective (physical design elements and physical environmental elements) issues in three respective scale macro (neighborhood) meso (shelter /built environment) and micro(family). It shows that by becoming subject to Government’s resettlements policies and after becoming user of its shelter units (although locally known as ‘barracks’ rather shelter or housing), the once displaced settlers assume a curious form of spatial practice where both social and spatial often bear slippery meanings. Thus, Policy-based shelter force the dwellers frequently compromise with their provided built environments and spaces within the settlements both in overtly and covertly. Compromises are made during the production of space and forms, whereas interesting new spaces and space-making practices emerge. The settlements under study are Dakshin Chandani Mahal Ashrayan Prakalpa located at the Eastern fringe area of Khulna, Bangladesh. In terms of methodology, this research is primarily exploratory and assumes a qualitative approach. Key tools used to obtain information are policy analysis, literature review, key informant interview, focus group discussion and participant observation at the level of dwelling and settlements. Necessary drawings and photographs have been taken to promote the study objective. Findings revealed that various shortages, inadequacies and negligence of policymakers make a compromising character of displaced by the means of 'quality of life' both in objective and subjective ground. Thus the study ends up with a recommendation to the policymakers to take an initiative to ensure the quality of life of the dwellers.

Keywords: Ashrayan, compromise, displaced people, quality of life

Procedia PDF Downloads 306
214 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 55
213 Compromising Quality of Life in Low Income Settlement's: The Case of Ashrayan Prakalpa, Khulna

Authors: Salma Akter, Md. Kamal Uddin

Abstract:

This study aims to demonstrate how top-down shelter policy and its resultant dwelling environment leads to ‘everyday compromise’ by the grassroots according to subjective (satisfaction) and objective (physical design elements and physical environmental elements) indicators, which are measured across three levels of the settlement; macro (Community), meso (Neighborhood or shelter/built environment) and micro (family). Ashrayan Prakalpa is a resettlement /housing project of Government of Bangladesh for providing shelters and human resources development activities like education, microcredit, and training programme to landless, homeless and rootless people. Despite the integrated nature of the shelter policies (comprises poverty alleviation, employment opportunity, secured tenure, and livelihood training), the ‘quality of life’ issue at the different levels of settlements becomes questionable. As dwellers of shelter units (although formally termed as ‘barracks’ rather shelter or housing) remain on the receiving end of government’s resettlement policies, they often involve with spatial-physical and socio-economic negotiation and assume curious forms of spatial practice, which often upholds contradiction with policy planning. Thus, policy based shelter force dwellers to persistently compromise with their provided built environments both in overtly and covertly. Compromising with prescribed designed space and facilities across living places articulated their negotiation with the quality of allocated space, built form and infrastructures, which in turn exert as less quality of life. The top-down shelter project, Dakshin Chandani Mahal Ashrayan Prakalpa at Dighalia Upazila, the study area located at the Eastern fringe area of Khulna, Bangladesh, is still in progress to resettle internally displaced and homeless people. In terms of methodology, this research is primarily exploratory and adopts a case study method, and an analytical framework is developed through the deductive approach for evaluating the quality of life. Secondary data have been obtained from housing policy analysis and relevant literature review, while key informant interview, focus group discussion, necessary drawings and photographs and participant observation across dwelling, neighborhood, and community level have also been administered as primary data collection methodology. Findings have revealed that various shortages, inadequacies, and negligence of policymakers force to compromise with allocated designed space, physical infrastructure and economic opportunities across dwelling, neighborhood and mostly community level. Thus, the outcome of this study can be beneficial for a global-level understating of the compromising the ‘quality of life’ under top-down shelter policy. Locally, for instance, in the context of Bangladesh, it can help policymakers and concerned authorities to formulate the shelter policies and take initiatives to improve the well-being of marginalized.

Keywords: Ashrayan Prakalpa, compromise, displaced people, quality of life

Procedia PDF Downloads 121
212 Compromising Quality of Life in Low-Income Settlements: The Case of Ashrayan Prakalpa, Khulna

Authors: Salma Akter, Md. Kamal Uddin

Abstract:

Quality of life is a vast and comprehensive concept refers overall well-being of society. Current research and efforts of policymakers and planners are concerned to increase the urban quality of life through the sustainable development of city and country. While such efforts effectively improve the quality of life of urban dwellers through improved social, economic and housing infrastructures, very little has been paid to improve low-income settlement users more specifically government provided shelter projects. The top-down shelter policies and its objective indicators (physical design elements and physical environmental elements) indicators on low-income groups merely can ensure grassroots needs, aspiration and well-being refer as subjective qualities obliged to compromise with the quality of life. This research, therefore, aims to measure the quality of life of such government-provided low-income settlements. To do so, a conceptual framework has been developed to measure quality of life with arguing that quality of life depends on both objective and subjective indicators and needs to measure across three scales of living environment refers to macro (community), meso (neighborhood or shelter/built environment), and micro (family). The top-down shelter project, Dakshin Chandani Mahal Ashrayan Prakalpa is a resettlement/housing project of Government of Bangladesh for providing shelters and human resources development activities like education, microcredit, and training programme to landless, homeless and rootless people has been taken as case study. The study area is located at Dighalia Upazila, Khulna Bangladesh. In terms of methodology, this research is primarily exploratory and adopts a case study method and deductive approach for evaluating the quality of life. Data have been obtained from relevant literature review, key informant interview, focus group discussion, necessary drawings, photographs and participant observation across dwelling, neighborhood, and community level. Findings have revealed that Shelter users mostly compromise the quality of life at community level due to insufficient physical design elements and facilities while neighborhood and dwelling level have been manifested similar result like former ones. Thus, the outcome of this study can be beneficial for a global-level understating of the compromising the ‘quality of life’ under top-down shelter policy. Locally, for instance, in the context of Bangladesh, it can help policymakers and concerned authorities to formulate the shelter policies and take initiatives to improve the well-being of marginalized.

Keywords: Ashrayan Prakalpa, compromise, displaced people, quality of life

Procedia PDF Downloads 193
211 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study

Procedia PDF Downloads 350
210 Sensitive Analysis of the ZF Model for ABC Multi Criteria Inventory Classification

Authors: Makram Ben Jeddou

Abstract:

The ABC classification is widely used by managers for inventory control. The classical ABC classification is based on the Pareto principle and according to the criterion of the annual use value only. Single criterion classification is often insufficient for a closely inventory control. Multi-criteria inventory classification models have been proposed by researchers in order to take into account other important criteria. From these models, we will consider the ZF model in order to make a sensitive analysis on the composite score calculated for each item. In fact, this score based on a normalized average between a good and a bad optimized index can affect the ABC items classification. We will then focus on the weights assigned to each index and propose a classification compromise.

Keywords: ABC classification, multi criteria inventory classification models, ZF-model

Procedia PDF Downloads 476
209 Conception of a Reliable Low Cost, Autonomous Explorative Hovercraft 1

Authors: A. Brand, S. Burgalat, E. Chastel, M. Jumeline, L. Teilhac

Abstract:

The paper presents actual benefits and drawbacks of a multidirectional Hovercraft conceived with limited resources and designed for indoor exploration. Recent developments in the field have led to apparition of very powerful automotive systems capable of very high calculation and exploration in complex unknown environments. They usually propose very complex algorithms, high precision/cost sensors and sometimes have heavy calculation consumption with complex data fusion. Those systems are usually powerful but have a certain price and the benefits may not be worth the cost, especially considering their hardware limitations and their power consumption. Present approach is to build a compromise between cost, power consumption and results preciseness.

Keywords: Hovercraft, indoor exploration, autonomous, multidirectional, wireless control

Procedia PDF Downloads 390
208 Conception of a Reliable Low Cost and Autonomous Explorative Hovercraft

Authors: S. Burgalat, L. Teilhac, A. Brand, E. Chastel, M. Jumeline

Abstract:

The paper presents actual benefits and drawbacks of a multidirectional autonomous hovercraft conceived with limited resources and designed for indoor exploration. Recent developments in the field have led to the apparition of very powerful automotive systems capable of very high calculation and exploration in complex unknown environments. They usually propose very complex algorithms, high precision/cost sensors and sometimes have heavy calculation consumption with complex data fusion. These systems are usually powerful but have a certain price, and the benefits may not be worth the cost, especially considering their hardware limitations and their power consumption. The present approach is to build a compromise between cost, power consumption and results preciseness.

Keywords: hovercraft, indoor exploration, autonomous, multidirectional, wireless control

Procedia PDF Downloads 244
207 Generalization of Blom Key Predistribution Scheme

Authors: Abbas Cheraghi

Abstract:

A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.

Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure

Procedia PDF Downloads 387
206 Non-Parametric, Unconditional Quantile Estimation of Efficiency in Microfinance Institutions

Authors: Komlan Sedzro

Abstract:

We apply the non-parametric, unconditional, hyperbolic order-α quantile estimator to appraise the relative efficiency of Microfinance Institutions in Africa in terms of outreach. Our purpose is to verify if these institutions, which must constantly try to strike a compromise between their social role and financial sustainability are operationally efficient. Using data on African MFIs extracted from the Microfinance Information eXchange (MIX) database and covering the 2004 to 2006 periods, we find that more efficient MFIs are also the most profitable. This result is in line with the view that social performance is not in contradiction with the pursuit of excellent financial performance. Our results also show that large MFIs in terms of asset and those charging the highest fees are not necessarily the most efficient.

Keywords: data envelopment analysis, microfinance institutions, quantile estimation of efficiency, social and financial performance

Procedia PDF Downloads 269
205 Improving the Management Systems of the Ownership Risks in Conditions of Transformation of the Russian Economy

Authors: Mikhail V. Khachaturyan

Abstract:

The article analyzes problems of improving the management systems of the ownership risks in the conditions of the transformation of the Russian economy. Among the main sources of threats business owners should highlight is the inefficiency of the implementation of business models and interaction with hired managers. In this context, it is particularly important to analyze the relationship of business models and ownership risks. The analysis of this problem appears to be relevant for a number of reasons: Firstly, the increased risk appetite of the owner directly affects the business model and the composition of his holdings; secondly, owners with significant stakes in the company are factors in the formation of particular types of risks for owners, for which relations have a significant influence on a firm's competitiveness and ultimately determines its survival; and thirdly, inefficient system of management ownership of risk is one of the main causes of mass bankruptcies, which significantly affects the stable operation of the economy as a whole. The separation of the processes of possession, disposal and use in modern organizations is the cause of not only problems in the process of interaction between the owner and managers in managing the organization as a whole, but also the asymmetric information about the kinds and forms of the main risks. Managers tend to avoid risky projects, inhibit the diversification of the organization's assets, while owners can insist on the development of such projects, with the aim not only of creating new values for themselves and consumers, but also increasing the value of the company as a result of increasing capital. In terms of separating ownership and management, evaluation of projects by the ratio of risk-yield requires preservation of the influence of the owner on the process of development and making management decisions. It is obvious that without a clearly structured system of participation of the owner in managing the risks of their business, further development is hopeless. In modern conditions of forming a risk management system, owners are compelled to compromise between the desire to increase the organization's ability to produce new value, and, consequently, increase its cost due to the implementation of risky projects and the need to tolerate the cost of lost opportunities of risk diversification. Improving the effectiveness of the management of ownership risks may also contribute to the revitalization of creditors on implementation claims to inefficient owners, which ultimately will contribute to the efficiency models of ownership control to exclude variants of insolvency. It is obvious that in modern conditions, the success of the model of the ownership of risk management and audit is largely determined by the ability and willingness of the owner to find a compromise between potential opportunities for expanding the firm's ability to create new value through risk and maintaining the current level of new value creation and an acceptable level of risk through the use of models of diversification.

Keywords: improving, ownership risks, problem, Russia

Procedia PDF Downloads 326
204 Multi-Objective Optimization (Pareto Sets) and Multi-Response Optimization (Desirability Function) of Microencapsulation of Emamectin

Authors: Victoria Molina, Wendy Franco, Sergio Benavides, José M. Troncoso, Ricardo Luna, Jose R. PéRez-Correa

Abstract:

Emamectin Benzoate (EB) is a crystal antiparasitic that belongs to the avermectin family. It is one of the most common treatments used in Chile to control Caligus rogercresseyi in Atlantic salmon. However, the sea lice acquired resistance to EB when it is exposed at sublethal EB doses. The low solubility rate of EB and its degradation at the acidic pH in the fish digestive tract are the causes of the slow absorption of EB in the intestine. To protect EB from degradation and enhance its absorption, specific microencapsulation technologies must be developed. Amorphous Solid Dispersion techniques such as Spray Drying (SD) and Ionic Gelation (IG) seem adequate for this purpose. Recently, Soluplus® (SOL) has been used to increase the solubility rate of several drugs with similar characteristics than EB. In addition, alginate (ALG) is a widely used polymer in IG for biomedical applications. Regardless of the encapsulation technique, the quality of the obtained microparticles is evaluated with the following responses, yield (Y%), encapsulation efficiency (EE%) and loading capacity (LC%). In addition, it is important to know the percentage of EB released from the microparticles in gastric (GD%) and intestinal (ID%) digestions. In this work, we microencapsulated EB with SOL (EB-SD) and with ALG (EB-IG) using SD and IG, respectively. Quality microencapsulation responses and in vitro gastric and intestinal digestions at pH 3.35 and 7.8, respectively, were obtained. A central composite design was used to find the optimum microencapsulation variables (amount of EB, amount of polymer and feed flow). In each formulation, the behavior of these variables was predicted with statistical models. Then, the response surface methodology was used to find the best combination of the factors that allowed a lower EB release in gastric conditions, while permitting a major release at intestinal digestion. Two approaches were used to determine this. The desirability approach (DA) and multi-objective optimization (MOO) with multi-criteria decision making (MCDM). Both microencapsulation techniques allowed to maintain the integrity of EB in acid pH, given the small amount of EB released in gastric medium, while EB-IG microparticles showed greater EB release at intestinal digestion. For EB-SD, optimal conditions obtained with MOO plus MCDM yielded a good compromise among the microencapsulation responses. In addition, using these conditions, it is possible to reduce microparticles costs due to the reduction of 60% of BE regard the optimal BE proposed by (DA). For EB-GI, the optimization techniques used (DA and MOO) yielded solutions with different advantages and limitations. Applying DA costs can be reduced 21%, while Y, GD and ID showed 9.5%, 84.8% and 2.6% lower values than the best condition. In turn, MOO yielded better microencapsulation responses, but at a higher cost. Overall, EB-SD with operating conditions selected by MOO seems the best option, since a good compromise between costs and encapsulation responses was obtained.

Keywords: microencapsulation, multiple decision-making criteria, multi-objective optimization, Soluplus®

Procedia PDF Downloads 93
203 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 312
202 Compromised Sexual Territoriality under Reflexive Cosmopolitanism: From Coffee Bean to Gay Bean in South Korea

Authors: Robert Christopher Hamilton

Abstract:

This research examined the effects of reflexive cosmopolitanism on the competition for sexual territoriality. By adopting Michel De Certeau’s (1984) spatial didactic model, the article maps out the key elements at play and the dynamics explaining how gays gay place in the backdrop of rapid modernization. It found that heterosexual space and heteronormative assumptions helped to create temporal and spatial opportunities that allow for sexual performativity of gay males. Moreover, using data collected from multiple semi-controlled one-on-one interviews over 13 months, this article illustrates how spatial competition culminates in non-zero sum game outcomes and particularly to compromise of sexual territoriality while further demonstrating the need to understand the sexual coping tactics used in cultures with similar backgrounds. The findings enable researchers to better understand how gay men gay space, and how space performatively embodies gay men.

Keywords: South Korea, coffee bean, sexual territoriality, reflexive cosmopolitanism

Procedia PDF Downloads 297
201 TechWhiz: Empowering Deaf Students through Inclusive Education

Authors: Paula Escudeiro, Nuno Escudeiro, Márcia Campos, Francisca Escudeiro

Abstract:

In today's world, technical and scientific knowledge plays a vital role in education, research, and employment. Deaf students face unique challenges in educational settings, particularly when it comes to understanding technical and scientific terminology. The reliance on written and spoken languages can create barriers for deaf individuals who primarily communicate using sign language. This lack of accessibility can hinder their learning experience and compromise equity in education. To address this issue, the TechWhiz project has been developed as a comprehensive glossary of scientific and technical concepts explained in sign language. By providing deaf students with access to education in their first language, TechWhiz aims to enhance their learning achievements and promote inclusivity while also fostering equity in education for all students.

Keywords: deaf students, technical and scientific knowledge, automatic sign language, inclusive education

Procedia PDF Downloads 32
200 Discrete Swarm with Passive Congregation for Cost Minimization of the Multiple Vehicle Routing Problem

Authors: Tarek Aboueldahab, Hanan Farag

Abstract:

Cost minimization of Multiple Vehicle Routing Problem becomes a critical issue in the field of transportation because it is NP-hard optimization problem and the search space is complex. Many researches use the hybridization of artificial intelligence (AI) models to solve this problem; however, it can not guarantee to reach the best solution due to the difficulty of searching the whole search space. To overcome this problem, we introduce the hybrid model of Discrete Particle Swarm Optimization (DPSO) with a passive congregation which enable searching the whole search space to compromise between both local and global search. The practical experiment shows that our model obviously outperforms other hybrid models in cost minimization.

Keywords: cost minimization, multi-vehicle routing problem, passive congregation, discrete swarm, passive congregation

Procedia PDF Downloads 65
199 SENSE-SEAT: Improving Creativity and Productivity through the Redesign of a Multisensory Technological Office Chair

Authors: Fernando Miguel Campos, Carlos Ferreira, João Pestana, Pedro Campos, Nils Ehrenberg, Wojciech Hydzik

Abstract:

The current trend of organizations offering their workers open-office spaces and co-working offices has been primed for stimulating teamwork and collaboration. However, this is not always valid as these kinds of spaces bring other types of challenges that compromise workers productivity and creativity. We present an approach for improving creativity and productivity at the workspace by redesigning an office chair that incorporates subtle technological elements that help users focus, relax and being more productive and creative. This sheds light on how we can better design interactive furniture for such popular contexts, as we develop this new chair through a multidisciplinary approach using ergonomics, interior design, interaction design, hardware and software engineering and psychology.

Keywords: creativity, co-working, ergonomics, human-computer interaction, interaction, interactive furniture, productivity

Procedia PDF Downloads 293
198 A New Design Methodology for Partially Reconfigurable Systems-on-Chip

Authors: Roukaya Dalbouchi, Abdelkrin Zitouni

Abstract:

In this paper, we propose a novel design methodology for Dynamic Partial Reconfigurable (DPR) system. This type of system has the property of being able to be modified after its design and during its execution. The suggested design methodology is generic in terms of granularity, number of modules, and reconfigurable region and suitable for any type of modern application. It is based on the interconnection between several design stages. The recommended methodology represents a guide for the design of DPR architectures that meet compromise reconfiguration/performance. To validate the proposed methodology, we use as an application a video watermarking. The comparison result shows that the proposed methodology supports all stages of DPR architecture design and characterized by a high abstraction level. It provides a dynamic/partial reconfigurable architecture; it guarantees material efficiency, the flexibility of reconfiguration, and superior performance in terms of frequency and power consumption.

Keywords: dynamically reconfigurable system, block matching algorithm, partial reconfiguration, motion vectors, video watermarking

Procedia PDF Downloads 59
197 Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh

Authors: Mohammad Ashraful Alam, Biro Judit

Abstract:

Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh.

Keywords: compromise personal freedom, fear of crime, fear of gender-based crime, fear of violent crime victimization, rape, sexual assaults, withdrawal from regular activities, women empowerment

Procedia PDF Downloads 104
196 The Effect of Material Properties and Volumetric Changes in Phase Transformation to the Final Residual Stress of Welding Process

Authors: Djarot B. Darmadi

Abstract:

The wider growing Finite Element Method (FEM) application is caused by its benefits of cost saving and environment friendly. Also, by using FEM a deep understanding of certain phenomenon can be achieved. This paper observed the role of material properties and volumetric change when Solid State Phase Transformation (SSPT) takes place in residual stress formation due to a welding process of ferritic steels through coupled Thermo-Metallurgy-Mechanical (TMM) analysis. The correctness of FEM residual stress prediction was validated by experiment. From parametric study of the FEM model, it can be concluded that the material properties change tend to over-predicts residual stress in the weld center whilst volumetric change tend to underestimates it. The best final result is the compromise of both by incorporates them in the model which has a better result compared to a model without SSPT.

Keywords: residual stress, ferritic steels, SSPT, coupled-TMM

Procedia PDF Downloads 240
195 Anomalous Origin of Bilateral Testicular Arteries: A Case Report

Authors: Arthi Ganapathy, Arithra Banerjee, Saroj Kaler

Abstract:

Abdominal aorta is the sole purveyor of all organs in the abdomen. Anomalies of its main trunk or its branches are to be meticulously observed as it effects the perfusion of an organ. Varying patterns of the testicular artery is one of them. The origin and course of testicular arteries have to be identified carefully during various surgical procedures like renal transplant, intra abdominal surgeries and even in orthopedic surgery like spine surgery. With the advent of new intra-abdominal therapeutic and diagnostic techniques, the anatomy of testicular arteries has assumed much more significance. Though the variations of the testicular vein are well documented, the variations of the testicular artery are not so frequent in incidence. We report a case of the bilateral aberrant origin of the testicular artery from polar renal arteries. We also discuss its developmental basis. Such anomalies if left unnoticed will lead to serious intraoperative complications during procedures on retroperitoneal organs. Any damage to testicular arteries will compromise the function of the gonads.

Keywords: cadaver, gonadal, renal, surgery

Procedia PDF Downloads 192
194 Meaningful General Education Reform: Integrating Core Curricula and Institutional Values

Authors: Michael W. Markowitz

Abstract:

A central element of higher education today is the “core” or “general education” curriculum: that configuration of courses that often encompasses the essence of liberal arts education. Ensuring that such offerings reflect the mission and values of the institution is a challenge faced by most college and universities, often more than once. This paper presents an action model of program planning designed to structure the processes of developing, implementing and revising core curricula in a manner consistent with key institutional goals and objectives. Through presentation of a case study from a university in the United States, the elements of needs assessment, stakeholder investment and collaborative compromise are shown as key components of a planning strategy that can produce a general education program that is comprehensive, academically rigorous, assessable and mission consistent. The paper concludes with recommendations for both the implementation and evaluation of such programs in practice.

Keywords: academic assessment, academic program planning, curriculum development, general education reform

Procedia PDF Downloads 279