Search results for: Linux system calls
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17474

Search results for: Linux system calls

17414 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 156
17413 The Fifth Political Theory and Countering Terrorism in the Post 9/11 Era

Authors: Rana Eijaz Ahmad

Abstract:

This paper is going to explain about the Fifth Political Theory that challenges all existing three plus one (Capitalism, Marxism and Fascism + Fourth Political Theory) theories. It says, ‘it is human ambiance evolve any political system to survive instead of borrowing other imported thoughts to live in a specific environment, in which Legitimacy leads to authority and promotes humanism.’ According to this theory, no other state is allowed to dictate or install any political system upon other states. It is the born right of individuals to choose a political system or a set of values that are going to make their structures and functions efficient enough to support the system harmony and counter the negative forces successfully. In the post 9/11 era, it is observed that all existing theories like Capitalism, Marxism, Fascism and Fourth Political Theory remained unsuccessful in resolving the global crisis. The so-called war against terrorism is proved as a war for terrorism and creates a vacuum on the global stage, worsening the crisis. The fifth political theory is an answer to counter terrorism in the twenty-first century. It calls for accountability of the United Nations for its failure in sustaining peace at global level. Therefore, the UN charter is supposed to be implemented in its true letter and spirit. All independent sovereign states have right to evolve their own system to carry out a political system that suits them best for sustaining harmony at home. This is the only way to counter terrorism. This paper is comprised of mixed method. Qualitative, quantitative and comparative methods will be used along with secondary sources. The objective of this paper is to create knowledge for the benefit of human beings with a logical and rational argument. It will help political scientists and scholars in conflict management and countering terrorism on pragmatic grounds.

Keywords: capitalism, fourth political theory, fifth political theory, Marxism, fascism

Procedia PDF Downloads 346
17412 safeRoute: Information Safety System for Professional Road Driving

Authors: Francisco Toledo-Castillo, Pilar Peiró-Torres, María Josefa Sospedra-Baeza, Sergio Hidalgo-Fuentes

Abstract:

The communication presented is about tasks that are been developed in the research project “safeRoute”, “Information safety system for professional road driving” (IPT-2012-110-370000). This R&D project was proposed by the consortium formed by Fagor Electronica la SEU 3 and the University of Valencia to the Ministry of Economy and Competitiveness, which approved it inside the INNPACTO subprogramme grants. Through this type of calls, the Ministry promote the innovative capacity of the Spanish companies and turn on the mechanism for competing internationally. With this kind of calls, private investments for technological and industrial development join their R & D resources with public entities to implement innovative project that could have an international exposure. Thus INNPACTO subprogramme promotes the creation of research projects with public-private partnerships that create exploitable final products. The “safeRoute” Project pretends develop a tool to help to make more safety the travels of commercial transport vehicles of goods and passengers. To achieve its objectives, the project is focused in three main lines of research: vehicle safety, the safety of the roads that they are using, and the safety which drivers do their job, their behaviour while they are driving. To improve safety, the project gives information about these three factors to all people that are involved in the safety of the professional transport. These three factors have influence to the occurrence of traffic accidents, thanks to the information provided and treated about these factors, we can achieve a significant reduction in occupational accidents in the transport sector. SafeRoute provide information about routes, vehicles, and driver behaviours, and in this manner pretends provide to transport companies a tool which could result in a safer driving results and could reduce their costs related to traffic accidents of their vehicles, in that way, this tool could help them to be more competitive, and give a more reliable service. This paper will focus mainly on the information about routes that drivers use to travel in their professional work, and how the researchers of this project have catalogued and evaluated these routes, and finally how that information will be provided to users.

Keywords: driver support systems, professional drivers, road safety, safeRoute

Procedia PDF Downloads 377
17411 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 119
17410 Free and Open Source Licences, Software Programmers, and the Social Norm of Reciprocity

Authors: Luke McDonagh

Abstract:

Over the past three decades, free and open source software (FOSS) programmers have developed new, innovative and legally binding licences that have in turn enabled the creation of innumerable pieces of everyday software, including Linux, Mozilla Firefox and Open Office. That FOSS has been highly successful in competing with 'closed source software' (e.g. Microsoft Office) is now undeniable, but in noting this success, it is important to examine in detail why this system of FOSS has been so successful. One key reason is the existence of networks or communities of programmers, who are bound together by a key shared social norm of 'reciprocity'. At the same time, these FOSS networks are not unitary – they are highly diverse and there are large divergences of opinion between members regarding which licences are generally preferable: some members favour the flexible ‘free’ or 'no copyleft' licences, such as BSD and MIT, while other members favour the ‘strong open’ or 'strong copyleft' licences such as GPL. This paper argues that without both the existence of the shared norm of reciprocity and the diversity of licences, it is unlikely that the innovative legal framework provided by FOSS would have succeeded to the extent that it has.

Keywords: open source, copyright, licensing, copyleft

Procedia PDF Downloads 336
17409 The Impact of Information and Communication Technology in Knowledge Fraternization

Authors: Muhammad Aliyu

Abstract:

Significant improvement in Information and Communication Technology (ICT) and the enforced global competition are revolutionizing the way knowledge is managed and the way organizations compete. The emergence of new organizations calls for a new way to fraternize knowledge, which is known as 'knowledge fraternization.' In this modern economy, it is the knowledge if properly managed that can harness the organization's competitive advantage. This competitive advantage is realized through the full utilization of information and data coupled with the harnessing of people’s skills and ideas as well as their commitment and motivations, which can be accomplished through socializing the knowledge management processes. A fraternize network for knowledge management is a web-based system designed using PHP that is Dreamweaver web development tool, with the help of CS4 Adobe Dreamweaver as the PHP code Editor that supports the use of Cascadian Style Sheet (CSS), MySQL with Xamp, Php My Admin (Version 3.4.7) localhost server via TCP/IP for containing the databases of the system to support this in a distributed way, spreading the workload over the whole organization. This paper reviews the technologies and the technology tools to be used in the development of social networks in an organization.

Keywords: Information and Communication Technology (ICT), knowledge, fraternization, social network

Procedia PDF Downloads 365
17408 Determining Inventory Replenishment Policy for Major Component in Assembly-to-Order of Cooling System Manufacturing

Authors: Tippawan Nasawan

Abstract:

The objective of this study is to find the replenishment policy in Assembly-to-Order manufacturing (ATO) which some of the major components have lead-time longer than customer lead-time. The variety of products, independent component demand, and long component lead-time are the difficulty that has resulted in the overstock problem. In addition, the ordering cost is trivial when compared to the cost of material of the major component. A conceptual design of the Decision Supporting System (DSS) has introduced to assist the replenishment policy. Component replenishment by using the variable which calls Available to Promise (ATP) for making the decision is one of the keys. The Poisson distribution is adopted to realize demand patterns in order to calculate Safety Stock (SS) at the specified Customer Service Level (CSL). When distribution cannot identify, nonparametric will be applied instead. The test result after comparing the ending inventory between the new policy and the old policy, the overstock has significantly reduced by 46.9 percent or about 469,891.51 US-Dollars for the cost of the major component (material cost only). Besides, the number of the major component inventory is also reduced by about 41 percent which helps to mitigate the chance of damage and keeping stock.

Keywords: Assembly-to-Order, Decision Supporting System, Component replenishment , Poisson distribution

Procedia PDF Downloads 99
17407 Development of Geo-computational Model for Analysis of Lassa Fever Dynamics and Lassa Fever Outbreak Prediction

Authors: Adekunle Taiwo Adenike, I. K. Ogundoyin

Abstract:

Lassa fever is a neglected tropical virus that has become a significant public health issue in Nigeria, with the country having the greatest burden in Africa. This paper presents a Geo-Computational Model for Analysis and Prediction of Lassa Fever Dynamics and Outbreaks in Nigeria. The model investigates the dynamics of the virus with respect to environmental factors and human populations. It confirms the role of the rodent host in virus transmission and identifies how climate and human population are affected. The proposed methodology is carried out on a Linux operating system using the OSGeoLive virtual machine for geographical computing, which serves as a base for spatial ecology computing. The model design uses Unified Modeling Language (UML), and the performance evaluation uses machine learning algorithms such as random forest, fuzzy logic, and neural networks. The study aims to contribute to the control of Lassa fever, which is achievable through the combined efforts of public health professionals and geocomputational and machine learning tools. The research findings will potentially be more readily accepted and utilized by decision-makers for the attainment of Lassa fever elimination.

Keywords: geo-computational model, lassa fever dynamics, lassa fever, outbreak prediction, nigeria

Procedia PDF Downloads 58
17406 On the Monitoring of Structures and Soils by Tromograph

Authors: Magarò Floriana, Zinno Raffaele

Abstract:

Since 2009, with the coming into force of the January 14, 2008 Ministerial Decree "New technical standards for construction", and the explanatory ministerial circular N°.617 of February 2, 2009, the question of seismic hazard and the design of seismic-resistant structures in Italy has acquired increasing importance. One of the most discussed aspects in recent Italian and international scientific literature concerns the dynamic interaction between land and structure, and the effects which dynamic coupling may have on individual buildings. In effect, from systems dynamics, it is well known that resonance can have catastrophic effects on a stimulated system, leading to a response that is not compatible with the previsions in the design phase. The method used in this study to estimate the frequency of oscillation of the structure is as follows: the analysis of HVSR (Horizontal to Vertical Spectral Ratio) relations. This allows for evaluation of very simple oscillation frequencies for land and structures. The tool used for data acquisition is an experimental digital tromograph. This is an engineered development of the experimental Languamply RE 4500 tromograph, equipped with an engineered amplification circuit and improved electronically using extremely small electronic components (size of each individual amplifier 16 x 26 mm). This tromograph is a modular system, completely "free" and "open", designed to interface Windows, Linux, OSX and Android with the outside world. It an amplifier designed to carry out microtremor measurements, yet which will also be useful for seismological and seismic measurements in general. The development of single amplifiers of small dimension allows for a very clean signal since being able to position it a few centimetres from the geophone eliminates cable “antenna” phenomena, which is a necessary characteristic in seeking to have signals which are clean at the very low voltages to be measured.

Keywords: microtremor, HVSR, tromograph, structural engineering

Procedia PDF Downloads 381
17405 A Basic Metric Model: Foundation for an Evidence-Based HRM System

Authors: K. M. Anusha, R. Krishnaveni

Abstract:

Crossing a decade of the 21st century, the paradigm of human resources can be seen evolving with the strategic gene induced into it. There seems to be a radical shift descending as the corporate sector calls on its HR team to become strategic rather than administrative. This transferal eventually requires the metrics employed by these HR teams not to be just operationally reactive but to be aligned to an evidence-based strategic thinking. Realizing the growing need for a prescriptive metric model for effective HR analytics, this study has designed a conceptual framework for a basic metric model that can assist IT-HRM professionals to transition to a practice of evidence-based decision-making to enhance organizational performance.

Keywords: metric model, evidence based HR, HR analytics, strategic HR practices, IT sector

Procedia PDF Downloads 373
17404 Waste Heat Recovery System

Authors: A. Ramkumar, Anvesh Sagar, Preetham P. Karkera

Abstract:

Globalization in the modern era is dependent on the International logistics, the economic and reliable means is provided by the ocean going merchant vessel. The propulsion system which drives this massive vessels has gone through leaps and bounds of evolution. Most reliable system of propulsion adopted by the majority of vessels is by marine diesel engine. Since the first oil crisis of 1973, there is demand in increment of efficiency of main engine. Due to increase in the oil prices ship-operators explores for reduction in the operational cost of ship. And newly adopted IMO’s EEDI & SEEMP rules calls for the effective measures taken in this regard. The main engine of a ship suffers a lot of thermal losses, they mainly occur due to exhaust gas waste heat, radiation and cooling. So to increase the overall efficiency of system, we have to look into the solution to harnessing this waste energy of main engine to increase the fuel economy. During the course of research, engine manufacturers have developed many waste heat recovery systems. In our paper we see about additional options to harness this waste heat. The exhaust gas of engine coming out from the turbocharger still holds enough heat to go to the exhaust gas economiser to produce steam. This heat of exhaust gas can be used to heat a liquid of less boiling point after coming out from the turbocharger. The vapour of this secondary liquid can be superheated by a bypass exhaust or exhaust of turbocharger. This vapour can be utilized to rotate the turbine which is coupled to a generator. And the electric power for ship service can be produced with proper configuration of system. This can be included in PMS of ship. In this paper we seek to concentrate on power generation with use of exhaust gas. Thereby taking out the load on the main generator and increasing the efficiency of the system. This will help us to comply with the new rules of IMO. Our method helps to develop clean energy.

Keywords: EEDI–energy efficiency design index, IMO–international maritime organization PMS-power management system, SEEMP–ship energy efficiency management plan

Procedia PDF Downloads 333
17403 Analytical Validity Of A Tech Transfer Solution To Internalize Genetic Testing

Authors: Lesley Northrop, Justin DeGrazia, Jessica Greenwood

Abstract:

ASPIRA Labs now offers an en-suit and ready-to-implement technology transfer solution to enable labs and hospitals that lack the resources to build it themselves to offer in-house genetic testing. This unique platform employs a patented Molecular Inversion Probe (MIP) technology that combines the specificity of a hybrid capture protocol with the ease of an amplicon-based protocol and utilizes an advanced bioinformatics analysis pipeline based on machine learning. To demonstrate its efficacy, two independent genetic tests were validated on this technology transfer platform: expanded carrier screening (ECS) and hereditary cancer testing (HC). The analytical performance of ECS and HC was validated separately in a blinded manner for calling three different types of variants: SNVs, short indels (typically, <50 bp), and large indels/CNVs defined as multi-exonic del/dup events. The reference set was constructed using samples from Coriell Institute, an external clinical genetic testing laboratory, Maine Molecular Quality Controls Inc. (MMQCI), SeraCare and GIAB Consortium. Overall, the analytical performance showed a sensitivity and specificity of >99.4% for both ECS and HC in detecting SNVs. For indels, both tests reported specificity of 100%, and ECS demonstrated a sensitivity of 100%, whereas HC exhibited a sensitivity of 96.5%. The bioinformatics pipeline also correctly called all reference CNV events resulting in a sensitivity of 100% for both tests. No additional calls were made in the HC panel, leading to a perfect performance (specificity and F-measure of 100%). In the carrier panel, however, three additional positive calls were made outside the reference set. Two of these calls were confirmed using an orthogonal method and were re-classified as true positives leaving only one false positive. The pipeline also correctly identified all challenging carrier statuses, such as positive cases for spinal muscular atrophy and alpha-thalassemia, resulting in 100% sensitivity. After confirmation of additional positive calls via long-range PCR and MLPA, specificity for such cases was estimated at 99%. These performance metrics demonstrate that this tech-transfer solution can be confidently internalized by clinical labs and hospitals to offer mainstream ECS and HC as part of their test catalog, substantially increasing access to quality germline genetic testing for labs of all sizes and resources levels.

Keywords: clinical genetics, genetic testing, molecular genetics, technology transfer

Procedia PDF Downloads 153
17402 Convectory Policing-Reconciling Historic and Contemporary Models of Police Service Delivery

Authors: Mark Jackson

Abstract:

Description: This paper is based on an theoretical analysis of the efficacy of the dominant model of policing in western jurisdictions. Those results are then compared with a similar analysis of a traditional reactive model. It is found that neither model provides for optimal delivery of services. Instead optimal service can be achieved by a synchronous hybrid model, termed the Convectory Policing approach. Methodology and Findings: For over three decades problem oriented policing (PO) has been the dominant model for western police agencies. Initially based on the work of Goldstein during the 1970s the problem oriented framework has spawned endless variants and approaches, most of which embrace a problem solving rather than a reactive approach to policing. This has included the Area Policing Concept (APC) applied in many smaller jurisdictions in the USA, the Scaled Response Policing Model (SRPM) currently under trial in Western Australia and the Proactive Pre-Response Approach (PPRA) which has also seen some success. All of these, in some way or another, are largely based on a model that eschews a traditional reactive model of policing. Convectory Policing (CP) is an alternative model which challenges the underpinning assumptions which have seen proliferation of the PO approach in the last three decades and commences by questioning the economics on which PO is based. It is argued that in essence, the PO relies on an unstated, and often unrecognised assumption that resources will be available to meet demand for policing services, while at the same time maintaining the capacity to deploy staff to develop solutions to the problems which were ultimately manifested in those same calls for service. The CP model relies on the observations from a numerous western jurisdictions to challenge the validity of that underpinning assumption, particularly in fiscally tight environment. In deploying staff to pursue and develop solutions to underpinning problems, there is clearly an opportunity cost. Those same staff cannot be allocated to alternative duties while engaged in a problem solution role. At the same time, resources in use responding to calls for service are unavailable, while committed to that role, to pursue solutions to the problems giving rise to those same calls for service. The two approaches, reactive and PO are therefore dichotomous. One cannot be optimised while the other is being pursued. Convectory Policing is a pragmatic response to the schism between the competing traditional and contemporary models. If it is not possible to serve either model with any real rigour, it becomes necessary to taper an approach to deliver specific outcomes against which success or otherwise might be measured. CP proposes that a structured roster-driven approach to calls for service, combined with the application of what is termed a resource-effect response capacity has the potential to resolve the inherent conflict between traditional and models of policing and the expectations of the community in terms of community policing based problem solving models.

Keywords: policing, reactive, proactive, models, efficacy

Procedia PDF Downloads 456
17401 The Impact of Australia's Skilled Migrant Selection System: A Case Study of Japanese Skilled Migrants and Their Families

Authors: Iori Hamada

Abstract:

Australia's skilled migrant selection system is constantly changing its target skills and criteria according to the labour market demands. The government's intention to employ this highly selective market-driven selection system is to better target the skills needed in the economy, enable skilled migrants to be employed in industries that have the highest need, and consequently boost the economy and population. However, migration scholars have called this intention into question, arguing that the system is not making the best use of skilled migrants. This paper investigates the impact of recent reforms in Australian skilled migration system on skilled migrants' employment and related life conditions. Drawing on semi-structured qualitative interviews with Japanese skilled migrants in Australia, it argues that Australia’s skilled migrant selection system guarantees neither skilled migrants' employment nor successful transfer of their skills to the labour market. The findings show that Japanese skilled migrants are often unemployed or under-employed, although they intend to achieve upward occupational mobility. The interview data also reveal that male unemployment or under-employment status prompts some Japanese men to leave Australia and find a job that better matches their skills and qualifications in a new destination. Further, it finds that Japanese male skilled migrants who experience downward occupational mobility tend to continue to take a primary breadwinner role, which affects the distribution of paid and unpaid work within their families. There is a growing body of research investigating skilled migrants’ downward career mobility. However, little has been written on skilled Japanese migrants. Further, the work-family intersection is a 'hot public policy topic' in Australia and elsewhere. Yet, the existing studies focus almost exclusively on non-migrant families. This calls attention to the urgency of assessing the work-family lives of skilled migrants. This study fills these gaps, presenting additional insight into Japanese skilled migrants’ work and family in and beyond Australia.

Keywords: Australia, employment, family, Japanese skilled migrants

Procedia PDF Downloads 90
17400 Restoring Statecraft in the U.S. Economy: A Proposal for an American Entrepreneurial State

Authors: Miron Wolnicki

Abstract:

In the past 75 years the world was either influenced by, competing with or learning from U.S. corporations. This is no longer true. As the economic power shifts from the West to the East, U.S. corporations are lagging behind Asian competitors. Moreover, U.S. statecraft fails to address this decline. In a world dominated by interventionist and neo-mercantilist states, having an ineffective non-activist government becomes a costly neoclassic delusion which weakens the world’s largest economy. American conservative economists continue talking about the superiority of the free market system in generating new technologies. The reality is different. The U.S. is sliding further into an overregulated, over-taxed, anti-business state. This paper argues that in order to maintain its economic strength and technological leadership, the U.S. must reform federal institutions to increase support for artificial intelligence and other cutting-edge technologies. The author outlines a number of institutional reforms, under one umbrella, which he calls the American Entrepreneurial State (AES). The AES will improve productivity and bring about coherent business strategies for the next 10-15 years. The design and inspiration for the AES come from the experience of successful statecraft examples in Asia and also other parts the global economy.

Keywords: post-neoliberal system, entrepreneurial state, government and economy, American entrepreneurial state

Procedia PDF Downloads 91
17399 Model-Based Approach as Support for Product Industrialization: Application to an Optical Sensor

Authors: Frederic Schenker, Jonathan J. Hendriks, Gianluca Nicchiotti

Abstract:

In a product industrialization perspective, the end-product shall always be at the peak of technological advancement and developed in the shortest time possible. Thus, the constant growth of complexity and a shorter time-to-market calls for important changes on both the technical and business level. Undeniably, the common understanding of the system is beclouded by its complexity which leads to the communication gap between the engineers and the sale department. This communication link is therefore important to maintain and increase the information exchange between departments to ensure a punctual and flawless delivery to the end customer. This evolution brings engineers to reason with more hindsight and plan ahead. In this sense, they use new viewpoints to represent the data and to express the model deliverables in an understandable way that the different stakeholder may identify their needs and ideas. This article focuses on the usage of Model-Based System Engineering (MBSE) in a perspective of system industrialization and reconnect the engineering with the sales team. The modeling method used and presented in this paper concentrates on displaying as closely as possible the needs of the customer. Firstly, by providing a technical solution to the sales team to help them elaborate commercial offers without omitting technicalities. Secondly, the model simulates between a vast number of possibilities across a wide range of components. It becomes a dynamic tool for powerful analysis and optimizations. Thus, the model is no longer a technical tool for the engineers, but a way to maintain and solidify the communication between departments using different views of the model. The MBSE contribution to cost optimization during New Product Introduction (NPI) activities is made explicit through the illustration of a case study describing the support provided by system models to architectural choices during the industrialization of a novel optical sensor.

Keywords: analytical model, architecture comparison, MBSE, product industrialization, SysML, system thinking

Procedia PDF Downloads 131
17398 Environment-Specific Political Risk Discourse, Environmental Reputation, and Stock Price Crash Risk

Authors: Sohanur Rahman, Elisabeth Sinnewe, Larelle (Ellie) Chapple, Sarah Osborne

Abstract:

Greater political attention to global climate change exposes firms to a higher level of political uncertainty, which can lead to adverse capital market consequences. However, a higher level of discourse on environment-specific political risk (EPR) between management and investors can mitigate information asymmetry, followed by less stock price crash risk. This study examines whether EPR discourse in discourse in the earnings conference calls (ECC) reduces firm-level stock price crash risk in the US market. This research also explores if adverse disclosures via media channels further moderates the association between EPR on crash risk. Employing a dataset of 28,933 firm-year observations from 2002 to 2020, the empirical analysis reveals that EPR discourse in ECC reduces future stock price crash risk. However, adverse disclosures via media channels can offset the favourable effect of EPR discourse on crash risk. The results are robust to the potential endogeneity concern in a quasi-natural experiment setting.

Keywords: earnings conference calls, environment, environment-specific political risk discourse, environmental disclosures, information asymmetry, reputation risk, stock price crash risk

Procedia PDF Downloads 107
17397 Educational Reforms in Algeria: Dilemmas of Globalization, Equity, and Decolonization

Authors: Fella Lahmar

Abstract:

This chapter investigates the educational reforms in Algeria, highlighting the challenges and complexities that arise in the context of globalization, equity, and decolonization. While Algeria’s education system historically had a socialist-economic model grounded in Islamic values, contemporary reforms reflect global influences and aspirations for cultural authenticity. The study employed a qualitative approach, utilizing semi-structured interviews with a diverse sample of 15 participants intimately involved in the Algerian education system. Analysis of the data reveals a discrepancy between the educational system’s pedagogical practices and students’ diverse learning needs, implying ramifications for educational equity and social justice. Furthermore, a critical tension was evident between global influences, local cultural authenticity, and the endeavor to decolonize education. In conclusion, the chapter advocates for reforms that prioritize the students’ holistic development and well-being while fostering intrinsic motivation and engagement. This entails re-evaluating curriculum frameworks, assessment strategies, and pedagogies in light of Algeria’s cultural and religious heritage. The chapter also calls for future research to explore methods for innovatively integrating cultural heritage into education in ways to cultivate learners who are both locally grounded and globally aware.

Keywords: impact of globalization on education, parental involvement in education, marketization of education, policy enactment and reform, curriculum overload, holistic approach, shadow education

Procedia PDF Downloads 46
17396 Series "H154M" as a Unit Area of the Region between the Lines and Curves

Authors: Hisyam Hidayatullah

Abstract:

This world events consciously or not realize everything has a pattern, until the events of the universe according to the Big Bang theory of the solar system which makes so regular in the rotation. The author would like to create a results curve area between the quadratic function y=kx2 and line y=ka2 using GeoGebra application version 4.2. This paper can provide a series that is no less interesting with Fourier series, so that will add new material about the series can be calculated with sigma notation. In addition, the ranks of the unique natural numbers of extensive changes in established areas. Finally, this paper provides analytical and geometric proof of the vast area in between the lines and curves that give the area is formed by y=ka2 dan kurva y=kx2, x-axis, line x=√a and x=-√a make a series of numbers for k=1 and a ∈ original numbers. ∑_(i=0)^n=(4n√n)/3=0+4/3+(8√2)/3+4√3+⋯+(4n√n)/3. The author calls the series “H154M”.

Keywords: sequence, series, sigma notation, application GeoGebra

Procedia PDF Downloads 343
17395 Dimensioning of Circuit Switched Networks by Using Simulation Code Based On Erlang (B) Formula

Authors: Ali Mustafa Elshawesh, Mohamed Abdulali

Abstract:

The paper presents an approach to dimension circuit switched networks and find the relationship between the parameters of the circuit switched networks on the condition of specific probability of call blocking. Our work is creating a Simulation code based on Erlang (B) formula to draw graphs which show two curves for each graph; one of simulation and the other of calculated. These curves represent the relationships between average number of calls and average call duration with the probability of call blocking. This simulation code facilitates to select the appropriate parameters for circuit switched networks.

Keywords: Erlang B formula, call blocking, telephone system dimension, Markov model, link capacity

Procedia PDF Downloads 569
17394 Hybrid Multipath Congestion Control

Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang

Abstract:

Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.

Keywords: network, TCP, WiFi, cellular, congestion control

Procedia PDF Downloads 669
17393 Urban Resilince and Its Prioritised Components: Analysis of Industrial Township Greater Noida

Authors: N. Mehrotra, V. Ahuja, N. Sridharan

Abstract:

Resilience is an all hazard and a proactive approach, require a multidisciplinary input in the inter related variables of the city system. This research based to identify and operationalize indicators for assessment in domain of institutions, infrastructure and knowledge, all three operating in task oriented community networks. This paper gives a brief account of the methodology developed for assessment of Urban Resilience and its prioritized components for a target population within a newly planned urban complex integrating Surajpur and Kasna village as nodes. People’s perception of Urban Resilience has been examined by conducting questionnaire survey among the target population of Greater Noida. As defined by experts, Urban Resilience of a place is considered to be both a product and process of operation to regain normalcy after an event of disturbance of certain level. Based on this methodology, six indicators are identified that contribute to perception of urban resilience both as in the process of evolution and as an outcome. The relative significance of 6 R’ has also been identified. The dependency factor of various resilience indicators have been explored in this paper, which helps in generating new perspective for future research in disaster management. Based on the stated factors this methodology can be applied to assess urban resilience requirements of a well planned town, which is not an end in itself, but calls for new beginnings.

Keywords: disaster, resilience, system, urban

Procedia PDF Downloads 430
17392 An Assessment of Airport Collaborative Decision-Making System Using Predictive Maintenance

Authors: Faruk Aras, Melih Inal, Tansel Cinar

Abstract:

The coordination of airport staff especially in the operations and maintenance departments is important for the airport operation. As a result, this coordination will increase the efficiency in all operation. Therefore, a Collaborative Decision-Making (CDM) system targets on improving the overall productivity of all operations by optimizing the use of resources and improving the predictability of actions. Enlarged productivity can be of major benefit for all airport operations. It also increases cost-efficiency. This study explains how predictive maintenance using IoT (Internet of Things), predictive operations and the statistical data such as Mean Time To Failure (MTTF) improves airport terminal operations and utilize airport terminal equipment in collaboration with collaborative decision making system/Airport Operation Control Center (AOCC). Data generated by the predictive maintenance methods is retrieved and analyzed by maintenance managers to predict when a problem is about to occur. With that information, maintenance can be scheduled when needed. As an example, AOCC operator would have chance to assign a new gate that towards to this gate all the equipment such as travellator, elevator, escalator etc. are operational if the maintenance team is in collaboration with AOCC since maintenance team is aware of the health of the equipment because of predictive maintenance methods. Applying predictive maintenance methods based on analyzing the health of airport terminal equipment dramatically reduces the risk of downtime by on time repairs. We can classify the categories as high priority calls for urgent repair action, as medium priority requires repair at the earliest opportunity, and low priority allows maintenance to be scheduled when convenient. In all cases, identifying potential problems early resulted in better allocation airport terminal resources by AOCC.

Keywords: airport, predictive maintenance, collaborative decision-making system, Airport Operation Control Center (AOCC)

Procedia PDF Downloads 327
17391 Analysis of Two Methods to Estimation Stochastic Demand in the Vehicle Routing Problem

Authors: Fatemeh Torfi

Abstract:

Estimation of stochastic demand in physical distribution in general and efficient transport routs management in particular is emerging as a crucial factor in urban planning domain. It is particularly important in some municipalities such as Tehran where a sound demand management calls for a realistic analysis of the routing system. The methodology involved critically investigating a fuzzy least-squares linear regression approach (FLLRs) to estimate the stochastic demands in the vehicle routing problem (VRP) bearing in mind the customer's preferences order. A FLLR method is proposed in solving the VRP with stochastic demands. Approximate-distance fuzzy least-squares (ADFL) estimator ADFL estimator is applied to original data taken from a case study. The SSR values of the ADFL estimator and real demand are obtained and then compared to SSR values of the nominal demand and real demand. Empirical results showed that the proposed methods can be viable in solving problems under circumstances of having vague and imprecise performance ratings. The results further proved that application of the ADFL was realistic and efficient estimator to face the stochastic demand challenges in vehicle routing system management and solve relevant problems.

Keywords: fuzzy least-squares, stochastic, location, routing problems

Procedia PDF Downloads 399
17390 Agile Smartphone Porting and App Integration of Signal Processing Algorithms Obtained through Rapid Development

Authors: Marvin Chibuzo Offiah, Susanne Rosenthal, Markus Borschbach

Abstract:

Certain research projects in Computer Science often involve research on existing signal processing algorithms and developing improvements on them. Research budgets are usually limited, hence there is limited time for implementing the algorithms from scratch. It is therefore common practice, to use implementations provided by other researchers as a template. These are most commonly provided in a rapid development, i.e. 4th generation, programming language, usually Matlab. Rapid development is a common method in Computer Science research for quickly implementing and testing new developed algorithms, which is also a common task within agile project organization. The growing relevance of mobile devices in the computer market also gives rise to the need to demonstrate the successful executability and performance measurement of these algorithms on a mobile device operating system and processor, particularly on a smartphone. Open mobile systems such as Android, are most suitable for this task, which is to be performed most efficiently. Furthermore, efficiently implementing an interaction between the algorithm and a graphical user interface (GUI) that runs exclusively on the mobile device is necessary in cases where the project’s goal statement also includes such a task. This paper examines different proposed solutions for porting computer algorithms obtained through rapid development into a GUI-based smartphone Android app and evaluates their feasibilities. Accordingly, the feasible methods are tested and a short success report is given for each tested method.

Keywords: SMARTNAVI, Smartphone, App, Programming languages, Rapid Development, MATLAB, Octave, C/C++, Java, Android, NDK, SDK, Linux, Ubuntu, Emulation, GUI

Procedia PDF Downloads 457
17389 Visualizing Class Metrics and Object Calls for Software Systems

Authors: Mohammad Alnabhan, Awni Hammouri, Mustafa Hammad, Anas Al-Badareen, Omamah Al-Thnebat

Abstract:

Software visualization is one of the main techniques used to simplify the presentation of software systems and enhance their understandability. It is used to present the software system in a visual manner using simple, clear and meaningful symbols. This study proposes a new 2D software visualization approach. In this approach, each class is represented by rectangle, the name of the class placed above the rectangle, the size of class (Line of Code) represented by the height of the rectangle. The methods and the attributes are represented by circles and triangles respectively. The relationships among classes correspond to arrows. The proposed visualization approach was evaluated in terms of applicability and efficiency. Results have confirmed successful implementation of the proposed approach, and its ability to provide a simple and effective graphical presentation of extracted software components and properties.

Keywords: software visualization, software metrics, calling relationships, 2D graphs

Procedia PDF Downloads 169
17388 Marine Environmental Monitoring Using an Open Source Autonomous Marine Surface Vehicle

Authors: U. Pruthviraj, Praveen Kumar R. A. K. Athul, K. V. Gangadharan, S. Rao Shrikantha

Abstract:

An open source based autonomous unmanned marine surface vehicle (UMSV) is developed for some of the marine applications such as pollution control, environmental monitoring and thermal imaging. A double rotomoulded hull boat is deployed which is rugged, tough, quick to deploy and moves faster. It is suitable for environmental monitoring, and it is designed for easy maintenance. A 2HP electric outboard marine motor is used which is powered by a lithium-ion battery and can also be charged from a solar charger. All connections are completely waterproof to IP67 ratings. In full throttle speed, the marine motor is capable of up to 7 kmph. The motor is integrated with an open source based controller using cortex M4F for adjusting the direction of the motor. This UMSV can be operated by three modes: semi-autonomous, manual and fully automated. One of the channels of a 2.4GHz radio link 8 channel transmitter is used for toggling between different modes of the USMV. In this electric outboard marine motor an on board GPS system has been fitted to find the range and GPS positioning. The entire system can be assembled in the field in less than 10 minutes. A Flir Lepton thermal camera core, is integrated with a 64-bit quad-core Linux based open source processor, facilitating real-time capturing of thermal images and the results are stored in a micro SD card which is a data storage device for the system. The thermal camera is interfaced to an open source processor through SPI protocol. These thermal images are used for finding oil spills and to look for people who are drowning at low visibility during the night time. A Real Time clock (RTC) module is attached with the battery to provide the date and time of thermal images captured. For the live video feed, a 900MHz long range video transmitter and receiver is setup by which from a higher power output a longer range of 40miles has been achieved. A Multi-parameter probe is used to measure the following parameters: conductivity, salinity, resistivity, density, dissolved oxygen content, ORP (Oxidation-Reduction Potential), pH level, temperature, water level and pressure (absolute).The maximum pressure it can withstand 160 psi, up to 100m. This work represents a field demonstration of an open source based autonomous navigation system for a marine surface vehicle.

Keywords: open source, autonomous navigation, environmental monitoring, UMSV, outboard motor, multi-parameter probe

Procedia PDF Downloads 209
17387 Modeling the Performance of Natural Sand-Bentonite Barriers after Infiltration with Polar and Non-Polar Hydrocarbon Leachates

Authors: Altayeb Qasem, Mousa Bani Baker, Amani Nawafleh

Abstract:

The complexity of the sand-bentonite liner barrier system calls for an adequate model that reflects the conditions depending on the barrier materials and the characteristics of the permeates which lead to hydraulic conductivity changes when liners infiltrated with polar, no-polar, miscible and immiscible liquids. This paper is dedicated to developing a model for evaluating the hydraulic conductivity in the form of a simple indicator for the compatibility of the liner versus leachate. Based on two liner compositions (95% sand: 5% bentonite; and 90% sand: 10% bentonite), two pressures (40 kPa and 100 kPa), and three leachates: water, ethanol and biofuel. Two characteristics of the leacahtes were used: viscosity of permeate and its octanol-water partitioning coefficient (Kow). Three characteristics of the liners mixtures were evaluated which had impact on the hydraulic conductivity of the liner system: the initial content of bentonite (%), the free swelling index, and the shrinkage limit of the initial liner’s mixture. Engineers can use this modest tool to predict a potential liner failure in sand-bentonite barriers.

Keywords: liner performance, sand-bentonite barriers, viscosity, free swelling index, shrinkage limit, octanol-water partitioning coefficient, hydraulic conductivity, theoretical modeling

Procedia PDF Downloads 383
17386 The Thermal Simulation of Hydraulic Cable Drum Trailers 15-Ton

Authors: Ahmad Abdul-Razzak Aboudi Al-Issa

Abstract:

Thermal is the main important aspect in any hydraulic system since it is affected on the hydraulic system performance. Therefore must be simulated the hydraulic system -that was designed- in this aspect before constructing it. In this study, an existed expert system was using to simulate the thermal aspect of a designed hydraulic system that will be used in an industrial field. The expert system which is used in this study is (Hydraulic System Calculations), and its symbol (HSC). HSC had been designed and coded in an interactive program userfriendly named (Microsoft Visual Basic 2010).

Keywords: fluid power, hydraulic system, thermal and hydrodynamic, expert system

Procedia PDF Downloads 469
17385 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 121