Search results for: crisis computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2110

Search results for: crisis computing

1840 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 398
1839 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 250
1838 A Review: Global Crisis Effects on Agriculture and Animal Production in Turkey

Authors: Muhittin Fatih Demirhan, Sibel Alapala Demirhan

Abstract:

Agriculture, is also regarded as the primary activity area in all economies. When international comparisons are made Turkey has comparative advantages in agricultural potential. However, it is diffi cult to say that Turkey's agricultural productivity and use of technology is well developed in terms of sufficieny. Turkey, in terms of agricultural production, is one of the rare self-sufficient countries, but for supplying excessive demand of its domesticproduction to foreign markets to obtain the necessary income it is rather insufficient. On the basis of wrong policies implemented during the crisis and found that bottlenecks in agriculture and animal husbandry or agriculture policies of the IMF and World Bank are imposed on countries like Turkey. The IMF and the World Bank, the reduction of support in the agricultural and livestock Turkey, is known to put pressure for the abolition. Under these circumstances, our farmers, livestock producers and breeders of, not a chance to compete in the same market with EU producers. Animal products that capture the productivity levels of developed countries, seems to be our chance to compete with the quality and hygiene criteria. Thus, the discussion of the issue must be raised as for the sector's contribution to the economy in terms of further increasing production of the existing potential in mobilization.

Keywords: agricultural development, animal production, competition, economic crisis, food supply

Procedia PDF Downloads 213
1837 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms

Authors: Nima Mahmoudi, Hamzeh Khazaei

Abstract:

Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.

Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization

Procedia PDF Downloads 135
1836 Metaphors, Cognition, and Action: Conceptual Metaphor Analysis of President Akuffo-Addo’s Speeches in the COVID-19 Crisis

Authors: Isaac Kwabena Adubofour, Esther Serwaah Afreh

Abstract:

Political speeches are structured in ways that ensure that the ideology of the leader is communicated in ways that the opinions of the audience are influenced towards certain lines of action, and in crisis situations like the outbreak of a global pandemic, public opinion and action are influenced through speeches. The foregoing explains the presence of metaphors in presidential speeches. Crises require, among other things, that the thoughts, emotions, and actions of the population are controlled in dealing with the problems at hand. The primary question this study assesses is how the use of metaphors in crisis situations, like the COVID-19 pandemic, influences thought, determines the policies a government adopts, and influences the reactions of the people. The study focused on twenty-four (24) addresses of the President of Ghana, Nana Addo Danquah Akuffo-Addo, on the COVID-19 pandemic and his government’s efforts to manage the crisis. The nature and relevance of presidential speeches and the presence of metaphors in such speeches have been investigated. However, there is a paucity of research on the connection between the presence of metaphors in presidential speeches and their influence on thought and action. Especially within the crisis of the COVID-19 pandemic, it is pertinent to investigate how the presence of metaphors in presidential addresses influences social thought and action. Thus, the current study sought to investigate the potential for metaphor use to influence thought and action on a national scale during the COVID crisis. The speeches were collected from the website of the presidency. The analysis was done using Metaphor Identification Process by the Praglejazz Group (2007) with conceptual metaphor theory (Lakoff & Johnson, 1980) as the theoretical foundation. The findings of the study show that the President’s adoption of war metaphors may not have been ideal since it triggered thoughts, policies, and social actions in line with war. For instance, the reference to health workers as heroes, heroines, and frontline workers praised the efforts of these workers over the efforts of the rest of the population, and that may have contributed to the apathy that arose among the citizens in dealing with the pandemic. This prioritization of the frontline workers explains why their taxes were forgiven for a considerable period. The government further absorbed utility bills of citizens during the pandemic. All these financial commitments may not have been advisable for a developing country like Ghana, but the authors argue that the actions may have been influenced by the metaphor that was adopted. Another finding that is explored is the problem of stigmatization in the country during the pandemic and its connection with the war metaphor. This investigation expands the research on metaphors, social thought and action, and crisis communication. Its contribution to metaphor use, thought, and action suggest its potential implication for education and other fields.

Keywords: conceptual metaphor theory, COVID-19, crisis communication, presidential addresses, risk communication

Procedia PDF Downloads 76
1835 New Approaches to the Determination of the Time Costs of Movements

Authors: Dana Kristalova

Abstract:

This article deals with geographical conditions in terrain and their effect on the movement of vehicles, their effect on speed and safety of movement of people and vehicles. Finding of the optimal routes outside the communication is studied in the army environment, but it occur in civilian as well, primarily in crisis situation, or by the provision of assistance when natural disasters such as floods, fires, storms, etc. have happened. These movements require the optimization of routes when effects of geographical factors should be included. The most important factor is surface of the terrain. It is based on several geographical factors as are slopes, soil conditions, micro-relief, a type of surface and meteorological conditions. Their mutual impact has been given by coefficient of deceleration. This coefficient can be used for commander´s decision. New approaches and methods of terrain testing, mathematical computing, mathematical statistics or cartometric investigation are necessary parts of this evaluation.

Keywords: surface of a terrain, movement of vehicles, geographical factor, optimization of routes

Procedia PDF Downloads 435
1834 Determining the Policy Space of the Partido Socialista Obrero Español Government in Managing Spain's Economic and Financial Crisis

Authors: A. Pascual Ramsay

Abstract:

Accounts of the management of the economic and euro crisis in Spain have been dominated by an emphasis on external constraints. However, this approach leaves unanswered important questions about the role of domestic political factors. Using systematic qualitative primary research and employing elite interviewing and process tracing, this paper aims to fill this gap for the period of the Partido Socialista Obrero Español (PSOE) administration. The paper shows that domestic politics played a crucial role in the management of the crisis, most importantly by determining the shape of the measures undertaken. In its three distinct stages – downplaying/inaction, reaction/stimulus, and austerity/reform – the PSOE's response was certainly constrained by external factors, most notably EMU membership and the actions of sovereign-bond investors, the ECB and Germany. Yet while these external constraints forced the government to act, domestic political factors fundamentally shaped the content of key measures: the fiscal stimulus, the labour, financial and pension reforms, the refusal to accept a bailout or the reform of the Constitution. Seven factors were particularly influential: i) electoral and political cost, ii) party and partisanship, iii) organised interests, iv) domestic institutions, v) ideological preferences, vi) ineffective decision-making, and vii) judgement and personal characteristics of decision-makers. In conclusion, domestic politics played an important role in the management of the crisis, a role that has been underestimated by dominant approaches focusing on external constraints and weak domestic policy autonomy. The findings provide empirical evidence to support research agendas that identify significant state discretion in the face of international economic integration and an important role for domestic political factors such as institutions, material interests, partisanship and ideology in shaping economic outcomes.

Keywords: economic crisis, Euro, PSOE, Spain

Procedia PDF Downloads 86
1833 Learning Grammars for Detection of Disaster-Related Micro Events

Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev

Abstract:

Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.

Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter

Procedia PDF Downloads 455
1832 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 345
1831 Russia’s Role in Resolving the Nagorno-Karabakh Conflict 1990-2020

Authors: Friba Haidari

Abstract:

The aim of the study is to identify Russia's role in managing the Nagorno-Karabakh conflict betweenArmenia and Azerbaijan during the years 1990 to 2020. The Nagorno-Karabakh crisis can not be considered a mere territorial conflict but also a crossroads of interests of foreign actors. Geopolitical rivalries and the access to energy by regional and trans-regional actors have complicated the crisis and created a security challenge in the region, which is likely to escalate into a full-blown war between the parties involved. The geopolitical situation of Nagorno-Karabakh and its current situation have affected all peripheral states in some way. Russia, as one of the main actors in this scene, has been actively involved since the beginning of the crisis. The Russians have always sought to strengthen their influence and presence in the Nagorno-Karabakh crisis. Russia's efforts to weaken the role of the Minsk Group, The presence of Western actors, and the deployment of Russian forces in the disputed area can be assessed in this context. However, this study seeks to answer the question of what role did Russia play in managing the Nagorno-Karabakh conflict between Armenia and Azerbaijan between 1990 and 2020? The study hypothesizes that Russia has prevented the escalation of the Nagorno-Karabakh conflict through mediation and some coercion. This study is divided into four parts, including conflict management as a theoretical framework; Examining the competition and the role of actors in the Caucasus region, especially the role of the Minsk Group, and what approach or tools and methods Russia has used in its foreign policy in managing the conflict, and finally what are the relations between the countries involved and what will be Russia's role in the future? Was discussed. This study examines the analysis and transfer of ideas and information using authoritative international sources with an explanatory method and shares its results with everyone.

Keywords: Russia, conflict, nagorno-karabakh, management

Procedia PDF Downloads 61
1830 'Refugee Crisis' and Global Labour Relations: Syrian Labour in Turkish Textile Factories

Authors: Katarzyna Czarnota, Inga Hajdarowicz

Abstract:

Political mechanisms of legal, social and economic segregation of refugees and migrants have reproduced and deepened existing hierarchies and inequalities in global labour relations. The consequences of these processes strengthened by current, so called, ‘refugee crisis’, tightening of border regimes, militarisation and closing of Balkan Route, will have a significant impact on future integration policies. One of the fields that require further research is limited access to labour rights of migrants and refugees. Although this phenomenon is experienced by a significant proportion of migrant population, these are the poorest who are also exposed to economic racism. The presentation will tackle the influence of current migration policies on increasing social and class inequalities between migrants, refugees, on the example of Syrian labours in Turkish textile factories. The authors will critically analyse examples of integration policies, especially planned changes in labour law as well as examples of violation of labour rights and exploitation of refugees and migrants in textile factories and industry. The presentation will be based on interviews with Syrian workers, conducted in Turkey and Greece in 2016.

Keywords: refugee crisis, economic racism, global labour relations, exploatation

Procedia PDF Downloads 297
1829 Effects of Allowance for Corporate Equity on the Financing Choices of Belgian Small and Medium-Sized Enterprises in a Crisis Context

Authors: O. Colot, M. Croquet, L. Cultrera, Y. Fandja Collince

Abstract:

The objective of our research is to evaluate the impact of the allowance for corporate equity (ACE) on the financial structure of Belgian SME in order to highlight the potential existence of a fiscal leverage. To limit the biases linked to the rationing of the capital further to the financial crisis, we compare first the dynamic evolution of the financial structure of the Belgian firms over the period 2006-2015 by focusing on three sub-periods: 2006-2008, 2009-2012 and 2013-2015. We give then an international size to this comparison by including SMEs from countries adjoining Belgium (France, Germany, Netherlands and the United Kingdom) and within which there is no ACE. This comparison allows better understanding the fiscal advantage linked to the ACE of firms evolving in a relatively unstable economic environment further to the financial crisis of 2008. This research is relevant given the economic and political context in which Belgium operates and the very uncertain future of the Belgian ACE. The originality of this research is twofold: the long study period and the consideration of the effects of the financial and economic crisis on the financing structure of Belgian SMEs. The results of this research, even though they confirm the existence of a positive fiscal leverage for the tax deduction for venture capital on the financing structure of Belgian SMEs, do not allow the extent of this leverage to be clearly quantified. The comparative evolution of financing structures over the period 2006-2015 of Belgian, French, German, Dutch and English SMEs shows a strong similarity in the overall evolution of their financing.

Keywords: allowance for corporate equity, Belgium, financial structure, small and medium sized firms

Procedia PDF Downloads 181
1828 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 506
1827 On the Factors Affecting Computing Students’ Awareness of the Latest ICTs

Authors: O. D. Adegbehingbe, S. D. Eyono Obono

Abstract:

The education sector is constantly faced with rapid changes in technologies in terms of ensuring that the curriculum is up to date and in terms of making sure that students are aware of these technological changes. This challenge can be seen as the motivation for this study, which is to examine the factors affecting computing students’ awareness of the latest Information Technologies (ICTs). The aim of this study is divided into two sub-objectives which are: the selection of relevant theories and the design of a conceptual model to support it as well as the empirical testing of the designed model. The first objective is achieved by a review of existing literature on technology adoption theories and models. The second objective is achieved using a survey of computing students in the four universities of the KwaZulu-Natal province of South Africa. Data collected from this survey is analyzed using Statistical package for the Social Science (SPSS) using descriptive statistics, ANOVA and Pearson correlations. The main hypothesis of this study is that there is a relationship between the demographics and the prior conditions of the computing students and their awareness of general ICT trends and of Digital Switch Over (DSO) a new technology which involves the change from analog to digital television broadcasting in order to achieve improved spectrum efficiency. The prior conditions of the computing students that were considered in this study are students’ perceived exposure to career guidance and students’ perceived curriculum currency. The results of this study confirm that gender, ethnicity, and high school computing course affect students’ perceived curriculum currency while high school location affects students’ awareness of DSO. The results of this study also confirm that there is a relationship between students prior conditions and their awareness of general ICT trends and DSO in particular.

Keywords: education, information technologies, IDT, awareness

Procedia PDF Downloads 334
1826 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

Authors: Hyun-Ho Lee, Kee-Won Kim

Abstract:

The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.

Keywords: finite field, Montgomery multiplication, systolic array, cryptography

Procedia PDF Downloads 254
1825 Proposed Solutions Based on Affective Computing

Authors: Diego Adrian Cardenas Jorge, Gerardo Mirando Guisado, Alfredo Barrientos Padilla

Abstract:

A system based on Affective Computing can detect and interpret human information like voice, facial expressions and body movement to detect emotions and execute a corresponding response. This data is important due to the fact that a person can communicate more effectively with emotions than can be possible with words. This information can be processed through technological components like Facial Recognition, Gait Recognition or Gesture Recognition. As of now, solutions proposed using this technology only consider one component at a given moment. This research investigation proposes two solutions based on Affective Computing taking into account more than one component for emotion detection. The proposals reflect the levels of dependency between hardware devices and software, as well as the interaction process between the system and the user which implies the development of scenarios where both proposals will be put to the test in a live environment. Both solutions are to be developed in code by software engineers to prove the feasibility. To validate the impact on society and business interest, interviews with stakeholders are conducted with an investment mind set where each solution is labeled on a scale of 1 through 5, being one a minimum possible investment and 5 the maximum.

Keywords: affective computing, emotions, emotion detection, face recognition, gait recognition

Procedia PDF Downloads 336
1824 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 318
1823 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 425
1822 From Waste to Wealth: A Future Paradigm for Plastic Management Using Blockchain Technology

Authors: Jim Shi, Jasmine Chang, Nesreen El-Rayes

Abstract:

The world has been experiencing a steadily increasing trend in both the production and consumption of plastic. The global consumer revolution should not have been possible without plastic, thanks to its salient feature of inexpensiveness and durability. But, as a two-edged sword, its durable quality has returned to haunt and even jeopardized us. That exacerbating the plastic crisis has attracted various global initiatives and actions. Simultaneously, firms are eager to adopt new technology as they witness and perceive more potential and merit of Industry 4.0 technologies. For example, Blockchain technology (BCT) is drawing the attention of numerous stakeholders because of its wide range of outstanding features that promise to enhance supply chain operations. However, from a research perspective, most of the literature addresses the plastic crisis from either environmental or social perspectives. In contrast, analysis from the data science perspective and technology is relatively scarce. To this end, this study aims to fill this gap and cover the plastic crisis from a holistic view of environmental, social, technological, and business perspectives. In particular, we propose a mathematical model to examine the inclusion of BCT to enhance and improve the efficiency on the upstream and the downstream sides of the plastic value, where the whole value chain is coordinated systematically, and its interoperability can be optimized. Consequently, the Environmental, Social, and Governance (ESG) goal and Circular Economics (CE) sustainability can be maximized.

Keywords: blockchain technology, plastic, circular economy, sustainability

Procedia PDF Downloads 52
1821 The Effect of Land Cover on Movement of Vehicles in the Terrain

Authors: Krisstalova Dana, Mazal Jan

Abstract:

This article deals with geographical conditions in terrain and their effect on the movement of vehicles, their effect on speed and safety of movement of people and vehicles. Finding of the optimal routes outside the communication is studied in the army environment, but it occur in civilian as well, primarily in crisis situation, or by the provision of assistance when natural disasters such as floods, fires, storms etc., have happened. These movements require the optimization of routes when effects of geographical factors should be included. The most important factor is the surface of a terrain. It is based on several geographical factors as are slopes, soil conditions, micro-relief, a type of surface and meteorological conditions. Their mutual impact has been given by coefficient of deceleration. This coefficient can be used for the commander`s decision. New approaches and methods of terrain testing, mathematical computing, mathematical statistics or cartometric investigation are necessary parts of this evaluation.

Keywords: movement in a terrain, geographical factors, surface of a field, mathematical evaluation, optimization and searching paths

Procedia PDF Downloads 396
1820 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 378
1819 How Rational Decision-Making Mechanisms of Individuals Are Corrupted under the Presence of Others and the Reflection of This on Financial Crisis Management Situations

Authors: Gultekin Gurcay

Abstract:

It is known that the most crucial influence of the psychological, social and emotional factors that affect any human behavior is to corrupt the rational decision making mechanism of the individuals and cause them to display irrational behaviors. In this regard, the social context of human beings influences the rationality of our decisions, and people tend to display different behaviors when they were alone compared to when they were surrounded by others. At this point, the interaction and interdependence of the behavioral finance and economics with the area of social psychology comes, where intentions and the behaviors of the individuals are being analyzed in the actual or implied presence of others comes into prominence. Within the context of this study, the prevalent theories of behavioral finance, which are The Prospect Theory, The Utility Theory Given Uncertainty and the Five Axioms of Choice under Uncertainty, Veblen’s Hidden Utility Theory, and the concept of ‘Overreaction’ has been examined and demonstrated; and the meaning, existence and validity of these theories together with the social context has been assessed. Finally, in this study the behavior of the individuals in financial crisis situations where the majority of the society is being affected from the same negative conditions at the same time has been analyzed, by taking into account how individual behavior will change according to the presence of the others.

Keywords: conditional variance coefficient, financial crisis, garch model, stock market

Procedia PDF Downloads 218
1818 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 161
1817 Media, Politics and Power in the Representation of the Refugee and Migration Crisis in Europe

Authors: Evangelia-Matroni Tomara

Abstract:

This thesis answers the question whether the media representations and reporting in 2015-2016 - especially, after the image of the drowned three-year-old Syrian boy in the Mediterranean Sea which made global headlines in the beginning of September 2015 -, the European Commission regulatory sources material and related reporting, have the power to challenge the conceptualization of humanitarianism or even redefine it. The theoretical foundations of the thesis are based on humanitarianism and its core definitions, the power of media representations and the relative portrayal of migrants, refugees and/or asylum seekers, as well as the dominant migration discourse and EU migration governance. Using content analysis for the media portrayal of migrants (436 newspaper articles) and qualitative content analysis for the European Commission Communication documents from May 2015 until June 2016 that required various depths of interpretation, this thesis allowed us to revise the concept of humanitarianism, realizing that the current crisis may seem to be a turning point for Europe but is not enough to overcome the past hostile media discourses and suppress the historical perspective of security and control-oriented EU migration policies. In particular, the crisis helped to shift the intensity of hostility and the persistence in the state-centric, border-oriented securitization in Europe into a narration of victimization rather than threat where mercy and charity dynamics are dominated and into operational mechanisms, noting the emergency of immediate management of the massive migrations flows, respectively. Although, the understanding of a rights-based response to the ongoing migration crisis, is being followed discursively in both political and media stage, the nexus described, points out that the binary between ‘us’ and ‘them’ still exists, with only difference that the ‘invaders’ are now ‘pathetic’ but still ‘invaders’. In this context, the migration crisis challenges the concept of humanitarianism because rights dignify migrants as individuals only in a discursive or secondary level while the humanitarian work is mostly related with the geopolitical and economic interests of the ‘savior’ states.

Keywords: European Union politics, humanitarianism, immigration, media representation, policy-making, refugees, security studies

Procedia PDF Downloads 257
1816 The Study of Intangible Assets at Various Firm States

Authors: Gulnara Galeeva, Yulia Kasperskaya

Abstract:

The study deals with the relevant problem related to the formation of the efficient investment portfolio of an enterprise. The structure of the investment portfolio is connected to the degree of influence of intangible assets on the enterprise’s income. This determines the importance of research on the content of intangible assets. However, intangible assets studies do not take into consideration how the enterprise state can affect the content and the importance of intangible assets for the enterprise`s income. This affects accurateness of the calculations. In order to study this problem, the research was divided into several stages. In the first stage, intangible assets were classified based on their synergies as the underlying intangibles and the additional intangibles. In the second stage, this classification was applied. It showed that the lifecycle model and the theory of abrupt development of the enterprise, that are taken into account while designing investment projects, constitute limit cases of a more general theory of bifurcations. The research identified that the qualitative content of intangible assets significant depends on how close the enterprise is to being in crisis. In the third stage, the author developed and applied the Wide Pairwise Comparison Matrix method. This allowed to establish that using the ratio of the standard deviation to the mean value of the elements of the vector of priority of intangible assets makes it possible to estimate the probability of a full-blown crisis of the enterprise. The author has identified a criterion, which allows making fundamental decisions on investment feasibility. The study also developed an additional rapid method of assessing the enterprise overall status based on using the questionnaire survey with its Director. The questionnaire consists only of two questions. The research specifically focused on the fundamental role of stochastic resonance in the emergence of bifurcation (crisis) in the economic development of the enterprise. The synergetic approach made it possible to describe the mechanism of the crisis start in details and also to identify a range of universal ways of overcoming the crisis. It was outlined that the structure of intangible assets transforms into a more organized state with the strengthened synchronization of all processes as a result of the impact of the sporadic (white) noise. Obtained results offer managers and business owners a simple and an affordable method of investment portfolio optimization, which takes into account how close the enterprise is to a state of a full-blown crisis.

Keywords: analytic hierarchy process, bifurcation, investment portfolio, intangible assets, wide matrix

Procedia PDF Downloads 183
1815 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 251
1814 Towards an Adornian Critical Theory of the Environment

Authors: Dominic Roulx

Abstract:

Many scholars have in the past decade emphasized the relevance of Adorno’s criticism of the rationalized domination of nature (Naturbeherrschung) for thinking the environmental crisis. Beyond the intersubjective critical models of thinkers such as Habermas and Honneth, Adorno’s critical theory has the benefit, according to them, of disclosing the entwinement of social and natural domination in a critically productive way. The author will be arguing in this paper that Adorno’s model of critical theory displays a theoretical framework that is both original and relevant for thinking the ins and outs of the currentenvironmental crisis. To do so, he first construe Adorno’s understanding of the historical domination of nature and argue that Adorno’s method for its criticizing is immanent critique. He puts emphasis on how his understanding of the domination of nature implicitly implies an account of thedialectical relationship between reason and nature. In doing so, he presents a naturalistic understanding of his idea of the primacy of the object. Second, regarding Adorno’s concept of nature, he discusses what he sees as the shortcomings of many commentators’ understanding of the concept of nature in Adorno. He contends that they tend to fall short of Adorno’s concept of nature in failing to make sense of its thoroughly negative signification, thereby falling into an uncritical and fetichized comprehension of “nature. Third, he discusses the prospect for a possible “reconciliation” (Versöhnung) of nature with society. Highlighting how the domination of nature proves to produce the necessary conditions for its own overcoming, he contends that reconciliation with nature relies mainly on the subject’s capacity for critical self-reflection.

Keywords: german philosophy, adorno, nature, environmental crisis

Procedia PDF Downloads 60
1813 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups

Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz

Abstract:

Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.

Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups

Procedia PDF Downloads 1067
1812 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 384
1811 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 367