Search results for: internet protocol address (IP address)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5304

Search results for: internet protocol address (IP address)

5034 Encoded Fiber Optic Sensors for Simultaneous Multipoint Sensing

Authors: C. Babu Rao, Pandian Chelliah

Abstract:

Owing to their reliability, a number of fluorescent spectra based fiber optic sensors have been developed for detection and identification of hazardous chemicals such as explosives, narcotics etc. In High security regions, such as airports, it is important to monitor simultaneously multiple locations. This calls for deployment of a portable sensor at each location. However, the selectivity and sensitivity of these techniques depends on the spectral resolution of the spectral analyzer. The better the resolution the larger the repertoire of chemicals that can be detected. A portable unit will have limitations in meeting these requirements. Optical fibers can be employed for collecting and transmitting spectral signal from the portable sensor head to a sensitive central spectral analyzer (CSA). For multipoint sensing, optical multiplexing of multiple sensor heads with CSA has to be adopted. However with multiplexing, when one sensor head is connected to CSA, the rest may remain unconnected for the turn-around period. The larger the number of sensor heads the larger this turn-around time will be. To circumvent this imitation, we propose in this paper, an optical encoding methodology to use multiple portable sensor heads connected to a single CSA. Each portable sensor head is assigned an unique address. Spectra of every chemical detected through this sensor head, are encoded by its unique address and can be identified at the CSA end. The methodology proposed is demonstrated through a simulation using Matlab SIMULINK.

Keywords: optical encoding, fluorescence, multipoint sensing

Procedia PDF Downloads 684
5033 Addressing Head Transplantation and Its Legal, Social and Neuroethical Implications

Authors: Joseph P. Mandala

Abstract:

This paper examines the legal and medical ethics concerns, which proponents of human head transplantation continue to defy since the procedure was first attempted on dogs in 1908. Despite recent bioethical objections, proponents have proceeded with radical experimentation, claiming transplantation would treat incurable diseases and improve patients’ quality of life. In 2018, Italian neurosurgeon, Sergio Canavero, and Dr. Xiaoping Ren claimed to have performed a head transplant on a corpse in China. Content analysis of literature shows that the procedure failed to satisfy scientific, legal, and bioethical elements because, unlike humans, corpses cannot coordinate function. Putting a severed head onto a body that has been dead for several days is not equivalent to a transplant which would require successfully reconnecting and restoring function to a spinal cord. While reconnection without restoration of bodily function is not transplantation, the publicized procedure on animals and corpses could leapfrog to humans, sparking excitement in society likely to affect organ donors and recipients from territorial jurisdictions with varying legal and ethical regimes. As neurodiscoveries generate further excitement, the need to preemptively address the legal and medical ethics impact of head transplantation in our society cannot be overstated. A preemptive development of methods to address the impact of head transplantation will help harmonizing national and international laws on organ donations, advance directives, and laws affecting end of life.

Keywords:

Procedia PDF Downloads 106
5032 The Role of DNA Evidence in Determining Paternity in India: A Study of Cases from the Legal and Scientific Perspective

Authors: Pratyusha Das

Abstract:

A paradigm shift has been noticed in the interpretation of DNA evidence for determining paternity. Sometimes DNA evidence has been accepted while sometimes it was rejected by the Indian Courts. Courts have forwarded various justifications for acceptance and rejection of such evidence through legal and scientific means. Laws have also been changed to accommodate the necessities of society. Balances between both the legal and scientific approaches are required, to make the best possible use of DNA evidence for the well-being of the society. Specifications are to be framed as to when such evidence can be used in the future by pointing out the pros and cons. Judicial trend is to be formulated to find out the present situation. The study of cases of superior courts of India using an analytical and theoretical approach is driving the questions regarding the shared identity of the legal and scientific approaches. To assimilate the differences between the two approaches, the basic differences between them have to be formulated. Revelations are required to access the favorable decisions using the DNA evidence. Reasons are to be forwarded for the unfavorable decisions and the approach preferred in such cases. The outcome of the two methods has to be assessed in relation to the parties to the dispute, the society at large, the researcher and from the judicial point of view. The dependability of the two methods is to be studied in relation to the justice delivery system. A highlight of the chronological study of cases along with the changes in the laws with the aid of presumptions will address the questions of necessity of a method according to the facts and situations. Address is required in this respect whether the legal and scientific forces converge somewhere pushing the traditional identification of paternity towards a fundamental change.

Keywords: cases, evidence, legal, scientific

Procedia PDF Downloads 222
5031 Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux

Authors: Senesh Wijayarathne

Abstract:

This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability.

Keywords: slmail server, extended instruction pointer, jump to the esp register, bad characters, virtual machine, windows 7, kali Linux, buffer overflow, Seattle lab, vulnerability

Procedia PDF Downloads 125
5030 A Study on Websites of Public and Private Hospitals in Konya

Authors: H. Nur Görkemli, Mehmet Fidan

Abstract:

After the first acquaintance with internet in April 1993, number of internet users increased rapidly in Turkey. According to Turkish Statistical Institute’s 2013 data, internet usage in Turkey between 16-74 age group is 48,9%. Hospitals are one of the areas where internet is being intensively used like many other businesses. As a part of public relations application, websites are important tools for hospitals to reach a wide range of target audience within and outside the organization. With their websites, hospitals have opportunities to give information about their organization, strengthen their image, compete with their rivals, interact with shareholders, reflect their transparency and meet with new audiences. This study examines web sites of totally 31 hospitals which are located in Konya. Institutions are categorized as public and private hospitals and then three main research categories are determined: content, visual and technical. Main and sub categories are examined by using content analysis method. Results are interpreted in terms of public and private institutions.

Keywords: websites, hospital, health communication, internet, webpages

Procedia PDF Downloads 349
5029 Residencial Inclusion Strategies for Homeless Immigrants: The Case of Spain

Authors: Raluca Cosmina Budian

Abstract:

The homeless population in Spain, particularly among immigrants, has been a persistent and multifaceted issue. The government has implemented various housing public policies over the years to address homelessness, ranging from shelter programs to initiatives promoting permanent housing solutions. However, understanding the effectiveness of these policies requires insight from the very individuals and professionals directly impacted by or involved in their execution. This research sheds light on national strategies (The 2015-2020 Comprehensive National Strategy for the Homeless and National Strategy to Combat Homelessness in Spain 2023-2030) aimed at tackling homelessness in Spain, with a focus on the evolving landscape of housing public policies and their relationship with the homeless population. We investigate how these strategies have transformed over time and their impact on the inclusion of this vulnerable group. Furthermore, we explore the perspectives of homeless immigrants, distinguishing between those with an extended residency in Spain and those who have more recently arrived (less than 2 years); and distinguishing between women and men. Additionally, we incorporate insights from 13 interviews with professionals dedicated to serving the homeless population. These insights offer a deeper understanding of the intricacies of current homelessness service provision. Our findings reveal the complex dynamics of providing services to homeless individuals, and the importance of aligning these efforts with the broader national strategies for tackling homelessness. Drawing on a comprehensive dataset, we offer a nuanced view of the challenges and successes in implementing inclusive housing policies in the Spanish context. Our research highlights the importance of collaboration between policy makers, service providers and advocates to create a cohesive and effective approach. By fostering such collaboration, we aim to create a more inclusive and comprehensive strategy to address homelessness in Spain and possible affordable housing proposals for this vulnerable group. It´s only underscores the importance of tailored approaches but also contributes to the broader discourse on housing public policies' ability to address homelessness and foster integration. We suggest that a more comprehensive approach, considering the unique needs of immigrants and working in collaboration with professionals in the field, is essential for the development of effective strategies to combat homelessness and ensure the right to adequate housing for all.

Keywords: housing, homeless, public policy, Spain

Procedia PDF Downloads 42
5028 Inclusion of Children with Disabilities in Early Childhood Development Programs in Nepal: Construction of a Stakeholder Informed Framework

Authors: Divya Dawadi, Kerry Bissaker

Abstract:

Inclusion of children with a disability (CwD) in Early Childhood Education and Development (ECED) programs in Nepal while viewed as desirable is not widespread. Even though the ECED program is currently providing access to ECED services for one million young children, with the aim to improve children's school readiness by equipping them with the necessary knowledge and skills to succeed more effectively in their primary schooling, access to early year's education in inclusive settings for CwD is challenging. Using a heuristic qualitative design, this research aims to construct a framework by analyzing the perspectives of parents and professionals through interviews and focus group discussions, with a view to recommending a new policy to address the rights of CwD and their families. Several school-based and/or organizational and contextual factors interact to contribute to CwD becoming victims of multiple layers of exclusion. The school-based factors include policy, attitudes, teacher efficacy, resources, coordination and parental engagement. The contextual factors are spirituality, caste ethnicity, language, economic status, and geographic location. However, there is a varied effect of the interaction between school-based and contextual factors on different groups of CwD. A policy needs to recognize the multiplicity of the interactions between these factors that inhibit the inclusion of varied groups of CwD in ECED programs and address them separately.

Keywords: children with a disability, early childhood education and development, framework, inclusion

Procedia PDF Downloads 326
5027 Mechanisms to Combat Maritime Terrorism in the Law of the Kingdom of Saudi Arabia and International Law

Authors: Khaleed Alsufyyan

Abstract:

This doctoral research has been successfully approved by a specialist upgrade panel, and it presents the proposition that the KSA policy for combating maritime terrorism is inadequate and current governance frameworks, including laws, are insufficiently developed to respond effectively and fairly to maritime terrorism. It will examine the legal system in the KSA in terms of effectiveness fairness, as well as investigate this proposition to determine what factors have contributed to such a deficiency. The main focus of this research will draw upon the policies, laws, and practices of the KSA, as well as UK and international laws and policies, to assess whether it is feasible to apply them in the context of the KSA. This thesis will recommend strategies regarding maritime terrorism to enrich the legal and policy frameworks and address the current and future dynamics of maritime terrorism adequately. To derive suitable improvements, UK policies, laws, and practices will be considered for policy transfer purposes. As for studies focused on the KSA, since the KSA is a Muslim state, it will be important to assess the impact of Islamic Law or Sharia Law subject to the doctrines of fairness and effectiveness to comprehend how the KSA’s legal system operates and determine the boundaries it sets for the response to maritime terrorism. This thesis will propose that more reforms are needed to effectively and fairly deal with maritime terrorism based on the prevailing understanding of Sharia law. The research will address the international perspectives on the problem of maritime terrorism and international cooperation of the KSA regarding maritime terrorism and consider the need for further developments.

Keywords: maritime terrorism, maritime security, combat maritime terrorism in the KSA, protecting maritime transport against terrorism

Procedia PDF Downloads 54
5026 The Impact of Organizational Culture on Internet Marketing Adoption

Authors: Hafiz Mushtaq Ahmad, Syed Faizan Ali Shah, Bushra Hussain, Muneeb Iqbal

Abstract:

Purpose: The purpose of this study is to investigate the impact of organizational culture on internet marketing adoption. Moreover, the study intends to explore the role of organizational culture in the internet marketing adoption that helps business to achieve organizational growth and augmented market share. Background: With the enormous expansion of technology, organizations now need technology-based marketing paradigm in order to capture larger group of customers. Organizational culture plays a dominant and prominent role in the internet marketing adoption. Changes in the world economy have demolished current organizational competition and generating new technology standards and strategies. With all the technological advances, e-marketing has become one of the essential part of marketing strategies. Organizations require advance internet marketing strategies in order to compete in a global market. Methodology: The population of this study consists of telecom sector organizations of Pakistan. The sample size consists of 200 telecom sector employees. Data were gathered through the questionnaire instrument. The research strategy of this study is survey. The study uses a deductive approach. The sampling technique of this study is convenience sampling. Tentative Results: The study reveals that organizational culture played a vital role in the internet marketing adoption. The results show that there is a strong association between the organizational culture and internet marketing adoption. The results further show that flexible organizational culture helps organization to easily adopt internet marketing. Conclusion: The study discloses that flexible organizational culture helps organizations to easily adopt e-marketing. The study guides decision-makers and owners of organizations to recognize the importance of internet marketing strategy and help them to increase market share by using e-marketing. The study offers solution to the managers to develop flexible organizational culture that helps in internet marketing adoption.

Keywords: internet technology, internet marketing, marketing paradigm, organizational culture

Procedia PDF Downloads 205
5025 Reimagining the Potential of Street Lighting Infrastructure in Nairobi City

Authors: Clifford Otieno Ochieng, Nsenda Lukumwena

Abstract:

Cities worldwide and most notably those in the global south, including Nairobi City are experiencing accelerated population growth and urban sprawl, accompanied with multiple socioeconomic challenges’ which in turn increase the pressure on already limited infrastructure such as public lighting and on limited financial resources. Based on this premise, through reimaging the value of street lighting infrastructure, the study attempts to highlight the affordance and affordability of streetlights and suggests them as a tool to optimally address limited financial resources that characterize cities in the global south. As a methodology, the paper reviews and analyzes literature available online including Nairobi city budgets; reports from Kenya Power, World Health Organization and United Nations; and articles on enterprise level Internet of Things (IoT) solutions. In conclusion, this study illustrates that streetlights can go well beyond their traditional roles of illuminating cities at night. They can be as suggested in this paper charging stations, communication network terminals and disease prevention nodes.

Keywords: affordance, Nairobi, developing economies, IoT, smart street lights, smart cities

Procedia PDF Downloads 153
5024 The Utilisation of Storytelling as a Therapeutic Intervention by Educational Psychologists to Address Behavioural Challenges Relating to Grief of Adolescent Clients

Authors: Laila Jeebodh Desai

Abstract:

Storytelling as a therapeutic intervention entails the narrating of events by externalising emotions, thoughts and responses to life-changing events such as loss and grief. This creates the opportunity for clients to engage with psychologists by projecting various beliefs and challenges, such as grief, through a range of therapeutic modalities. This study conducts an inquiry into the ways in which storytelling can be utilised by educational psychologists with adolescent clients to address behavioural challenges relating to grief. This qualitative study therefore aims to facilitate an understanding of the use and benefits of storytelling as a therapeutic intervention. This has been achieved by examining interviews with four educational psychologists who have utilised storytelling as a therapeutic intervention with adolescent clients to overcome challenges with grief. The participants (educational psychologists) discussed case studies during interviews, which provided evidence of their practical administration of storytelling as a therapeutic intervention incorporating integrated theoretical approaches through the use of blended therapeutic techniques. Behavioural challenges relating to grief were also predominant in the case study information provided by the participants. The participants further confirmed that the term ‘grief’ included different types of loss that were experienced among adolescent clients. The implications and recommendations of the findings encouraged the utilisation of storytelling as a therapeutic intervention with adolescent clients in addressing behavioural challenges related to grief, based on the outcome of the case studies discussed by the participants.

Keywords: storytelling, therapeutic intervention, adolescents, grief

Procedia PDF Downloads 471
5023 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 24
5022 Concepts in the Design of Lateral-Load Systems in High Rise Buildings to Reduce Operational Energy Consumption

Authors: Mohamed Ali MiladKrem Salem, Sergio F.Breña, Sanjay R. Arwade, Simi T. Hoque

Abstract:

The location of the main lateral‐load resisting system in high-rise buildings may have positive impacts on sustainability through a reduction in operational energy consumption, and this paper describes an assessment of the accompanying effects on structural performance. It is found that there is a strong influence of design for environmental performance on the structural performance the building, and that systems selected primarily with an eye towards energy use reduction may require substantial additional structural stiffening to meet safety and serviceability limits under lateral load cases. We present a framework for incorporating the environmental costs of meeting structural design requirements through the embodied energy of the core structural materials and also address the issue of economic cost brought on by incorporation of environmental concerns into the selection of the structural system. We address these issues through four case study high-rise buildings with differing structural morphologies (floor plan and core arrangement) and assess each of these building models for cost and embodied energy when the base structural system, which has been suggested by architect Kenneth Yeang based on environmental concerns, is augmented to meet lateral drift requirements under the wind loads prescribed by ASCE 7-10.

Keywords: sustainable, embodied, Outrigger, skyscraper, morphology, efficiency

Procedia PDF Downloads 439
5021 Internet Pornography Consumption and Relationship Commitment of Filipino Married Individuals

Authors: Racidon P. Bernarte, Vincent Jude G. Estella, Dominador Jr. M. Nucon, Jin Danniel O. Villatema

Abstract:

Purpose: Internet pornography has many negative effects, but one of the disturbing phases of pornography usage is; users are insentient on how pornography influences and affects them. The acceptance of Internet pornography use in a relationship has been found to be higher among men than among women. The use of pornography directly correlates to a decrease in sexual intimacy. Hence, this might lead to the weakening of the relationship of the married individuals to their partner. To find out the relevance of the claim, the researchers aimed to explore the relationship of Internet pornography consumption to the relationship commitment of married individuals in the Philippines. Different factors such as level of satisfaction, the size of the investment, quality of alternatives, relationship stability, and viewing habits of the Filipino married individuals were also considered in determining the relationship of watching pornography online and the relationship commitment of the Filipino married individuals. Design/ Methodology/ Approach –The study used the quantitative research approach, specifically descriptive method and correlation in order to further analyze the gathered data. A self-administered survey was distributed to 400 selected Filipino married individuals who were married individuals that are watching pornography on the Internet who are living in Quezon City. Findings –It is revealed that Internet pornography consumption has a negative effect on the relationship commitment of married individuals. Furthermore, watching pornography online weakened the relationship commitment of the Filipino married individuals that leads to an unstable relationship.

Keywords: internet pornography consumption, relationship commitment, married individuals, polytechnic university of the Philippines

Procedia PDF Downloads 383
5020 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 450
5019 A Modeling Approach for Blockchain-Oriented Information Systems Design

Authors: Jiaqi Yan, Yani Shi

Abstract:

The blockchain technology is regarded as the most promising technology that has the potential to trigger a technological revolution. However, besides the bitcoin industry, we have not yet seen a large-scale application of blockchain in those domains that are supposed to be impacted, such as supply chain, financial network, and intelligent manufacturing. The reasons not only lie in the difficulties of blockchain implementation, but are also root in the challenges of blockchain-oriented information systems design. As the blockchain members are self-interest actors that belong to organizations with different existing information systems. As they expect different information inputs and outputs of the blockchain application, a common language protocol is needed to facilitate communications between blockchain members. Second, considering the decentralization of blockchain organization, there is not any central authority to organize and coordinate the business processes. Thus, the information systems built on blockchain should support more adaptive business process. This paper aims to address these difficulties by providing a modeling approach for blockchain-oriented information systems design. We will investigate the information structure of distributed-ledger data with conceptual modeling techniques and ontology theories, and build an effective ontology mapping method for the inter-organization information flow and blockchain information records. Further, we will study the distributed-ledger-ontology based business process modeling to support adaptive enterprise on blockchain.

Keywords: blockchain, ontology, information systems modeling, business process

Procedia PDF Downloads 405
5018 The Situation in Afghanistan as a Step Forward in Putting an End to Impunity

Authors: Jelena Radmanovic

Abstract:

On 5 March 2020, the International Criminal Court has decided to authorize the investigation into the crimes allegedly committed on the territory of Afghanistan after 1 May 2003. The said determination has raised several controversies, including the recently imposed sanctions by the United States, furthering the United States' long-standing rejection of the authority of the International Criminal Court. The purpose of this research is to address the said investigation in light of its importance for the prevention of impunity in the cases where the perpetrators are nationals of Non-Party States to the Rome Statute. Difficulties that the International Criminal Court has been facing, concerning the establishment of its jurisdiction in those instances where an involved state is not a Party to the Rome Statute, have become the most significant stumbling block undermining the importance, integrity, and influence of the Court. The Situation in Afghanistan raises even further concern, bearing in mind that the Prosecutor’s Request for authorization of an investigation pursuant to article 15 from 20 November 2017 has initially been rejected with the ‘interests of justice’ as an applied rationale. The first method used for the present research is the description of the actual events regarding the aforementioned decisions and the following reactions in the international community, while with the second method – the method of conceptual analysis, the research will address the decisions pertaining to the International Criminal Court’s jurisdiction and will attempt to address the mentioned Decision of 5 March 2020 as an example of good practice and a precedent that should be followed in all similar situations. The research will attempt parsing the reasons used by the International Criminal Court, giving rather greater attention to the latter decision that has authorized the investigation and the points raised by the officials of the United States. It is a find of this research that the International Criminal Court, together with other similar judicial instances (Nuremberg and Tokyo Tribunals, The International Criminal Tribunal for the former Yugoslavia, The International Criminal Tribunal for Rwanda), has presented the world with the possibility of non-impunity, attempting to prosecute those responsible for the gravest of crimes known to the humanity and has shown that such persons should not enjoy the benefits of their immunities, with its focus primarily on the victims of such crimes. Whilst it is an issue that will most certainly be addressed further in the future, with the situations that will be brought before the International Criminal Court, the present research will make an attempt at pointing to the significance of the situation in Afghanistan, the International Criminal Court as such and the international criminal justice as a whole, for the purpose of putting an end to impunity.

Keywords: Afghanistan, impunity, international criminal court, sanctions, United States

Procedia PDF Downloads 99
5017 A Study of Barriers and Challenges Associated with Agriculture E-commerce in Afghanistan

Authors: Khwaja Bahman Qaderi, Noorullah Rafiqee

Abstract:

Background: With today's increasing Internet users, e-commerce has become a viable model for strengthening relationships between sellers, entrepreneurs, and consumers due to its speed, efficiency, and cost reduction. Agriculture is the economic backbone for 80 percent of the Afghan population. According to MCIT statistics, there are currently around 10 million internet users in Afghanistan. With this data, it was expected that Afghan people should have utilized e-commerce in their agricultural aspects, although it appears to be less used. Objective: This study examines the scope of e-commerce in Afghanistan's agriculture enterprises, how they harness the potential of internet users, and what obstacles they face in implementing e-commerce in their businesses. Method: The study distributed a 39-question questionnaire to agribusinesses in five different zones of Afghanistan. After extracting the responses and excluding the incomplete questionnaires, 280 were included in the analysis step to perform a non-parametric sign test. Result: E-commerce in Afghanistan faces four major political, economic, Internet, and technological obstacles, and no company in the country has implemented e-commerce. In addition, e-commerce is still in its infancy among agricultural companies in the country. Internet use is still primarily limited to email and sharing product images on Facebook & Instagram for advertising purposes. There are no companies that conduct international transactions via the Internet. Conclusion: This study contributes to knowing the challenges and barriers that the agriculture e-commerce faces in Afghanistan to find the effective solutions to use the capacity of internet users in the country and increase the sales rate of agricultural products through the Internet.

Keywords: E-commerce, barriers and challenges, agriculture companies, Afghanistan

Procedia PDF Downloads 63
5016 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 216
5015 Model of a Context-Aware Middleware for Mobile Workers

Authors: Esraa Moustafa, Gaetan Rey, Stephane Lavirotte, Jean-Yves Tigli

Abstract:

With the development of Internet of Things and Web of Things, computing becomes more pervasive, invisible and present everywhere. In fact, in our environment, we are surrounded by multiple devices that deliver (web) services that meet the needs of the users. However, the mobility of these devices as the users has important repercussions that challenge software design of these applications because the variability of the environment cannot be anticipated at the design time. Thus, it will be interesting to dynamically discover the environment and adapt the application during its execution to the new contextual conditions. We, therefore, propose a model of a context-aware middleware that can address this issue through a monitoring service that is capable of reasoning and observation channels capable of calculating the context during the runtime. The monitoring service evaluates the pre-defined X-Query predicates in the context manager and uses Prolog to deduce the services needed to respond back. An independent Observation Channel for each different predicate is then dynamically generated by the monitoring service depending on the current state of the environment. Each channel sends its result directly to the context manager which consequently calculates the context based on all the predicates’ results while preserving the reactivity of the self-adaptive system.

Keywords: auto-adaptation, context-awareness, middleware, reasoning engine

Procedia PDF Downloads 214
5014 Employment Mobility and the Effects of Wage Level and Tenure

Authors: Idit Kalisher, Israel Luski

Abstract:

One result of the growing dynamicity of labor markets in recent decades is a wider scope of employment mobility – i.e., transitions between employers, either within or between careers. Employment mobility decisions are primarily affected by the current employment status of the worker, which is reflected in wage and tenure. Using 34,328 observations from the National Longitudinal Survey of Youth 1979 (NLS79), which were derived from the USA population between 1990 and 2012, this paper aims to investigate the effects of wage and tenure over employment mobility choices, and additionally to examine the effects of other personal characteristics, individual labor market characteristics and macroeconomic factors. The estimation strategy was designed to address two challenges that arise from the combination of the model and the data: (a) endogeneity of the wage and the tenure in the choice equation; and (b) unobserved heterogeneity, as the data of this research is longitudinal. To address (a), estimation was performed using two-stage limited dependent variable procedure (2SLDV); and to address (b), the second stage was estimated using femlogit – an implementation of the multinomial logit model with fixed effects. Among workers who have experienced at least one turnover, the wage was found to have a main effect on career turnover likelihood of all workers, whereas the wage effect on job turnover likelihood was found to be dependent on individual characteristics. The wage was found to negatively affect the turnover likelihood and the effect was found to vary across wage level: high-wage workers were more affected compared to low-wage workers. Tenure was found to have a main positive effect on both turnover types’ likelihoods, though the effect was moderated by the wage. The findings also reveal that as their wage increases, women are more likely to turnover than men, and academically educated workers are more likely to turnover within careers. Minorities were found to be as likely as Caucasians to turnover post wage-increase, but less likely to turnover with each additional tenure year. The wage and the tenure effects were found to vary also between careers. The difference in attitude towards money, labor market opportunities and risk aversion could explain these findings. Additionally, the likelihood of a turnover was found to be affected by previous unemployment spells, age, and other labor market and personal characteristics. The results of this research could assist policymakers as well as business owners and employers. The former may be able to encourage women and older workers’ employment by considering the effects of gender and age on the probability of a turnover, and the latter may be able to assess their employees’ likelihood of a turnover by considering the effects of their personal characteristics.

Keywords: employment mobility, endogeneity, femlogit, turnover

Procedia PDF Downloads 118
5013 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks

Authors: Chothmal

Abstract:

In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.

Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces

Procedia PDF Downloads 217
5012 Electronic Commerce in Georgia: Problems and Development Perspectives

Authors: Nika GorgoShadze, Anri Shainidze, Bachuki Katamadze

Abstract:

In parallel to the development of the digital economy in the world, electronic commerce is also widely developing. Internet and ICT (information and communication technology) have created new business models as well as promoted to market consolidation, sustainability of the business environment, creation of digital economy, facilitation of business and trade, business dynamism, higher competitiveness, etc. Electronic commerce involves internet technology which is sold via the internet. Nowadays electronic commerce is a field of business which is used by leading world brands very effectively. After the research of internet market in Georgia, it was found out that quality of internet is high in Tbilisi and is low in the regions. The internet market of Tbilisi can be evaluated as high-speed internet service, competitive and cost effective internet market. Development of electronic commerce in Georgia is connected with organizational and methodological as well as legal problems. First of all, a legal framework should be developed which will regulate responsibilities of organizations. The Ministry of Economy and Sustainable Development will play a crucial role in creating legal framework. Ministry of Justice will also be involved in this process as well as agency for data exchange. Measures should be taken in order to make electronic commerce in Georgia easier. Business companies may be offered some model to get low-cost and complex service. A service centre should be created which will provide all kinds of online-shopping. This will be a rather interesting innovation which will facilitate online-shopping in Georgia. Development of electronic business in Georgia requires modernized infrastructure of telecommunications (especially in the regions) as well as solution of institutional and socio-economic problems. Issues concerning internet availability and computer skills are also important.

Keywords: electronic commerce, internet market, electronic business, information technology, information society, electronic systems

Procedia PDF Downloads 355
5011 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 131
5010 Out of Hospital Cardiac Arrest in Kuala Lumpur: A Mixed Method Study on Incidence, Adherence to Protocol, and Issues

Authors: Mohd Said Nurumal, Sarah Sheikh Abdul Karim

Abstract:

Information regarding out of hospital cardiac arrest incidence include outcome in Malaysia is limited and fragmented. This study aims to identify incidence and adherence to protocol of out of hospital cardiac arrest and also to explore the issues faced by the pre-hospital personnel in regards managing cardiac arrest victim in Kuala Lumpur, Malaysia. A mixed method approach combining the qualitative and quantitative study design was used. The 285 pre-hospital care data sheet of out of hospital cardiac arrest during the year of 2011 were examined by using checklists for identify the incidence and adherence to protocol. Nine semi-structured interviews and two focus group discussions were performed. For the incidence based on the overall out of hospital cardiac arrest cases that occurred in 2011 (n=285), the survival rates were 16.8%. For adherence to protocol, only 89 (41.8%) of the cases adhered to the given protocol and 124 did not adhere to such protocol. The qualitative information provided insight about the issues related to out of hospital cardiac arrest in every aspect. All the relevant qualitative data were merged into few categories relating issues that could affect the management of out of hospital cardiac arrest performed by pre-hospital care team. One of the essential elements in the out of hospital cardiac arrest handling by pre-hospital care is to ensure increase of survival rates and excellent outcomes by adhering to given protocols based on international standard benchmarks. Measures are needed to strengthen the quick activation of the pre-hospital care service, prompt bystander cardiopulmonary resuscitation, early defibrillation and timely advanced cardiac life support and also to tackle all the issues highlighted in qualitative results.

Keywords: pre-hospital care, out of hospital cardiac arrest, incidence, protocol, mixed method research

Procedia PDF Downloads 388
5009 The Impact of Water Resources on Economic and Social Development in Kuwait

Authors: Obaid Alotaibi

Abstract:

The geographical location of the State of Kuwait contributed significantly to the suffering of Kuwait in the past, due to the scarcity of natural water resources and the inability of the State's financial resources to provide other water resources to meet the needs of the population. The problem of water scarcity in Kuwait remained until the beginning of the second half of the twentieth century, as the country's economic conditions revived with the emergence and export of oil; which was clearly reflected in the steady growth of the population. To cope with this population, increase, it was necessary to expand the various development programs to include all sectors of the state. The process of development and urbanization could not start without finding solutions to the problem of water shortage in Kuwait. The only option for officials to meet the needs of the population and the different sectors of water development is the desalination of seawater. This process necessitated the establishment of six desalination plants along the coast of Kuwait and extended freshwater arteries to reach everywhere on the land. However, this does not mean that the problem of water shortage has been completely solved. The desalination plants are not meeting the country's future water needs, especially considering the increasing population growth. These stations are nearing completion and they need to be replaced, renovation and maintenance, require significant expenses. Therefore, it was necessary for scientific research to address the issue of water in Kuwait, whether in the field of development of existing resources or in the field of rationalization of consumption and protection of available resources. The study focused on how to address the increasing demand for water resulting from population increase, the impact of water on economic and social development, the prospects of water resources in Kuwait and its ability to meet the needs of the country by 2030.

Keywords: economic, development, Kuwait, social, water resources

Procedia PDF Downloads 100
5008 The Public Relations Activities on Social Networking Sites for Communication to the Customer: Case Study the Company in Thailand

Authors: Phakit Treesukol

Abstract:

The purpose of this investigation is to ascertain Internet users’ behaviours towards companies’ public relations activities on social networking sites. In order to conduct a study of Internet users’ behaviour, data was collected using the quota sampling method from a total of 100 Internet users who are members of SNS and used the Internet during the period 10 December 2009 to 9 January 2010. An online self-administrated questionnaire was distributed through Facebook, Hi5 and Twitter to Internet users by using snowball sampling technique. Results of the study showed that the majority of the respondents were using social networking sites with the main purpose to contact their friends. Presently, most of the respondents were not regularly receiving companies’ public relations activities on social networking sites. The highest frequency of survey responses by the respondents was for hiding or deleting information introducing new products or services from companies on SNS also as well.

Keywords: media uses and gratification, online activities, public relations activities, social networking sites

Procedia PDF Downloads 225
5007 An Analysis of African Solutions to African Problems: Practical Effects of International Criminal Court Withdrawals in Favour of Regional Court Systems

Authors: Jeanne-Mari Retief

Abstract:

As of November 2016, three African states have withdrawn from the International Criminal Court (ICC) and more are expected to follow. The alleged abuse of universal jurisdiction and targeting of African states by the ICC motivated the withdrawals. These historical exits raise many questions, especially in regard to the adequate investigation and prosecution of international crimes in a continent with a history of impunity. Even though African courts exist and one more is proposed, many issues remain i.e. adequate access to the courts, the extent of the courts’ jurisdiction, and proposed methods of effectively dealing with international crimes in Africa. This paper seeks to address the practical effects of the withdrawal from the ICC and the problems posed through utilizing regional courts. It will specifically look at the practical challenges existing courts face, the lack of access to the latter, issues concerning the proposed African Court for Justice and Human Rights, and the shocking promotion of impunity in Africa. These all have severe implications for African citizens and victims of the most heinous crimes. The mantra of African solutions to African problems places an important duty on states to ensure the actual provision of these solutions, which can only be achieved through a critical analysis of the questions above.

Keywords: ACJHR, Africa, impunity, justice, Malabo protocol

Procedia PDF Downloads 194
5006 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 217
5005 Exploration of Barriers and Challenges to Innovation Process for SMEs: Possibilities to Promote Cooperation Between Scientific and Business Institutions to Address it

Authors: Indre Brazauskaite, Vilte Auruskeviciene

Abstract:

Significance of the study is outlined through current strategic management challenges faced by SMEs. First, innovation is recognized as competitive advantage in the market, having ever changing market conditions. It is of constant interest from both practitioners and academics to capture and capitalize on business opportunities or mitigate the foreseen risks. Secondly, it is recognized that integrated system is needed for proper implementation of innovation process, especially during the period of business incubation, associated with relatively high risks of new product failure. Finally, ability to successful commercialize innovations leads to tangible business results that allow to grow organizations further. This is particularly relevant to SMEs due to limited structures, resources, or capabilities. Cooperation between scientific and business institutions could be a tool of mutual interest to observe, address, and further develop innovations during the incubation period, which is the most demanding and challenging during the innovation process. Material aims to address the following problematics: i) indicate the major barriers and challenges in innovation process that SMEs are facing, ii) outline the possibilities for these barriers and challenges to be addressed by cooperation between scientific and business institutions. Basis for this research is stage-by-stage integrated innovation management process which presents existing challenges and needed aid in operational decision making. The stage-by-stage innovation management process exploration highlights relevant research opportunities that have high practical relevance in the field. It is expected to reveal the possibility for business incubation programs that could combine interest from both – practices and academia. Methodology. Scientific meta-analysis of to-date scientific literature that explores innovation process. Research model is built on the combination of stage-gate model and lean six sigma approach. It outlines the following steps: i) pre-incubation (discovery and screening), ii) incubation (scoping, planning, development, and testing), and iii) post-incubation (launch and commercialization) periods. Empirical quantitative research is conducted to address barriers and challenges related to innovation process among SMEs that limits innovations from successful launch and commercialization and allows to identify potential areas for cooperation between scientific and business institutions. Research sample, high level decision makers representing trading SMEs, are approached with structured survey based on the research model to investigate the challenges associated with each of the innovation management step. Expected findings. First, the current business challenges in the innovation process are revealed. It will outline strengths and weaknesses of innovation management practices and systems across SMEs. Secondly, it will present material for relevant business case investigation for scholars to serve as future research directions. It will contribute to a better understanding of quality innovation management systems. Third, it will contribute to the understanding the need for business incubation systems for mutual contribution from practices and academia. It can increase relevance and adaptation of business research.

Keywords: cooperation between scientific and business institutions, innovation barriers and challenges, innovation measure, innovation process, SMEs

Procedia PDF Downloads 124