Search results for: principles of integrity in Georgian defense management
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11731

Search results for: principles of integrity in Georgian defense management

11641 Trusted Neural Network: Reversibility in Neural Networks for Network Integrity Verification

Authors: Malgorzata Schwab, Ashis Kumer Biswas

Abstract:

In this concept paper, we explore the topic of Reversibility in Neural Networks leveraged for Network Integrity Verification and crafted the term ''Trusted Neural Network'' (TNN), paired with the API abstraction around it, to embrace the idea formally. This newly proposed high-level generalizable TNN model builds upon the Invertible Neural Network architecture, trained simultaneously in both forward and reverse directions. This allows for the original system inputs to be compared with the ones reconstructed from the outputs in the reversed flow to assess the integrity of the end-to-end inference flow. The outcome of that assessment is captured as an Integrity Score. Concrete implementation reflecting the needs of specific problem domains can be derived from this general approach and is demonstrated in the experiments. The model aspires to become a useful practice in drafting high-level systems architectures which incorporate AI capabilities.

Keywords: trusted, neural, invertible, API

Procedia PDF Downloads 114
11640 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience

Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha

Abstract:

Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.

Keywords: digital images, medical information system, second opinion consultations, electronic medical record

Procedia PDF Downloads 423
11639 The Importance of Applying Established Web Site Design Principles on an Online Performance Management System

Authors: R. W. Brown, P. J. Blignaut

Abstract:

An online performance management system was evaluated, and recommendations were made to improve the system. The study shows the effects of not adhering to the established web design principles and conventions. Furthermore, the study indicates that if the online performance management system is not well designed, it may have negative effects on the overall usability of the system and these negative effects will have consequences for both the employer and employees. The evaluation was done in terms of the usability metrics of effectiveness, efficiency and user satisfaction. Effectiveness was measured in terms of the success rate with which users could execute prescribed tasks in a sandbox system. Efficiency was expressed in terms of the time it took participants to understand what is expected of them and to execute the tasks. Post-test questionnaires were used in order to determine the satisfaction of the participants. Recommendations were made to improve the usability of the online performance management system.

Keywords: eye tracking, human resource management, performance management, usability

Procedia PDF Downloads 177
11638 Music in Religion Culture of the Georgian Pentecostals

Authors: Nino Naneishvili

Abstract:

The study of religious minorities and their musical culture has attracted scant academic attention in Georgia. Within wider Georgian society, it would seem that the focus of discourse to date has been on the traditional orthodox religion and its musical expression, with other forms of religious expression regarded as intrinsically less valuable. The goal of this article is to study Georgia's different religious and musical picture which, this time, is presented on the example of the Pentecostals. The first signs of the Pentecostal movement originated at the end of the 19th Century in the USA, and first appeared in Georgia as early as 1914. An ethnomusicological perspective allows the use of anthropological and sociological approaches. The basic methodology is an ethnographic method. This involved attending religious services, observation, in-depth interviews and musical material analysis. This analysis, based on a combined use of various theoretical and methodological approaches, reveals that Georgian Pentecostals, apart from polyphonic singing, are characterised by “ bi-musicality.“ This phenomenon together with Georgian three part polyphony combines vocalisation within “social polyphony.“ The concept of back stage and front stage is highlighted. Chanters also try to express national identity. In some cases however it has been observed that they abandon or conceal certain musical forms of expression which are considered central to Georgian identity. The famous hymn “Thou art a Vineyard” is a case in point. The reason given for this omission within the Georgian Pentecostal church is that within Pentecostal doctrine, God alone is the object of worship. Therefore there is no veneration of Saints as representatives of the Divine. In some cases informants denied the existence of this hymn, and others explain that the meaning conveyed to the Vineyard is that of Jesus Christ and not the Virgin Mary. Others stated that they loved Virgin Mary and were therefore free to sing this song outside church circles. The results of this study illustrates that one of the religious minorities in Georgia, the Pentecostals, are characterised by a deviation in musical thinking from Homo Polyphonicus. They actively change their form of musical worship to secondary ethno hearing – bi-musicality. This outcome is determined by both new religious thinking and the process of globalization. A significant principle behind this form of worship is the use of forms during worship which are acceptable and accessible to all. This naturally leads to the development of modern forms. Obtained material does not demonstrate a connection between traditional religious music in general. Rather, it constitutes an independent domain.

Keywords: Georgia, globalization, music, pentecostal

Procedia PDF Downloads 299
11637 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 35
11636 Territorial Disputes behind the Declaration of Independence of Abkhazia and South Ossetia by Some Latin American States

Authors: Besik Goginava

Abstract:

Several days later after the end of 2008 Russo-Georgian War, Venezuela and Nicaragua formally recognized the independence of Abkhazia and South Ossetia. In 2009-10 both countries established diplomatic relations with self-declared republics. It is a paradoxical fact that after neighboring Russia-Georgian conflict territories were internationally recognized by two Latin American states with ongoing territorial disputes. The Venezuela-Guyana territorial dispute which officially began in the early XIX century became conflict-ridden again in the late 1990s and 2000s. Venezuela has long claimed the land which comprises 40% of Guyana’s current territory. Territorial disputes of Nicaragua include dispute with Colombia over Caribbean Islands, with Costa Rica over the San Juan River and maritime dispute with Honduras. Based on historical and analytical research methods the purpose of this paper is to establish the relationship between the recognition of Abkhazia and South Ossetia by Venezuela and Nicaragua and Venezuela’s territorial dispute with Guyana, as well as Nicaragua’s with Colombia, Costa Rica and Honduras. The objective of the study is to investigate the factors that led Venezuela and Nicaragua to formally recognize Georgian conflict territories and how could their own territorial disputes affect on their decision.

Keywords: Latin America, Georgia, Venezuela, Nicaragua, Abkhazia, South Ossetia

Procedia PDF Downloads 209
11635 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 478
11634 Sectoral Linkages and Key Sectors of the Georgian Economy

Authors: Vano Benidze, Ioseb Berikashvili

Abstract:

Since 2003, Georgia has implemented many successful reforms, however, economic growth, poverty alleviation and unemployment reduction are still major challenges facing country’s economy. This is due to the fact that most reforms during the past 2 decades were mainly geared toward improving the institutional environment, while economy’s sectoral composition and industrial policy were largely ignored. Each individual sector plays its own specific role in the functioning of the whole economy that cannot be accomplished by any other sector. However, given the unavoidable reality that one sector uses intermediate inputs from other industries to produce its output and sells part of its output to other sectors, the importance of sectors should consider these sectoral interdependencies as well. Simply put, not all industries are equally useful for economic growth and development. In this context, the aim of this paper is to identify the key economic sectors of the Georgian economy. Leontief input-output analysis has been used in deriving backward and forwards linkages for all sectors in the Georgian economy for 2020 and 2021. Sectors with both high backward and forward linkages have been identified as key sectors of the economy. The results obtained are beneficial for the success of the economic and industrial policy of Georgia. If targeted properly by thoughtful policy intervention, key sectors identified in this paper will have a high potential of spreading growth impulses throughout the economy and will possibly generate higher economic growth.

Keywords: structural change, key sectors, development strategies, input-output analysis

Procedia PDF Downloads 52
11633 Complete Chloroplast DNA Sequences of Georgian Endemic Polyploid Wheats

Authors: M. Gogniashvili, I. Maisaia, A. Kotorashvili, N. Kotaria, T. Beridze

Abstract:

Three types of plasmon (A, B and G) is typical for genus Triticum. In polyploid species - Triticum turgidum L. and Triticum aestivum L. plasmon B is detected. In the forthcoming paper, complete nucleotide sequence of chloroplast DNA of 11 representatives of Georgian wheat polyploid species, carrying plasmon B was determined. Sequencing of chloroplast DNA was performed on an Illumina MiSeq platform. Chloroplast DNA molecules were assembled using the SOAPdenovo computer program. All contigs were aligned to the reference chloroplast genome sequence using BLASTN. For detection of SNPs and Indels and phylogeny tree construction computer programs Mafft and Blast were used. Using Triticum aestivum L. subsp. macha (Dekapr. & Menabde) Mackey var. paleocolchicum Dekapr. et Menabde as a reference, 5 SNPs can be identified in chloroplast DNA of Georgian endemic polyploid wheat. The number of noncoding substitutions is 2, coding substitutions - 3. In comparison with reference DNA two - 38 bp and 56 bp inversions were observed in paleocolchicum subspecies. There were six 1 bp indels detected in Georgian polyploid wheats, all of them at microsatellite stretches. The phylogeny tree shows that subspecies macha, carthlicum and paleocolchicum occupy different positions. According to the simplified scheme based on SNP and indel data, the ancestral, female parent of the all studied polyploid wheat is unknown X predecesor, from which four lines were formed. 1 SNP and two inversions (38 bp and 56 bp) caused the formation of subsp. paleocolchicum. Three other lines are macha, durum and carthlicum lines. Macha line is further divided into two sublines (M_1 and M_4). Carthlicum line includes subsp.carthlicum and T.aestivum - C_1 - C_2 - A_1. One of the central question of wheat domestication is which people(s) participated in wheat domestication? It is proposed that the predecessors of Georgian peoples (Proto-Kartvelians) must be placed, on the evidence of archaic lexical and toponymic data, in the mountainous regions of the western and central part of the Little Caucasus (the Transcaucasian foothills) at least 4,000 years ago. One of the possibility to explain the ‘wheat puzzle’ is that Kartvelian speakers brought domesticated wheat species and subspecis from Fertile Crescent further north to South Caucasus.

Keywords: chloroplast DNA, sequencing, SNP, triticum

Procedia PDF Downloads 127
11632 Technical Realization of Key Aesthetic Principles in Guzheng Performance

Authors: Qiongzi Zheng, Lewis Cornwell, Neal Peres Da Costa

Abstract:

Drawn on Confucian and Taoist philosophy and long-established tradition of aesthetic ideals, the Art of the Chinese Zither (Xishan Qinkuang), a classic work by Chinese music scholar Xu Shangyin in 1643, distilled twenty-four practicing principles for the Chinese zither. This work has influenced the practice of guzheng to the present day. Whilst the principles were described in detail, how they can actually be achieved on a technical level remains to be explored. This study focuses on three key practicing principles: yuan (roundness), liu (fluidness), and su (swiftness), and examines how the playing techniques developed by Master Zhao Manqin contribute to the implementation of the principles. The study concludes that knowledge of the technicality of fingering positioning before and after plucking motion is critical to the realization of these principles.

Keywords: Chinese music aesthetics, practicing principles of the Chinese zither, guzheng playing techniques, Zhao Manqin’s fingering techniques, Xishan Qinkuang

Procedia PDF Downloads 149
11631 Urban Traffic: Understanding the Traffic Flow Factor Through Fluid Dynamics

Authors: Sathish Kumar Jayaraj

Abstract:

The study of urban traffic dynamics, underpinned by the principles of fluid dynamics, offers a distinct perspective to comprehend and enhance the efficiency of traffic flow within bustling cityscapes. Leveraging the concept of the Traffic Flow Factor (TFF) as an analog to the Reynolds number, this research delves into the intricate interplay between traffic density, velocity, and road category, drawing compelling parallels to fluid dynamics phenomena. By introducing the notion of Vehicle Shearing Resistance (VSR) as an analogy to dynamic viscosity, the study sheds light on the multifaceted influence of traffic regulations, lane management, and road infrastructure on the smoothness and resilience of traffic flow. The TFF equation serves as a comprehensive metric for quantifying traffic dynamics, enabling the identification of congestion hotspots, the optimization of traffic signal timings, and the formulation of data-driven traffic management strategies. The study underscores the critical significance of integrating fluid dynamics principles into the domain of urban traffic management, fostering sustainable transportation practices, and paving the way for a more seamless and resilient urban mobility ecosystem.

Keywords: traffic flow factor (TFF), urban traffic dynamics, fluid dynamics principles, vehicle shearing resistance (VSR), traffic congestion management, sustainable urban mobility

Procedia PDF Downloads 29
11630 Public Relations for the Faculty of Management Science in Suan Sunandha Rajabhat University

Authors: Narong Anurak

Abstract:

The objectives of this research were to investigate the knowledge and understanding of public relations principles for public relations officials of the office of the faculty of management science in Ratjabhat Suan Sunandha University and to determine the approach of public relations for the Office of Faculty of Management Science.  The questionnaire was utilized as a tool to collect data. Statistics utilized included frequency, percentage, mean, standard deviation, and regression analysis. The results of the research showed that the public relations officials misunderstood on public relations principles. The lack of the perception in media of the target groups both in-house and outside caused the misunderstanding on the roles, mission, and responsibilities. It would be beneficial to public relations division and other divisions of the office of the faculty of management science to be trained and obtained more knowledge and skills on the public relations to support the public relations work for the organization.

Keywords: faculty of management science, preparation in media, public relations, Suan Sunandha Rajabhat University

Procedia PDF Downloads 350
11629 Ethics, Culture, Customer Relationships and Risk Management in Financing Chinese SMEs

Authors: Yongsheng Guo, Mengyu Lu

Abstract:

This study investigates how Chinese SMEs manage financial risks in customer financing. 32 interviews were conducted, and grounded theory models were developed to link the causal conditions, actions, and consequences. This study found that Chinese ethical principles, including integrity, friendship, reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for customer financing. The SMEs establish trust-based relationships with customers and build a social network. The SMEs reduce financial risk through diversification, frequent operations and enterprise reputations. Both customers and SMEs can get benefits, including customer experience and financial rewards for customers and financial resources and customer base for SMEs. But there are some problems, like default for customers and financial cost for enterprises. This study develops a resource and process capability theory of SMEs and a customer capital and customer value theory to connect finance, accounting, and management concepts.

Keywords: CRM, culture, ethics, financing from customer, SME

Procedia PDF Downloads 14
11628 A Reference Framework Integrating Lean and Green Principles within Supply Chain Management

Authors: M. Bortolini, E. Ferrari, F. G. Galizia, C. Mora

Abstract:

In the last decades, an increasing set of companies adopted lean philosophy to improve their productivity and efficiency promoting the so-called continuous improvement concept, reducing waste of time and cutting off no-value added activities. In parallel, increasing attention rises toward green practice and management through the spread of the green supply chain pattern, to minimise landfilled waste, drained wastewater and pollutant emissions. Starting from a review on contributions deepening lean and green principles applied to supply chain management, the most relevant drivers to measure the performance of industrial processes are pointed out. Specific attention is paid on the role of cost because it is of key importance and it crosses both lean and green principles. This analysis leads to figure out an original reference framework for integrating lean and green principles in designing and managing supply chains. The proposed framework supports the application, to the whole value chain or to parts of it, e.g. distribution network, assembly system, job-shop, storage system etc., of the lean-green integrated perspective. Evidences show that the combination of the lean and green practices lead to great results, higher than the sum of the performances from their separate application. Lean thinking has beneficial effects on green practices and, at the same time, methods allowing environmental savings generate positive effects on time reduction and process quality increase.

Keywords: environmental sustainability, green supply chain, integrated framework, lean thinking, supply chain management

Procedia PDF Downloads 367
11627 The Effectiveness of Rebranding as a Comparative Study of Ghanaian Business Using the Principles of Corporate Rebranding

Authors: Kennedy Gbenu, Richmond Kweku Frempong

Abstract:

Rebranding has become a very important strategic tool for companies wanting to succeed in the ever competitive business world using the principles of rebranding Moisescu. Two businesses in Ghana (Ghana Commercial Bank and Vodafone Ghana) have been used to ascertain how rebranding of these organizations was done using the principles in their effort to rebrand themselves and to stay relevant. A secondary research mainly on literature surrounding rebranding, official websites of the organizations under study have also been used extensively. After a basic comparative study undertaken two firms (GCB and VODAFONE) seems to be using the first three principles and reaping from it as provided by Moisescu. This goes to show that rebranding should not be done in vacuum but should be guided by such principles so as to achieve the full potential of any kind of investments made.

Keywords: brands, corporate branding, innovation, case studies

Procedia PDF Downloads 369
11626 Role of Tourism Cluster in Improvement of Economic Competitiveness of Georgia

Authors: Alexander Sharashenidze

Abstract:

This article discusses the role of tourism in the economics of Georgia, justifies the necessity of several governmental supporting tools for diversification of tourism product and increasing competitiveness. Tourism directions are characterized through discovering Georgian tourism potential, considering cultural and geographical features; tools of formating supplemental products and development opportunities of Tbilisi and, also regions are asserted in the case of conducting appropriate government policy. There are presented tools of suggesting innovative tourism products, improvement of service, decreasing taxes, also providing availability to them. The role of tourism cluster in improvement of national competitiveness is substantiated. Based on the analysis of competitive factors influencing the development of tourism cluster, conclusions are made, and recommendations are suggested.

Keywords: economic competitivness, enhancing competitiveness, Georgian economic, tourism cluster, tourism product

Procedia PDF Downloads 499
11625 The Role of Food Labeling on Consumers’ Buying Decision: Georgian Case

Authors: Nugzar Todua

Abstract:

The paper studies the role of food labeling in order to promote healthy eating issue in Georgia. The main focus of the research is directed to consumer attitudes regarding food labeling. The methodology of the paper is based on the focus group work, as well as online and face to face surveys. The data analysis has been provided through ANOVA. The study proves that the impact of variables such as the interest, awareness, reliability, assurance and satisfaction of consumers' on buying decision, is statistically important. The study reveals that consumers’ perception regarding to food labeling is positive, but their level of knowledge and ability is rather low. It is urgent to strengthen marketing promotions strategies in the process of implementations of food security policy in Georgia.

Keywords: food labeling, buying decision, Georgian consumers, marketing research

Procedia PDF Downloads 129
11624 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 306
11623 Climate Change Impact on Water Resources above the Territory of Georgia

Authors: T. Davitashvili

Abstract:

At present impact of global climate change on the territory of Georgia is evident at least on the background of the Caucasus glaciers melting which during the last century have decreased to half their size. Glaciers are early indicators of ongoing global and regional climate change. Knowledge of the Caucasus glaciers fluctuation (melting) is an extremely necessary tool for planning hydro-electric stations and water reservoir, for development tourism and agriculture, for provision of population with drinking water and for prediction of water supplies in more arid regions of Georgia. Otherwise, the activity of anthropogenic factors has resulted in decreasing of the mowing, arable, unused lands, water resources, shrubs and forests, owing to increasing the production and building. Transformation of one type structural unit into another one has resulted in local climate change and its directly or indirectly impacts on different components of water resources on the territory of Georgia. In the present paper, some hydrological specifications of Georgian water resources and its potential pollutants on the background of regional climate change are presented. Some results of Georgian’s glaciers pollution and its melting process are given. The possibility of surface and subsurface water pollution owing to accidents at oil pipelines or railway routes are discussed. The specific properties of regional climate warming process in the eastern Georgia are studied by statistical methods. The effect of the eastern Georgian climate change upon water resources is investigated.

Keywords: climate, droughts, pollution, water resources

Procedia PDF Downloads 453
11622 The Overexpression of Horsegram MURLK Improves Regulation of Cell Death and Defense Responses to Microbial Pathogens

Authors: Shikha Masand, Sudesh Kumar Yadav

Abstract:

Certain protein kinases have been shown to be crucial for plant cell signaling pathways associated with plant immune responses. Here we identified a horsegram [Macrotyloma uniflorum (Lam.) Verdc.] malectin-like leucine rich receptor-like protein kinase (RLK) gene MuRLK. The functional MuRLK protein preferentially binds to mannose and N-acetyl glucosamine residues. MuRLK exists in the cytoplasm and also localizes to the plasma membrane of plant cells via its N-terminus. Over-expression of MuRLK in Arabidopsis enhances the basal resistance to infection with Pseudomonas syringae pv. tomato, Alternaria brassicicola and Hyaloperonospora arabidopsidis, are associated with elevated ROS bursts, MAPK activation, thus ultimately leading to hypersensitive cell death. Moreover, salicylic acid-dependent and jasmonic acid-dependent defense responses are also enhanced in the MuRLK-overexpressed plants that lead to HR-induced cell death. Together, these results suggest that MuRLK plays a key role in the regulation of plant cell death, early and late defense responses after the recognition of microbial pathogens.

Keywords: horsegram, Pseudomonas syringae pv. tomato, MuRLK, ROS burst, cell death, plant defense

Procedia PDF Downloads 223
11621 Using Agility in Building Business Process Management Solutions

Authors: Krešimir Fertalj, Mladen Matejaš

Abstract:

In turbulent modern economy, the companies need to properly manage their business processes. Well defined and stable business processes ensure the security of crucial data and application, and provide a quality product or service to the end customer. On the other side constant changes on the market, new regulatory provisions and emerging new technologies require the need of issuing prompt and effective changes of business process. In this article, we explore the use of agile principles in working with business process management (BPM) solutions. We deal with difficulties in BPM development cycle, review the benefits of using agility and choose the basic agile principles that ensure the success of a BPM project.

Keywords: agile development, BPM environment, Kanban, SCRUM, XP

Procedia PDF Downloads 296
11620 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 41
11619 Role of Senior Management in Implementing Lean Manufacturing Practices: A Study of Manufacturing Companies of Pakistan

Authors: Saima Yaqoob

Abstract:

Due to advancement in technologies and cutting cost competition, especially in manufacturing business, organizations are now becoming more focused toward achieving exceptional quality standards with low manufacturing cost. In this concern, many process improvement strategies are becoming popular in the way of increasing productivity and output. Lean manufacturing principles are among one of them, increasingly used for improving productivity by reducing wastages. Many success factors are involved in lean implementation. But, the role of senior management is most important in developing the lean culture in an organization. Purpose of this study is to investigate the perception of executive level management related to the successful implementation of lean practices and its comparison with the existing practices in the organization. In order to collect data, survey questionnaire comprised of eight statements rendering the critical success factors were sent to the top management of fifty (50) automotive manufacturing companies of Karachi. After analyzing their feedbacks, the trend of lean manufacturing principles and the commitment of senior management toward its implementation was identified in the manufacturing industries of Karachi, Pakistan.

Keywords: lean manufacturing, process improvement, senior management, perception, involvement, waste reduction

Procedia PDF Downloads 162
11618 Bilateral Relations in Matter of Defense between Argentina-United States and Argentina-China along the Period 2005-2015: Advice to Develop a Rational Defense Foreign Policy for Peripheral Countries

Authors: Alvarez Magañini, María Victoria-Rubbi, Lautaro Nahuel

Abstract:

At present, we are facing an unstable international context, conditioned by a relative decline of the US power, primarily in the economic sphere and, to a lesser extent, in the military sphere. This scenario of multipolarity creates tension and uncertainty in the peripheral countries when the issue of their foreign policy arises. This paper presents an analysis of the bilateral relations that were maintained by the Argentine Republic, a peripheral country, along with the United States and China during the period of 2005-2015 in matters of defense in order to identify the empirical consequences resulted from the Argentine actions. Based on the conceptual framework of Peripheral Realism, we analyze indicators related to the weapon trade, defense loans, joint exercises, and personnel training, among others. There will also be a comparative analysis of the conventional military forces of the two powers in question, United States and China. As a conclusion, the cost of having closer relations with China instead of the United States in the defense agenda has been clearly higher than the benefits obtained. The conclusions drawn are empirically aligned with the theoretical paradigm of peripheral realism. Although there are certain conceptual and methodological digressions, these conclusions they could be useful to update and adapt the theory to the current complex international scenario.

Keywords: China, United States, Argentine, peripheral country, peripheral realism

Procedia PDF Downloads 350
11617 Effects of Coastal Structure Construction on Ecosystem

Authors: Afshin Jahangirzadeh, Shatirah Akib, Keyvan Kimiaei, Hossein Basser

Abstract:

Coastal defense structures were built to protect part of shore from beach erosion and flooding by sea water. Effects of coastal defense structures can be negative or positive. Some of the effects are beneficial in socioeconomic aspect, but environment matters should be given more concerns because it can bring bad consequences to the earth landscape and make the ecosystem be unbalanced. This study concerns on the negative impacts as they are dominant. Coastal structures can extremely impact the shoreline configuration. Artificial structures can influence sediment transport, split the coastal space, etc. This can result in habitats loss and lead to noise and visual disturbance of birds. There are two types of coastal defense structures, hard coastal structure and soft coastal structure. Both coastal structures have their own impacts. The impacts are induced during the construction, maintaining, and operation of the structures.

Keywords: ecosystem, environmental impact, hard coastal structures, soft coastal structures

Procedia PDF Downloads 455
11616 Good Governance in Perspective: An Example of Transition from Corruption towards Integrity within a Developing Country (Pakistan)

Authors: Saifullah Khalid

Abstract:

Governance and good governance are among the main topics in international discussions about the success factors for social and economic development. The image of developing countries as for example Pakistan in this respect is bad (in TI Corruption Index nr. among countries). Additionally, the police are among the sectors and organizations which are seen as most corrupt in many countries. However, in case of Pakistan there seem to be exceptions to the rule, and improvement can be brought in specific police departments. This paper represents the findings of Islamabad traffic police (ITP). In Pakistan, the police, in general, have been stigmatized for being the most corrupt department in the country. However, the few recent examples of Motorway police and its replicated model of Islamabad traffic police changed the perception about police and policing. These police forces have shown that Policing in Pakistan can be changed for better. In this paper, the research question that is addressed is: How corrupt are (traffic) police forces in Pakistan and what factors influence corruption within that police force? And What lessons can be learned from that to improve police integrity? Both qualitative and quantitative tools are utilized for data collection. The overall picture of the factors is not so easy to interpret and summarise. Nevertheless paying a better salary does not seem to limit integrity violations, neither does recruitment and selection and leadership, while supervision and control, training and stimulating the positive and limiting the negative elements of culture appear to be important in curbing (sometimes specific) integrity violations in the context of Pakistani police forces. The study also leads to a number of suggestions for curbing corruption and other integrity violations in the Pakistan police.

Keywords: corruption control, governance, integrity violations, Islamabad traffic police, Pakistan

Procedia PDF Downloads 192
11615 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 448
11614 Internal Product Management: The Key to Achieving Digital Maturity and Business Agility for Manufacturing IT Organizations

Authors: Frederick Johnson

Abstract:

Product management has a long and well-established history within the consumer goods industry, despite being one of the most obscure aspects of brand management. Many global manufacturing organizations are now opting for external cloud-based Manufacturing Execution Systems (MES) to replace costly and outdated monolithic MES solutions. Other global manufacturing leaders are restructuring their organizations to support human-centered values, agile methodologies, and fluid operating principles. Still, industry-leading organizations struggle to apply the appropriate framework for managing evolving external MES solutions as internal "digital products." Product management complements these current trends in technology and philosophical thinking in the market. This paper discusses the central problems associated with adopting product management processes by analyzing its traditional theories and characteristics. Considering these ideas, the article then constructs a translated internal digital product management framework by combining new and existing approaches and principles. The report concludes by demonstrating the framework's capabilities and potential effectiveness in achieving digital maturity and business agility within a manufacturing environment.

Keywords: internal product management, digital transformation, manufacturing information technology, manufacturing execution systems

Procedia PDF Downloads 107
11613 The Reason of Principles of Construction Engineering and Management Being Necessary for Contracting Firms and Their Projects Managers

Authors: Mamoon Mousa Atout

Abstract:

The industries of construction are in continuous growth not only in Middle East rejoin but almost all over the world. For the last fifteen years, big expansion and increase of different types of projects has been observed. Many infrastructural projects have been developed, high rise buildings, big shopping malls, power sub-stations, roads, bridges, schools, universities and developing many of new cities with full and complete facilities. The growth and enlargement of the mentioned developed projects has been accomplished through many international and local contracting organizations. Senior management of these organizations depend on their qualified and experienced team whom are aware of the implications of project management, construction management, engineering management and resource management during tendering till final completion of the project. This research aims to find out why reasons of principles of construction engineering and management are necessary for contracting firms and their managers. Principles of construction management help contracting organizations to accomplish and deliver projects without delay. This can be maintained by establishing guidelines’ details for updating the adopted system of construction management that they have through qualified and experienced project managers. The research focuses on benefits of other essential skills of projects planning, monitoring and control. Defining roles and responsibilities of contractor project managers during tendering and execution is a part of the investigated factors that will be analyzed. Other skills like optimizing and utilizing the obtainable project resources to deliver the project within time, cost and quality will be also investigated to find out how these factors are affecting the performance of contracting firms, projects managers and projects. The conclusion of the research will help senior management team and the contractors project managers about the benefits of implications and benefits construction management system and its effect upon the performance and knowledge of contract values that they have, and the optimal profit margin of the firm it.

Keywords: construction management, contracting firms, project managers, planning processes, roles and responsibilities

Procedia PDF Downloads 264
11612 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 7