Search results for: private cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2334

Search results for: private cloud

2094 Prediction of Positive Cloud-to-Ground Lightning Striking Zones for Charged Thundercloud Based on Line Charge Model

Authors: Surajit Das Barman, Rakibuzzaman Shah, Apurv Kumar

Abstract:

Bushfire is known as one of the ascendant factors to create pyrocumulus thundercloud that causes the ignition of new fires by pyrocumulonimbus (pyroCb) lightning strikes and creates major losses of lives and property worldwide. A conceptual model-based risk planning would be beneficial to predict the lightning striking zones on the surface of the earth underneath the pyroCb thundercloud. PyroCb thundercloud can generate both positive cloud-to-ground (+CG) and negative cloud-to-ground (-CG) lightning in which +CG tends to ignite more bushfires and cause massive damage to nature and infrastructure. In this paper, a simple line charge structured thundercloud model is constructed in 2-D coordinates using the method of image charge to predict the probable +CG lightning striking zones on the earth’s surface for two conceptual thundercloud charge configurations: titled dipole and conventional tripole structure with excessive lower positive charge regions that lead to producing +CG lightning. The electric potential and surface charge density along the earth’s surface for both structures via continuously adjusting the position and the charge density of their charge regions is investigated. Simulation results for tilted dipole structure confirm the down-shear extension of the upper positive charge region in the direction of the cloud’s forward flank by 4 to 8 km, resulting in negative surface density, and would expect +CG lightning to strike within 7.8 km to 20 km around the earth periphery in the direction of the cloud’s forward flank. On the other hand, the conceptual tripole charge structure with enhanced lower positive charge region develops negative surface charge density on the earth’s surface in the range |x| < 6.5 km beneath the thundercloud and highly favors producing +CG lightning strikes.

Keywords: pyrocumulonimbus, cloud-to-ground lightning, charge structure, surface charge density, forward flank

Procedia PDF Downloads 86
2093 Fire Safety Engineering of Wood Dust Layer or Cloud

Authors: Marzena Półka, Bożena Kukfisz

Abstract:

This paper presents an analysis of dust explosion hazards in the process industries. It includes selected testing method of dust explosibility and presentation two of them according to experimental standards used by Department of Combustion and Fire Theory in The Main School of Fire Service in Warsaw. In the article are presented values of maximum acceptable surface temperature (MAST) of machines operating in the presence of dust cloud and chosen dust layer with thickness of 5 and 12,5mm. The comparative analysis, points to the conclusion that the value of the minimum ignition temperature of the layer (MITL) and the minimum ignition temperature of dust cloud (MTCD) depends on the granularity of the substance. Increasing the thickness of the dust layer reduces minimum ignition temperature of dust layer. Increasing the thickness of dust at the same time extends the flameless combustion and delays the ignition.

Keywords: fire safety engineering, industrial hazards, minimum ignition temperature, wood dust

Procedia PDF Downloads 288
2092 Barriers to Job Localization Policy in Private Sector: Case Study from Oman

Authors: Yahya Al Nahdi

Abstract:

Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.

Keywords: localization, job security, labour force structure, Omanization, private sector, public sector

Procedia PDF Downloads 363
2091 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 337
2090 Cloud Support for Scientific Workflow Execution: Prototyping Solutions for Remote Sensing Applications

Authors: Sofiane Bendoukha, Daniel Moldt, Hayat Bendoukha

Abstract:

Workflow concepts are essential for the development of remote sensing applications. They can help users to manage and process satellite data and execute scientific experiments on distributed resources. The objective of this paper is to introduce an approach for the specification and the execution of complex scientific workflows in Cloud-like environments. The approach strives to support scientists during the modeling, the deployment and the monitoring of their workflows. This work takes advantage from Petri nets and more pointedly the so-called reference nets formalism, which provides a robust modeling/implementation technique. RENEWGRASS is a tool that we implemented and integrated into the Petri nets editor and simulator RENEW. It provides an easy way to support not experienced scientists during the specification of their workflows. It allows both modeling and enactment of image processing workflows from the remote sensing domain. Our case study is related to the implementation of vegetation indecies. We have implemented the Normalized Differences Vegetation Index (NDVI) workflow. Additionally, we explore the integration possibilities of the Cloud technology as a supplementary layer for the deployment of the current implementation. For this purpose, we discuss migration patterns of data and applications and propose an architecture.

Keywords: cloud computing, scientific workflows, petri nets, RENEWGRASS

Procedia PDF Downloads 422
2089 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 113
2088 Supply Chain Management Strategies of the Private Residential Construction Sector in South Africa

Authors: R. Khoza, K. K. Govender

Abstract:

The aim of the study was to review and critically evaluate the supply chain management (SCM) strategies and challenges in the private residential construction sector in South Africa. The study was grounded in three theories, namely, theory of constraints, principal-agency theory, and stakeholder theory. A quantitative approach was used to survey 320 private residential construction companies which registered with the National Homebuilders Registration Council (NHBRC) within the Gauteng province. The data from 250 questionnaires returned were analysed using SPSS (Versions 23) and Smart PLS. It became evident that the SCM challenges included lack of trust between the supplier and the organization; lack of adoption of SCM system; lack of a sufficiently skilled SCM workforce; and poor implementation of contract management. The findings also indicate that there is a significant positive relationship between the performance of the private residential construction sector in South Africa and SCM challenges, SCM strategies and SCM processes. A framework is proposed comprising SCM practices and strategies of private residential construction sector in South Africa, which will enable them to enhance performance.

Keywords: management challenges, residential housing, South Africa, supply chain management

Procedia PDF Downloads 50
2087 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 127
2086 The Nature of Problems Faced by Organization in Recruitment: A Comparative Analysis between Public and Private Sector of Russia

Authors: Zarema Urustamova, Chunsheng Shi, Ghulam Mujtaba Kayani 

Abstract:

This research paper helps to understand the comparative analysis of recruitment problems which majorly faced by HRD of Public/Semi-Govt. and private sectors of Russia. The natures of different recruitment problems faced by HRD are different in both sector of Russia. Recruitment is one of very critical and important decision taken by HR department and some recruitment problems are highly faced by HR department of public/semi Govt. sector but are not major problems for private sector. Moreover, some problems are majorly influence in private sector but are not major problems in public/semi-govt. sector of Russia in recruitment. It is also identified that some recruitment problems are majorly affect in recruitment in both sectors. This paper helps to understand the recruitment problems faced by HR department while recruiting the new employee in both sectors. This paper also identified that “environment” and “prejudice” in public sector have higher affect and considered as a major problems in employee recruitment and “reference”, “selection standards” are considered as a least affecting problems of recruitment in public sector. Further, in private sector, “prejudice” and “culture” are major issues and “selection standards” and “reference” is considered as least affecting recruitment problems in private sector of Russia. So, HR department will be able to hire right person on right time, and it is possible when different HR departments focus to overcome these recruitment problems more efficiently and effectively.

Keywords: Govt. /Semi-Govt. vs. private sector, HR department, recruitment problems, Russia

Procedia PDF Downloads 348
2085 Infrastructure Investment Law Formulation to Ensure Low Transaction Cost at Policy Level: Case Study of Public Private Partnership Project at the Ministry of Public Works and Housing of the Republic of Indonesia

Authors: Yolanda Indah Permatasari, Sudarsono Hardjosoekarto

Abstract:

Public private partnership (PPP) scheme was considered as an alternative source of funding for infrastructure provision. However, the performance of PPP scheme and interest of private sector to participate in the provision of infrastructure was still practically low. This phenomenon motivates the research to reconstruct the form of collaborative governance at the policy level from the perspective of transaction cost of the PPP scheme. Soft-system methodology (SSM)-based action research was used as this research methodology. The result of this study concludes that the emergence of transaction cost sources at the policy level is caused by the absence of a law that governs infrastructure investment, especially the implementation of PPP scheme. This absence is causing the imbalance in risk allocation and risk mitigation between the public and private sector. Thus, this research recommended the formulation of infrastructure investment law that aims to minimize asymmetry information, to anticipate the principal-principal problems, and to provide legal basis that ensures risk certainty and guarantee fair risk allocation between public and private sector.

Keywords: public governance, public private partnership, soft system methodology, transaction cost

Procedia PDF Downloads 109
2084 Use of Cloud-Based Virtual Classroom in Connectivism Learning Process to Enhance Information Literacy and Self-Efficacy for Undergraduate Students

Authors: Kulachai Kultawanich, Prakob Koraneekij, Jaitip Na-Songkhla

Abstract:

The way of learning has been changed into a new paradigm since the improvement of network and communication technology, so learners have to interact with massive amount of the information. Thus, information literacy has become a critical set of abilities required by every college and university in the world. Connectivism is considered to be an alternative way to design information literacy course in online learning environment, such as Virtual Classroom (VC). With the change of learning pedagogy, VC is employed to improve the social capability by integrating cloud-based technology. This paper aims to study the use of Cloud-based Virtual Classroom (CBVC) in Connectivism learning process to enhance information literacy and self-efficacy of twenty-one undergraduate students who registered in an e-publishing course at Chulalongkorn University. The data were gathered during 6 weeks of the study by using the following instruments: (1) Information literacy test (2) Information literacy rubrics (3) Information Literacy Self-Efficacy (ILSE) Scales and (4) Questionnaire. The result indicated that students have information literacy and self-efficacy posttest mean scores higher than pretest mean scores at .05 level of significant after using CBVC in Connectivism learning process. Additionally, the study identified that the Connectivism learning process proved useful for developing information rich environment and a sense of community, and the CBVC proved useful for developing social connection.

Keywords: cloud-based, virtual classroom, connectivism, information literacy

Procedia PDF Downloads 424
2083 The Permutation of Symmetric Triangular Equilateral Group in the Cryptography of Private and Public Key

Authors: Fola John Adeyeye

Abstract:

In this paper, we propose a cryptosystem private and public key base on symmetric group Pn and validates its theoretical formulation. This proposed system benefits from the algebraic properties of Pn such as noncommutative high logical, computational speed and high flexibility in selecting key which makes the discrete permutation multiplier logic (DPML) resist to attack by any algorithm such as Pohlig-Hellman. One of the advantages of this scheme is that it explore all the possible triangular symmetries. Against these properties, the only disadvantage is that the law of permutation multiplicity only allow an operation from left to right. Many other cryptosystems can be transformed into their symmetric group.

Keywords: cryptosystem, private and public key, DPML, symmetric group Pn

Procedia PDF Downloads 171
2082 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 405
2081 A Study on the HTML5 Based Multi Media Contents Authority Tool

Authors: Heesuk Seo, Yongtae Kim

Abstract:

Online learning started in the 1990s, the spread of the Internet has been through the era of e-learning paradigm of online education in the era of smart learning change. Reflecting the different nature of the mobile to anywhere anytime, anywhere was also allows the form of learning, it was also available through the learning content and interaction. We are developing a cloud system, 'TLINKS CLOUD' that allows you to configure the environment of the smart learning without the need for additional infrastructure. Using the big-data analysis for e-learning contents, we provide an integrated solution for e-learning tailored to individual study.

Keywords: authority tool, big data analysis, e-learning, HTML5

Procedia PDF Downloads 375
2080 Comparing Quality of Care in Family Planning Services in Primary Public and Private Health Care Facilities in Ethiopia

Authors: Gizachew Assefa Tessema, Mohammad Afzal Mahmood, Judith Streak Gomersall, Caroline O. Laurence

Abstract:

Introduction: Improving access to quality family planning services is the key to improving health of women and children. However, there is currently little evidence on the quality and scope of family planning services provided by private facilities, and this compares to the services provided in public facilities in Ethiopia. This is important, particularly in determining whether the government should further expand the roles of the private sector in the delivery of family planning facility. Methods: This study used the 2014 Ethiopian Services Provision Assessment Plus (ESPA+) survey dataset for comparing the structural aspects of quality of care in family planning services. The present analysis used a weighted sample of 1093 primary health care facilities (955 public and 138 private). This study employed logistic regression analysis to compare key structural variables between public and private facilities. While taking the structural variables as an outcome for comparison, the facility type (public vs private) were used as the key exposure of interest. Results: When comparing availability of basic amenities (infrastructure), public facilities were less likely to have functional cell phones (AOR=0.12; 95% CI: 0.07-0.21), and water supply (AOR=0.29; 95% CI: 0.15-0.58) than private facilities. However, public facilities were more likely to have staff available 24 hours in the facility (AOR=0.12; 95% CI: 0.07-0.21), providers having family planning related training in the past 24 months (AOR=4.4; 95% CI: 2.51, 7.64) and possessing guidelines/protocols (AOR= 3.1 95% CI: 1.87, 5.24) than private facilities. Moreover, comparing the availability of equipment, public facilities had higher odds of having pelvic model for IUD demonstration (AOR=2.60; 95% CI: 1.35, 5.01) and penile model for condom demonstration (AOR=2.51; 95% CI: 1.32, 4.78) than private facilities. Conclusion: The present study suggests that Ethiopian government needs to provide emphasis towards the private sector in terms of providing family planning guidelines and training on family planning services for their staff. It is also worthwhile for the public health facilities to allocate funding for improving the availability of basic amenities. Implications for policy and/ or practice: This study calls policy makers to design appropriate strategies in providing opportunities for training a health care providers working in private health facility.

Keywords: quality of care, family planning, public-private, Ethiopia

Procedia PDF Downloads 310
2079 Flexible 3D Virtual Desktop Using Handles for Cloud Environments

Authors: J. K. Lee, S. L. Lee

Abstract:

Due to the improvement in performance of computer hardware and the development of operating systems, a multi-tasking for several programs has become one of the basic functions to computer users. It is natural for computer users to want more functional, convenient, and visual GUI functions (Graphic User Interface). In this paper, a 3D virtual desktop system was proposed to meet users’ requirements for cloud environments such as a virtual desktop function in the Windows environment. The proposed system uses the handles of the windows to hide or restore several windows. It connects the list of task spaces using the circular double linked list to manage the handles. Each handle list is registered in the corresponding task space being executed. The 3D virtual desktop is efficient and flexible in handling the numbers of task spaces and can help users to work under more comfortable environments. Acknowledgment: This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korea government (MSIP) (NRF-2015R1D1A1A01057680).

Keywords: virtual desktop, GUI, cloud, virtualization

Procedia PDF Downloads 181
2078 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 441
2077 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 78
2076 A Study of the Costs and Benefits of Smart City Projects Including the Scenario of Public-Private Partnerships

Authors: Patrick T. I. Lam, Wenjing Yang

Abstract:

A smart city project embraces benefits and costs which can be classified under direct and indirect categories. Externalities come into the picture, but they are often difficult to quantify. Despite this barrier, policy makers need to carry out cost-benefit analysis to justify the huge investments needed to make a city smart. The recent trend is towards the engagement of the private sector to utilize their resources and expertise, especially in the Information and Communication Technology (ICT) areas, where innovations blossom. This study focuses on the identification of costs (on a life cycle basis) and benefits associated with smart city project developments based on a comprehensive literature review and case studies, where public-private partnerships would warrant consideration, the related costs and benefits are highlighted. The findings will be useful for policy makers of cities.

Keywords: smart city projects, costs and benefits, identification, public-private partnerships

Procedia PDF Downloads 304
2075 Delay in the Diagnosis of Tuberculosis and Initiation of TB Treatment in the Private and Public Health Sectors, Udaipur District, Rajasthan, India, Nov 2013

Authors: Yogita Tulsian, R. S. Gupta, K. F. Laserson

Abstract:

Background: Delays in the diagnosis and treatment of TB facilitates disease transmission in the community, so we conducted a study to evaluate the burden of and risk factors for delay in TB diagnosis and initiation of TB treatment among patients in the private and public sectors in Udaipur district, Rajasthan, India. Methods: A retrospective cohort study was conducted among 100 new sputum-positive TB. Patients were interviewed in the intensive phase of treatment September 2013-November 2013 Long total diagnosis delay (TDD) was defined as a time interval between first symptom to confirmed diagnosis > 30 days. Long health treatment delay (HTD) was defined as a time interval between confirmed diagnosis to treatment initiation > 7 days. Results: We observed a median TDD of 55 days (range: 7-136 days) in the public sector and of 92 days (11-380 days) in the private sector. Long TDD in the private sector was significantly associated with middle-higher socio-economic status (Risk Ratio (RR): 2;95% CI: 1.3-3). The reasons reported from the private sector for long TDD were suspect TB patients not advised for sputum examination (RR: 42; 95% CI:2.6-660), practise of self-medication (RR: 17.4; 95% CI: 1.1-267), or lack of awareness (RR: 9.7;95% CI: 0.6-145). The median HTD in the public sector was 3 days (range: 0-14 days), and in the private sector, 2 days (range: 0-11 days) (non-significant difference). Conclusions: Long TDD in private sector may be improved through sputum referral for all suspect TB cases and better education to all regarding TB.

Keywords: diagnosis delay, treatment delay, privatesector, public sector

Procedia PDF Downloads 394
2074 Impact of Sovereign Debt Risk and Corrective Austerity Measures on Private Sector Borrowing Cost in Euro Zone

Authors: Syed Noaman Shah

Abstract:

The current paper evaluates the effect of external public debt risk on the borrowing cost of private non-financial firms in euro zone. Further, the study also treats the impact of austerity measures on syndicated-loan spreads of private firm followed by euro area member states to revive the economic growth in the region. To test these hypotheses, we follow multivariate ordinary least square estimation method to assess the effect of external public debt on the borrowing cost of private firms. By using foreign syndicated-loan issuance data of non-financial private firms from 2005 to 2011, we attempt to gauge how the private financing cost varies with high levels of sovereign external debt prevalent in the euro zone. Our results suggest significant effect of external public debt on the borrowing cost of private firm. In particular, an increase in external public debt by one standard deviation from its sample mean raises syndicated-loan spread by 89 bps. Furthermore, weak creditor rights protection prevalent in member states deepens this effect. However, we do not find any significant effect of domestic public debt on the private sector borrowing cost. In addition, the results show significant effect of austerity measures on private financing cost, both in normal and in crisis period in the euro zone. In particular, one standard deviation change in fiscal consolidation conditional mean reduces the syndicated-loan spread by 22 bps. In turn, it indicates strong presence of credibility channel due to austerity measures in euro area region.

Keywords: corporate debt, fiscal consolidation, sovereign debt, syndicated-loan spread

Procedia PDF Downloads 373
2073 The Effect of Affirmative Action in Private Schools on Education Expenditure in India: A Quasi-Experimental Approach

Authors: Athira Vinod

Abstract:

Under the Right to Education Act (2009), the Indian government introduced an affirmative action policy aimed at the reservation of seats in private schools at the entry-level and free primary education for children from lower socio-economic backgrounds. Using exogenous variation in the status of being in a lower social category (disadvantaged groups) and the year of starting school, this study investigates the effect of exposure to the policy on the expenditure on private education. It employs a difference-in-difference strategy with the help of repeated cross-sectional household data from the National Sample Survey (NSS) of India. It also exploits regional variation in exposure by combining the household data with administrative data on schools from the District Information System for Education (DISE). The study compares the outcome across two age cohorts of disadvantaged groups, starting school at different times, that is, before and after the policy. Regional variation in exposure is proxied with a measure of enrolment rate under the policy, calculated at the district level. The study finds that exposure to the policy led to an average reduction in annual private school fees of ₹223. Similarly, a 5% increase in the rate of enrolment under the policy in a district was associated with a reduction in annual private school fees of ₹240. Furthermore, there was a larger effect of the policy among households with a higher demand for private education. However, the effect is not due to fees waived through direct enrolment under the policy but rather an increase in the supply of low-fee private schools in India. The study finds that after the policy, 79,870 more private schools entered the market due to an increased demand for private education. The new schools, on average, charged a lower fee than existing schools and had a higher enrolment of children exposed to the policy. Additionally, the district-level variation in the enrolment under the policy was very strongly correlated with the entry of new schools, which not only charged a low fee but also had a higher enrolment under the policy. Results suggest that few disadvantaged children were admitted directly under the policy, but many were attending private schools, which were largely low-fee. This implies that disadvantaged households were willing to pay a lower fee to secure a place in a private school even if they did not receive a free place under the policy.

Keywords: affirmative action, disadvantaged groups, private schools, right to education act, school fees

Procedia PDF Downloads 90
2072 3D Point Cloud Model Color Adjustment by Combining Terrestrial Laser Scanner and Close Range Photogrammetry Datasets

Authors: M. Pepe, S. Ackermann, L. Fregonese, C. Achille

Abstract:

3D models obtained with advanced survey techniques such as close-range photogrammetry and laser scanner are nowadays particularly appreciated in Cultural Heritage and Archaeology fields. In order to produce high quality models representing archaeological evidences and anthropological artifacts, the appearance of the model (i.e. color) beyond the geometric accuracy, is not a negligible aspect. The integration of the close-range photogrammetry survey techniques with the laser scanner is still a topic of study and research. By combining point cloud data sets of the same object generated with both technologies, or with the same technology but registered in different moment and/or natural light condition, could construct a final point cloud with accentuated color dissimilarities. In this paper, a methodology to uniform the different data sets, to improve the chromatic quality and to highlight further details by balancing the point color will be presented.

Keywords: color models, cultural heritage, laser scanner, photogrammetry

Procedia PDF Downloads 254
2071 Trade Liberalization and Domestic Private Investment in Nigeria

Authors: George-Anokwuru Chioma Chidinma Bernadette

Abstract:

This paper investigated the effect of trade liberalization on domestic private investment in Nigeria from 1981 to 2020. To achieve this objective, secondary data on domestic private investment, trade openness, exchange rate and interest rate were sourced from the statistical bulletin of Nigeria’s apex bank. The Autoregressive Distributed Lag (ARDL) technique was used as the main analytical tool. The ARDL Bounds test revealed the existence of long run association among the variables. The results revealed that trade openness and exchange rate have positive and insignificant relationship with domestic private investment both in the long and short runs. At the same time, interest rate has negative relationship with domestic private investment both in the long and short runs. Therefore, it was concluded that there is no significant relationship between trade openness, exchange rate, interest rate and domestic private investment in Nigeria during the period of study. Based on the findings, the study recommended that government should formulate trade policies that will encourage the growth of domestic private investment in Nigeria. To achieve this, government should ensure consistency in trade policies and at the same time strengthen the existing policies to build investors’ confidence. Also, government should make available an investment-friendly environment, as well as monitor real sector operators to ensure that foreign exchange allocations are not diverted. Government should increase capital investment in education, housing, transportation, agriculture, health, power, road construction, national defense, among others that will help the various sectors of the economy to function very well thereby making the business environment friendly thereby enhancing the growth and development of the country.

Keywords: trade openness, domestic private investment, ARDL, exchange rate

Procedia PDF Downloads 36
2070 Assets Misappropriation in the Malaysian Public and Private Sectors

Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura

Abstract:

Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.

Keywords: assets misappropriation, fraud, public sector, private sector

Procedia PDF Downloads 167
2069 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 133
2068 Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities

Authors: Jeana Cadby, Kae Miyazawa

Abstract:

With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector.

Keywords: cloud computing, environmental benefits, mobile technology, women

Procedia PDF Downloads 140
2067 A Novel Meta-Heuristic Algorithm Based on Cloud Theory for Redundancy Allocation Problem under Realistic Condition

Authors: H. Mousavi, M. Sharifi, H. Pourvaziri

Abstract:

Redundancy Allocation Problem (RAP) is a well-known mathematical problem for modeling series-parallel systems. It is a combinatorial optimization problem which focuses on determining an optimal assignment of components in a system design. In this paper, to be more practical, we have considered the problem of redundancy allocation of series system with interval valued reliability of components. Therefore, during the search process, the reliabilities of the components are considered as a stochastic variable with a lower and upper bounds. In order to optimize the problem, we proposed a simulated annealing based on cloud theory (CBSAA). Also, the Monte Carlo simulation (MCS) is embedded to the CBSAA to handle the random variable components’ reliability. This novel approach has been investigated by numerical examples and the experimental results have shown that the CBSAA combining MCS is an efficient tool to solve the RAP of systems with interval-valued component reliabilities.

Keywords: redundancy allocation problem, simulated annealing, cloud theory, monte carlo simulation

Procedia PDF Downloads 387
2066 Defining a Reference Architecture for Predictive Maintenance Systems: A Case Study Using the Microsoft Azure IoT-Cloud Components

Authors: Walter Bernhofer, Peter Haber, Tobias Mayer, Manfred Mayr, Markus Ziegler

Abstract:

Current preventive maintenance measures are cost intensive and not efficient. With the available sensor data of state of the art internet of things devices new possibilities of automated data processing emerge. Current advances in data science and in machine learning enable new, so called predictive maintenance technologies, which empower data scientists to forecast possible system failures. The goal of this approach is to cut expenses in preventive maintenance by automating the detection of possible failures and to improve efficiency and quality of maintenance measures. Additionally, a centralization of the sensor data monitoring can be achieved by using this approach. This paper describes the approach of three students to define a reference architecture for a predictive maintenance solution in the internet of things domain with a connected smartphone app for service technicians. The reference architecture is validated by a case study. The case study is implemented with current Microsoft Azure cloud technologies. The results of the case study show that the reference architecture is valid and can be used to achieve a system for predictive maintenance execution with the cloud components of Microsoft Azure. The used concepts are technology platform agnostic and can be reused in many different cloud platforms. The reference architecture is valid and can be used in many use cases, like gas station maintenance, elevator maintenance and many more.

Keywords: case study, internet of things, predictive maintenance, reference architecture

Procedia PDF Downloads 219
2065 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 110