Search results for: private information retrieval (PIR)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11988

Search results for: private information retrieval (PIR)

11808 Health Status among Government and Private Primary School Children in the Central of Thailand

Authors: Petcharat Kerdonfag, Supunnee Thrakul

Abstract:

School health services through regular screening of school students’ health status have been the main responsibility for community or school health nurses. The purposes of these retrospective study were to assess and compare health problems between government and private primary school students in the central region of Thailand. The data were collected from the school health records in October at the end of the first semester in the academic year 2018. Two thousand and fifty primary school health records from government and private primary schools were gathered to assess health problems regarding anthropometric measurements, physical examination/personal hygiene, and clinical findings for this study. Descriptive statistics and Chi-square were used to be analyzed. The results revealed that health problems of all the school students remained high magnitude. The five top ranks for prevalence rate of health problems were dental caries (36.6%), visual acuity problem (27.7%), over-nutrition (16.8%), head lice (12.8%), and under-nutrition (6.8%), respectively. However, when compared between government and private schools among five health problems; dental caries (55.0% vs 19.9%), visual acuity problem (23.1% vs 31.9%), over-nutrition (20.2% vs 13.8%), head lice (26.5% vs 0.3%), and under-nutrition (10.6% vs 3.4%) with Chi-square analysis, there were significantly different (p < .001). The problem of visual acuity seems to be more serious in private schools while other health problems tend to be more critical in government schools. The findings have suggested that parents who have children in the private primary schools should pay more attention to visual health defects whereas parents with children in the government school should pay more vigilance regards to hygiene and health behavior problems.

Keywords: community health nursing, school health service, health status, primary school children

Procedia PDF Downloads 93
11807 Monetary Policy and Assets Prices in Nigeria: Testing for the Direction of Relationship

Authors: Jameelah Omolara Yaqub

Abstract:

One of the main reasons for the existence of central bank is that it is believed that central banks have some influence on private sector decisions which will enable the Central Bank to achieve some of its objectives especially that of stable price and economic growth. By the assumption of the New Keynesian theory that prices are fully flexible in the short run, the central bank can temporarily influence real interest rate and, therefore, have an effect on real output in addition to nominal prices. There is, therefore, the need for the Central Bank to monitor, respond to, and influence private sector decisions appropriately. This thus shows that the Central Bank and the private sector will both affect and be affected by each other implying considerable interdependence between the sectors. The interdependence may be simultaneous or not depending on the level of information, readily available and how sensitive prices are to agents’ expectations about the future. The aim of this paper is, therefore, to determine whether the interdependence between asset prices and monetary policy are simultaneous or not and how important is this relationship. Studies on the effects of monetary policy have largely used VAR models to identify the interdependence but most have found small effects of interaction. Some earlier studies have ignored the possibility of simultaneous interdependence while those that have allowed for simultaneous interdependence used data from developed economies only. This study, therefore, extends the literature by using data from a developing economy where information might not be readily available to influence agents’ expectation. In this study, the direction of relationship among variables of interest will be tested by carrying out the Granger causality test. Thereafter, the interaction between asset prices and monetary policy in Nigeria will be tested. Asset prices will be represented by the NSE index as well as real estate prices while monetary policy will be represented by money supply and the MPR respectively. The VAR model will be used to analyse the relationship between the variables in order to take account of potential simultaneity of interdependence. The study will cover the period between 1980 and 2014 due to data availability. It is believed that the outcome of the research will guide monetary policymakers especially the CBN to effectively influence the private sector decisions and thereby achieve its objectives of price stability and economic growth.

Keywords: asset prices, granger causality, monetary policy rate, Nigeria

Procedia PDF Downloads 191
11806 Retrieving Similar Segmented Objects Using Motion Descriptors

Authors: Konstantinos C. Kartsakalis, Angeliki Skoura, Vasileios Megalooikonomou

Abstract:

The fuzzy composition of objects depicted in images acquired through MR imaging or the use of bio-scanners has often been a point of controversy for field experts attempting to effectively delineate between the visualized objects. Modern approaches in medical image segmentation tend to consider fuzziness as a characteristic and inherent feature of the depicted object, instead of an undesirable trait. In this paper, a novel technique for efficient image retrieval in the context of images in which segmented objects are either crisp or fuzzily bounded is presented. Moreover, the proposed method is applied in the case of multiple, even conflicting, segmentations from field experts. Experimental results demonstrate the efficiency of the suggested method in retrieving similar objects from the aforementioned categories while taking into account the fuzzy nature of the depicted data.

Keywords: fuzzy object, fuzzy image segmentation, motion descriptors, MRI imaging, object-based image retrieval

Procedia PDF Downloads 350
11805 Development of Innovative Islamic Web Applications

Authors: Farrukh Shahzad

Abstract:

The rich Islamic resources related to religious text, Islamic sciences, and history are widely available in print and in electronic format online. However, most of these works are only available in Arabic language. In this research, an attempt is made to utilize these resources to create interactive web applications in Arabic, English and other languages. The system utilizes the Pattern Recognition, Knowledge Management, Data Mining, Information Retrieval and Management, Indexing, storage and data-analysis techniques to parse, store, convert and manage the information from authentic Arabic resources. These interactive web Apps provide smart multi-lingual search, tree based search, on-demand information matching and linking. In this paper, we provide details of application architecture, design, implementation and technologies employed. We also presented the summary of web applications already developed. We have also included some screen shots from the corresponding web sites. These web applications provide an Innovative On-line Learning Systems (eLearning and computer based education).

Keywords: Islamic resources, Muslim scholars, hadith, narrators, history, fiqh

Procedia PDF Downloads 258
11804 A Survey of Response Generation of Dialogue Systems

Authors: Yifan Fan, Xudong Luo, Pingping Lin

Abstract:

An essential task in the field of artificial intelligence is to allow computers to interact with people through natural language. Therefore, researches such as virtual assistants and dialogue systems have received widespread attention from industry and academia. The response generation plays a crucial role in dialogue systems, so to push forward the research on this topic, this paper surveys various methods for response generation. We sort out these methods into three categories. First one includes finite state machine methods, framework methods, and instance methods. The second contains full-text indexing methods, ontology methods, vast knowledge base method, and some other methods. The third covers retrieval methods and generative methods. We also discuss some hybrid methods based knowledge and deep learning. We compare their disadvantages and advantages and point out in which ways these studies can be improved further. Our discussion covers some studies published in leading conferences such as IJCAI and AAAI in recent years.

Keywords: deep learning, generative, knowledge, response generation, retrieval

Procedia PDF Downloads 105
11803 Support Vector Regression for Retrieval of Soil Moisture Using Bistatic Scatterometer Data at X-Band

Authors: Dileep Kumar Gupta, Rajendra Prasad, Pradeep Kumar, Varun Narayan Mishra, Ajeet Kumar Vishwakarma, Prashant K. Srivastava

Abstract:

An approach was evaluated for the retrieval of soil moisture of bare soil surface using bistatic scatterometer data in the angular range of 200 to 700 at VV- and HH- polarization. The microwave data was acquired by specially designed X-band (10 GHz) bistatic scatterometer. The linear regression analysis was done between scattering coefficients and soil moisture content to select the suitable incidence angle for retrieval of soil moisture content. The 250 incidence angle was found more suitable. The support vector regression analysis was used to approximate the function described by the input-output relationship between the scattering coefficient and corresponding measured values of the soil moisture content. The performance of support vector regression algorithm was evaluated by comparing the observed and the estimated soil moisture content by statistical performance indices %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE). The values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 2.9451, 1.0986, and 0.9214, respectively at HH-polarization. At VV- polarization, the values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 3.6186, 0.9373, and 0.9428, respectively.

Keywords: bistatic scatterometer, soil moisture, support vector regression, RMSE, %Bias, NSE

Procedia PDF Downloads 393
11802 Annotation Ontology for Semantic Web Development

Authors: Hadeel Al Obaidy, Amani Al Heela

Abstract:

The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.

Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology

Procedia PDF Downloads 151
11801 Linking Soil Spectral Behavior and Moisture Content for Soil Moisture Content Retrieval at Field Scale

Authors: Yonwaba Atyosi, Moses Cho, Abel Ramoelo, Nobuhle Majozi, Cecilia Masemola, Yoliswa Mkhize

Abstract:

Spectroscopy has been widely used to understand the hyperspectral remote sensing of soils. Accurate and efficient measurement of soil moisture is essential for precision agriculture. The aim of this study was to understand the spectral behavior of soil at different soil water content levels and identify the significant spectral bands for soil moisture content retrieval at field-scale. The study consisted of 60 soil samples from a maize farm, divided into four different treatments representing different moisture levels. Spectral signatures were measured for each sample in laboratory under artificial light using an Analytical Spectral Device (ASD) spectrometer, covering a wavelength range from 350 nm to 2500 nm, with a spectral resolution of 1 nm. The results showed that the absorption features at 1450 nm, 1900 nm, and 2200 nm were particularly sensitive to soil moisture content and exhibited strong correlations with the water content levels. Continuum removal was developed in the R programming language to enhance the absorption features of soil moisture and to precisely understand its spectral behavior at different water content levels. Statistical analysis using partial least squares regression (PLSR) models were performed to quantify the correlation between the spectral bands and soil moisture content. This study provides insights into the spectral behavior of soil at different water content levels and identifies the significant spectral bands for soil moisture content retrieval. The findings highlight the potential of spectroscopy for non-destructive and rapid soil moisture measurement, which can be applied to various fields such as precision agriculture, hydrology, and environmental monitoring. However, it is important to note that the spectral behavior of soil can be influenced by various factors such as soil type, texture, and organic matter content, and caution should be taken when applying the results to other soil systems. The results of this study showed a good agreement between measured and predicted values of Soil Moisture Content with high R2 and low root mean square error (RMSE) values. Model validation using independent data was satisfactory for all the studied soil samples. The results has significant implications for developing high-resolution and precise field-scale soil moisture retrieval models. These models can be used to understand the spatial and temporal variation of soil moisture content in agricultural fields, which is essential for managing irrigation and optimizing crop yield.

Keywords: soil moisture content retrieval, precision agriculture, continuum removal, remote sensing, machine learning, spectroscopy

Procedia PDF Downloads 60
11800 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks

Authors: Chi-Hsuan Cheng

Abstract:

This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurity

Keywords: cybersecurity, cybercrime, public private partnerships, cyberattack

Procedia PDF Downloads 28
11799 The Relationship between Confidence, Accuracy, and Decision Making in a Mobile Review Program

Authors: Carla Van De Sande, Jana Vandenberg

Abstract:

Just like physical skills, cognitive skills grow rusty over time unless they are regularly used and practiced, so academic breaks can have negative consequences on student learning and success. The Keeping in School Shape (KiSS) program is an engaging, accessible, and cost-effective intervention that harnesses the benefits of retrieval practice by using technology to help students maintain proficiency over breaks from school by delivering a daily review problem via text message or email. A growth mindset is promoted through feedback messages encouraging students to try again if they get a problem wrong and to take on a challenging problem if they get a problem correct. This paper reports on the relationship between confidence, accuracy, and decision-making during the implementation of the KiSS Program at a large university during winter break for students enrolled in an engineering introductory Calculus course sequence.

Keywords: growth mindset, learning loss, on-the-go learning, retrieval practice

Procedia PDF Downloads 174
11798 High-Resolution Spatiotemporal Retrievals of Aerosol Optical Depth from Geostationary Satellite Using Sara Algorithm

Authors: Muhammad Bilal, Zhongfeng Qiu

Abstract:

Aerosols, suspended particles in the atmosphere, play an important role in the earth energy budget, climate change, degradation of atmospheric visibility, urban air quality, and human health. To fully understand aerosol effects, retrieval of aerosol optical properties such as aerosol optical depth (AOD) at high spatiotemporal resolution is required. Therefore, in the present study, hourly AOD observations at 500 m resolution were retrieved from the geostationary ocean color imager (GOCI) using the simplified aerosol retrieval algorithm (SARA) over the urban area of Beijing for the year 2016. The SARA requires top-of-the-atmosphere (TOA) reflectance, solar and sensor geometry information and surface reflectance observations to retrieve an accurate AOD. For validation of the GOCI retrieved AOD, AOD measurements were obtained from the aerosol robotic network (AERONET) version 3 level 2.0 (cloud-screened and quality assured) data. The errors and uncertainties were reported using the root mean square error (RMSE), relative percent mean error (RPME), and the expected error (EE = ± (0.05 + 0.15AOD). Results showed that the high spatiotemporal GOCI AOD observations were well correlated with the AERONET AOD measurements with a correlation coefficient (R) of 0.92, RMSE of 0.07, and RPME of 5%, and 90% of the observations were within the EE. The results suggested that the SARA is robust and has the ability to retrieve high-resolution spatiotemporal AOD observations over the urban area using the geostationary satellite.

Keywords: AEORNET, AOD, SARA, GOCI, Beijing

Procedia PDF Downloads 138
11797 Coherencing a Diametrical Interests between the State, Adat Community and Private Interests in Utilising the Land for Investment in Indonesia

Authors: L. M. Hayyan ul Haq, Lalu Sabardi

Abstract:

This research is aimed at exploring an appropriate regulatory model in coherencing a diametrical interest between the state, Adat legal community, and private interests in utilising and optimizing land in Indonesia. This work is also highly relevant to coherencing the obligation of the state to respect, to fulfill and to protect the fundamental rights of people, especially to protect the communal or adat community rights to the land. In visualizing those ideas, this research will use the normative legal research to elaborate the normative problem in land use, as well as redesigning and creating an appropriate regulatory model in bridging and protecting all interest parties, especially, the state, Adat legal community, and private parties. In addition, it will also employ an empirical legal research for identifying some operational problems in protecting and optimising the land. In detail, this research will not only identify the problems at the normative level, such as conflicted norms, the absence of the norms, and the unclear norm in land law, but also the problems at operational level, such as institutional relationship in managing the land use. At the end, this work offers an appropriate regulatory model at the systems level, which covers value and norms in land use, as well as the appropriate mechanism in managing the utilization of the land for the state, Adat legal community, and private sector. By manifesting this objective, the government will not only fulfill its obligation to regulate the land for people and private, but also to protect the fundamental rights of people, as mandated by the Indonesian 1945 Constitution.

Keywords: adat community rights, fundamental rights, investment, land law, private sector

Procedia PDF Downloads 491
11796 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi

Abstract:

Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.

Keywords: RFID, asset tracking system, MongoDB, NoSQL

Procedia PDF Downloads 276
11795 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 52
11794 Partnerships between Public Administration and Private Social Investment for Territorial Development: Lessons after 15 Brazilian Cases

Authors: Graziela D. de Azevedo, Livia M. Pagotto, Mario P. Monzoni, Neto

Abstract:

This article aims to discuss partnerships between public administration and private social investment aimed at territorial development. There has been some approximation in Brazil from private social investors with initiatives aiming at territorial development policies in highly vulnerable territories or in places where the business sector operates. This represents this paper’s major justification: on the advance of academic debate about how businesses, institutes, and foundations have been working alongside local governments, taking the territory as the reference for joint action. The research was based on the literature on governance and territorial development and adopted a mixed iterative approach (inductive and deductive) through an interpretative lens so as to develop an analysis structure that complements and expands knowledge about the contribution of public policies and private social investments for territorial development in Brazil. The analysis of 15 cases based on three distinct blocks (territorial development plans, articulation for education, and thematic approaches) has made it possible to identify common elements regarding the motivations of partnerships, the specific needs of the actors involved, and the priority drivers for stimulating development. Findings include discussion on the leading role of territories in their development paths, on the institutionalization and strengthening of capacities, and on long-term perspectives in development strategies.

Keywords: private social investment, public administration, territorial governance, territorial development

Procedia PDF Downloads 180
11793 Applicable Law to Intellectual and Industrial Property Agreements According to Turkish Private International Law and Rome I Regulation

Authors: Sema Cortoglu Koca

Abstract:

Intellectual and industrial property rules, have a substantial effect on the sustainable development. Intellectual and industrial property rights, as temporary privileges over the products of intellectual activity, determine the supervision of information and technology. The level and scope of intellectual property protection thus influence the flow of technology between developed and developing countries. In addition, intellectual and industrial property rights are based on the notion of balance. Since they are time-limited rights, they reconcile private and public benefits. That is, intellectual and industrial property rights respond to both private interests and public interests by rewarding innovators and by promoting the dissemination of ideas, respectively. Intellectual and industrial property rights can, therefore, be a tool for sustainable development. If countries can balance their private and public interests according to their particular context and circumstances, they can ensure the intellectual and industrial property which promotes innovation and technology transfer relevant for them. People, enterprises and countries who need technology, can transfer developed technology which is acquired by people, enterprises and countries so as to decrease their technological necessity and improve their technology. Because of the significance of intellectual and industrial property rights on the technology transfer law as mentioned above, this paper is confined to intellectual and industrial property agreements especially technology transfer contracts. These are license contract, know-how contract, franchise agreement, joint venture agreement, management agreement, research and development agreement. In Turkey, technology transfer law is still a developing subject. For developing countries, technology transfer regulations are very important for their private international law because these countries do not know which technology transfer law is applicable when conflicts arise. In most technology transfer contracts having international elements, the parties choose a law to govern their contracts. Where the parties do not choose a law, either expressly or impliedly, and matters which is not excluded in party autonomy, the court has to determine the applicable law to contracts in a matter of capacity, material, the formal and essential validity of contracts. For determining the proper law of technology transfer contracts, it is tried to build a rule for applying all technology transfer contracts. This paper is confined to the applicable law to intellectual and industrial property agreements according to ‘5718 Turkish Act on Private International Law and Civil Procedure’ and ‘Regulation (EC) No 593/2008 of the European Parliament and of the Council of 17 June 2008 on the law applicable to contractual obligations (Rome I)’. Like these complex contracts, to find a rule can be really difficult. We can arrange technology transfer contracts in groups, and we can determine the rule and connecting factors to these groups. For the contracts which are not included in these groups, we can determine a special rule considering the characteristics of the contract.

Keywords: intellectual and industrial property agreements, Rome I regulation, technology transfer, Turkish act on private international law and civil procedure

Procedia PDF Downloads 121
11792 Public-Private Partnership Transportation Projects: An Exploratory Study in the US

Authors: Medya Fathi

Abstract:

When public transportation projects were delivered through design-bid-build and later design-build, governments found a serious issue: inadequate funding. With population growth, governments began to develop new arrangements in which the private sectors were involved to cut the financial burden. This arrangement, known as Public-Private Partnership (PPP), has its own risks; however, performance outputs can motivate or discourage its use. On top of such output's list are time and budget, which can be affected by the type of project delivery methods. Project completion within or ahead of schedule as well as within or under budget is among any owner’s objectives. With a higher application of PPP in the highway industry in the US and insufficient PPP research, the current study addresses the schedule and cost performance of PPP highway projects and determines which one outperforms the other. To meet this objective, after collecting performance data of all PPP projects, schedule growth and cost growth are calculated, and finally, statistical analysis is conducted to evaluate the PPP performance. The results and conclusions will be provided. This study can assist practitioners in applying PPP for transportation projects by showing its ability to save time and/or cost.

Keywords: cost, delivery method, highway, public-private partnership, schedule, transportation

Procedia PDF Downloads 140
11791 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 44
11790 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 502
11789 Memory Consolidation: Application of Retrieval Strategies in the Classroom

Authors: Eric Tardif, Nicolas Meylan

Abstract:

Recent studies suggest that the consolidation of episodic memory is better achieved through repeated retrieval than with the use of concept mapping or repeated study. Although such laboratory results highly appeal to educationalists, it remains to be shown whether they can be directly used in a classroom setting. Forty-five college students (42 girls; mean age 16.1 y/o) were asked to remember pairs of biology-related words (e.g. mitochondria-energy) in two configurations. The first configuration consisted of a three-minute study of pairs of words followed by a final one-minute test in which the first word of a pair was shown and the subject asked to write down the second associated word. This procedure was repeated three times. The second configuration consisted of a one-minute study of a list of pairs of words, which was immediately followed by a one-minute test. This procedure was repeated 6 times. Subjects filled out a small questionnaire assessing their general mood, level of fatigue, stress and motivation to do the exercise. One week later, subjects were given a final test using the same words. A total of 8 lists of words were studied and tested during the semester. Results showed that subjects recalled more correct words when using the second configuration, both within the study period and one week later, confirming laboratory findings. However, the general performance (mean items recalled) as well as the motivation to do the exercise gradually decreased during the semester. Motivation was positively correlated with performance (r=0.77, p<0.05). The results suggest that laboratory findings may provide some applications in education but other variables inherent to the classroom setting must also be considered.

Keywords: long-term, episodic memory, consolidation, retrieval, school setting

Procedia PDF Downloads 312
11788 Private University Students’ Travel Mode Choice Behaviour to University: Analysis in the Context of Dhaka City

Authors: Sharmin Nasrin

Abstract:

Dhaka is the capital of Bangladesh. In Dhaka among other trips, significant percentages of trips comprise education trips. This paper explores significant factors for private university students’ education trip to the University. A paper pencil based survey has been conducted on Asia Pacific University student in Dhaka from May 2016 to July 2016. Participants were chosen randomly for the survey. Exploratory analysis showed that about 50% chose bus, 33% chose Rickshaw, 2% chose car and 15% chose to walk for travel to their University. Results from Multinomial Logit model revealed that travel cost, travel time and comfort are the significant factors for private university students to choose different modes. However, magnitude of coefficient of attribute comfort is significantly higher compared to travel cost and travel time. Result from this paper can be used by policymakers and Government agencies to provide more cost effective, comfortable journey to their University.

Keywords: private university student's education trip, mode choice mode, Dhaka, developing country

Procedia PDF Downloads 407
11787 Conflicts of Interest in the Private Sector and the Significance of the Public Interest Test

Authors: Opemiposi Adegbulu

Abstract:

Conflicts of interest is an elusive, diverse and engaging subject, a cross-cutting problem of governance; all levels of governance, ranging from local to global, public to corporate or financial sectors. In all these areas, its mismanagement could lead to the distortion of decision-making processes, corrosion of trust and the weakening of administration. According to Professor Peters, an expert in the area, conflict of interest, a problem at the root of many scandals has “become a pervasive ethical concern in our professional, organisational, and political life”. Conflicts of interest corrode trust, and like in the public sector, trust is mandatory for the market, consumers/clients, shareholders and other stakeholders in the private sector. However, conflicts of interest in the private sector are distinct and must be treated in like manner when regulatory efforts are made to address them. The research looks at identifying conflicts of interest in the private sector and differentiating them from those in the public sector. The public interest is submitted as a criterion which allows for such differentiation. This is significant because it would for the use of tailor-made or sector-specific approaches to addressing this complex issue. This is conducted through extensive review of literature and theories on the definition of conflicts of interest. This study will employ theoretical, doctrinal and comparative methods. The nature of conflicts of interest in the private sector will be explored, through an analysis of the public sector where the notion of conflicts of interest appears more clearly identified, reasons, why they are of business ethics concern, will be advanced, and then, once again, looking at public sector solutions and other solutions, the study will identify ways of mitigating and managing conflicts in the private sector. An exploration of public sector conflicts of interest and solutions will be carried out because the typologies of conflicts of interest in both sectors appear very similar at the core and thus, lessons can be learnt with regards to the management of these issues in the private sector. Conflicts of interest corrode trust, and like in the public sector, trust is mandatory for the market, consumers/clients, shareholders and other stakeholders in the private sector. This research will then focus on some specific challenges to understanding and identifying conflicts of interest in the private sector; origin, diverging theories, the psychological barrier to the definition, similarities with public sector conflicts of interest due to the notions of corrosion of trust, ‘being in a particular kind of situation,’ etc. The notion of public interest will be submitted as a key element at the heart of the distinction between public sector and private sector conflicts of interests. It will then be proposed that the appreciation of the notion of conflicts of interest differ according to sector, country to country, based on the public interest test, using the United Kingdom (UK), the United States of America (US), France and the Philippines as illustrations.

Keywords: conflicts of interest, corporate governance, global governance, public interest

Procedia PDF Downloads 361
11786 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 369
11785 The Study of the Quality of Dissertation in Humanities and Social Sciences between 2007-2013 in Thai Private Universities

Authors: Thanyasinee Laosum, Sirichai Kanjanawasee, Taweewat Pitayanon

Abstract:

The purpose of this study was to investigate the quality of dissertation in humanities and social sciences in Thai private universities.Seven hundred and fifty dissertations of students graduating between 2007-2013 from 12 private universities were randomly sampled. The 5-point rating scale for the evaluation of the dissertations was developed. The rubric method was used in scoring. The overall content validity of the scale was .92. The individual content validities of the scale were ranged from .71 to 1.00. The concurrent validities were significant at the .01 level with the value from .849 to .959. The inter-rater reliabilities were significant related at the .01 level with the value from .810 to .959. The test-retest method was used to find the reliabilities and significant related at the .01 level with the value from .944 to .966. The descriptive statistics was used in the analysis of the collected data. The study found that, among 750 dissertations, those that were rated as excellent, above average, average standard, below standard, and need to be improved were, 0.1 %, 13.3 %, 74.7 %, 11.7 %, and 0.1 % respectively. It was, therefore, concluded that the overall quality of the dissertations was in accordance with the principle of the research methodology and the quality of the majority of the dissertations is closely related.

Keywords: quality of dissertation, quality of dissertation in humanities and social sciences, private university, reliability

Procedia PDF Downloads 491
11784 Challenges and Opportunities for Implementing Integrated Project Delivery Method in Public Sector Construction

Authors: Ahsan Ahmed, Ming Lu, Syed Zaidi, Farhan Khan

Abstract:

The Integrated Project Delivery (IPD) method has been proposed as the solution to tackle complexity and fragmentation in the real world while addressing the construction industry’s growing needs for productivity and sustainability. Although the private sector has taken the initiative in implementing IPD and taken advantage of new technology such as building information modeling (BIM) in delivering projects, IPD remains less known and rarely used in public sector construction. The focus of this paper is set on the use of IPD in projects in public sector, which is potentially complemented by the use of analytical functionalities for workface planning and construction oriented design enabled by recent research advances in BIM. Experiences and lessons learned from implementing IPD in the private sector and in BIM-based construction automation research would play a vital role in reducing barriers and eliminating issues in connection with project delivery in the public sector. The paper elaborates issues challenges, contractual relationships and the interactions throughout the planning, design and construction phases in the context of implementing IPD on construction projects in the public sector. A slab construction case is used as a ‘sandbox’ model to elaborate (1) the ideal way of communication, integration, and collaboration among all the parties involved in project delivery in planning and (2) the execution of projects by using IDP principles and optimization, simulation analyses.

Keywords: integrated project delivery, IPD, building information modeling, BIM

Procedia PDF Downloads 154
11783 The Relation between Coping Strategies with Stress and Mental Health Situation in Flying Addicted Family of Self Introducer and Private

Authors: Farnoush Haghanipour

Abstract:

Recent research studies relation between coping strategies with stress and mental health situation in flying addicted family of self-introducer and private, Units of Guilan province. For this purpose 251 family (parent, spouse), that referred to private and self-introducer centers to break out of drug are selected in random sampling form. Research method was cross sectional-descriptive and purpose of research was fixing of between kinds of coping strategies with stress and mental health condition with attention to demographic variables. Therefore to collection of information, coping strategies questionnaire (CSQ) and mental health questionnaire (GHQ) was used and finally data analyzed by descriptive statistical methods (average, standard deviation) and inferential statistical correlation coefficient and regression. Study of correlation coefficient between mental healths with problem focused emotional focused and detachment strategies in level more than %99 is confirmed. Also mental health with avoidant focused hasn't correlation in other words relation is between mental health with problem focused strategies (r= 0/34) and emotional focused with mental health (r=0.52) and detachment with mental health (r= 0.18) in meaningful level 0.05. And also relation is between emotional focused strategies and mental health (r= 0.034) that is meaningless in Alpha 0.05. Also relation between problem processed coping strategies and mental health situation with attention to demographic variable is meaningful and relation level verified in confidence level more than 0.99. And result of anticipation equation regression statistical test has most a have in problem focused coping strategy, mental health, but relation of the avoidant emotional, detachment strategy with mental health was meaningless with attention to demographic variables.

Keywords: stress, coping strategy with stress, mental health, self introducer and private

Procedia PDF Downloads 286
11782 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348
11781 Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)

Authors: Hlamulo Makelane

Abstract:

The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII).

Keywords: water, R&D, investment, public sector, private sector

Procedia PDF Downloads 206
11780 Problems of the Management of Legal Entities of Private Law in Georgia

Authors: Ketevan Kokrashvili, Rusudan Kutateladze, Nino Pailodze

Abstract:

Importance of management of legal entities under private law of which especially corporate management, as well as looking for ways of its improvement and perfection has become especially relevant in the twenty-first century, which was greatly contributed to by the global economic crisis. Some states have adopted Corporate Governance Codes; the European Union has set to work on a series of directives the main purpose of which is an improvement of corporate governance, provision of greater transparency and implementation of an effective control mechanism. This process is not yet completed, and various problematic issues associated with management of legal persons are still being debated among practitioner experts and scholars. Georgia is not an exception in this regard. The article discusses the legislative gaps, and in some cases, discrepancies having arisen in legal relationships under private law and having caused many practical problems. This especially applies to the management of capital companies.

Keywords: business entities, corporate management, capital public management, existing problems, legal discrepancies

Procedia PDF Downloads 258
11779 Fundamental Study on Reconstruction of 3D Image Using Camera and Ultrasound

Authors: Takaaki Miyabe, Hideharu Takahashi, Hiroshige Kikura

Abstract:

The Government of Japan and Tokyo Electric Power Company Holdings, Incorporated (TEPCO) are struggling with the decommissioning of Fukushima Daiichi Nuclear Power Plants, especially fuel debris retrieval. In fuel debris retrieval, amount of fuel debris, location, characteristics, and distribution information are important. Recently, a survey was conducted using a robot with a small camera. Progress report in remote robot and camera research has speculated that fuel debris is present both at the bottom of the Pressure Containment Vessel (PCV) and inside the Reactor Pressure Vessel (RPV). The investigation found a 'tie plate' at the bottom of the containment, this is handles on the fuel rod. As a result, it is assumed that a hole large enough to allow the tie plate to fall is opened at the bottom of the reactor pressure vessel. Therefore, exploring the existence of holes that lead to inside the RCV is also an issue. Investigations of the lower part of the RPV are currently underway, but no investigations have been made inside or above the PCV. Therefore, a survey must be conducted for future fuel debris retrieval. The environment inside of the RPV cannot be imagined due to the effect of the melted fuel. To do this, we need a way to accurately check the internal situation. What we propose here is the adaptation of a technology called 'Structure from Motion' that reconstructs a 3D image from multiple photos taken by a single camera. The plan is to mount a monocular camera on the tip of long-arm robot, reach it to the upper part of the PCV, and to taking video. Now, we are making long-arm robot that has long-arm and used at high level radiation environment. However, the environment above the pressure vessel is not known exactly. Also, fog may be generated by the cooling water of fuel debris, and the radiation level in the environment may be high. Since camera alone cannot provide sufficient sensing in these environments, we will further propose using ultrasonic measurement technology in addition to cameras. Ultrasonic sensor can be resistant to environmental changes such as fog, and environments with high radiation dose. these systems can be used for a long time. The purpose is to develop a system adapted to the inside of the containment vessel by combining a camera and an ultrasound. Therefore, in this research, we performed a basic experiment on 3D image reconstruction using a camera and ultrasound. In this report, we select the good and bad condition of each sensing, and propose the reconstruction and detection method. The results revealed the strengths and weaknesses of each approach.

Keywords: camera, image processing, reconstruction, ultrasound

Procedia PDF Downloads 85