Search results for: private keys
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1869

Search results for: private keys

1869 Perfectly Keyless Commercial Vehicle

Authors: Shubha T., Latha H. K. E., Yogananth Karuppiah

Abstract:

Accessing and sharing automobiles will become much simpler thanks to the wide range of automotive use cases made possible by digital keys. This study aims to provide digital keys to car owners and drivers so they can lock or unlock their automobiles and start the engine using a smartphone or other Bluetooth low energy-enabled mobile device. Private automobile owners can digitally lend their car keys to family members or friends without having to physically meet them, possibly for a certain period of time. Owners of company automobile fleets can electronically distribute car keys to staff members, possibly granting access for a given day or length of time. Customers no longer need to physically pick up car keys at a rental desk because automobile owners can digitally transfer keys with them.

Keywords: NFC, BLE, CCC, digital key, OEM

Procedia PDF Downloads 129
1868 Keys of Success in Regional Entrepreneurial Media Collaboration Linked With a New Concept of Citizenship

Authors: Rianne Voet

Abstract:

This paper uses a literature review to search for keys of success for entrepreneurial regional media collaborations in the Netherlands and elsewhere. It specifies keys on general aspects: a digital-first strategy, innovation, a particular journalistic mission and a new role for the public. It outlines keys in practicalities: competencies, revenue model, legal structure, communication structure and organization structure. The paper elaborates on a new public function and a new concept of citizenship which, according to several authors in the literature, are required in order to be successful. Finally, it offers a model of keys for success in regional entrepreneurial media collaboration.

Keywords: media collaboration, factors of success, keys of success, regional media cooperation

Procedia PDF Downloads 249
1867 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 466
1866 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 268
1865 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 251
1864 Does Inflation Affect Private Investment in Nigeria?

Authors: Amassoma Ditimi, Nwosa Philip Ifeakachukwu

Abstract:

This study examined the impact of inflation on private investment in Nigeria for the period 1980 to 2012. Private investment was measured by foreign direct investment and private domestic investment. The study employed the Ordinary Least Square (OLS) technique. The empirical regression estimate showed that inflation had a positive but insignificant effect on private investment in Nigeria; implying that although an increase in inflation rate leads to a corresponding increase in private investment but however the effect was found to be insignificant. Thus, the study recommended that government should prevent high inflation rate that can negatively affect private investment in Nigeria and government should also put in place appropriate facilities that are investment enhancing in order to increase the level of both domestic and foreign private investment in Nigeria.

Keywords: inflation rate, private investment, OLS, Nigeria

Procedia PDF Downloads 353
1863 Advertising Incentives of National Brands against Private Labels

Authors: Lu Liao

Abstract:

This paper studies the impact of private labels on the advertising incentives of national brands. The worldwide expansion of private labels over the past two decades not only transformed the choice sets of consumers but also forced manufacturers of national brands to design new marketing strategies to maintain their market positions. This paper first develops a consumer demand model that incorporates spillover effects of advertising for antacids, including private labels and finds positive spillovers of national brands’ advertising on demand for private label antacids. With the demand estimates, it provides a simulation for the equilibrium prices and advertising levels for leading national brands in a counterfactual where private labels are eliminated to quantify national brands’ advertising incentives as a response to the rise of private labels.

Keywords: advertising, private label, marketing, demand

Procedia PDF Downloads 110
1862 Religion, Education, and Nation: Anticlerical Principle of France and Private School Law of South Korea

Authors: Minjeoung Kim

Abstract:

The education plays an important role of political socialization in politics. In Korean and in France, religion in education is situated in an important place, but religious education in school is dealt differently in two countries. In this article, the author tries to reveal the reason why in France private Catholic schools can keep their religious discipline, but in Korea, private Christian schools cannot insist Christianism to their students. This is because of the different situation of their budget. In Korea, even though private schools are named ‘private’, they cannot be managed without government subsidy but in France, private Catholic schools are owned by private foundation and their budget is based on their own resource. That’s why French private schools do not need to follow governmental guidance but not in Korean case.

Keywords: religion, politics, South Korea, France

Procedia PDF Downloads 171
1861 Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria

Authors: E. O. Fakoya, B. G. Abiona, J. O. Soetan

Abstract:

The study determined Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria. Data were collected from 80 respondents with a well-structured questionnaire. The result of the findings showed that there is need for private sector participation in extension services (=4.313), private extension services has facilities than public extension services (=4.97). Private sector participated in extension services by: giving of loans and credits to farmers (=4.50). Major constraints identified by the respondents were: Transportation problem (=2.88) and lack of fund (=2.77) A significant relationship (P<0.05) exists between factors affecting public extension services(r = 0.641, p = 0.00) and private sector participation in extension services. It was concluded from the study that there is need for private sector to participate in extension service in order to improve productivity of the farmers.

Keywords: agricultural extension, extension agent, private sector, perception

Procedia PDF Downloads 561
1860 Balancing Rule of Law, Human Rights and Governance

Authors: Torkan Jabbariraad

Abstract:

This study explores the role of private regulation as a mode of governance that engages non-state actors in establishing and implementing rules or standards for public goods or services. It examines the various forms, functions, and effects of private regulation on the rule of law and human rights and considers the role and duties of public authorities in monitoring and supporting private regulation. It contends that private regulation should be regarded as a beneficial supplement to public regulation rather than a substitute or rival and that public authorities should find a balance between acknowledging the independence and variety of private actors and securing their accountability and legitimacy. It also recommends that applying the principles and values of good governance to private regulation can improve its quality and efficiency. The study relies on various sources and viewpoints from the literature on governance theory, public law, and human rights and suggests further research and discussion on the topic of private regulation and its consequences for society.

Keywords: private regulation, public authority, governance theory, rule of law, human rights

Procedia PDF Downloads 27
1859 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 361
1858 Reculturing: The Key to Sustainability of Private Universities

Authors: Yu Sing Ong

Abstract:

This article explores the key issues and challenges facing private university leaders today. Universities are reculturing their operational processes, academic content and interactions with stakeholders. Many challenges centred around the need for university leaders to reculture the institutions and the redesigning of the teaching profession. It recommends a framework for university leaders to deal with the challenges they face. Only through reculturing, private universities can maintain the sustainability of its workforce and student population. The article has both theoretical and practical significance for private university leaders to follow.

Keywords: university leadership, reculturing, improvement, teacher education, motivation, private education

Procedia PDF Downloads 239
1857 Non-Cooperative Game Theory Approach for Ensuring Community Satisfaction on Public-Private Partnership Projects

Authors: Jason Salim, Zhouyang Lu

Abstract:

Private sector involvement in Public Private Partnership (PPP) projects may raise public suspicion, as PPP is often mistaken as merely a partnership between private and government agencies without consideration for greater “public” (community). This public marginalization is crucial to be dealt with because undermining opinion of majority may cause problems such as protests and/ or low demand. Game theory approach applied in this paper shows that probability of public acceptance towards a project is affected by overall public’s perception on Private sectors’ possible profit accumulation from the project. On the contrary, goodwill of the government and private coalition alone is not enough to minimize the probability of public opposition towards a PPP project. Additionally, the threat of loss or damage raised from public opposition does not affect the profit-maximization behavior of Private sectors.

Keywords: community satisfaction, game theory, non-cooperative, PPP, public policy

Procedia PDF Downloads 676
1856 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 233
1855 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 281
1854 Non-Linear Dynamic Analyses of Grouted Pile-Sleeve Connection

Authors: Mogens Saberi

Abstract:

The focus of this article is to present the experience gained from the design of a grouted pile-sleeve connection and to present simple design expressions which can be used in the preliminary design phase of such connections. The grout pile-sleeve connection serves as a connection between an offshore jacket foundation and pre-installed piles located in the seabed. The jacket foundation supports a wind turbine generator resulting in significant dynamic loads on the connection. The connection is designed with shear keys in order to optimize the overall design but little experience is currently available in the use of shear keys in such connections. It is found that the consequence of introducing shear keys in the design is a very complex stress distribution which requires special attention due to significant fatigue loads. An optimal geometrical shape of the shear keys is introduced in order to avoid large stress concentration factors and a relatively easy fabrication. The connection is analysed in ANSYS Mechanical where the grout is modelled by a non-linear material model which allows for cracking of the grout material and captures the elastic-plastic behaviour of the grout material. Special types of finite elements are used in the interface between the pile sleeve and the grout material to model the slip surface between the grout material and the steel. Based on the performed finite element modelling simple design expressions are introduced.

Keywords: fatigue design, non-linear finite element modelling, structural dynamics, simple design expressions

Procedia PDF Downloads 364
1853 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca

Authors: Asmaa Sokrat, Aykut Karaman

Abstract:

Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.

Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca

Procedia PDF Downloads 119
1852 Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement

Authors: Avdasheva Svetlanaa, Kryuchkova Polinab

Abstract:

Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not.

Keywords: public enforcement, private complaints, legal errors, competition protection, labor law, competition law, russia

Procedia PDF Downloads 473
1851 Penguins Search Optimization Algorithm for Chaotic Synchronization System

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.

Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization

Procedia PDF Downloads 179
1850 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 343
1849 Horizontal Dimension of Constitutional Social Rights

Authors: Monika Florczak-Wątor

Abstract:

The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularization of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them.

Keywords: social rights, private relations, horizontality, constitutional rights

Procedia PDF Downloads 310
1848 The Quality of Accounting Information of Private Companies in the Czech Republic

Authors: Kateřina Struhařová

Abstract:

The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.

Keywords: accounting information quality, financial statements, Czech Republic, private companies

Procedia PDF Downloads 285
1847 Trends of Public-Private Partnership Infrastructure in Thailand

Authors: Wasaporn Techapeeraparnich

Abstract:

Bringing private investor involving in providing public infrastructure have been increasingly used worldwide, and there is no exception for developing countries like Thailand. Recently, there is a huge investment opportunity for public-private partnership (PPP) in Thailand, especially in the transportation sector. This paper analyses the development of the PPP since the early beginning of PPP in different service sectors. It also summarizes the development of PPP and its application in terms of usage, opportunities and trends particularly in the transport sector. The results are aimed to draw some lessons learned for future development.

Keywords: case study, public-private partnership, transportation, Thailand

Procedia PDF Downloads 412
1846 Assessment of Student Attitudes to Higher Education Service Measures: The Development of a Framework for Private Higher Education Institutions in Malaysia

Authors: Farrah Anne Robert, Robert McClelland, Seng Kiat Kok

Abstract:

Higher education service quality is widely regarded as key factors in the long term success of a higher education institution in attracting and retaining students. This research attempted to establish the impact of service quality on recruiting and retaining students in private higher education institutions (PHEI’s). 501 local and international students responded to a 49 item educational service measure questionnaire from PHEIs in Kuala Lumpur and Selangor, two states in Malaysia which together account for 60% of private colleges in Malaysia. Results from this research revealed that, inter-alia, facilities, employability, management and administration services, academic staff competence, curriculum and student overall experiences were key driving factors in attracting and retaining students. Lack of “campus-like building” facilities and lecturer’s effectiveness in delivering lectures were keys concerns in the provision of service quality by PHEI’s in Malaysia. Over the last decade, the Government of Malaysia has set a target of recruiting 200,000 international students to study in Malaysia by PHEI’s and PHEI’s have failed to achieve this target. This research suggests that service quality issues identified above are impacting efforts to recruit and retain both local and international students by PHEIs. The researcher recommends that further and detailed research be carried on these factors and its impact on recruitment and retention. PHEI administrators can benefit from this research by conducting an evaluation of service measures delivered in their institutions and take corrective measures. Prospective students can benefit from this study by including in their choice factors the “service quality delivery” of PHEI’s when deciding to enroll in a particular PHEI.

Keywords: higher education, recruitment, retention, service quality

Procedia PDF Downloads 357
1845 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds

Authors: Sahar Sohrabi

Abstract:

The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.

Keywords: cloud computing, scheduling, real-time private cloud, bayesian

Procedia PDF Downloads 341
1844 Organization Development’s Role in Environmental, Social and Governance (ESG) Sustainability in the Private Organizations

Authors: Karmela Palma Samson

Abstract:

In recent years, there has been a growing interest in the implementation of Environmental, Social, and Governance (ESG) frameworks in private organizations. The COVID-19 pandemic and increasing global environmental concerns have further highlighted the importance of ESG practices in businesses. To be effective, the development and sustainability of ESG implementation require specific organizational functions. One such function is Organization Development (OD). This study aims to identify the roles of OD in the development, monitoring, and evaluation of ESG in private organizations. The role of OD in sustaining ESG implementation in private organizations was analyzed in this study. Qualitative research was conducted, which included interviews with OD practitioners to understand their role and challenges in maintaining ESG programs and initiatives. The study found that OD practitioners have low participation in managing ESG programs, initiatives, and indicators. However, the study also revealed that the OD function is crucial for the development, monitoring, and evaluation of ESG implementation in private organizations. In essence, the study highlights the importance of the OD function in ensuring the success of ESG implementation in private organizations. With their expertise in organizational development, OD practitioners can contribute significantly to the development, implementation, and evaluation of ESG initiatives. Therefore, private organizations should involve their OD departments in ESG implementation to ensure that they are sustainable, effective, and aligned with their organizational goals.

Keywords: ESG, organization development, private sector, sustainability

Procedia PDF Downloads 72
1843 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 348
1842 Differential Item Functioning in the Vocabulary Test of Grade 7 Students in Public and Private Schools

Authors: Dave Kenneth Tayao Cayado, Carlo P. Magno

Abstract:

The most common source of bias detected are those of gender and socioeconomic status. The present study investigated the Differential Item Functioning (DIF) or item bias between public and private school students in a vocabulary test. Studies on DIF were expanded by using the type of school as a source of bias. There were 200 participants in this study. 100 came from a public secondary school and 100 came from a private secondary school. The vocabulary skills of students were measured using a standardized vocabulary test for grade 7 students. Using DIF, specifically the Rasch-Welch approach, it was found that out of 24 items, 12 were biased for a specific group. The vocabulary skills on the use of slang, idiomatic expression, personification, collocations, and partitive relations were biased for private schools while the use of slang and homonymous words were biased for public school students. The analysis debunked the trend that private school students are outperforming public school students in terms of academic achievement. It was revealed that there are some competencies that private school students are having difficulty and vice versa.

Keywords: differential item functioning, item bias, public school students, private school students, vocabulary

Procedia PDF Downloads 167
1841 The Development of Private Housing Schemes to Address the Housing Problem: A Case Study of Islamabad

Authors: Zafar Iqbal Zafar, Abdul Waheed

Abstract:

The Capital Development Authority (CDA) Ordinance 1960 requires CDA to acquire land for the provision of housing in Islamabad. However, the pace of residential development was slow and the demand for housing was increasing rapidly. To resolve the growing housing problem, CDA involved the private sector in the development of housing schemes. Detailed bye-laws for regulation of private housing schemes were prepared and these bylaws were called “Modalities & Procedures”. This paper explains how the Modalities and Procedures of CDA have been successful in regulating the development of private housing schemes in Islamabad.

Keywords: housing schemes, master plan, development works, zoning regulations

Procedia PDF Downloads 179
1840 Legal and Contractual Framework for Private Experiments in Space

Authors: Linda Ana-Maria Ungureanu

Abstract:

As space exploration opens to new actors, we are faced with the interesting question of regulating more complex structures that enable private experiments. From intellectual property implications to private and public law, there is a multitude of factors and legal structures that need to be taken into consideration when opening space, and these structures need to be harmonized with the International Space Treaties governing space exploration. In this sense, this article presents an overview of the legal and contractual framework applicable to private experiments conducted in space and/or in relation to off-world environments. Additionally, the article analyses the manner in which national space agencies regulate agreements concluded with private actors and research institutions. Finally, the article sets a series of de lege ferenda proposals for the regulation of general research and development rules and intellectual property matters that are connected to experiments and research conducted in space and/or concerning off-world environments.

Keywords: private space, intellectual property, contracts, ESA guidelines, EU legislation, Intellectual property law, international IP treaties

Procedia PDF Downloads 79