Search results for: secret sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1123

Search results for: secret sharing

763 Therapeutic Touch from Primary Care to Tertiary Care in Health Services

Authors: Ayşegül Bilge, Hacer Demirkol, Merve Uğuryol

Abstract:

Therapeutic touch is one of the most important methods of complementary and alternative treatments. Therapeutic touch requires the sharing of universal energy. Therapeutic touch (TT) provides the interaction between the patient and the nurse. In addition, nurses can be aware of physical and mental symptoms of patients through therapeutic touch. Therapeutic touch (TT) is short-term provides the advantage for the nurse. For this reason, nurses have to be aware of the importance of therapeutic touch and they can use it from the primary care to tertiary care in nursing practices at in health field.

Keywords: health care services, complementary treatment, nursing, therapeutic touch

Procedia PDF Downloads 311
762 Effects of the Affordable Care Act On Preventive Care Disparities

Authors: Cagdas Agirdas

Abstract:

Background: The Affordable Care Act (ACA) requires non-grandfathered private insurance plans, starting with plan years on or after September 23rd, 2010, to provide certain preventive care services without any cost sharing in the form of deductibles, copayments or co-insurance. This requirement may affect racial and ethnic disparities in preventive care as it provides the largest copay reduction in preventive care. Objectives: We ask whether the ACA’s free preventive care benefits are associated with a reduction in racial and ethnic disparities in the utilization of four preventive services: cholesterol screenings, colonoscopies, mammograms, and pap smears. Methods: We use a data set of over 6,000 individuals from the 2009, 2010, and 2013 Medical Expenditure Panel Surveys (MEPS). We restrict our data set only to individuals who are old enough to be eligible for each preventive service. Our difference-in-differences logistic regression model classifies privately-insured Hispanics, African Americans, and Asians as the treatment groups and 2013 as the after-policy year. Our control group consists of non-Hispanic whites on Medicaid as this program already covered preventive care services for free or at a low cost before the ACA. Results: After controlling for income, education, marital status, preferred interview language, self-reported health status, employment, having a usual source of care, age and gender, we find that the ACA is associated with increases in the probability of the median, privately-insured Hispanic person to get a colonoscopy by 3.6% and a mammogram by 3.1%, compared to a non-Hispanic white person on Medicaid. Similarly, we find that the median, privately-insured African American person’s probability of receiving these two preventive services improved by 2.3% and 2.4% compared to a non-Hispanic white person on Medicaid. We do not find any significant improvements for any racial or ethnic group for cholesterol screenings or pap smears. Furthermore, our results do not indicate any significant changes for Asians compared to non-Hispanic whites in utilizing the four preventive services. These reductions in racial/ethnic disparities are robust to reconfigurations of time periods, previous diagnosis, and residential status. Conclusions: Early effects of the ACA’s provision of free preventive care are significant for Hispanics and African Americans. Further research is needed for the later years as more individuals became aware of these benefits.

Keywords: preventive care, Affordable Care Act, cost sharing, racial disparities

Procedia PDF Downloads 117
761 Teamwork of Teachers in Kindergarten and School Heads Implementing Focused Leadership

Authors: Vilma Zydziunaite, Simona Kersiene

Abstract:

The concept of focused leadership means that the leader gathers the entire community in various ways to communicate and cooperate with each other, to share their knowledge and responsibility, to get involved in problem-solving, to create a safe and trusting environment and to satisfy the needs and interests of each community member. The study's aim is to analyze the teamwork of teachers working in kindergartens and schools and its CEOs by implementing confused leadership. A mixed research design was used for the research study. Quantitative research used the teamwork test "Team-Puls" (2003). Data is processed by the IBM SPSS version 29.0 software package. Semi-structured interviews were used for data collection, and qualitative content analysis was applied for data analysis. The results of quantitative research show that there is no statistically significant difference between the evaluation averages of kindergarten and school teachers. Likewise, the effectiveness and evaluation of teacher teamwork in educational institutions depend on different characteristics and processes, such as the number of participating teachers, the involvement of the institution's administration or the stages of team formation. In the qualitative research, the components of the focused leadership categories applied by the kindergarten and school CEOs emerged. The categories reflect the components of shared leadership. In the study, the sharing of responsibilities and cooperation among teachers and the sharing of knowledge among themselves is distinguished. This shows that the action takes place between the teachers when they participate in the processes voluntarily, according to their wishes or for certain reasons. Distributed leadership components occurs when leadership responsibility is extended beyond the school CEO. The components of servant leadership are expressed when the CEO achieves organizational goals in the service of others. Servant leadership is helping and striving for others, creating a safe environment. The level of the educational institution does not affect working teachers in the evaluation of working in a team. Giving freedom to teachers, the role of the CEO is dividing responsibilities and creating cooperation between teachers as well as ensuring teachers' interests, needs, emotional well-being and professional development.

Keywords: teamwork, school, teacher, school CEO, school environment, mixed research, Team-Puls test, semi-structured interview, questioning survey, qualitative content analysis, focused leadership, teacher leadership

Procedia PDF Downloads 28
760 Using Multiple Strategies to Improve the Nursing Staff Edwards Lifesciences Hemodynamic Monitoring Correctness of Operation

Authors: Hsin-Yi Lo, Huang-Ju Jiun, Yu-Chiao Chu

Abstract:

Hemodynamic monitoring is an important in the intensive care unit. Advances in medical technology in recent years, more diversification of intensive care equipment, there are many kinds of instruments available for monitoring of hemodynamics, Edwards Lifesciences Hemodynamic Monitoring (FloTrac) is one of them. The recent medical safety incidents in parameters were changed, nurses have not to notify doctor in time, therefore, it is hoped to analyze the current problems and find effective improvement strategies. In August 2021, the survey found that only 74.0% of FloTrac correctness of operation, reasons include lack of education, the operation manual is difficulty read, lack of audit mechanism, nurse doesn't know those numerical changes need to notify doctor, work busy omission, unfamiliar with operation and have many nursing records then omissions. Improvement methods include planning professional nurse education, formulate the secret arts of FloTrac, enacting an audit mechanism, establish FloTrac action learning, make「follow the sun」care map, hold simulated training and establish monitoring data automatically upload nursing records. After improvement, FloTrac correctness of operation increased to 98.8%. The results are good, implement to the ICU of the hospital.

Keywords: hemodynamic monitoring, edwards lifesciences hemodynamic monitoring, multiple strategies, intensive care

Procedia PDF Downloads 49
759 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 146
758 Reverse Logistics Information Management Using Ontological Approach

Authors: F. Lhafiane, A. Elbyed, M. Bouchoum

Abstract:

Reverse Logistics (RL) Process is considered as complex and dynamic network that involves many stakeholders such as: suppliers, manufactures, warehouse, retails, and costumers, this complexity is inherent in such process due to lack of perfect knowledge or conflicting information. Ontologies, on the other hand, can be considered as an approach to overcome the problem of sharing knowledge and communication among the various reverse logistics partners. In this paper, we propose a semantic representation based on hybrid architecture for building the Ontologies in an ascendant way, this method facilitates the semantic reconciliation between the heterogeneous information systems (ICT) that support reverse logistics Processes and product data.

Keywords: Reverse Logistics, information management, heterogeneity, ontologies, semantic web

Procedia PDF Downloads 463
757 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia

Authors: Aspalella A. Rahman

Abstract:

It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.

Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering

Procedia PDF Downloads 392
756 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 184
755 The Gender Dialectic in Mothers and Daughters’ Relationships

Authors: Ronit Even Zahav

Abstract:

Objectives: Mother-daughter relationships are often portrayed as one of the most constitutive ties that shape women's identities throughout their lives. Yet, to the best of author’s knowledge, only few studies examine mother-daughter relationships in adulthood in the context of cross-cultural transition. Most of them focus on the mother-daughter relationship among one origin group. Hence, the existing knowledge about these relationships in adulthood, in the context of intercultural transition and encounters between different cultures, remain limited. Based on a critical feminist approach critical and cultural perspectives the current study focuses on a cross-cultural comparison of adult mother-daughter relationships among three groups of origin: Ethiopia, Russia, and Israel. The study aimed to: Explore the voices of women participating in a mother-daughter discourse in the context of gender and ethnicity; examine the differences in the mother-daughter relationship through number of factors (e.g. expectations of similarity and difference, perceptions of gender roles, gender identity, emotional closeness, sharing and stress) and finally, to develop a gender informed tool for understanding the gender dialectic in mother-daughter relationship in the context of cross cultural transitions. Method: 37 dyads of mothers and adult daughters participated in a qualitative study. A semi-structured interview was conducted that included questions about socio-demographic characteristics, language proficiency, social distance, closeness, emotional stress, and expectations of similarity and difference in mother-daughter relationships. Results: Analysis of the findings yielded three relationship patterns of gender dialectic and expectations of similarity and difference that characterize the groups of origin. Ethiopian mothers reported more sharing their daughters, fewer expectations of similarity, and felt more stress in the relationship compered to women from the two other origin groups. Conclusions: The study highlighted the impact of intercultural transition and social exclusion on mother-daughter relationships in adulthood in the context of the gender dialectic and women’s status in society. The presentation will explore the findings that were brought up by participants. The discussion will focus on the practices related to gender dialectic and intersecting inequalities regarding diverse groups and discuss gender development reducing inequalities and promoting empowerment to transform oppressive conditions.

Keywords: gender informed perspectives, gender dialectic, mother-daughter relationships, multiculturalism

Procedia PDF Downloads 34
754 Open Consent And Artificial Intelligence For Health Research in South Africa

Authors: Amy Gooden

Abstract:

Various modes of consent have been utilized in health research, but open consent has not been explored in South Africa’s AI research context. Open consent entails the sharing of data without assurances of privacy and may be seen as an attempt to marry open science with informed consent. Because all potential uses of data are unknown, it has been questioned whether consent can be informed. Instead of trying to adapt existing modes of consent, why not adopt a new perspective? This is what open consent proposes and what this research will explore in AI health research in South Africa.

Keywords: artificial intelligence, consent, health, law, research, South Africa

Procedia PDF Downloads 119
753 The Feasibility of Online, Interactive Workshops to Facilitate Anatomy Education during the UK COVID-19 Lockdowns

Authors: Prabhvir Singh Marway, Kai Lok Chan, Maria-Ruxandra Jinga, Rachel Bok Ying Lee, Matthew Bok Kit Lee, Krishan Nandapalan, Sze Yi Beh, Harry Carr, Christopher Kui

Abstract:

We piloted a structured series of online workshops on the 3D segmentation of anatomical structures from CT scans. 33 participants were recruited from four UK universities for two-day workshops between 2020 and 2021. Open-source software (3D-Slicer) was used. We hypothesized that active participation via real-time screen-sharing and voice-communication via Discord would enable improved engagement and learning, despite national lockdowns. Written feedback indicated positive learning experiences, with subjective measures of anatomical understanding and software confidence improving.

Keywords: medical education, workshop, segmentation, anatomy

Procedia PDF Downloads 158
752 Knowledge Management Barriers: A Statistical Study of Hardware Development Engineering Teams within Restricted Environments

Authors: Nicholas S. Norbert Jr., John E. Bischoff, Christopher J. Willy

Abstract:

Knowledge Management (KM) is globally recognized as a crucial element in securing competitive advantage through building and maintaining organizational memory, codifying and protecting intellectual capital and business intelligence, and providing mechanisms for collaboration and innovation. KM frameworks and approaches have been developed and defined identifying critical success factors for conducting KM within numerous industries ranging from scientific to business, and for ranges of organization scales from small groups to large enterprises. However, engineering and technical teams operating within restricted environments are subject to unique barriers and KM challenges which cannot be directly treated using the approaches and tools prescribed for other industries. This research identifies barriers in conducting KM within Hardware Development Engineering (HDE) teams and statistically compares significance to barriers upholding the four KM pillars of organization, technology, leadership, and learning for HDE teams. HDE teams suffer from restrictions in knowledge sharing (KS) due to classification of information (national security risks), customer proprietary restrictions (non-disclosure agreement execution for designs), types of knowledge, complexity of knowledge to be shared, and knowledge seeker expertise. As KM evolved leveraging information technology (IT) and web-based tools and approaches from Web 1.0 to Enterprise 2.0, KM may also seek to leverage emergent tools and analytics including expert locators and hybrid recommender systems to enable KS across barriers of the technical teams. The research will test hypothesis statistically evaluating if KM barriers for HDE teams affect the general set of expected benefits of a KM System identified through previous research. If correlations may be identified, then generalizations of success factors and approaches may also be garnered for HDE teams. Expert elicitation will be conducted using a questionnaire hosted on the internet and delivered to a panel of experts including engineering managers, principal and lead engineers, senior systems engineers, and knowledge management experts. The feedback to the questionnaire will be processed using analysis of variance (ANOVA) to identify and rank statistically significant barriers of HDE teams within the four KM pillars. Subsequently, KM approaches will be recommended for upholding the KM pillars within restricted environments of HDE teams.

Keywords: engineering management, knowledge barriers, knowledge management, knowledge sharing

Procedia PDF Downloads 242
751 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 102
750 Perfectly Keyless Commercial Vehicle

Authors: Shubha T., Latha H. K. E., Yogananth Karuppiah

Abstract:

Accessing and sharing automobiles will become much simpler thanks to the wide range of automotive use cases made possible by digital keys. This study aims to provide digital keys to car owners and drivers so they can lock or unlock their automobiles and start the engine using a smartphone or other Bluetooth low energy-enabled mobile device. Private automobile owners can digitally lend their car keys to family members or friends without having to physically meet them, possibly for a certain period of time. Owners of company automobile fleets can electronically distribute car keys to staff members, possibly granting access for a given day or length of time. Customers no longer need to physically pick up car keys at a rental desk because automobile owners can digitally transfer keys with them.

Keywords: NFC, BLE, CCC, digital key, OEM

Procedia PDF Downloads 119
749 Integration of “FAIR” Data Principles in Longitudinal Mental Health Research in Africa: Lessons from a Landscape Analysis

Authors: Bylhah Mugotitsa, Jim Todd, Agnes Kiragga, Jay Greenfield, Evans Omondi, Lukoye Atwoli, Reinpeter Momanyi

Abstract:

The INSPIRE network aims to build an open, ethical, sustainable, and FAIR (Findable, Accessible, Interoperable, Reusable) data science platform, particularly for longitudinal mental health (MH) data. While studies have been done at the clinical and population level, there still exists limitations in data and research in LMICs, which pose a risk of underrepresentation of mental disorders. It is vital to examine the existing longitudinal MH data, focusing on how FAIR datasets are. This landscape analysis aimed to provide both overall level of evidence of availability of longitudinal datasets and degree of consistency in longitudinal studies conducted. Utilizing prompters proved instrumental in streamlining the analysis process, facilitating access, crafting code snippets, categorization, and analysis of extensive data repositories related to depression, anxiety, and psychosis in Africa. While leveraging artificial intelligence (AI), we filtered through over 18,000 scientific papers spanning from 1970 to 2023. This AI-driven approach enabled the identification of 228 longitudinal research papers meeting inclusion criteria. Quality assurance revealed 10% incorrectly identified articles and 2 duplicates, underscoring the prevalence of longitudinal MH research in South Africa, focusing on depression. From the analysis, evaluating data and metadata adherence to FAIR principles remains crucial for enhancing accessibility and quality of MH research in Africa. While AI has the potential to enhance research processes, challenges such as privacy concerns and data security risks must be addressed. Ethical and equity considerations in data sharing and reuse are also vital. There’s need for collaborative efforts across disciplinary and national boundaries to improve the Findability and Accessibility of data. Current efforts should also focus on creating integrated data resources and tools to improve Interoperability and Reusability of MH data. Practical steps for researchers include careful study planning, data preservation, machine-actionable metadata, and promoting data reuse to advance science and improve equity. Metrics and recognition should be established to incentivize adherence to FAIR principles in MH research

Keywords: longitudinal mental health research, data sharing, fair data principles, Africa, landscape analysis

Procedia PDF Downloads 20
748 Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations

Authors: Marisa Galiza Filipe

Abstract:

In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war.

Keywords: espionage, Azores, WWI, neutrality

Procedia PDF Downloads 18
747 General Framework for Price Regulation of Container Terminals

Authors: Murat Yildiz, Burcu Yildiz

Abstract:

Price Cap Regulation is a form of economic regulation designed in the 1980s in the United Kingdom. Price cap regulation sets a cap on the price that the utility provider can charge. The cap is set according to several economic factors, such as the price cap index, expected efficiency savings and inflation. It has been used by several countries as a regulatory regime in several sectors. Container port privatization is still in early stages in some countries. Lack of a general framework can be an impediment to privatization. This paper aims a general framework to comprising decisions to be made for variables which are able to accommodate the variety of container terminals. Several approaches that may be needed as well as a passage between approaches.

Keywords: Price Cap Regulation, ports privatization, container terminal price regime, earning sharing

Procedia PDF Downloads 322
746 Impacts of COVID-19 on Communal Based Natural Resources Management in Newtown, Bekezela Village, Eastern Cape, South Africa

Authors: James Donald Nyamahono, Kelvin Tinashe Pikirai

Abstract:

Communal based natural resource management (CBNRM) is regarded as one of the most significant methods for sustainable natural resource conservation. This is due to the fact that it entails the engagement of local communities as well as the use of indigenous knowledge and customary conservation. The emergence of COVID-19 had a devastating impact on this sector since it has resulted in the disbandment of all collective activities, such as group gatherings, including those with a good cause. This is supported by research, which demonstrates that throughout the era of full lockdowns, the coordination of diverse activities and the sustainability of various working groups were severely harmed. This study was undertaken in the CBNRM niche to examine how COVID-19 affected this sector. Data were gathered through focus group discussions with youths, women, and the elderly active in CBNRM in Newtown, Bekezela Village, Eastern Cape. The study concluded that the sustainability of indigenous knowledge in natural resource management was endangered due to the restricted movements and community participation in developmental initiatives. The study also revealed a 'environment-community divide,' since COVID-19 hindered local communities from holding their regular conservation meetings. The research, on the other hand, discovered that there were 'secret' gatherings in which local communities attempted to adopt Afrocentric ways in which the available natural resources would provide a remedy for COVID-19.

Keywords: CBNRM, COVID-19, indigenous knowledge, South Africa

Procedia PDF Downloads 69
745 Unleashing the Potential of Green Finance in Architecture: A Promising Path for Balkan Countries

Authors: Luan Vardari, Dena Arapi Vardari

Abstract:

The Balkan countries, known for their diverse landscapes and cultural heritage, face the dual challenge of promoting economic growth while addressing pressing environmental concerns. In recent years, the concept of green finance has emerged as a powerful tool to achieve sustainable development and mitigate the environmental impact of various sectors, including architecture. This extended abstract explores the untapped potential of green finance in architecture within the Balkan region and highlights its role in driving sustainable construction practices and fostering a greener future. The abstract begins by defining green finance and emphasizing its relevance in the context of the architectural sector in Balkan countries. It underlines the benefits of green finance, such as economic growth, environmental conservation, and social well-being. Integrating green finance into architectural projects is important as a means to achieve sustainable development goals while promoting financial viability. Also, delves into the current state of green building practices in the Balkan countries and identifies the need for financial support to further drive adoption. It explores the existing regulatory frameworks and policies that promote sustainable architecture and discusses how green finance can complement these initiatives. Unique challenges faced by Balkan countries are highlighted, along with the potential opportunities that green finance presents in overcoming these challenges. We highlight successful sustainable architectural projects in the region to showcase the practical application of green finance in the Balkans. These projects exemplify the effective utilization of green finance mechanisms, resulting in tangible economic and environmental impacts, including job creation, energy efficiency, and reduced carbon emissions. The abstract concludes by identifying replicable models and lessons learned from these projects that can serve as a blueprint for future sustainable architecture initiatives in the Balkans. The importance of collaboration and knowledge sharing among stakeholders is emphasized. Engaging architects, financial institutions, governments, and local communities is crucial to promoting green finance in architecture. The abstract suggests the establishment of knowledge exchange platforms and regional/international networks to foster collaboration and facilitate the sharing of expertise among Balkan countries.

Keywords: sustainable finance, renewable energy, Balkan region, investment opportunities, green infrastructure, ESG criteria, architecture

Procedia PDF Downloads 23
744 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 116
743 Settlement Network Supplying Energy

Authors: Balázs Kulcsár

Abstract:

Few people now doubt the future of the global energy transition. The only question is whether the pace of renewables' penetration will be sufficient to compete with the rate of warming. Dynamic changes are also taking place in the Hungarian electricity system. In addition to nuclear power, which provides the basic electricity supply, the most dynamic is solar power, which is largely small-scale and residential. The emergence of solar power is outlining the emergence of energy production and supply fabric of municipalities. This creates the potential for over-producing municipalities to supply the electricity needs of neighboring settlements with lower production beyond renewables. By taking advantage of this energy sharing, electricity supply based on pure renewables can be achieved more quickly.

Keywords: renewable energy, energy geography, self-sufficiency, energy transition

Procedia PDF Downloads 144
742 Countering the Bullwhip Effect by Absorbing It Downstream in the Supply Chain

Authors: Geng Cui, Naoto Imura, Katsuhiro Nishinari, Takahiro Ezaki

Abstract:

The bullwhip effect, which refers to the amplification of demand variance as one moves up the supply chain, has been observed in various industries and extensively studied through analytic approaches. Existing methods to mitigate the bullwhip effect, such as decentralized demand information, vendor-managed inventory, and the Collaborative Planning, Forecasting, and Replenishment System, rely on the willingness and ability of supply chain participants to share their information. However, in practice, information sharing is often difficult to realize due to privacy concerns. The purpose of this study is to explore new ways to mitigate the bullwhip effect without the need for information sharing. This paper proposes a 'bullwhip absorption strategy' (BAS) to alleviate the bullwhip effect by absorbing it downstream in the supply chain. To achieve this, a two-stage supply chain system was employed, consisting of a single retailer and a single manufacturer. In each time period, the retailer receives an order generated according to an autoregressive process. Upon receiving the order, the retailer depletes the ordered amount, forecasts future demand based on past records, and places an order with the manufacturer using the order-up-to replenishment policy. The manufacturer follows a similar process. In essence, the mechanism of the model is similar to that of the beer game. The BAS is implemented at the retailer's level to counteract the bullwhip effect. This strategy requires the retailer to reduce the uncertainty in its orders, thereby absorbing the bullwhip effect downstream in the supply chain. The advantage of the BAS is that upstream participants can benefit from a reduced bullwhip effect. Although the retailer may incur additional costs, if the gain in the upstream segment can compensate for the retailer's loss, the entire supply chain will be better off. Two indicators, order variance and inventory variance, were used to quantify the bullwhip effect in relation to the strength of absorption. It was found that implementing the BAS at the retailer's level results in a reduction in both the retailer's and the manufacturer's order variances. However, when examining the impact on inventory variances, a trade-off relationship was observed. The manufacturer's inventory variance monotonically decreases with an increase in absorption strength, while the retailer's inventory variance does not always decrease as the absorption strength grows. This is especially true when the autoregression coefficient has a high value, causing the retailer's inventory variance to become a monotonically increasing function of the absorption strength. Finally, numerical simulations were conducted for verification, and the results were consistent with our theoretical analysis.

Keywords: bullwhip effect, supply chain management, inventory management, demand forecasting, order-to-up policy

Procedia PDF Downloads 42
741 Promoting 'One Health' Surveillance and Response Approach Implementation Capabilities against Emerging Threats and Epidemics Crisis Impact in African Countries

Authors: Ernest Tambo, Ghislaine Madjou, Jeanne Y. Ngogang, Shenglan Tang, Zhou XiaoNong

Abstract:

Implementing national to community-based 'One Health' surveillance approach for human, animal and environmental consequences mitigation offers great opportunities and value-added in sustainable development and wellbeing. 'One Health' surveillance approach global partnerships, policy commitment and financial investment are much needed in addressing the evolving threats and epidemics crises mitigation in African countries. The paper provides insights onto how China-Africa health development cooperation in promoting “One Health” surveillance approach in response advocacy and mitigation. China-Africa health development initiatives provide new prospects in guiding and moving forward appropriate and evidence-based advocacy and mitigation management approaches and strategies in attaining Universal Health Coverage (UHC) and Sustainable Development Goals (SDGs). Early and continuous quality and timely surveillance data collection and coordinated information sharing practices in malaria and other diseases are demonstrated in Comoros, Zanzibar, Ghana and Cameroon. Improvements of variety of access to contextual sources and network of data sharing platforms are needed in guiding evidence-based and tailored detection and response to unusual hazardous events. Moreover, understanding threats and diseases trends, frontline or point of care response delivery is crucial to promote integrated and sustainable targeted local, national “One Health” surveillance and response approach needs implementation. Importantly, operational guidelines are vital in increasing coherent financing and national workforce capacity development mechanisms. Strengthening participatory partnerships, collaboration and monitoring strategies in achieving global health agenda effectiveness in Africa. At the same enhancing surveillance data information streams reporting and dissemination usefulness in informing policies decisions, health systems programming and financial mobilization and prioritized allocation pre, during and post threats and epidemics crises programs strengths and weaknesses. Thus, capitalizing on “One Health” surveillance and response approach advocacy and mitigation implementation is timely in consolidating Africa Union 2063 agenda and Africa renaissance capabilities and expectations.

Keywords: Africa, one health approach, surveillance, response

Procedia PDF Downloads 396
740 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management

Authors: Mehrnoosh Askarizadeh

Abstract:

To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.

Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle

Procedia PDF Downloads 448
739 Application of Quality Function Deployment Approach to Industrial Engineering Department of Gaziantep University

Authors: Eren Özceylan, Cihan Çetinkaya

Abstract:

Quality function deployment (QFD) is a technique to assist transform the voice of the customer into engineering characteristics for a product/service. With the difference of existing studies, QFD is applied to an educational area that is a service sector which is not a manufacturing firm. The objective of the study is to design the undergraduate program according to students’ desire and expectations. To do so, third and fourth year students of industrial engineering department of Gaziantep University are considered as customers. Some suggestions about lecturers, courses, exams and facility for how to satisfy students’ demands are presented and as a result, sharing the materials of courses is the most important requirement among others.

Keywords: higher education, quality function deployment, quality house, voice of customer

Procedia PDF Downloads 404
738 Programmed Cell Death in Datura and Defensive Plant Response toward Tomato Mosaic Virus

Authors: Asma Alhuqail, Nagwa Aref

Abstract:

Programmed cell death resembles a real nature active defense in Datura metel against TMV after three days of virus infection. Physiological plant response was assessed for asymptomatic healthy and symptomatic infected detached leaves. The results indicated H2O2 and Chlorophyll-a as the most potential parameters. Chlorophyll-a was considered the only significant predictor variant for the H2O2 dependent variant with a P value of 0.001 and R-square of 0.900. The plant immune response was measured within three days of virus infection using the cutoff value of H2O2 (61.095 lmol/100 mg) and (63.201 units) for the tail moment in the Comet Assay. Their percentage changes were 255.12% and 522.40% respectively which reflects the stress of virus infection in the plant. Moreover, H2O2 showed 100% specificity and sensitivity in the symptomatic infected group using the receiver-operating characteristic (ROC). All tested parameters in the symptomatic infected group had significant correlations with twenty-five positive and thirty-one negative correlations where the P value was <0.05 and 0.01. Chlorophyll-a parameter had a crucial role of highly significant correlation between total protein and salicylic acid. Contrarily, this correlation with tail moment unit was (r = _0.930, P <0.01) where the P value was < 0.01. The strongest significant negative correlation was between Chlorophyll-a and H2O2 at P < 0.01, while moderate negative significant correlation was seen for Chlorophyll-b where the P value < 0.05. The present study discloses the secret of the three days of rapid transient production of activated oxygen species (AOS) that was enough for having potential quantitative physiological parameters for defensive plant response toward the virus.

Keywords: programmed cell death, plant–adaptive immune response, hydrogen peroxide (H2O2), physiological parameters

Procedia PDF Downloads 217
737 Measuring Systems Interoperability: A Focal Point for Standardized Assessment of Regional Disaster Resilience

Authors: Joel Thomas, Alexa Squirini

Abstract:

The key argument of this research is that every element of systems interoperability is an enabler of regional disaster resilience, and arguably should become a focal point for standardized measurement of communities’ ability to work together. Few resilience research efforts have focused on the development and application of solutions that measurably improve communities’ ability to work together at a regional level, yet a majority of the most devastating and disruptive disasters are those that have had a regional impact. The key findings of the research include a unique theoretical, mathematical, and operational approach to tangibly and defensibly measure and assess systems interoperability required to support crisis information management activities performed by governments, the private sector, and humanitarian organizations. A most effective way for communities to measurably improve regional disaster resilience is through deliberately executed disaster preparedness activities. Developing interoperable crisis information management capabilities is a crosscutting preparedness activity that greatly affects a community’s readiness and ability to work together in times of crisis. Thus, improving communities’ human and technical posture to work together in advance of a crisis, with the ultimate goal of enabling information sharing to support coordination and the careful management of available resources, is a primary means by which communities may improve regional disaster resilience. This model describes how systems interoperability can be qualitatively and quantitatively assessed when characterized as five forms of capital: governance; standard operating procedures; technology; training and exercises; and usage. The unique measurement framework presented defines the relationships between systems interoperability, information sharing and safeguarding, operational coordination, community preparedness and regional disaster resilience, and offers a means by which to implement real-world solutions and measure progress over the course of a multi-year program. The model is being developed and piloted in partnership with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the North Atlantic Treaty Organization (NATO) Advanced Regional Civil Emergency Coordination Pilot (ARCECP) with twenty-three organizations in Bosnia and Herzegovina, Croatia, Macedonia, and Montenegro. The intended effect of the model implementation is to enable communities to answer two key questions: 'Have we measurably improved crisis information management capabilities as a result of this effort?' and, 'As a result, are we more resilient?'

Keywords: disaster, interoperability, measurement, resilience

Procedia PDF Downloads 114
736 Examining the Role of Farmer-Centered Participatory Action Learning in Building Sustainable Communities in Rural Haiti

Authors: Charles St. Geste, Michael Neumann, Catherine Twohig

Abstract:

Our primary aim is to examine farmer-centered participatory action learning as a tool to improve agricultural production, build resilience to climate shocks and, more broadly, advance community-driven solutions for sustainable development in rural communities across Haiti. For over six years, sixty plus farmers from Deslandes, Haiti, organized in three traditional work groups called konbits, have designed and tested low-input agroecology techniques as part of the Konbit Vanyan Kapab Pwoje Agroekoloji. The project utilizes a participatory action learning approach, emphasizing social inclusion, building on local knowledge, experiential learning, active farmer participation in trial design and evaluation, and cross-community sharing. Mixed methods were used to evaluate changes in knowledge and adoption of agroecology techniques, confidence in advancing agroecology locally, and innovation among Konbit Vanyan Kapab farmers. While skill and knowledge in application of agroecology techniques varied among individual farmers, a majority of farmers successfully adopted techniques outside of the trial farms. The use of agroecology techniques on trial and individual farms has doubled crop production in many cases. Farm income has also increased, and farmers report less damage to crops and property caused by extreme weather events. Furthermore, participatory action strategies have led to greater local self-determination and greater capacity for sustainable community development. With increased self-confidence and the knowledge and skills acquired from participating in the project, farmers prioritized sharing their successful techniques with other farmers and have developed a farmer-to-farmer training program that incorporates participatory action learning. Using adult education methods, farmers, trained as agroecology educators, are currently providing training in sustainable farming practices to farmers from five villages in three departments across Haiti. Konbit Vanyan Kapab farmers have also begun testing production of value-added food products, including a dried soup mix and tea. Key factors for success include: opportunities for farmers to actively participate in all phases of the project, group diversity, resources for application of agroecology techniques, focus on group processes and overcoming local barriers to inclusive decision-making.

Keywords: agroecology, participatory action learning, rural Haiti, sustainable community development

Procedia PDF Downloads 114
735 An Effective Approach to Knowledge Capture in Whole Life Costing in Constructions Project

Authors: Ndibarafinia Young Tobin, Simon Burnett

Abstract:

In spite of the benefits of implementing whole life costing technique as a valuable approach for comparing alternative building designs allowing operational cost benefits to be evaluated against any initial cost increases and also as part of procurement in the construction industry, its adoption has been relatively slow due to the lack of tangible evidence, ‘know-how’ skills and knowledge of the practice, i.e. the lack of professionals in many establishments with knowledge and training on the use of whole life costing technique, this situation is compounded by the absence of available data on whole life costing from relevant projects, lack of data collection mechanisms and so on. This has proved to be very challenging to those who showed some willingness to employ the technique in a construction project. The knowledge generated from a project can be considered as best practices learned on how to carry out tasks in a more efficient way, or some negative lessons learned which have led to losses and slowed down the progress of the project and performance. Knowledge management in whole life costing practice can enhance whole life costing analysis execution in a construction project, as lessons learned from one project can be carried on to future projects, resulting in continuous improvement, providing knowledge that can be used in the operation and maintenance phases of an assets life span. Purpose: The purpose of this paper is to report an effective approach which can be utilised in capturing knowledge in whole life costing practice in a construction project. Design/methodology/approach: An extensive literature review was first conducted on the concept of knowledge management and whole life costing. This was followed by a semi-structured interview to explore the existing and good practice knowledge management in whole life costing practice in a construction project. The data gathered from the semi-structured interview was analyzed using content analysis and used to structure an effective knowledge capturing approach. Findings: From the results obtained in the study, it shows that the practice of project review is the common method used in the capturing of knowledge and should be undertaken in an organized and accurate manner, and results should be presented in the form of instructions or in a checklist format, forming short and precise insights. The approach developed advised that irrespective of how effective the approach to knowledge capture, the absence of an environment for sharing knowledge, would render the approach ineffective. Open culture and resources are critical for providing a knowledge sharing setting, and leadership has to sustain whole life costing knowledge capture, giving full support for its implementation. The knowledge capturing approach has been evaluated by practitioners who are experts in the area of whole life costing practice. The results have indicated that the approach to knowledge capture is suitable and efficient.

Keywords: whole life costing, knowledge capture, project review, construction industry, knowledge management

Procedia PDF Downloads 234
734 Research on Perceptual Features of Couchsurfers on New Hospitality Tourism Platform Couchsurfing

Authors: Yuanxiang Miao

Abstract:

This paper aims to examine the perceptual features of couchsurfers on a new hospitality tourism platform, the free homestay website couchsurfing. As a local host, the author has accepted 61 couchsurfers in Kyoto, Japan, and attempted to figure out couchsurfers' characteristics on perception by hosting them. Moreover, the methodology of this research is mainly based on in-depth interviews, by talking with couchsurfers, observing their behaviors, doing questionnaires, etc. Five dominant perceptual features of couchsurfers were identified: (1) Trusting; (2) Meeting; (3) Sharing; (4) Reciprocity; (5) Worries. The value of this research lies in figuring out a deeper understanding of the perceptual features of couchsurfers, and the author indeed hosted and stayed with 61 couchsurfers from 30 countries and areas over one year. Lastly, the author offers practical suggestions for future research.

Keywords: couchsurfing, depth interview, hospitality tourism, perceptual features

Procedia PDF Downloads 117