Search results for: secret sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1123

Search results for: secret sharing

883 Smartphone Photography in Urban China

Authors: Wen Zhang

Abstract:

The smartphone plays a significant role in media convergence, and smartphone photography is reconstructing the way we communicate and think. This article aims to explore the smartphone photography practices of urban Chinese smartphone users and images produced by smartphones from a techno-cultural perspective. The analysis consists of two types of data: One is a semi-structured interview of 21 participants, and the other consists of the images created by the participants. The findings are organised in two parts. The first part summarises the current tendencies of capturing, editing, sharing and archiving digital images via smartphones. The second part shows that food and selfie/anti-selfie are the preferred subjects of smartphone photographic images from a technical and multi-purpose perspective and demonstrates that screenshots and image texts are new genres of non-photographic images that are frequently made by smartphones, which contributes to improving operational efficiency, disseminating information and sharing knowledge. The analyses illustrate the positive impacts between smartphones and photography enthusiasm and practices based on the diffusion of innovation theory, which also makes us rethink the value of photographs and the practice of ‘photographic seeing’ from the screen itself.

Keywords: digital photography, image-text, media convergence, photographic- seeing, selfie/anti-selfie, smartphone, technological innovation

Procedia PDF Downloads 323
882 The Effects of Relationship Banking on the Financial Performance of SMEs in Kenya

Authors: Abraham Rotich

Abstract:

The purpose of this study was to determine the effects of relationship banking on the financial performance of SMEs. The paper attempted to establish the link between the constructs of relationship banking and SME performance. The study was guided by relationship lending, relationship monitoring, relationship risk sharing and bundle of products as independent variables while financial performance will be the dependent variable. The study used a quasi experimental design with population being the 620 SMEs who have a relationship banking arrangement with banks in Nairobi. The study used stratified sampling to pick a sample of 235. The population of interest will be the CEOs of the respective companies. The basis of stratification is the sectors in which the SMEs operate in. The study will use a questionnaire to collect data. The questionnaire will have both open and close ended questions. A pilot study will be conducted to test reliability and validity of questionnaire. The data was analyzed using descriptive statistics. Regression analysis was employed to test if there is a relationship between the dependent and the independent variable. The study found evidence that relationship banking positively impacts on financial performance of SMEs. Specifically, the study established that each component of relationship banking in this study i.e relationship lending, monitoring, bundle of products and risk sharing positively affects financial performance.

Keywords: relationship banking, SMEs, financial performance, entrepreneurial orientation

Procedia PDF Downloads 279
881 The Influence of Language on Music Consumption in Japan: An Experimental Study

Authors: Timur Zhukov, Yuko Yamashita

Abstract:

Music as a product of hedonic consumption has been researched at least since the early 20th century, but little light has been shed on how language affects its consumption process. At the intersection of music consumption, language impact, and consumer behavior, this research explores the influence of language on music consumption in Japan. Its aim is to clarify how listening to music in different languages affects the listener’s purchase intention and sharing intention by conducting a survey where respondents listen to three versions of the same song in different languages in random order. It uses an existing framework that views the flow of music consumption as a combination of responses (emotional response, sensory response, imaginal response, analytical responses) affecting the experiential response, which then affects the overall affective response, followed by the need to reexperience and lastly the purchase intention. In this research, the sharing intention has been added to the model to better fit the modern consumption model (e.g., AISAS). This research shows how positive and negative emotions and imaginal and analytical responses change depending on the language and what impact it has on consumer behavior. It concludes by proposing how modern music businesses can learn from the language differences and cater to the needs of the audiences who speak different languages.

Keywords: AISAS, consumer behavior, first language, music consumption, second language

Procedia PDF Downloads 105
880 Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility

Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad

Abstract:

File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.

Keywords: wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD Protocol, DHT

Procedia PDF Downloads 442
879 Factors Influencing an Implementation of Financial Participation Programmes in Polish Companies - Some Relationships

Authors: Maciej Kozlowski, Agnieszka Piotrowska-Piatek

Abstract:

Purpose: This article analyses the most important financial participation programmes (FPP) in Poland to show the relationship between the programmes applied and the socio-economic results of enterprises and assesses the impact of participation on these results and the impact of selected factors on the introduction of FPP. Methodology: The research has been based on a questionnaire answered by senior management of listed Polish companies that had at least one out of three major FPPs in operation, namely share ownership, profit-sharing, or a stock option scheme. Findings: The results of the empirical study conducted indicate the existence of some peculiar relationships. The vast majority of schemes in Polish public companies are aimed at the participation of the management personnel; these programmes are narrow-based (only for management) and rather hermetic, with a high concentration of stocks or shares in the hands of the management. Conclusion: FPPs generally have a positive influence on enterprise functioning. However, the effects are more social than economic (no significant economic improvement after programme implementation). The paper contributes to the debate about financial participation and suggests actions to popularize these programmes on a wider scale.

Keywords: financial participation, profit sharing, stock options, worker attitude, worker ownership

Procedia PDF Downloads 105
878 Clique and Clan Analysis of Patient-Sharing Physician Collaborations

Authors: Shahadat Uddin, Md Ekramul Hossain, Arif Khan

Abstract:

The collaboration among physicians during episodes of care for a hospitalised patient has a significant contribution towards effective health outcome. This research aims at improving this health outcome by analysing the attributes of patient-sharing physician collaboration network (PCN) on hospital data. To accomplish this goal, we present a research framework that explores the impact of several types of attributes (such as clique and clan) of PCN on hospitalisation cost and hospital length of stay. We use electronic health insurance claim dataset to construct and explore PCNs. Each PCN is categorised as ‘low’ and ‘high’ in terms of hospitalisation cost and length of stay. The results from the proposed model show that the clique and clan of PCNs affect the hospitalisation cost and length of stay. The clique and clan of PCNs show the difference between ‘low’ and ‘high’ PCNs in terms of hospitalisation cost and length of stay. The findings and insights from this research can potentially help the healthcare stakeholders to better formulate the policy in order to improve quality of care while reducing cost.

Keywords: clique, clan, electronic health records, physician collaboration

Procedia PDF Downloads 115
877 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 132
876 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy

Authors: Ilhan Keskin, Hasan Bulent Kantarci

Abstract:

In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.

Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates

Procedia PDF Downloads 490
875 Impacts of Community Forest on Forest Resources Management and Livelihood Improvement of Local People in Nepal

Authors: Samipraj Mishra

Abstract:

Despite the successful implementation of community forestry program, a number of pros and cons have been raised on Terai community forestry in the case of lowland locally called Terai region of Nepal, which is climatically belongs to tropical humid and possessed high quality forests in terms of ecology and economy. The study aims to investigate the local pricing strategy of forest products and its impacts on equitable forest benefit sharing, collection of community fund and carrying out livelihood improvement activities. The study was carried out on six community forests revealed that local people have substantially benefited from the community forests. However, being the region is heterogeneous by socio-economic conditions and forest resources have higher economical potential, the decision of low pricing strategy made by the local people have created inequality problems while sharing the forest benefits, and poorly contributed to community fund collection and consequently carrying out limited activities of livelihood improvement. The paper argued that the decision of low pricing strategy of forest products is counter-productive to promote the equitable benefit sharing in the areas of heterogeneous socio-economic conditions with high value forests. The low pricing strategy has been increasing accessibility of better off households at higher rate than poor; as such households always have higher affording capacity. It is also defective to increase the community fund and carry out activities of livelihood improvement effectively. The study concluded that unilateral decentralized forest policy and decision-making autonomy to the local people seems questionable unless their decision-making capacities are enriched sufficiently. Therefore, it is recommended that empowerment of decision-making capacity of local people and their respective institutions together with policy and program formulation are prerequisite for efficient and equitable community forest management and its long-term sustainability.

Keywords: community forest, livelihood, socio-economy, pricing system, Nepal

Procedia PDF Downloads 244
874 The Impact of Artificial Intelligence on Legislations and Laws

Authors: Keroles Akram Saed Ghatas

Abstract:

The near future will bring significant changes in modern organizations and management due to the growing role of intangible assets and knowledge workers. The area of copyright, intellectual property, digital (intangible) assets and media redistribution appears to be one of the greatest challenges facing business and society in general and management sciences and organizations in particular. The proposed article examines the views and perceptions of fairness in digital media sharing among Harvard Law School's LL.M.s. Students, based on 50 qualitative interviews and 100 surveys. The researcher took an ethnographic approach to her research and entered the Harvard LL.M. in 2016. at, a Face book group that allows people to connect naturally and attend in-person and private events more easily. After listening to numerous students, the researcher conducted a quantitative survey among 100 respondents to assess respondents' perceptions of fairness in digital file sharing in various contexts (based on media price, its availability, regional licenses, copyright holder status, etc.). to understand better . .). Based on the survey results, the researcher conducted long-term, open-ended and loosely structured ethnographic interviews (50 interviews) to further deepen the understanding of the results. The most important finding of the study is that Harvard lawyers generally support digital piracy in certain contexts, despite having the best possible legal and professional knowledge. Interestingly, they are also more accepting of working for the government than the private sector. The results of this study provide a better understanding of how “fairness” is perceived by the younger generation of lawyers and pave the way for a more rational application of licensing laws.

Keywords: cognitive impairments, communication disorders, death penalty, executive function communication disorders, cognitive disorders, capital murder, executive function death penalty, egyptian law absence, justice, political cases piracy, digital sharing, perception of fairness, legal profession

Procedia PDF Downloads 21
873 Studying the Load Sharing and Failure Mechanism of Hybrid Composite Joints Using Experiment and Finite Element Modeling

Authors: Seyyed Mohammad Hasheminia, Heoung Jae Chun, Jong Chan Park, Hong Suk Chang

Abstract:

Composite joints have been getting attention recently due to their high specific mechanical strength to weight ratio that is crucial for structures such as aircrafts and automobiles. In this study on hybrid joints, quasi-static experiments and finite element analysis were performed to investigate the failure mechanism of hybrid composite joint with respect to the joint properties such as the adhesive material, clamping force, and joint geometry. The outcomes demonstrated that the stiffness of the adhesive is the most imperative design parameter. In this investigation, two adhesives with various stiffness values were utilized. Regarding the joints utilizing the adhesive with the lower stiffness modulus, it was observed that the load was exchanged promptly through the adhesive since it was shared more proficiently between the bolt and adhesive. This phenomenon permitted the hybrid joints with low-modulus adhesive to support more prominent loads before failure when contrasted with the joints that utilize the stiffer adhesive. In the next step, the stress share between the bond and bolt as a function of various design parameters was studied using a finite element model in which it was understood that the geometrical parameters such as joint overlap and width have a significant influence on the load sharing between the bolt and the adhesive.

Keywords: composite joints, composite materials, hybrid joints, single-lap joint

Procedia PDF Downloads 375
872 How Does Paradoxical Leadership Enhance Organizational Success?

Authors: Wageeh A. Nafei

Abstract:

This paper explores the role of Paradoxical Leadership (PL) in enhancing Organizational Success (OS) at private hospitals in Egypt. Based on the collected data from employees in private hospitals (doctors, nursing staff, and administrative staff). The researcher has adopted a sampling method to collect data for the study. The appropriate statistical methods, such as Alpha Correlation Coefficient (ACC), Confirmatory Factor Analysis (CFA), and Multiple Regression Analysis (MRA), are used to analyze the data and test the hypotheses. The research has reached a number of results, the most important of which are (1) there is a statistical relationship between the independent variable represented by PL and the dependent variable represented by Organizational Success (OS). The paradoxical leader encourages employees to express their opinions and builds a work environment characterized by flexibility and independence. Also, the paradoxical leader works to support specialized work teams, which leads to the creation of new ideas, on the one hand, and contributes to the achievement of outstanding performance on the other hand. (2) the mentality of the paradoxical leader is flexible and capable of absorbing all suggestions from all employees. Also, the paradoxical leader is interested in enhancing cooperation among them and provides an opportunity to transfer experience and increase knowledge-sharing. Also, the sharing of knowledge creates the necessary diversity that helps the organization to obtain rich external information and enables the organization to deal with a rapidly changing environment. (3) The PL approach helps in facing the paradoxical demands of employees. A paradoxical leader plays an important role in reducing the feeling of instability in the work environment and lack of job security, reducing negative feelings for employees, restoring balance in the work environment, improving the well-being of employees, and increasing the degree of job satisfaction of employees in the organization. The study referred to a number of recommendations, the most important of which are (1) the leaders of the organizations must listen to the views of employees and their needs and move away from the official method of control. The leader should give sufficient freedom to employees to participate in decision-making and maintain enough space among them. The treatment between the leaders and employees must be based on friendliness, (2) the need for organizational leaders to pay attention to sharing knowledge among employees through training courses. The leader should make sure that every information provided by the employee is valuable and useful, which can be used to solve a problem that may face his/her colleagues at work, (3) the need for organizational leaders to pay attention to sharing knowledge among employees through brainstorming sessions. The leader should ensure that employees obtain knowledge from their colleagues and share ideas and information among them. This is in addition to motivating employees to complete their work in a new creative way, which leads to employees’ not feeling bored of repeating the same routine procedures in the organization.

Keywords: paradoxical leadership, organizational success, human resourece, management

Procedia PDF Downloads 24
871 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 443
870 E–Learning System in Virtual Learning Environment to Develop Problem Solving Ability and Team Learning for Learners in Higher Education

Authors: Noawanit Songkram

Abstract:

This paper is a report on the findings of a study conducted on e–learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education. The methodology of this study was R&D research. The subjects were 18 undergraduate students in Faculty of Education, Chulalongkorn University in the academic year of 2013. The research instruments were a problem solving ability assessment, a team learning evaluation form, and an attitude questionnaire. The data was statistically analyzed using mean, standard deviation, one way repeated measure ANOVA and t–test. The research findings discovered the e –learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education consisted of five components:(1) online collaborative tools, (2) active learning activities, (3) creative thinking, (4) knowledge sharing process, (5) evaluation and nine processes which were (1) preparing in group working, (2) identifying interested topic, (3) analysing interested topic, (4) collecting data, (5) concluding idea (6) proposing idea, (7) creating workings, (8) workings evaluation, (9) sharing knowledge from empirical experience.

Keywords: e-learning system, problem solving ability, team leaning, virtual learning environment

Procedia PDF Downloads 412
869 Thailand’s Education Cooperation with Neighboring Countries: The Key Factors to Strengthen the “Soft Power” Relationship

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the model of education cooperation during Thailand and neighbor countries, especially the countries which the territory-cohesion border with Thailand used “Soft Power” to enhance the good relationship. This research employed qualitative method, analyzed and synthesized the content of cooperation projects, policies, laws, relevant theories, relevant research papers and documents and used SWOT analysis. The research findings revealed that Thailand’s education cooperation projects with neighbor countries had two characteristics: 1) education cooperation projects/programs were a part in economic cooperation projects, and 2) there were directly education cooperation projects. The suggested education cooperation model was based on the concept of “Soft Power”, thus the determination of action plans or projects as key factors of public and private organizations should be based on sincere participation among people, communities and relevant organizations of the neighbor countries. Adoption of education-cultural exchange, learning and sharing process is a key to strengthen good relationship of the countries’ cooperation. The roles of education in this included sharing and acceptance of culture and local wisdom, human resource development, knowledge management, integration and networking building could enhance relationship between agents of related organizations of Thailand and neighbors countries.

Keywords: education, soft-power, relationship, cooperation, Thailand neighboring countries

Procedia PDF Downloads 331
868 Turbulent Channel Flow Synthesis using Generative Adversarial Networks

Authors: John M. Lyne, K. Andrea Scott

Abstract:

In fluid dynamics, direct numerical simulations (DNS) of turbulent flows require large amounts of nodes to appropriately resolve all scales of energy transfer. Due to the size of these databases, sharing these datasets amongst the academic community is a challenge. Recent work has been done to investigate the use of super-resolution to enable database sharing, where a low-resolution flow field is super-resolved to high resolutions using a neural network. Recently, Generative Adversarial Networks (GAN) have grown in popularity with impressive results in the generation of faces, landscapes, and more. This work investigates the generation of unique high-resolution channel flow velocity fields from a low-dimensional latent space using a GAN. The training objective of the GAN is to generate samples in which the distribution of the generated samplesis ideally indistinguishable from the distribution of the training data. In this study, the network is trained using samples drawn from a statistically stationary channel flow at a Reynolds number of 560. Results show that the turbulent statistics and energy spectra of the generated flow fields are within reasonable agreement with those of the DNS data, demonstrating that GANscan produce the intricate multi-scale phenomena of turbulence.

Keywords: computational fluid dynamics, channel flow, turbulence, generative adversarial network

Procedia PDF Downloads 170
867 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 22
866 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 56
865 Effect of Combining Return Policy and Early Order Commitment on Supply Chain Performance

Authors: Hamed Homaei, Seyed Reza Hejazi, Iraj Mahdavi

Abstract:

Return policy (RP) is a strategy for supply chain coordination, whereby the retailer returns the unsold products to the manufacturer or the manufacturer offers a credit on unsold products to the retailer at the end of selling season. Early order commitment (EOC) is another efficient mechanism for channel coordination wherein the retailer commits to purchasing from the manufacturer a fixed order quantity a few periods in advance of the regular delivery lead time. This paper studies the coordination issue of a two-level supply chain with one retailer and one manufacturer through combining two mentioned contracts. The main purpose of this paper is to present an analytical model to show that how the contract which is created by combining RP and EOC can improve supply chain performance. Numerical analyses show that the supply chain coordination through mentioned contract in compare with EOC mechanism, can improve supply chain performance under certain ranges of model parameters. Furthermore, some numerical analyses are done to determine the best buyback price in order to achieve maximum cost saving in the supply chain. Finally, a revenue sharing scheme is presented in order to achieve a win-win condition in the supply chain.

Keywords: supply chain coordination, early order commitment, return policy, revenue sharing

Procedia PDF Downloads 255
864 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 395
863 Local Pricing Strategy Should Be the Entry Point of Equitable Benefit Sharing and Poverty Reduction in Community Based Forest Management: Some Evidences from Lowland Community Forestry in Nepal

Authors: Dhruba Khatri

Abstract:

Despite the short history of community based forest management, the community forestry program of Nepal has produced substantial positive effects to organize the local people at a local level institution called Community Forest User Group and manage the local forest resources in the line of poverty reduction since its inception in 1970s. Moreover, each CFUG has collected a community fund from the sale of forest products and non-forestry sources as well and the fund has played a vital role to improve the livelihood of user households living in and around the forests. The specific study sites were selected based on the criteria of i) community forests having dominancy of Sal forests, and ii) forests having 3-5 years experience of community forest management. The price rates of forest products fixed by the CFUGs and the distribution records were collected from the respective community forests. Nonetheless, the relation between pricing strategy and community fund collection revealed that the small change in price of forest products could greatly affect in community fund collection and carry out of forest management, community development, and income generation activities in the line of poverty reduction at local level.

Keywords: benefit sharing, community forest, equitable, Nepal

Procedia PDF Downloads 342
862 A New Development Pathway And Innovative Solutions Through Food Security System

Authors: Osatuyi Kehinde Micheal

Abstract:

There is much research that has contributed to an improved understanding of the future of food security, especially during the COVID-19 pandemic. A pathway was developed by using a local community kitchen in Muizenberg in western cape province, cape town, south Africa, a case study to map out the future of food security in times of crisis. This kitchen aims to provide nutritious, affordable, plant-based meals to our community. It is also a place of diverse learning, sharing, empowering the volunteers, and growth to support the local economy and future resilience by sustaining our community kitchen for the community. This document contains an overview of the story of the community kitchen on how we create self-sustainability as a new pathway development to sustain the community and reduce Zero hunger in the regional food system. This paper describes the key elements of how we respond to covid-19 pandemic by sharing food parcels and creating 13 soup kitchens across the community to tackle the immediate response to covid-19 pandemic and agricultural systems by growing home food gardening in different homes, also having a consciousness Dry goods store to reduce Zero waste and a local currency as an innovation to reduce food crisis. Insights gained from our article and outreach and their value in how we create adaptation, transformation, and sustainability as a new development pathway to solve any future problem crisis in the food security system in our society.

Keywords: sustainability, food security, community development, adapatation, transformation

Procedia PDF Downloads 46
861 Form of Social Quality Moving Process of Suburb Communities in a Changing World

Authors: Supannee Chaiumporn

Abstract:

This article is to introduce the meaning and form of social quality moving process as indicated by members of two suburb communities with different social and cultural contexts. The form of social quality moving process is very significant for the community and social development, because it will make the people living together with sustainable happiness. This is a qualitative study involving 30 key-informants from two suburb communities. Data were collected though key-informant interviews, and analyzed using logical content description and descriptive statistics. This research found that on the social quality component, the people in both communities stressed the procedure for social quality-making. This includes the generousness, sharing and assisting among people in the communities. These practices helped making people to live together with sustainable happiness. Living as a family or appear to be a family is the major social characteristic of these two communities. This research also found that form of social quality’s moving process of both communities stress relation of human and nature; “nature overpower humans” paradigm and influence of religious doctrine that emphasizes relations among humans. Both criteria make the form of social’s moving process simple, adaptive to nature and caring for opinion sharing and understanding among each other before action. This form of social quality’s moving process is composed of 4 steps; (1) awareness building, (2) motivation to change, (3) participation from every party concerned (4) self-reliance.

Keywords: social quality, form of social quality moving process, happiness, different social and cultural context

Procedia PDF Downloads 352
860 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 377
859 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 309
858 Application of Social Media for Promoting Library and Information Services: A Case Study of Library Science Professionals of India

Authors: Payel Saha

Abstract:

Social media is playing an important role for dissemination of information in society. In 21st century most people have a smart phone and used different social media tools like Facebook, Twitter, Instagram, WhatsApp, Skype etc. in day to day life. It is rapidly growing web-based tool for everyone to share thoughts, ideas and knowledge globally using internet. The study highlights the current use of social media tools for promoting library and information services of Library and Information Professionals of India, which are working in Library. The study was conducted during November, 2017. A structured questionnaire was prepared using google docs and shared using different mailing list, sent to individual email IDs and sharing with other social media tools. Only 90 responses received from the different states of India and analyzed via MS-Excel. The data receive from 17 states and 3 union territories of India; however most of the respondents has come from the states Odisha 23, Himachal Pradesh 14 and Assam 10. The results revealed that out 90 respondents 37 Female and 53 male categories and also majority of respondents 71 have come from academic library followed by special library 15, Public library 3 and corporate library 1 respondent. The study indicates that, out of 90 respondent’s majority of 53 of respondents said that their Library have a social media account while 39 of respondents have not their Library social media account. The study also inform that Facebook, YouTube, Google+, LinkedIn, Twitter and Instagram are using by the LIS professional of India and Facebook 86 was popular social media tool among the other social media tools. Furthermore, respondent reported that they are using social media tools for sharing photos of events and programs of library 72, followed by tips for using different services 64, posting of new arrivals 56, tutorials of database 35 and send brief updates to patrons 32, announcement of library holidays 22. It was also reported by respondents that they are sharing information about scholarships training programs and marketing of library events etc. The study furthermore identify that lack of time is the major problem while using social media with 53 of respondents followed by low speed of internet 35, too many social media tools to learn 17 and some 3 respondents reported that there is no problem while using social media tools. The results also revealed that, majority of the respondents reported that they are using social media tools in daily basis 71 followed by weekly basis 16. It was followed by monthly 1 respondent and other 2 of the respondents. In summary, this study is expected to be useful in further promoting the social media for dissemination of library and information services to the general public.

Keywords: application of social media, India, promoting library services, library professionals

Procedia PDF Downloads 121
857 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 307
856 Migration Management in the Eastern Mediterranean: The European Union's Legacy of the Securitization and Lacking on the Principle of Solidarity and Burden Sharing

Authors: Tasawar Ashraf

Abstract:

The paper argues that the European Union’s securitized recourse to migration management which is lacking on the principle of solidarity has enhanced the sufferings of the asylum seekers by influencing the asylum policies of the non-EU states in the Eastern Mediterranean. The research critically analyses the development of the Turkish Asylum Policy and advocates that due to extraordinary burden of refugees and conceivable chances of getting EU membership, Turkey is developing its asylum policy essentially on the footprints of the EU. Such political and economic domination of the EU are resulting in the development of broader securitized migration zone in the EU and MENA region. Therefore, this paper critically analyses two interconnected issues, i.e., securitization of the migration in the EU and MENA region and the deficiency of the principle of solidarity and burden sharing in the European Agenda on Migration and how it reflects on Turkish asylum policy. This paper suggests that the EU must adopt a more generous resettle scheme ensuring the division of the refugee burden on all member and regional states by considering different political, social, and economic factors. Only such corporation can increase the pool of refugee hosting states by collaborating with the regional states to develop their asylum systems in accordance with international law.

Keywords: European Agenda on Migration (EAM), EU, Middle East and North Africa (MENA), Treaty on the Functioning of the European Union (TFEU)

Procedia PDF Downloads 153
855 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space

Authors: P. Saee, Baiju Gopal

Abstract:

YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.

Keywords: cyber-psychology, internet, media, mental health, mental illness, technology

Procedia PDF Downloads 144
854 Information Sharing with Potential Users of Traditional Knowledge under Provisions of Nagoya Protocol: Issues of Participation of Indigenous People and Local Communities

Authors: Hasrat Arjjumend, Sabiha Alam

Abstract:

The Nagoya Protocol is landmark international legislation governing access to genetic resources and benefit sharing from utilization of genetic resource and traditional knowledge. The field implications of the international law have been assessed by surveying academic/ research institutions, civil society organizations (CSOs) and concerned individuals, who gave their opinions on whether the provider parties (usually developing countries) would ensure effective participation of Indigenous people and local communities (ILCs) in establishing the mechanisms to inform the potential users of traditional knowledge (TK) about their obligations under art. 12.2 of Nagoya Protocol. First of all, involvement and participation of ILCs in suggested clearing-house mechanisms of the Parties are seldom witnessed. Secondly, as respondents expressed, it is doubtful that developing countries would ensure effective participation of ILCs in establishing the mechanisms to inform the potential users of TK about their obligations. Yet, as most of ILCs speak and understand local or indigenous languages, whether the Nagoya Protocol provides or not, it is a felt need that the Parties should disclose information in a language understandable to ILCs. Alternative opinions indicate that if TK held by ILCs is disclosed, the value is gone. Therefore, it should be protected by the domestic law first and should be disclosed then.

Keywords: genetic resources, indigenous people, language, Nagoya protocol, participation, traditional knowledge

Procedia PDF Downloads 119