Search results for: trusted third party
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 469

Search results for: trusted third party

439 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 298
438 The Communist Party of China’s Approach to Human Rights and the Death Penalty in China since 1979

Authors: Huang Gui

Abstract:

The issues of human rights and death penalty are always drawing attentions from international scholars, critics and observers, activities and Chinese scholars, and most of them looking at these problems are just doing with such legal or political from a single perspective, but the real relationship between Chinese political regime and legislation is often ignored. In accordance with the Constitution of P.R.C., Communist Party of China (CPC) does not merely play a key role in political field, but in legislation and law enforcement as well. Therefore, the legislation has to implement the party’s theory and outlook, and realize the party’s policies. So is the death penalty system, though it is only concrete punishment system. Considering this point, basic upon the introducing the relationship between CPC and legislation, this paper would like to explore the shifting of CPC’s outlook on human rights and the death penalty system changes in different eras. In Maoist era, the issue of human rights was rejected and deemed as an exclusion zone, and the death penalty was unjustifiably imposed; human rights were politically recognized and accepted in Deng era, but CPC has its own viewpoints on it. CPC emphasized on national security and stability in that era, and the individual human rights weren’t taken correspondingly and reasonably account of. The death penalty was abused and deemed as an important measure to control crime. In post-Deng, human rights were gradually developed and recognized. The term of ‘state respect and protect human rights’ is contained in Constitution of P.R.C., and the individual human rights are gradually valued, but the CPC still focus on state security, development, and stability, the individual right to life hasn’t been enough valued like the right to substance. Although the steps of reforming death penalty are taking, there are still 46 crimes punishable by death. CPC should change its outlook and pay more attention to the right to life, and try to abolish death penalty de facto and de jure.

Keywords: criminal law, communist party of China, death penalty, human rights, China

Procedia PDF Downloads 388
437 The Strategic Role of Accommodation Providers in Encouraging Travelers to Adopt Environmentally-Friendly Modes of Transportation: An Experiment from France

Authors: Luc Beal

Abstract:

Introduction. Among the stakeholders involved in the tourist decision-making process, the accommodation provider has the potential to play a crucial role in raising awareness, disseminating information, and thus influencing the tourists’ choice of transportation. Since the early days of tourism, the accommodation provider has consistently served as the primary point of contact with the destination, and consequently, as the primary source of information for visitors. By offering accommodation and hospitality, the accommodation provider has evolved into a trusted third party, functioning as an 'ambassador' capable of recommending the finest attractions and activities available at the destination. In contemporary times, when tourists plan their trips, they make a series of consecutive decisions, with the most important decision being to lock-in the accommodation reservation for the earliest days, so as to secure a safe arrival. Consequently, tourists place their trust in the accommodation provider not only for lodging but also for recommendations regarding restaurants, activities, and more. Thus, the latter has the opportunity to inform and influence tourists well in advance of their arrival, particularly during the booking phase, namely when it comes to selecting their mode of transportation. The pressing need to reduce greenhouse gas emissions within the tourism sector presents an opportunity to underscore the influence that accommodation providers have historically exerted on tourist decision-making . Methodology A participatory research, currently ongoing in south-western France, in collaboration with a nationwide hotel group and several destination management organizations, aims at examining the factors that determine the ability of accommodation providers to influence tourist transportation choices. Additionally, the research seeks to identify the conditions that motivate accommodation providers to assume a proactive role, such as fostering customer loyalty, reduced distribution costs, and financial compensation mechanisms. A panel of hotels participated in a series of focus group sessions with tourists, with the objective of modeling the decision-making process of tourists regarding their choice of transportation mode and to identify and quantify the types and levels of incentives liable to encourage environmentally responsible choices. Individual interviews were also conducted with hotel staff, including receptionists and guest relations officers, to develop a framework for interactions with tourists during crucial decision-making moments related to transportation choices. The primary finding of this research indicates that financial incentives significantly outweigh symbolic incentives in motivating tourists to opt for eco-friendly modes of transportation. Another noteworthy result underscores the crucial impact of organizational conditions governing interactions with tourists both before and during their stay. These conditions greatly influence the ability to raise awareness at key decision-making moments and the possibility of gathering data about the chosen transportation mode during the stay. In conclusion, this research has led to the formulation of practical recommendations for accommodation providers and Destination Marketing Organizations (DMOs). These recommendations pertain to communication protocols with tourists, the collection of evidences confirming chosen transportation modes, and the implementation of necessary incentives. Through these measures, accommodation provider can assume a central role in guiding tourists towards making responsible choices in terms of transportation.

Keywords: accommodation provider, trusted third party, environmentally-friendly transportation, green house gas, tourist decision-making process

Procedia PDF Downloads 32
436 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 353
435 A Method and System for Container Inventory Management

Authors: Lalith Edirisinghe

Abstract:

Due to the variability in global trading patterns, some ports in the world experience a shortage of shipping containers while the rest of the ports have excess container stocks. According to this study, carriers operate and manage their container inventories independently, leading to enormous container repositioning costs. In contrast, the researcher suggests that costs can be minimized if carriers exchange containers among them. In other words, rather than repositioning excess containers, a carrier could offer them to another carrier in the same port that has a shortage and vice versa. However, this is easier said than done because there is huge complexity in global container management as it involves many operational parameters such as multiple types and sizes of containers, the varying transit times of different carriers, etc., and the exchange may take place in various ports globally. Therefore, the exchange should be facilitated through a fully comprehensive automated computer system that could consider all the parameters that impact the possibility of exchange containers. Accordingly, the research used mixed research methods, combining qualitative and quantitative approaches. Data analysis is conducted using SPSS tools, and a prototype is developed as the output of the research. The proposed mathematical solution will proactively scan through the container size, type, and volume of every member carrier in each port and map how the deficit and excess quantities could be shared among them and set off the imbalance of empty container reposition at ports of their interest. The approach includes obtaining and processing container inventory information from multiple parties in real time for assessing container data associated with each party for each port at a given time. Using the container data, container inventories for each party at each port for a defined time are forecasted. A first party having surplus (offeror) and deficit (offeree) of empty containers at a first and a second port at a first time, respectively, is determined. A second party having a deficit and surplus of empty containers at the first time, respectively, is determined. Offering the first and the second party a container exchange opportunity to enable the first party to supply surplus empty containers to the second party at the first port based on the first container characteristics and the second party to supply surplus empty containers to the first party at the second port based on the second container characteristics. After the offeree obtains containers, they will be shipped to a port determined by the exporters. To ensure the sustainability of this method, the system should provide equal benefits to both the offeror and the offeree. Accordingly, the system will consider not only the number of containers exchanged but also the duration the offeree may hold them in its custody. This reduces container repositioning costs by utilizing mathematical modeling, algorithms, big data, machine learning, and artificial intelligence. This method and system may reduce the container repositioning cost by twenty percent.

Keywords: container inventory, benefit of exchange, reposition, imbalance, shipping, carriers, offeree, offeror

Procedia PDF Downloads 30
434 Mapping the Digital Landscape: An Analysis of Party Differences between Conventional and Digital Policy Positions

Authors: Daniel Schwarz, Jan Fivaz, Alessia Neuroni

Abstract:

Although digitization is a buzzword in almost every election campaign, the political parties leave voters largely in the dark about their specific positions on digital issues. In the run-up to the 2019 elections in Switzerland, the ‘Digitization Monitor’ project (DMP) was launched in order to change this situation. Within the framework of the DMP, all 4,736 candidates were surveyed about their digital policy positions and values. The DMP is designed as a digital policy supplement to the existing ‘smartvote’ voting advice application. This enabled a direct comparison of the digital policy attitudes according to the DMP with the topics of the ‘smartvote’ questionnaire which are comprehensive in content but mainly related to conventional policy areas. This paper’s main research goal is to analyze and visualize possible differences between conventional and digital policy areas in terms of response patterns between and within political parties. The analysis is based on dimensionality reduction methods (multidimensional scaling and principal component analysis) for the visualization of inter-party differences, and on standard deviation as a measure of variation for the evaluation of intra-party unity. The results reveal that digital issues show a lower degree of inter-party polarization compared to conventional policy areas. Thus, the parties have more common ground in issues on digitization than in conventional policy areas. In contrast, the study reveals a mixed picture regarding intra-party unity. Homogeneous parties show a lower degree of unity in digitization issues whereas parties with heterogeneous positions in conventional areas have more united positions in digital areas. All things considered, the findings are encouraging as less polarized conditions apply to the debate on digital development compared to conventional politics. For the future, it would be desirable if in further countries similar projects to the DMP could emerge to broaden the basis for conclusions.

Keywords: comparison of political issue dimensions, digital awareness of candidates, digital policy space, party positions on digital issues

Procedia PDF Downloads 157
433 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 376
432 Transfer of Contractual Right of Suit Evidenced in Carriage Contract of Bill of Lading in Nigeria

Authors: Eunice Chiamaka Allen-Ngbale

Abstract:

Prior to bill of lading (BOL), merchants travelled along with their goods; then recorded the goods in the ship’s mates’ register; and finally started selling the goods while in transit by way of BOL, indicative that BOL is negotiable. Common law doctrine of privity of contract did not allow the transfer of right to sue to a non-party to the contract. This created hardship to cargo owners, which made many jurisdictions enact laws in this regard. Bill of Lading Act 1855 (BLA) was enacted in the United Kingdom, which applied as statute of general application under section 375 Merchant Shipping Act 1990 (MSA) in Nigeria; and conferred contractual rights of the suit on consignees and endorsees, but on the passing of ownership upon or by reason of such consignment or endorsement on the shipment of the goods simultaneously. The repeal of section 375 MSA by section 439 MSA 2007 created a lacuna, and the doctrine of privity of contract is the extant law in Nigeria. The aim of this study is to evaluate laws governing the transfer of the contractual right of suit to a third party under the bill of lading in Nigeria. The specific objectives of this study are to ascertain: (i) whether the extant law of common law doctrine of privity of the contract covers the transfer of the right of suit to the third party under the bill of lading in Nigeria; (ii) impediment(s) of the common law to transfer such right in Nigeria in the absence of any legislation; (iii) the level of applicability of the doctrine of privity of contract as it relates to transfer of the contractual right of suit to third party under the bill of lading in Nigeria; and (iv) whether to proffer possible suggestion on how to fill the lacuna left by the repeal of Merchant Shipping Act 1990. This work adopted a doctrinal approach with reliance on primary and secondary source materials. It finds that the common law doctrine of privity of contract in Nigeria is retrogressive. This work recommends for amendment of the relevant statute to cure this defect/lacuna like other commonwealth nations for best international practices.

Keywords: contract of carriage by sea, doctrine of privity of contract, lawful holder of bill of lading, third party right of suit

Procedia PDF Downloads 130
431 Inflation and Unemployment Rates as Indicators of the Transition European Union Countries Monetary Policy Orientation

Authors: Elza Jurun, Damir Piplica, Tea Poklepović

Abstract:

Numerous studies carried out in the developed western democratic countries have shown that the ideological framework of the governing party has a significant influence on the monetary policy. The executive authority consisting of a left-wing party gives a higher weight to unemployment suppression and central bank implements a more expansionary monetary policy. On the other hand, right-wing governing party considers the monetary stability to be more important than unemployment suppression and in such a political framework the main macroeconomic objective becomes the inflation rate reduction. The political framework conditions in the transition countries which are new European Union (EU) members are still highly specific in relation to the other EU member countries. In the focus of this paper is the question whether the same monetary policy principles are valid in these transitional countries as well as they apply in developed western democratic EU member countries. The data base consists of inflation rate and unemployment rate for 11 transitional EU member countries covering the period from 2001 to 2012. The essential information for each of these 11 countries and for each year of the observed period is right or left political orientation of the ruling party. In this paper we use t-statistics to test our hypothesis that there are differences in inflation and unemployment between right and left political orientation of the governing party. To explore the influence of different countries, through years and different political orientations descriptive statistics is used. Inflation and unemployment should be strongly negatively correlated through time, which is tested using Pearson correlation coefficient. Regarding the fact whether the governing authority is consisted from left or right politically oriented parties, monetary authorities will adjust its policy setting the higher priority on lower inflation or unemployment reduction.

Keywords: inflation rate, monetary policy orientation, transition EU countries, unemployment rate

Procedia PDF Downloads 413
430 The Success and Failure of the Solicitor General When the U.S. Government Appears as a Direct Party before the U.S. Supreme Court

Authors: Joseph Ignagni, Rebecca Deen

Abstract:

This paper analyzes the extent to which the U.S. Supreme Court votes to support the position of the United States in cases where the government is a party to the litigation. This study considers the relationship between the Solicitor General’s Office and the U.S. Supreme Court. The Solicitor General has the unique position of being the representative of the Executive Branch and the U.S. government before the Supreme Court. While a great deal of research has looked at the Solicitor General’s success as a “friend of the court,” far less has considered this relationship when the U.S. is a direct party in the litigation. This paper investigates the success rate of the Solicitor General’s Office in these cases. We find that there is considerable variation in the U.S. government’s success rate before the Court depending on the issue, Supreme Court leadership, the ideological direction of the Court and whether the U.S. approached the Court as a petitioner or respondent. We conduct our analysis on the Court’s decisions from 1953-2009. This study adds to our understanding of checks and balances, separation of powers, and inter-institutional relationships between the branches of the federal government of the United States.

Keywords: U.S. president, solicitor general, U.S. Supreme Court, separation of power, checks and balances

Procedia PDF Downloads 327
429 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 129
428 Determining Factors Influencing the Total Funding in Islamic Banking of Indonesia

Authors: Euphrasia Susy Suhendra, Lies Handrijaningsih

Abstract:

The banking sector as an intermediary party or intermediaries occupies a very important position in bridging the needs of working capital investment in the real sector with funds owner. This will certainly make money more effectively to improve the economic value added. As an intermediary, Islamic banks raise funds from the public and then distribute in the form of financing. In practice, the distribution of funding that is run by Islamic Banking is not as easy as, in theory, because, in fact, there are many financing problems; some are caused by lacking the assessment and supervision of banks to customers. This study aims to analyze the influence of the Third Party Funds, Return on Assets (ROA), Non Performing Financing (NPF), and Financing Deposit Ratio (FDR) to Total Financing provided to the Community by Islamic Banks in Indonesia. The data used is monthly data released by Bank of Indonesia in Islamic Banking Statistics in the time period of January 2009 - December 2013. This study uses cointegration test to see the long-term relationship, and use error correction models to examine the relationship of short-term. The results of this study indicate that the Third Party Fund has a short-term effect on total funding, Return on Assets has a long term effect on the total financing, Non Performing Financing has long-term effects of total financing, and Financing deposit ratio has the effect of short-term and long-term of the total financing provided by Islamic Banks in Indonesia.

Keywords: Islamic banking, third party fund, return on asset, non-performing financing, financing deposit ratio

Procedia PDF Downloads 431
427 The Impact of Internal Dynamics of Standing Committees on Legislative Productivity in the Korean National Assembly

Authors: Lee Da Hyun

Abstract:

The purpose of this study is to explore the relation between the internal dynamics of standing committees and legislative productivity of the Korean National Assembly using statistical methods. Studies on legislation in South Korea have been largely revolved around political parties due to the uniqueness of its political context including strong party cohesion and party’s nomination right. However, as standing committees have been at the center of legislatures since the 6th National Assembly, there is a growing need for studying the operation and effectiveness of standing committees in legislation process. Thus, through panel data analysis for the sixteen standing committees across the four terms of the Korean National Assembly-from the 16th to the 19th-this article attempts to reveal that legislators’ bill passing rate is not a sole function of factors pertaining to political party as the existing studies have believed. By measuring the ideological distribution within a committee and the bill passing rate, this article provides differentiated interpretation from established theories of standing committees and presents compelling evidence describing complex interactions and independent operation of the standing committees with the subsequent legislative results.

Keywords: collective decision-making, lawmaking, legislation, political polarization, standing committees

Procedia PDF Downloads 120
426 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 125
425 The Real Consignee: An Exploratory Study of the True Party who is Entitled to Receive Cargo under Bill of Lading

Authors: Mojtaba Eshraghi Arani

Abstract:

According to the international conventions for the carriage of goods by sea, the consignee is the person who is entitled to take delivery of the cargo from the carrier. Such a person is usually named in the relevant box of the bill of lading unless the latter is issued “To Order” or “To Bearer”. However, there are some cases in which the apparent consignee, as above, was not intended to take delivery of cargo, like the L/C issuing bank or the freight forwarder who are named as consignee only for the purpose of security or acceleration of transit process. In such cases as well as the BL which is issued “To Order”, the so-called “real consignee” can be found out in the “Notify Party” box. The dispute revolves around the choice between apparent consignee and real consignee for being entitled not only to take delivery of the cargo but also to sue the carrier for any damages or loss. While it is a generally accepted rule that only the apparent consignee shall be vested with such rights, some courts like France’s Cour de Cassation have declared that the “Notify Party”, as the real consignee, was entitled to sue the carrier and in some cases, the same court went far beyond and permitted the real consignee to take suit even where he was not mentioned on the BL as a “Notify Party”. The main argument behind such reasoning is that the real consignee is the person who suffered the loss and thus had a legitimate interest in bringing action; of course, the real consignee must prove that he incurred a loss. It is undeniable that the above-mentioned approach is contrary to the position of the international conventions on the express definition of consignee. However, international practice has permitted the use of BL in a different way to meet the business requirements of banks, freight forwarders, etc. Thus, the issue is one of striking a balance between the international conventions on the one hand and existing practices on the other hand. While the latest convention applicable for sea transportation, i.e., the Rotterdam Rules, dealt with the comparable issue of “shipper” and “documentary shipper”, it failed to cope with the matter being discussed. So a new study is required to propose the best solution for amending the current conventions for carriage of goods by sea. A qualitative method with the concept of interpretation of data collection has been used in this article. The source of the data is the analysis of domestic and international regulations and cases. It is argued in this manuscript that the judge is not allowed to recognize any one as real consignee, other than the person who is mentioned in the “Consingee” box unless the BL is issued “To Order” or “To Bearer”. Moreover, the contract of carriage is independent of the sale contract and thus, the consignee must be determined solely based on the facts of the BL itself, like “Notify Party” and not any other contract or document.

Keywords: real consignee, cargo, delivery, to order, notify the party

Procedia PDF Downloads 42
424 Detection of Fuel Theft and Vehicle Position Using Third Party Monitoring Software

Authors: P. Senthilraja, C. Rukumani Khandhan, M. Palaniappan, S. L. Rama, P. Sai Sushimitha, R. Madhan, J. Vinumathi, N. Vijayarangan

Abstract:

Nowadays, the logistics achieve a vast improvement in efficient delivery of goods. The technology improvement also helps to improve its development, but still the owners of transport vehicles face problems, i.e., fuel theft in vehicles by the drivers or by an unknown person. There is no proper solution to overcome the problems. This scheme is to determine the amount of fuel that has been stolen and also to determine the position of the vehicle at a particular time using the technologies like GPS, GSM, ultrasonic fuel level sensor and numeric lock system. The ultrasonic sensor uses the ultrasonic waves to calculate the height of the tank up to which the fuel is available. Based on height it is possible to calculate the amount of fuel. The Global Positioning System (GPS) is a satellite-based navigation system. The scientific community uses GPS for its precision timing capability and position information. The GSM provides the periodic information about the fuel level. A numeric lock system has been provided for fuel tank opening lever. A password is provided to access the fuel tank lever and this is authenticated only by the driver and the owner. Once the fuel tank is opened an alert is sent to owner through a SMS including the timing details. Third party monitoring software is a user interface that updates the information automatically into the database which helps to retrieve the data as and when required. Third party monitoring software provides vehicle’s information to the owner and also shows the status of the vehicle. The techniques that are to be proposed will provide an efficient output. This project helps to overcome the theft and hence to put forth fuel economy.

Keywords: fuel theft, third party monitoring software, bioinformatics, biomedicine

Procedia PDF Downloads 365
423 Human Rights and Fundamental Freedoms in Crisis as Viewed during Bangladesh Parliamentary Election-2018 and Afterwards: A Contestant's Perspective on Social Measures

Authors: Mohammad S. Islam

Abstract:

Elections in Bangladesh are always controversial, and sometimes it becomes a violent affair when state power is combined with politics. Despite the commitment of the ruling party- the polling government to ensure free, fair, and credible elections, the participants of opposition parties and the general voters became very disappointed, terribly frustrated, and severely shocked. It happened when numerous claims of serious irregularities of vote rigging and violence came out in broad daylight during the election. This paper addresses the issues of how the ruling party created frightening and a horror situation to make people silent over electoral fraud and violent incidents, including gang rape. It also seeks to demonstrate that election-2018 was simply the deceptive action of the ruling party to legitimate their power, but not to provide a minimum opportunity for voters to exercise their fundamental right to vote. The fundamental freedom and the rule of law seemed to be ignored completely in this election process and afterwards. With the help of state machinery, the government of the ruling party violated human rights, restricted fundamental freedoms, and humiliated social protection & dignity. The contestant’s views as witnessed and relevant literatures are cited first for conceptual understanding. Then, the paper will examine how a new dimension of circumstantial social measures related to sustained protection can reduce all kinds of violence against humanity towards establishing a peaceful democratic society. Finally, this paper interprets the key findings and considers wider implications.

Keywords: electoral fraud, human rights, sustained protection, social measures, vote rigging

Procedia PDF Downloads 162
422 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 264
421 Combating Supplier-Copycatting With Intellectual Property Agreements

Authors: Hubert Pun

Abstract:

When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products.

Keywords: coopetitive supply chain, copycat, government regulation, intellectual property

Procedia PDF Downloads 153
420 A Study on Al-Riba Al-Hukmi and Its Instances from View of Islam

Authors: Abolfazl Alishahi Ghalehjoughi, Bi Bi Zeinab Hoseni

Abstract:

Islam is a comprehensive religion, and has rules for any thing. Islam attaches respect and importance to properties as well, and outlaws some types of transaction. A type of transaction that is strictly forbidden by the Islam is riba (usury), for which special punishments is considered in the Qur’an and hadiths. Usury is divided into (riba qarzi) loan usury and riba muamili (transaction usury); sometimes, in transaction and interest free loan contracts, ziyadah aini (interest in kind and of the same kind as that of the object of transaction) is not stipulated, but performance of work, provision of an advantage or a service, or a respite is stipulated, in which case although no ziyadah aini is in place, the transaction still constitutes usury and is outlaw. For instance, if a bank stipulates in an interest free loan contract that it pays a person the interest free loan only if he/she deposits a sum in the bank, this is an instance of riba hukmi. Or, for muamilah sarfi (transaction is which object of transaction and consideration is gold or silver) to be legitimate, it necessary that both the object of transaction and the consideration be handed over between the parties, because if a party takes delivery of the considered or object of transaction while the other party does not, the party who has taken delivery will accrue a benefit, as he/she wins time until he/she makes delivery to the other party, and this tantamount to usury in muamilah sarfi. Or, if a person lends a sum to another person, while the lender is indebted to the borrower, if the lender stipulates that he/she lends such amount only if the borrower postpones the maturity date of the lender’s debt to borrower, which is in one month, for a particular period of time, such loan will constitute usury. This research first provides views on riba hukmi, and then proceeds to analysis of views, trying to study fundamentals and proof regarding prohibition of riba hukmi, and to analyze instances of riba hukmi according to religious and hadith books.

Keywords: Islam, riba, prohibition, riba hukmi

Procedia PDF Downloads 347
419 Development of Internet of Things (IoT) with Mobile Voice Picking and Cargo Tracing Systems in Warehouse Operations of Third-Party Logistics

Authors: Eugene Y. C. Wong

Abstract:

The increased market competition, customer expectation, and warehouse operating cost in third-party logistics have motivated the continuous exploration in improving operation efficiency in warehouse logistics. Cargo tracing in ordering picking process consumes excessive time for warehouse operators when handling enormous quantities of goods flowing through the warehouse each day. Internet of Things (IoT) with mobile cargo tracing apps and database management systems are developed this research to facilitate and reduce the cargo tracing time in order picking process of a third-party logistics firm. An operation review is carried out in the firm with opportunities for improvement being identified, including inaccurate inventory record in warehouse management system, excessive tracing time on stored products, and product misdelivery. The facility layout has been improved by modifying the designated locations of various types of products. The relationship among the pick and pack processing time, cargo tracing time, delivery accuracy, inventory turnover, and inventory count operation time in the warehouse are evaluated. The correlation of the factors affecting the overall cycle time is analysed. A mobile app is developed with the use of MIT App Inventor and the Access management database to facilitate cargo tracking anytime anywhere. The information flow framework from warehouse database system to cloud computing document-sharing, and further to the mobile app device is developed. The improved performance on cargo tracing in the order processing cycle time of warehouse operators have been collected and evaluated. The developed mobile voice picking and tracking systems brings significant benefit to the third-party logistics firm, including eliminating unnecessary cargo tracing time in order picking process and reducing warehouse operators overtime cost. The mobile tracking device is further planned to enhance the picking time and cycle count of warehouse operators with voice picking system in the developed mobile apps as future development.

Keywords: warehouse, order picking process, cargo tracing, mobile app, third-party logistics

Procedia PDF Downloads 349
418 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction

Authors: Didem Aslantaş

Abstract:

In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.

Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria

Procedia PDF Downloads 58
417 Legal Problems with the Thai Political Party Establishment

Authors: Paiboon Chuwatthanakij

Abstract:

Each of the countries around the world has different ways of management and many of them depend on people to administrate their country. Thailand, for example, empowers the sovereignty of Thai people under constitution; however, our Thai voting system is not able to flow fast enough under the current Political management system. The sovereignty of Thai people is addressing this problem through representatives during current elections, in order to set a new policy for the countries ideology to change in the House and the Cabinet. This is particularly important in a democracy to be developed under our current political institution. The Organic Act on Political Parties 2007 is the establishment we have today that is causing confrontations within the establishment. There are many political parties that will soon be abolished. Many political parties have already been subsidized. This research study is to analyze the legal problems with the political party establishment under the Organic Act on Political Parties 2007. This will focus on the freedom of each political establishment compared to an effective political operation. Textbooks and academic papers will be referenced from studies home and abroad. The study revealed that Organic Act on Political Parties 2007 has strict provisions on the political structure over the number of members and the number of branches involved within political parties system. Such operations shall be completed within one year; but under the existing laws the small parties are not able to participate with the bigger parties. The cities are capable of fulfilling small political party requirements but fail to become coalesced because the current laws won't allow them to be united as one. It is important to allow all independent political parties to join our current political structure. Board members can’t help the smaller parties to become a large organization under the existing Thai laws. Creating a new establishment that functions efficiently throughout all branches would be one solution to these legal problems between all political parties. With this new operation, individual political parties can participate with the bigger parties during elections. Until current political institutions change their system to accommodate public opinion, these current Thai laws will continue to be a problem with all political parties in Thailand.

Keywords: coalesced, political party, sovereignty, elections

Procedia PDF Downloads 287
416 Institutional Engineering and Party Politics in Nigeria’s Fourth Republic

Authors: Emmanuel Ayobami Adesiyan

Abstract:

Political theorists have identified ethnicity as an obstacle to democratic stability in deeply divided societies. Nigeria belongs to the categories of problematic states labeled divided or deeply divided societies, as such post-independence politics is characterized by ethnicity with its ruinous effect on democratic governance and development. Institutional Engineering, the purposive manipulation of the electoral rule relating to party organization and the electoral formula has been established in comparative political studies as a policy measure for managing ethnicity in order to stabilize politics in divided societies. This paper examines the use of electoral engineering tools in managing ethnic politics in Nigeria’s Fourth Republic. The study is guided by rational institutional theory. Secondary data on electoral rules and disaggregated results of presidential elections were collected from archival documents. Data were subjected to content analysis. Institutional changes in electoral rules have promoted the development of inter-ethnic bargaining and compromises within the party system. Presidential Electoral Formula aided the emergence of national rather parochial parties. Electoral engineering tools moved Nigerian Politics from ethnic parochialism to inclusion and accommodation. These innovations should be strengthened to enhance democratic stability.

Keywords: Nigeria, presidential-elections, ethnic politics, institutional engineering

Procedia PDF Downloads 194
415 The Role and Function of National Land Authority as Mediator in Land Dispute Settlements in Indonesia

Authors: Nia Kurniati, Efa Laela Fakhriah

Abstract:

The regulation in Indonesia provides space for the land dispute to be settled outside the court by the government through National Land. In this case, the bureaucrat of Badan Pertanahan Nasional (BPN) acts as mediator to reach a fair agreement between the disputing parties. Land dispute is from a party who denies the ownership of the other party of a land and denies legal-technical facts written on land certificate published by BPN. Appointing the bureaucrat of BPN as mediator in dispute settlements may possibly create conflict of interest since the object. It has become a concern since bureaucrat of BPN acts as mediator, he will be bias and partial in assisting the dispute settlement, thus the spirit and purposes of mediation will be hampered. This issue triggers to be thoroughly examined further in a relation with the role and function of BPN as land dispute mediator. The methodology used in this research is a normative-legal one with qualitative-legal analytical method. The object of this research is in the form of random sampling of land dispute cases being occurred in some areas. Several principles in mediation have to be made as the base of the consideration to appoint bureaucrat of BPN as mediator since the mediator is an impartial third party, working with both disputing parties and assisting them to reach a fair resolution written in agreement as a foundation of land dispute settlement. The existence of BPN as mediator in land dispute settlement encounters conflict of interest which uphold legal uncertainty to act objectively.

Keywords: Indonesia, land dispute, mediator, national land authority

Procedia PDF Downloads 278
414 Gender-Based Differences in the Social Judgment of Hungarian Politicians' Sex Scandals

Authors: Sara Dalma Galgoczi, Judith Gabriella Kengyel

Abstract:

Sex scandals are quite an engaging topic to work with, especially with their judgment in society. Most people are interested in other people's lives, specifically in public figures' such as celebrities or politicians, because ordinary people feel like they have the right to know more things about the famous and notorious ones than they would probably willing to share. Intimacy and sexual acts aren't exceptions; moreover, sexuality is one of the central interests of humans ever since. Besides, knowing and having an opinion about any kind of scandal can change even whole social groups or classes estimation of anyone. This study aims to research the social judgment of some Hungarian politicians' sex scandals and asks important questions like diverse public opinions in the light of gender or delegates’ abuse of power. Considering that this study is about collecting and evaluating opinions from the public, and no one before researched and published this exact topic and cases, an online survey was created. In the survey were different sections. We collected data about party-preference, conservativism-liberalism scale; then we used the following questionnaires: from Zero-sum perspective with regard to gender equality (Ruthig, Kehn, Gamblin, Vanderzanden & Jones, 2017), Ambivalent Sexism Inventory (ASI; Glick & Fiske, 1996), Ambivalence Toward Men Inventory (AMI; Glick & Fiske, 1999). Finally, 5 short summaries were presented about five Hungarian politicians' sex scandal cases (3 males, 2 females) from the recent past. These stories were followed by questions about their opinion of the party and attitudes towards the parties' reactions to the cases. We came to the conclusion that people are more permissive with the scandals of men, and benevolent sexism and ambivalence towards men mediate this relation. Men tend to see these cases as part of politicians' private lives more than women. Party preference had a significant effect - people tend to pass a sentence the delegates of the opposing parties, and they rather release the delegates of their preferred party.

Keywords: sex scandal, sexism, social judgement, politician

Procedia PDF Downloads 95
413 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization

Authors: Hebberly Ahatlan

Abstract:

The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.

Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain

Procedia PDF Downloads 134
412 Taiwan’s Democratic Institutions: The Electoral Rise and Recall of Kuomintang’s Han Kuo-YU Mayor

Authors: Ryan Brading

Abstract:

The results of Taiwan’s presidential election, which took place on 11 January 2020, were alarming for the Kuomintang (KMT). A party that was once the pillar of Taiwan’s institutional apparatus is now losing its direction. Since 2016, the inability of KMT to construct a winning presidential election campaign strategy has made its Chinese ancestry an obstacle in Taiwan’s vibrant and transparent democracy. The appearance of the little-known legislator Han Kuo-yu as the leadership alternative opened the possibility of reigniting the party. Han’s victory in the Kaohsiung mayoral election in November 2018 provided hope that Han could also win the presidency. Wrongly described as a populist, Han, however, was defeated in the January 2020 presidential race. This article analyses why Han is not a populist, his triumph in Kaohsiung, humiliation in running for the presidency and suffering a complete ‘loss of face’ when Kaohsiungers democratically ousted him from the mayoral post on 6 June 2020.

Keywords: populism, 1992 consensus, youth vote, Taiwan, recall

Procedia PDF Downloads 140
411 Contemporary Army Prints for Women’s Wear Kurti

Authors: Shaleni Bajpai, Nancy Stephan

Abstract:

Various designs of women’s kurtis with different styles, motifs and prints were available in market but none of the kurtis was found in army print. Mostly army prints are used for men’s wear like jackets, trousers, caps, bags. The main colours available in military prints were beige, parrot green, red, dark blue, light blue, orange, bottle green, pink and the original military green colour. As the original camouflage is banned in civil wears so the different variety and colours were used in this study to popularize army prints in women’s wear. The aim of this project was to construct different styles of women kurti’s with various colours of different military prints. Mood board, inspiration and colour board was prepared to design the kurtis. The fabric used for construction was army printed poplin and crepe. The designing and construction of kurti’s were divided into two categories such as - casual and party wear. Casual wear had simple silhouette like a-line, high-low and waist coat style whereas party wear included princess line, panelled and bandhani style. Structured questionnaire was prepared to assess the acceptance of newly designed kurtis with respect to colour combination, overall appearance and cost. Purposively sampling method was adopted for selection of respondents. Opinion was taken from 100 women of various age groups. The result and analysis was presented through graph and percentage. Kurtis in army print of both the categories were appreciated by the respondents.

Keywords: army, kurti, casual wear, party wear

Procedia PDF Downloads 274
410 The Active Subject and the Victim of Trafficking in Human Beings: Material and Procedural Criminal Law Approaches

Authors: Andrei Nastas, Sergiu Cernomopret

Abstract:

This research addresses trafficking in human beings, in terms of the active subject and the victim of this crime, through the prism of national and international regulations in material and procedural criminal matters. For the correlative approach of both mentioned aspects, the active subject and the victim of trafficking in human beings, the research addresses both its constituent elements and the way to prevent and combat this phenomenon through criminal proceedings. As follows, trafficking in human beings, from a material criminal point of view, involves two subjects of this crime (active subject - offender and passive subject - victim), while their procedural status differs depending on the case (victim or injured party). The result of the research highlights some clarifications, which find a theoretical-practical basis in the legal provisions, the specialized doctrine, and the judicial practice.

Keywords: victim, active subject, abuse, injured party, crime

Procedia PDF Downloads 100