Search results for: no-fixed address
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3097

Search results for: no-fixed address

3097 The Role of Social Parameters in the Choice of Address Forms Used in Kinship Domain in Punjab, Pakistan

Authors: Ana Ramsha, Samrah Hidayat

Abstract:

This study examines the role of social parameters in the choice of address forms used in kinship domain in Punjab, Pakistan. The study targeted 140 respondents in order to test the impact of social factors along with the regional differences in the choices of address forms in kinship domain. Statistical analyses are done by applying t-test for gender in relation to choices of address forms and ANOVA for age, income, education and social class. The study finds out that there is a strong connection of different social parameters not only with language use and practice but also in choices and use of address forms, especially in kinship relationships. Moreover, it is highlighted that gender does not influence in the choices of address forms, even the participants belonging to young and middle categories show no significant difference with regard to the choices of address form despite the fact that all the factors and parameters exert influence on the choices of address forms. Hence address forms as being one of the major traits of language and society is affected by all the social factors around and regional differences are also most important as they give identity and ethnicity to the society.

Keywords: address forms, kinship, social parameters, linguistics

Procedia PDF Downloads 133
3096 On the Translation of Thai Culture-Specific Terms of Address into English

Authors: Supannee Pinmanee

Abstract:

This article focuses on the strategies in the translation of terms of address for both referential and vocative functions from Thai to English from a cultural perspective. The discussion concerns the culture-specific ways in which Thai people use address terms that depend largely on social and conventional contexts, including pragmatic factors, for example, relationships between people, levels of formality, and attitudes. Examples used to illustrate the problems and proposed solutions were drawn from the media, the internet, the novels and the language used by Thai native speakers in expressing Thai address terms. The terms used in this area show very well not only the differences in language but also the different cultures and world views of the speakers of Thai and those of English. Thai has developed its own set of address terms, particularly kinship terms for non-relatives and the Thai royal terms. Some of Newmark’s procedures (1995) are used in the article to illustrate the task of translating Thai terms into English, a language that embodies a very different culture with its own set of address terms. However, no one strategy can be applied to serve all purposes and to translate all the intended senses. One particular term can be translated by several strategies, and which strategy to choose depends largely on one’s purposes and what requirement one needs to fulfill.

Keywords: translation, terms of address, Thai-English translation, Thai culture-specific terms of address, translation strategies

Procedia PDF Downloads 205
3095 Objectives of the Standardization of Technical Terminology Nowadays in Albanian

Authors: Gani Pllana

Abstract:

In the conditions of the rapid development of technics and technology in recent years, the cooperation of the scientific-technical language with the standard Albanian language is continuing with a higher intensity than before. We notice a vigor of enrichment in the vocabulary of technical terminology, due to the birth and formation of new fields and subfields of technics, technology, as computing, mechatronics, telemetry, a multitude of concepts many of which, on the one hand, are marked with names of the languages they come from, mainly from English, but on the other hand, they meet their needs with the lexical mother tongue composition (by common words being raised to terms) and with the activation of other layers, such as compound word terms. Thus, for example, in the field of computing, we notice in it the inclusion of the ordinary vocabulary for reproductive reasons, like mi, dritare, flamur, adresë, skedar (Engl: mouse, window, flag, address, file), and along with them, the compound word terms, serving to differentiate relevant concepts, like, adresë e hiperlidhjes, adresë e uebit, adresë relative, adresë virtuale (Engl. address hyperlink, web address, relative address, virtual address) etc.

Keywords: common words, Albanian language, technical terminology, standardization

Procedia PDF Downloads 290
3094 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
3093 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 385
3092 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
3091 Copywriting and the Creative Edge

Authors: Dandeswar Bisoyi, Preeti Yadav, Utpal Barua

Abstract:

This study address particular way that verbal information can affect the processing of positive and interesting qualities which help in making the brand attractive to the consumer. Also, it address the development of a communication strategy which is a very important part of the marketing plan we have to take into account many factors. Out of all the product strengths, the strategy has to outline one marked differential which will drive our brand. This is the fundamental base on which the entire creative strategy will be big idea-based.

Keywords: copy writing, advertisement, marketing, branding, recall

Procedia PDF Downloads 582
3090 Addressing Scheme for IOT Network Using IPV6

Authors: H. Zormati, J. Chebil, J. Bel Hadj Taher

Abstract:

The goal of this paper is to present an addressing scheme that allows for assigning a unique IPv6 address to each node in the Internet of Things (IoT) network. This scheme guarantees uniqueness by extracting the clock skew of each communication device and converting it into an IPv6 address. Simulation analysis confirms that the presented scheme provides reductions in terms of energy consumption, communication overhead and response time as compared to four studied addressing schemes Strong DAD, LEADS, SIPA and CLOSA.

Keywords: addressing, IoT, IPv6, network, nodes

Procedia PDF Downloads 294
3089 A Multicenter Assessment on Psychological Well-Being Status among Medical Residents in the United Arab Emirates

Authors: Mahera Abdulrahman

Abstract:

Objective: Healthcare transformation from traditional to modern in the country recently prompted the need to address career choices, accreditation perception and satisfaction among medical residents. However, a concerted nationwide study to understand and address burnout in the medical residency program has not been conducted in the UAE and the region. Methods: A nationwide, multicenter, cross-sectional study was designed to evaluate professional burnout and depression among medical residents in order to address the gap. Results: Our results indicate that 75.5% (216/286) of UAE medical residents had moderate to high emotional exhaustion, 84% (249/298) had high depersonalization, and 74% (216/291) had a low sense of personal accomplishment. In aggregate, 70% (212/302) of medical residents were considered to be experiencing at least one symptom of burnout based on a high emotional exhaustion score or a high depersonalization score. Depression ranging from 6-22%, depending on the specialty was also striking given the fact the Arab culture lays high emphasis on family bonding. Interestingly 83% (40/48) of medical residents who had high scores for depression also reported burnout. Conclusion: Our data indicate that burnout and depression among medical residents is epidemic. There is an immediate need to address burnout through effective interventions at both the individual and institutional levels. It is imperative to reconfigure the approach to medical training for the well-being of the next generation of physicians in the Arab world.

Keywords: mental health, Gulf, Arab, residency training, burnout, depression

Procedia PDF Downloads 295
3088 Gender-Based Violence in Pakistan: Addressing the Root Causes

Authors: Hafiz Awais Ahmad

Abstract:

This paper aims to examine the root causes of gender-based violence (GBV) in Pakistan and proposes strategies to address this issue. Using a qualitative approach, this study analyzed data from various sources, including interviews with survivors of GBV and experts in the field. The findings revealed that GBV in Pakistan is deeply rooted in patriarchal attitudes and practices, economic insecurity, lack of education, and limited access to justice. The study recommends a multi-faceted approach to address GBV, including legislative reforms, awareness-raising campaigns, economic empowerment, and improved access to justice for survivors. Furthermore, the study highlights the importance of engaging men and boys in efforts to address GBV and promote gender equality. The findings of this study have important implications for policy-makers, practitioners, and researchers working towards ending GBV in Pakistan.

Keywords: gender-based violence, Pakistan, legislative reforms, advocacy

Procedia PDF Downloads 148
3087 Ideological Stance in Political Discourse: A Transitivity Analysis of Nawaz Sharif's Address at 71st UN Assembly

Authors: A. Nawaz

Abstract:

The present study uses Halliday’s transitivity model to analyze and interpret ideological stance in PM Nawaz Sharif’s political discourse. His famous speech at the 71st UN assembly was analyzed qualitatively using clausal analysis approach to investigate the communicative functions of the linguistic choices made in the address. The study discovers that among the six process types under the transitivity model, material, relational and mental processes appear most frequently in the speech, making up almost 86% of the whole. Verbal processes rank 4th, whereas existential and behavioral are the least occurring processes covering only 2 and 1 percent respectively. The dominant use of material processes suggests that Nawaz Sharif and his government are the main actors working on several concrete projects to produce a sense of developmental progression and continuity. Using relational and mental processes the PM, along with establishing proximity with masses and especially Kashmiri, gives guarantees and promises. The linguistic analysis concludes Kashmir dispute as being the central theme of the address, since it covers more than half of the discourse. The address calls for a strong action instead of formal assurances and wishful thoughts. The study establishes that language structures can yield certain connotations and ideologies which are not overt for readers. This is in affirmation to the supposition that language form performs a communicative function and is not merely fortuitous.

Keywords: Hallidian perspective on language, implicit meanings, Nawaz Sharif, political ideologies, political speeches, transitivity, UN Assembly

Procedia PDF Downloads 211
3086 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 124
3085 Using the Technological, Pedagogical, and Content Knowledge (TPACK) Model to Address College Instructors Weaknesses in Integration of Technology in Their Current Area Curricula

Authors: Junior George Martin

Abstract:

The purpose of this study was to explore college instructors’ integration of technology in their content area curriculum. The instructors indicated that they were in need of additional training to successfully integrate technology in their subject areas. The findings point to the implementation of a proposed the Technological, Pedagogical, and Content Knowledge (TPACK) model professional development workshop to satisfactorily address the weaknesses of the instructors in technology integration. The professional development workshop is proposed as a rational solution to adequately address the instructors’ inability to the successful integration of technology in their subject area in an effort to improve their pedagogy. The intense workshop would last for 5 days and will be designed to provide instructors with training in areas such as a use of technology applications and tools, and using modern methodologies to improve technology integration. Exposing the instructors to the specific areas identified will address the weaknesses they demonstrated during the study. Professional development is deemed the most appropriate intervention based on the opportunities it provides the instructors to access hands-on training to overcome their weaknesses. The purpose of the TPACK professional development workshop will be to improve the competence of the instructors so that they are adequately prepared to integrate technology successfully in their curricula. At the end of the period training, the instructors are expected to adopt strategies that will have a positive impact on the learning experiences of the students.

Keywords: higher education, modern technology tools, professional development, technology integration

Procedia PDF Downloads 312
3084 Water Supply and Utility Management to Address Urban Sanitation Issues

Authors: Akshaya P., Priyanjali Prabhkaran

Abstract:

The paper examines the formulation of strategies to develop a comprehensive model of city level water utility management to addressing urban sanitation issues. The water is prime life sustaining natural resources and nature’s gifts to all living beings on the earth multiple urban sanitation issues are addressed in the supply of water in a city. Many of these urban sanitation issues are linked to population expansion and economic inequity. Increased usage of water and the development caused water scarcity. The lack of water supply results increases the chance of unhygienic situations in the cities. In this study, the urban sanitation issues are identified with respect to water supply and utility management. The study compared based on their best practices and initiatives. From this, best practices and initiatives identify suitable sustainable measures to address water supply issues in the city level. The paper concludes with the listed provision that should be considered suitable measures for water supply and utility management in city level to address the urban sanitation issues.

Keywords: water, benchmarking water supply, water supply networks, water supply management

Procedia PDF Downloads 110
3083 Progression of Trauma: Myth Mess Mastery, Addressing and Grooming

Authors: Stuart Bassman

Abstract:

Services that focus on the synthesis of research and clinical practice are vital in providing efficacious change for the men and women who have been victims of childhood sexual abuse. This study will address what processes have been helpful in being a catalyst in changing one’s inner life as well as providing meaningful applications and fulfilling experiences. Initially, we would focus on the Myths regarding childhood sexual abuse. This would include Grooming behaviors and Delayed Disclosures. Subsequently, we would address the Mess that follows from not recognizing the adverse impairments that result from Childhood Sexual Abuse. Finally, we would conclude by looking at the Mastery that could arise from moving from being a Victim to a Survivor and a Thriver.

Keywords: trauma, childhood, somatic, treatment

Procedia PDF Downloads 56
3082 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims

Authors: F. Zamani Ashni, P. Gerber

Abstract:

In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.

Keywords: Australia, discrimination, Islamophobia, Muslim

Procedia PDF Downloads 134
3081 Community Health Workers’ Performance and Their Influence in the Adoption of Strategies to Address Malaria Burden at a Subnational Level Health System in Cameroon

Authors: Tacho Rubby Kong

Abstract:

Community health workers’ performances are known to influence members’ behaviours and practices while translating policies into service delivery. However, little remains known about the extent to which this remains true within interventions aimed at addressing malaria burden in low-resource settings like Cameroon. The objective of this study was to examine the health workers’ performance and their influence on the adoption of strategies to address the malaria burden at a subnational level health system in Cameroon. A qualitative exploratory design was adopted on a purposively selected sample of 18 key informants. The study was conducted in Konye health district among sub-national health systems, managers, health facility in-charges, and frontline community health workers. Data was collected using semi-structured interview guides in a face-to-face interview with respondents. The analysis adopted a thematic approach utilising journals, credible authors, and peer review articles for data management. Participants acknowledged that workplace networks were influential during the implementation of policies to address malaria. The influence exerted was in form of linkage with other services, caution, and advice regarding strict adherence to policy recommendations, perhaps reflective of the level of trust in providers’ ability to adhere to policy provisions. At the district health management level and among non-state actors, support in perceived areas of weak performance in policy implementation was observed. In addition, timely initiation of contact and subsequent referral was another aspect where community health workers exerted influence while translating policies to address the malaria burden. While the level of support from among network peers was observed to influence community health workers’ adoption and implementation of strategies to address the malaria burden, different mechanisms triggered subsequent response and level of adherence to recommended policy aspects. Drawing from the elicited responses, it was infer that community health workers’ performance influence the direction and extent of success in policy implementation to address the malaria burden at the subnational level.

Keywords: subnational, community, malaria, strategy

Procedia PDF Downloads 93
3080 Using Real Truck Tours Feedback for Address Geocoding Correction

Authors: Dalicia Bouallouche, Jean-Baptiste Vioix, Stéphane Millot, Eric Busvelle

Abstract:

When researchers or logistics software developers deal with vehicle routing optimization, they mainly focus on minimizing the total travelled distance or the total time spent in the tours by the trucks, and maximizing the number of visited customers. They assume that the upstream real data given to carry the optimization of a transporter tours is free from errors, like customers’ real constraints, customers’ addresses and their GPS-coordinates. However, in real transporter situations, upstream data is often of bad quality because of address geocoding errors and the irrelevance of received addresses from the EDI (Electronic Data Interchange). In fact, geocoders are not exempt from errors and could give impertinent GPS-coordinates. Also, even with a good geocoding, an inaccurate address can lead to a bad geocoding. For instance, when the geocoder has trouble with geocoding an address, it returns those of the center of the city. As well, an obvious geocoding issue is that the mappings used by the geocoders are not regularly updated. Thus, new buildings could not exist on maps until the next update. Even so, trying to optimize tours with impertinent customers GPS-coordinates, which are the most important and basic input data to take into account for solving a vehicle routing problem, is not really useful and will lead to a bad and incoherent solution tours because the locations of the customers used for the optimization are very different from their real positions. Our work is supported by a logistics software editor Tedies and a transport company Upsilon. We work with Upsilon's truck routes data to carry our experiments. In fact, these trucks are equipped with TOMTOM GPSs that continuously save their tours data (positions, speeds, tachograph-information, etc.). We, then, retrieve these data to extract the real truck routes to work with. The aim of this work is to use the experience of the driver and the feedback of the real truck tours to validate GPS-coordinates of well geocoded addresses, and bring a correction to the badly geocoded addresses. Thereby, when a vehicle makes its tour, for each visited customer, the vehicle might have trouble with finding this customer’s address at most once. In other words, the vehicle would be wrong at most once for each customer’s address. Our method significantly improves the quality of the geocoding. Hence, we achieve to automatically correct an average of 70% of GPS-coordinates of a tour addresses. The rest of the GPS-coordinates are corrected in a manual way by giving the user indications to help him to correct them. This study shows the importance of taking into account the feedback of the trucks to gradually correct address geocoding errors. Indeed, the accuracy of customer’s address and its GPS-coordinates play a major role in tours optimization. Unfortunately, address writing errors are very frequent. This feedback is naturally and usually taken into account by transporters (by asking drivers, calling customers…), to learn about their tours and bring corrections to the upcoming tours. Hence, we develop a method to do a big part of that automatically.

Keywords: driver experience feedback, geocoding correction, real truck tours

Procedia PDF Downloads 675
3079 Shocking Shortage: The Electrical Trade Crisis in the Eastern Cape, South Africa

Authors: Amore Gerber, Gerrit Crafford

Abstract:

This research paper explores the root causes of the shortage of professional electricians in the Eastern Cape, South Africa. The primary objectives are to identify the underlying reasons contributing to this deficit, analyze the consequences of the shortage, and propose practical solutions to address this critical issue. The research employed an interpretivist paradigm and an inductive approach. Qualitative data was gathered through semi-structured interviews with professional electricians working in the Eastern Cape. Thematic analysis was used to identify common themes and comprehensively understand the issue. The analysis revealed that the shortage of electricians can be attributed primarily to training challenges and a lack of awareness within the industry. This shortage has significant repercussions, as it has led to the proliferation of unqualified electricians, exacerbating the problem. The study identified two key solutions to address this issue: promoting education and trade programs and transforming electrical instruction and education. The research was conducted in the Eastern Cape and reflects the viewpoints of professional electricians. Results may differ in other locations or where the effects are investigated from a client’s perspective. The research uncovers the root causes of the electrician shortage and offers valuable insights for devising effective solutions to address these challenges. This paper adds a significant dimension to the current literature gap. The study's findings underscore deficiencies in awareness and training as fundamental factors driving the shortage of electricians, emphasizing the urgent need to address these issues to bridge the gap.

Keywords: electrician shortage, skill gap, training, awareness

Procedia PDF Downloads 61
3078 Early Prediction of Disposable Addresses in Ethereum Blockchain

Authors: Ahmad Saleem

Abstract:

Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results.

Keywords: blockchain, Ethereum, cryptocurrency, prediction

Procedia PDF Downloads 98
3077 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 185
3076 Jurisdiction in International Law

Authors: Hamid Vahidkia

Abstract:

Purview has customarily been considered in worldwide law as simply an address of the rights and powers of states. Conceived in this way, the rules onward serve the imperative work of delimiting (whereas tolerating a few covers of) state administrative specialist – the address of when an individual or occasion may be subject to national direction – a work which is shared with the cognate teach of private worldwide law. This article proposes that the thought and the rules of locale in worldwide law require reconceptualization in light of three advancements. The primary is the developing acknowledgment that in an extend of circumstances, the work out of national locale may, beneath worldwide law, be an address of duty or commitment instead of right. The moment advancement is the expanded acknowledgment that such jurisdictional obligations may, in a few circumstances, be owed not as it were to other states but also to private parties, especially through the rise and fortifying of the teachings of refusal of equity and get to equity. The third improvement is the broadly perceived wonder known as party independence, beneath which private parties in the gracious debate have the control to bestow locale on national courts and to decide themselves which law administers their connections. In combination, these improvements propose the need to reexamine the concept of ward in worldwide law to reflect the more complex substances of a worldwide lawful arrangement beneath which states possess both jurisdictional rights and commitments and are not the elite on-screen characters.

Keywords: international law, jurisdiction, purview, preconceptions, commitment

Procedia PDF Downloads 55
3075 Designing Electric Vehicle Charging Infrastructure to Benefit Historically-Marginalized Residents

Authors: Polly Parkinson, Emma Mecham, Fawn Groves, Amy Wilson-Lopez, Ivonne Santiago

Abstract:

In the rush to meet electric vehicle (EV) adoption goals that address environmental and health concerns, engineering planners and community policy experts cannot separate the socioeconomic and equity factors from transportation needs. Two gaps are identified in existing research: concrete proposals that address affordable micromobility options and provide for needs of community members without cars, and community-engaged research that elevates the concerns and solutions brought forward by historically-marginalized community members. This data analysis from a recent case study in a vulnerable community indicates that because transportation decisions are inextricably linked to health, work, and housing, EV adoption must also address multifaceted human needs. Communities focused on building more electric vehicle charging stations must find ways for lower-income households to also benefit. This research engaged residents in the planning process and resulted in a template for charging stations to advance mobility justice with a range of options that purposefully benefit the whole community.

Keywords: community engagement, electric vehicle charging, environmental justice, participatory research, transportation equity

Procedia PDF Downloads 44
3074 Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller

Authors: N. Pitcheswara Rao

Abstract:

In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.

Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code

Procedia PDF Downloads 428
3073 Characterization of Onboard Reliable Error Correction Code for SDRAM Controller

Authors: Pitcheswara Rao Nelapati

Abstract:

In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.

Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code

Procedia PDF Downloads 430
3072 Exploring the Impacts of Ogoni/African Indigenous Knowledge in Addressing Environmental Issues in Ogoniland, Nigeria

Authors: Lele Dominic Dummene

Abstract:

Environmental issues are predominant in rural areas where indigenous people reside. These environmental issues cover environmental, health, social, economic, and political issues that emanate from poor environmental management and unfair distribution of environmental resources. These issues have greatly affected the lives of the indigenous people and their daily activities. As these environmental issues grow in communities, environmental experts, scientists, and theorists have proposed and developed methods, policies, and strategies to address these environmental-related issues in indigenous communities. Thus, this paper explores how the Ogoni indigenous knowledge and cultural practices could be used to address environmental issues such as oil pollution and other environmental-related issues that have destroyed the Ogoni environment.

Keywords: Ogoniland, indigenous knowledge, environment, environmental education

Procedia PDF Downloads 123
3071 One year later after the entry into force of the Treaty on the Prohibition of Nuclear Weapons (TPNW): Reviewing Legal Impact and Implementation

Authors: Cristina Siserman-Gray

Abstract:

TheTreaty on the Prohibition of Nuclear Weapons(TPNW)will mark in January 2022 one year since the entry into force of the treaty. TPNW provides that within one year of entry into force, the 86 countries that have signed it so far will convene to discuss and take decisions on the treaty’s implementation at the first meeting of states-parties. Austria has formally offered to host the meeting in Vienna in the spring of 2022. At this first meeting, the States Parties would need to work. Among others, on the interpretations of some of the provisions of the Treaty, disarmament timelines under Article 4, and address universalization of the Treaty. The main objective of this paper is to explore the legal implications of the TPNW for States-Parties and discuss how these will impact non-State Parties, particularly the United States. In a first part, the article will address the legal requirements that States Parties to this treaty must adhere to by illustrating some of the progress made by these states regarding the implementation of the TPNW. In a second part, the paper will address the challenges and opportunities for universalizing the treaty and will focus on the response of Nuclear Weapons States, and particularly the current US administration. Since it has become clear that TPNW has become a new and important element to the nonproliferation and disarmament architecture, the article will provide a number of suggestions regarding ways US administration could positively contribute to the international discourse on TPNW.

Keywords: disarmament, arms control and nonproliferation, legal regime, TPNW

Procedia PDF Downloads 167
3070 A Review on Disaster Risk Reduction and Sustainable Development in Nigeria

Authors: Kudu Dangana

Abstract:

The occurrences of disaster often call for the support of both government and non-government organization. Consequently, disaster relief remains extremely important in disaster management. However, this approach alone does not proactively address the need to adduce the human and environment impacts of future disasters. Recent thinking in the area of disaster management is indicative of the need for a new paradigm that focuses on reducing the risk of disasters with the involvement and participation of communities. This paper reviews the need for communities to place more emphasis on a holistic approach to disaster risk reduction. This approach involves risk assessment, risk reduction, early warning and disaster preparedness in order to effectively address the reduction of social, economic, and environmental costs of disasters nationally and at the global level.

Keywords: disaster, early, management, warning, relief, risk vulnerability

Procedia PDF Downloads 649
3069 The Role of Maladaptive Personality Traits in Obesity Treatment – Quantitative Study

Authors: Judita Konečná, Dagmar Halo, Martin Matoulek

Abstract:

Background: Personality pathology does not have to be a contraindication nor an obstacle in obesity treatment, or eventually, surgical treatment. Detection of specific maladaptive personality traits can help us understand the manner of behavior leading to obesity as well as to address the treatment better. Objective: Using The Personality Inventory for DSM-5 (PID-5) in combination with clinical interviews with the goal of gaining a psychological evaluation to set the treatment procedure. Data was collected from more than 400 patients to detect differences in constellations of maladaptive personality traits based on BMI, DM2 and gender. Conclusions: Besides the fact that a psychological evaluation can help address the treatment better, analyses showed that it is also useful to detect specific groups of patients. Implications for clinical practice are discussed, as well as recommendations for group education programs based on quantitative research.

Keywords: bariatric surgery, obesity, personality traits, PID-5, treatment

Procedia PDF Downloads 228
3068 The Education-Development Nexus: The Vision of International Organizations

Authors: Thibaut Lauwerier

Abstract:

This presentation will cover the vision of international organizations on the link between development and education. This issue is very relevant to address the general topic of the conference. 'Educating for development' is indeed at the heart of their discourse. For most of international organizations involved in education, it is important to invest in this field since it is at the service of development. The idea of this presentation is to better understand the vision of development according to these international organizations and how education can contribute to this type of development. To address this issue, we conducted a comparative study of three major international organizations (OECD, UNESCO and World Bank) influencing education policy at the international level. The data come from the strategic reports of these organizations over the period 1990-2015. The results show that the visions of development refer mainly to the neoliberal agenda, despite evolutions, even contradictions. And so, education must increase productivity, improve economic growth, etc. UNESCO, which has a less narrow conception of the development and therefore the aims of education, does not have the same means as the two other organizations to advocate for an alternative vision.

Keywords: development, education, international organizations, poilcy

Procedia PDF Downloads 223