Search results for: publish/subscribe
75 Publish/Subscribe Scientific Workflow Interoperability Framework (PS-SWIF) Architecture and Design
Authors: Ahmed Alqaoud
Abstract:
This paper describes Publish/Subscribe Scientific Workflow Interoperability Framework (PS-SWIF) architecture and its components that collectively provide interoperability between heterogeneous scientific workflow systems. Requirements to achieve interoperability are identified. This paper also provides a detailed investigation and design of models and solutions for system requirements, and considers how workflow interoperability models provided by Workflow Management Coalition (WfMC) can be achieved using the PS-SWIF system.Keywords: publish/subscribe, scientific workflow, web services, workflow interoperability
Procedia PDF Downloads 30774 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 12473 Development and Test of an Open Source PX4 Controler for omnidirectional Unmanned Surface Vehicle
Authors: Norbert Szulc, Cezary Wieczorkowski, Igor Baranowski
Abstract:
In this paper, a control system that bridges the gap in support for Unmanned Surface Vessels in the PX4 Opensource Autopilot was developed. The system is designed for an omnidirectional water craft with four motors. A modular autopilot architecture design centred around publish-subscribe interprocess communication was used. The paper presents the implementation and integration process of a generic surface vehicle controller capable of driving any configuration of motors through the recently introduced in control allocator in PX4 autopilot. The proposed approach was successfully tested in a case study through implementation on the ASV Perkoz.Keywords: control system, PX4, drones, rovers, surface vessels, omnidirectional
Procedia PDF Downloads 8772 Natural Language News Generation from Big Data
Authors: Bastian Haarmann, Likas Sikorski
Abstract:
In this paper, we introduce an NLG application for the automatic creation of ready-to-publish texts from big data. The fully automatic generated stories have a high resemblance to the style in which the human writer would draw up a news story. Topics may include soccer games, stock exchange market reports, weather forecasts and many more. The generation of the texts runs according to the human language production. Each generated text is unique. Ready-to-publish stories written by a computer application can help humans to quickly grasp the outcomes of big data analyses, save time-consuming pre-formulations for journalists and cater to rather small audiences by offering stories that would otherwise not exist.Keywords: big data, natural language generation, publishing, robotic journalism
Procedia PDF Downloads 43171 Wikipedia World: A Computerized Process for Cultural Heritage Data Dissemination
Authors: L. Rajaonarivo, M. N. Bessagnet, C. Sallaberry, A. Le Parc Lacayrelle, L. Leveque
Abstract:
TCVPYR is a European FEDER (European Regional Development Fund) project which aims to promote tourism in the French Pyrenees region by leveraging its cultural heritage. It involves scientists from various domains (geographers, historians, anthropologists, computer scientists...). This paper presents a fully automated process to publish any dataset as Wikipedia articles as well as the corresponding linked information on Wikidata and Wikimedia Commons. We validate this process on a sample of geo-referenced cultural heritage data collected by TCVPYR researchers in different regions of the Pyrenees. The main result concerns the technological prerequisites, which are now in place. Moreover, we demonstrated that we can automatically publish cultural heritage data on Wikimedia.Keywords: cultural heritage dissemination, digital humanities, open data, Wikimedia automated publishing
Procedia PDF Downloads 12770 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19869 Ontological Modeling Approach for Statistical Databases Publication in Linked Open Data
Authors: Bourama Mane, Ibrahima Fall, Mamadou Samba Camara, Alassane Bah
Abstract:
At the level of the National Statistical Institutes, there is a large volume of data which is generally in a format which conditions the method of publication of the information they contain. Each household or business data collection project includes a dissemination platform for its implementation. Thus, these dissemination methods previously used, do not promote rapid access to information and especially does not offer the option of being able to link data for in-depth processing. In this paper, we present an approach to modeling these data to publish them in a format intended for the Semantic Web. Our objective is to be able to publish all this data in a single platform and offer the option to link with other external data sources. An application of the approach will be made on data from major national surveys such as the one on employment, poverty, child labor and the general census of the population of Senegal.Keywords: Semantic Web, linked open data, database, statistic
Procedia PDF Downloads 17568 Using Mobile Phones for M-Learning in Higher Education: A Comparative Study
Authors: Islam Elsayed Hussein Ali, Stefan M. Wagner
Abstract:
Smartphone and tablet computers, as well as other ultra portable devices, have already gained enough critical mass to be considered mainstream devices, being present in the daily lives of millions of higher education students. Many universities throughout the world have already adopted or are planning to adopt mobile technologies in many of their courses as a better way to connect students with the subjects they are studying. These new mobile platforms allow students to access content anywhere/anytime to immerse himself/herself into that content (alone or interacting with teachers or colleagues via web communication forms) and to interact with that content in ways that were not previously possible. This paper plans to provide a thorough overview of the possibilities and consequences of m-learning in higher education environments as a gateway to ubiquitous learning – perhaps the ultimate form of learner engagement, since it allows the student to learn, access and interact with important content in any way or at any time or place he might want so the objective of the study is to examine how the usage of mobile phones for m-learning differs between heavy and light mobile phone users at TU Braunschweig. Heavy mobile phone users are hypothesized to have access to/subscribe to one type of mobile content than light mobile phone users, to have less frequent access to, subscribe to or purchase mobile content within the last year than light mobile phone users, and to pay less money for mobile learning, its content and mobile games than light mobile phone users.Keywords: mobile learning, technologies, applications, higher education
Procedia PDF Downloads 41567 PhD Students’ Challenges with Impact-Factor in Kazakhstan
Authors: Duishon Shamatov
Abstract:
This presentation is about Kazakhstan’s PhD students’ experiences with impact-factor publication requirement. Since the break-up of the USSR, Kazakhstan has been attempting to improve its higher education system at undergraduate and graduate levels. From March, 2010 Kazakhstan joined Bologna process and entered European space of higher education. To align with the European system of higher education, three level of preparation of specialists (undergraduate, master and PhD) was adopted to replace the Soviet system. The changes were aimed at promoting high quality higher education that meets the demands of labor market and growing needs of the industrial-innovative development of the country, and meeting the international standards. The shift to the European system has brought many benefits, but there are also some serious challenges. One of those challenges is related to the requirements for the PhD candidates to publish in national and international journals. Thus, a PhD candidate should have 7 publications in total, out of which one has to be in an international impact factor journal. A qualitative research was conducted to explore the PhD students’ views of their experiences with impact-factor publications. With the help of purposeful sampling, 30 PhD students from seven universities across Kazakhstan were selected for individual and focus group interviews. The key findings of the study are as follows. While the Kazakh PhD students have no difficulties in publishing in local journals, they face great challenges in attempting to publish in impact-factor journals for a range of reasons. They include but not limited to lack of research and publication skills, poorer knowledge of academic English, not familiarity with the peer review publication processes and expectations, and very short time to get published due to their PhD programme requirements. This situation is pushing some these young scholars explore alternative ways to get published in impact factor journals and they seek to publish by any means and often by any costs (which means even paying large sum of money for a publication). This in turn, creates a myth in the scholars’ circles in Kazakhstan, that to get published in impact factor journals, one should necessarily pay much money. This paper offers some policy recommendations on how to improve preparation of future PhD candidates in Kazakhstan.Keywords: Bologna process, impact-factor publications, post-graduate education, Kazakhstan
Procedia PDF Downloads 37966 Towards a Broader Understanding of Journal Impact: Measuring Relationships between Journal Characteristics and Scholarly Impact
Authors: X. Gu, K. L. Blackmore
Abstract:
The impact factor was introduced to measure the quality of journals. Various impact measures exist from multiple bibliographic databases. In this research, we aim to provide a broader understanding of the relationship between scholarly impact and other characteristics of academic journals. Data used for this research were collected from Ulrich’s Periodicals Directory (Ulrichs), Cabell’s (Cabells), and SCImago Journal & Country Rank (SJR) from 1999 to 2015. A master journal dataset was consolidated via Journal Title and ISSN. We adopted a two-step analysis process to study the quantitative relationships between scholarly impact and other journal characteristics. Firstly, we conducted a correlation analysis over the data attributes, with results indicating that there are no correlations between any of the identified journal characteristics. Secondly, we examined the quantitative relationship between scholarly impact and other characteristics using quartile analysis. The results show interesting patterns, including some expected and others less anticipated. Results show that higher quartile journals publish more in both frequency and quantity, and charge more for subscription cost. Top quartile journals also have the lowest acceptance rates. Non-English journals are more likely to be categorized in lower quartiles, which are more likely to stop publishing than higher quartiles. Future work is suggested, which includes analysis of the relationship between scholars and their publications, based on the quartile ranking of journals in which they publish.Keywords: academic journal, acceptance rate, impact factor, journal characteristics
Procedia PDF Downloads 30465 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 15464 Understanding Embryology in Promoting Peace Leadership: A Document Review
Authors: Vasudev Das
Abstract:
The specific problem is that many leaders of the 21st century do not understand that the extermination of embryos wreaks havoc on peace leadership. The purpose of the document review is to understand embryology in facilitating peace leadership. Extermination of human embryos generates a requital wave of violence which later falls on human society in the form of disturbances, considering that violence breeds further violence as a consequentiality. The study results reveal that a deep understanding of embryology facilitates peace leadership, given that minimizing embryo extermination enhances non-violence in the global village. Neo-Newtonians subscribe to the idea that every action has an equal and opposite reaction. The US Federal Government recognizes the embryo or fetus as a member of Homo sapiens. The social change implications of this study are that understanding human embryology promotes peace leadership, considering that the consequentiality of embryo extermination can serve as a deterrent for violence on embryos.Keywords: consequentiality, Homo sapiens, neo-Newtonians, violence
Procedia PDF Downloads 13663 Game of Funds: Efficiency and Policy Implications of the United Kingdom Research Excellence Framework
Authors: Boon Lee
Abstract:
Research publication is an essential output of universities because it not only promotes university recognition, it also receives government funding. The history of university research culture has been one of ‘publish or perish’ and universities have consistently encouraged their academics and researchers to produce research articles in reputable journals in order to maintain a level of competitiveness. In turn, the United Kingdom (UK) government funding is determined by the number and quality of research publications. This paper aims to investigate on whether more government funding leads to more quality papers. To that end, the paper employs a Network DEA model to evaluate the UK higher education performance over a period. Sources of efficiency are also determined via second stage regression analysis.Keywords: efficiency, higher education, network data envelopment analysis, universities
Procedia PDF Downloads 11462 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea
Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee
Abstract:
Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking
Procedia PDF Downloads 34961 Representation of the Iranian Community in the Videos of the Instagram Page of the World Health Organization Representative in Iran
Authors: Naeemeh Silvari
Abstract:
The phenomenon of the spread and epidemic of the corona virus caused many aspects of the social life of the people of the world to face various challenges. In this regard, and in order to improve the living conditions of the people, the World Health Organization has tried to publish the necessary instructions for its contacts in the world in the form of its media capacities. Considering the importance of cultural differences in the discussion of health communication and the distinct needs of people in different societies, some production contents were produced and published exclusively. This research has studied six videos published on the official page of the World Health Organization in Iran as a case study. The published content has the least semantic affinity with Iranian culture, and it has been tried to show a uniform image of the Middle East with the predominance of the image of the culture of the developing Arab countries.Keywords: corona, representation, semiotics, instagram, health communication
Procedia PDF Downloads 9360 Checking Energy Efficiency by Simulation Tools: The Case of Algerian Ksourian Models
Authors: Khadidja Rahmani, Nahla Bouaziz
Abstract:
Algeria is known for its rich heritage. It owns an immense historical heritage with a universal reputation. Unfortunately, this wealth is withered because of abundance. This research focuses on the Ksourian model, which constitutes a large portion of this wealth. In fact, the Ksourian model is not just a witness to a great part of history or a vernacular culture, but also it includes a panoply of assets in terms of energetic efficiency. In this context, the purpose of our work is to evaluate the performance of the old techniques which are derived from the Ksourian model , and that using the simulation tools. The proposed method is decomposed in two steps; the first consists of isolate and reintroduce each device into a basic model, then run a simulation series on acquired models. And this in order to test the contribution of each of these dialectal processes. In another scale of development, the second step consists of aggregating all these processes in an aboriginal model, then we restart the simulation, to see what it will give this mosaic on the environmental and energetic plan .The model chosen for this study is one of the ksar units of Knadsa city of Bechar (Algeria). This study does not only show the ingenuity of our ancestors in their know-how, and their adapting power to the aridity of the climate, but also proves that their conceptions subscribe in the current concerns of energy efficiency, and respond to the requirements of sustainable development.Keywords: dialectal processes, energy efficiency, evaluation, Ksourian model, simulation tools
Procedia PDF Downloads 19559 The Relevance of Corporate Governance Disclosure in Spanish Public Universities
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
There is currently a growing interest in the improvement of university governance and the disclosure of information on corporate governance processes as an essential part of the transparency and accountability of universities. This paper aims to know the importance given by Spanish university stakeholders to the disclosure of information about structure and mechanism of corporate governance. So as to meet this objective we propose a model for disclosing information on the main aspects of university governance in Spanish universities. This model will be validated using a questionnaire sent to members of the Social Councils of public universities in Spain. Our results show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance, which would result in improved transparency and accountability. According to the results of this study it may be concluded that the university stakeholders feel that it is relevant to publish information on corporate governance in the university accounting information model.Keywords: corporate governance, transparency, accountability, universities, Spain
Procedia PDF Downloads 31158 "Revolutionizing Geographic Data: CADmapper's Automated Precision in CAD Drawing Transformation"
Authors: Toleen Alaqqad, Kadi Alshabramiy, Suad Zaafarany, Basma Musallam
Abstract:
CADmapper is a significant tool of software for transforming geographic data into realistic CAD drawings. It speeds up and simplifies the conversion process by automating it. This allows architects, urban planners, engineers, and geographic information system (GIS) experts to solely concentrate on the imaginative and scientific parts of their projects. While the future incorporation of AI has the potential for further improvements, CADmapper's current capabilities make it an indispensable asset in the business. It covers a combination of 2D and 3D city and urban area models. The user can select a specific square section of the map to view, and the fee is based on the dimensions of the area being viewed. The procedure is straightforward: you choose the area you want, then pick whether or not to include topography. 3D architectural data (if available), followed by selecting whatever design program or CAD style you want to publish the document which contains more than 200 free broad town plans in DXF format. If you desire to specify a bespoke area, it's free up to 1 km2.Keywords: cadmaper, gdata, 2d and 3d data conversion, automated cad drawing, urban planning software
Procedia PDF Downloads 6857 Greyscale: A Tree-Based Taxonomy for Grey Literature Published by Fisheries Agencies
Authors: Tatiana Tunon, Gottfried Pestal
Abstract:
Government agencies responsible for the management of fisheries resources publish many types of grey literature, and these materials are increasingly accessible to the public on agency websites. However, scope and quality vary considerably, and end-users need meta-data about the report series when deciding whether to use the information (e.g. apply the methods, include the results in a systematic review), or when prioritizing materials for archiving (e.g. library holdings, reference databases). A proposed taxonomy for these report series was developed based on a review of 41 report series from 6 government agencies in 4 countries (Canada, New Zealand, Scotland, and United States). Each report series was categorized according to multiple criteria describing peer-review process, content, and purpose. A robust classification tree was then fitted to these descriptions, and the resulting taxonomic groups were used to compare agency output from 4 countries using reports available in their online repositories.Keywords: classification tree, fisheries, government, grey literature
Procedia PDF Downloads 28356 Socioeconomic Status and Use of Web-Based Information Resources by Public Polytechnic Students in Southwestern Nigeria
Authors: John Adeboye Oyeboade, Pius Olatunji Olaojo, Kuburay Folashade Yusuf, John Oluwaseye Adebayo
Abstract:
Web-based Information Resources (WBIR) are increasingly becoming essential tools for students to accomplish academic tasks. Preliminary observation revealed that many polytechnic libraries in Southwestern Nigeria do not subscribe or renew subscriptions to WBIR academic databases, and students use free-based electronic resources. Hence, this study was carried out to investigate socioeconomic status and use of WBIR by public polytechnic students in Southwestern Nigeria. Six public polytechnics out of the 16 offerings of Higher National Diploma (HND) programs were selected by stratified random sampling to reflect federal and state polytechnics. A proportionate size sampling technique was used to select 1,463 HND students. The instruments used were Socioeconomic status (SeS) (α=0.81) and WBIR used for Academic Tasks (α=0.98) scales. Data were analyzed using descriptive statistics and Pearson’s product-moment correlation at a 0.05 level of significance. Students’ SeS ( =79.10) was moderate. Online reference sources ( =3.97), Web 2.0 ( =3.50), and social media ( =3.00) were regularly used WBIR. WBIR use ( =53.34) was moderate. The students used WBIR for project writing ( =3.46) and class assignments ( =3.42). The Students’ SeS (r=0.59) had significant relationships with WBIR use. Socioeconomic status directly influenced the use of WBIR for academic tasks. Management of polytechnics should provide WBIR subscriptions for students’ use in the polytechnic e-libraries.Keywords: public polytechnic students, polytechnic libraries, socioeconomic status, Web-based information resources
Procedia PDF Downloads 7555 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State
Authors: Rebecca Rumbul
Abstract:
The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.Keywords: digital, ICT, transparency, civic technology
Procedia PDF Downloads 66254 The Rise of Boko Haram in Nigeria: Lesson for Ghana
Authors: Emmanuel Anim
Abstract:
Ghana has been touted as an oasis of peace in Africa following her relatively peaceful democratic elections, proliferated number of the media, and freedom of speech. Besides, the former Gold Coast country is yet to experience any major incidence of terrorism. Nevertheless, the somewhat occasional simmering violence and conflicts arising from political, religious and chieftaincy skirmishes, largely at its northern part portrays that it is not immune to the political violence of terrorism. The predominantly-based qualitative research reveals that current conditions of socio-politico-economic, and religious issues in Ghana places the West African country on the possible sidelines of the phenomenon of terrorism, when its status quo is juxtaposed with the factors enumerated to have culminated in the rise of Boko Haram, and its accompanying insurgency in Nigeria. Arguing from the perspective of the theory of Social Movement, the analyses and discussions note that the current state of affairs in Ghana could foster domestic terrorism in the country. What is more, the research shows that Ghana faces threats from transnational terrorism given the tendency for elements in Ghana to sympathize and subscribe to the ideological dictates and appeals from Boko Haram and other terrorist organizations. As a consequence, the study recommends that adverse conditions of poverty, poor governance, unemployment, and rising levels of (Islamic) religious radicalization should be remedied by economic improvements, good governance, job creation, and de-radicalization programs by government officials to aid mitigate the incidence of terrorism in the country.Keywords: Boko Haram, Ghana, Nigeria, terrorism
Procedia PDF Downloads 42853 Benchmarking of Pentesting Tools
Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities
Procedia PDF Downloads 31952 Modeling of Oligomerization of Ethylene in a Falling film Reactor for the Production of Linear Alpha Olefins
Authors: Adil A. Mohammed, Seif-Eddeen K. Fateen, Tamer S. Ahmed, Tarek M. Moustafa
Abstract:
Falling film were widely used for gas-liquid absorption and reaction process. Modeling of falling film for oligomerization of ethylene reaction to linear alpha olefins is developed. Although there are many researchers discuss modeling of falling film in many processes, there has been no publish study the simulation of falling film for the oligomerization of ethylene reaction to produce linear alpha olefins. The Comsol multiphysics software was used to simulate the mass transfer with chemical reaction in falling film absorption process. The effect of concentration profile absorption of the products through falling thickness is discussed. The effect of catalyst concentration, catalyst/co-catalyst ratio, and temperature is also studied. For the effect of the temperature, as it increase the concentration of C4 increase. For catalyst concentration and catalyst/co-catalyst ratio as they increases the concentration of C4 increases, till it reached almost constant value.Keywords: falling film, oligomerization, comsol mutiphysics, linear alpha olefins
Procedia PDF Downloads 47051 Multi-Criteria Optimization of High-Temperature Reversed Starter-Generator
Authors: Flur R. Ismagilov, Irek Kh. Khayrullin, Vyacheslav E. Vavilov, Ruslan D. Karimov, Anton S. Gorbunov, Danis R. Farrakhov
Abstract:
The paper presents another structural scheme of high-temperature starter-generator with external rotor to be installed on High Pressure Shaft (HPS) of aircraft engines (AE) to implement More Electrical Engine concept. The basic materials to make this starter-generator (SG) were selected and justified. Multi-criteria optimization of the developed structural scheme was performed using a genetic algorithm and Pareto method. The optimum (in Pareto terms) active length and thickness of permanent magnets of SG were selected as a result of the optimization. Using the dimensions obtained, allowed to reduce the weight of the designed SG by 10 kg relative to a base option at constant thermal loads. Multidisciplinary computer simulation was performed on the basis of the optimum geometric dimensions, which proved performance efficiency of the design. We further plan to make a full-scale sample of SG of HPS and publish the results of its experimental research.Keywords: high-temperature starter-generator, more electrical engine, multi-criteria optimization, permanent magnet
Procedia PDF Downloads 36850 Bridging the Internalist-Externalist Divide: A Catholic-Reformed Epistemological Synthesis of the Justification of Christian Beliefs
Authors: Linto Francis Kallukulangara
Abstract:
Although the Catholic and Reformed traditions share a common baptismal heritage, they differe considerably in their epistemic stance on whether a believer can legitimatly subscribe to a proposition of Christian Revelation without any evidence. Catholic tradition, which is essentially rooted in the internalist epistemology, posits that a theistic belief must be substantiated by a rational ground that is cognitively accessible to the believer. In contrast, Reformed thinkers have historically maintained a non-evidentialist stance, which has received strong criticism, including allegations of irrationality. However, recent developments in analytic philosophy, particularly the rise of externalist epistemology, have revitalized the non-evidentialist position within the Reformed tradition. The intellectual allure of this movement has led many contemporary thinkers to argue that the Catholic internalist/evidentialist position has not only been significantly challenged but has also been largely silenced by this externalism-based Reformed epistemological stance. Consequently, they argue that the non-cogntive Reformed currect has established itself as the dominant, or perhaps the only, epistemological position in the philosophy of religion. This paper counters the prevailing narrative, arguing that despite the ostensible challenge posed by Reformed non-evidentialism, a synthesis is possible. By analyzing various Reformed epistemological movements within the contemporary anaytic tradtion, we demonstrate that externalist-based Reformed epistemology does not fundamentally undermine Catholic evidentialism. Instead, it offers a new and more promising framework for a Christian epistemology that sythesizes elements from both traditions, offering a more comprehensive and nuanced understing of the justification of religion belief, incoperating both internalist and externalist perspective.Keywords: reformed and catholic epistemology, evidentialism, non-evidentialism, internalism, externalism
Procedia PDF Downloads 2349 Rating and Generating Sudoku Puzzles Based on Constraint Satisfaction Problems
Authors: Bahare Fatemi, Seyed Mehran Kazemi, Nazanin Mehrasa
Abstract:
Sudoku is a logic-based combinatorial puzzle game which people in different ages enjoy playing it. The challenging and addictive nature of this game has made it a ubiquitous game. Most magazines, newspapers, puzzle books, etc. publish lots of Sudoku puzzles every day. These puzzles often come in different levels of difficulty so that all people, from beginner to expert, can play the game and enjoy it. Generating puzzles with different levels of difficulty is a major concern of Sudoku designers. There are several works in the literature which propose ways of generating puzzles having a desirable level of difficulty. In this paper, we propose a method based on constraint satisfaction problems to evaluate the difficulty of the Sudoku puzzles. Then, we propose a hill climbing method to generate puzzles with different levels of difficulty. Whereas other methods are usually capable of generating puzzles with only few number of difficulty levels, our method can be used to generate puzzles with arbitrary number of different difficulty levels. We test our method by generating puzzles with different levels of difficulty and having a group of 15 people solve all the puzzles and recording the time they spend for each puzzle.Keywords: constraint satisfaction problem, generating Sudoku puzzles, hill climbing
Procedia PDF Downloads 40248 Short Text Classification for Saudi Tweets
Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq
Abstract:
Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter
Procedia PDF Downloads 15547 Shooting in The Foot at The Pulpit; An Analysis of Analysis of The Origin and Progression of Conflict Among the Born-Again Churches in Uganda
Authors: Baguma Charles Abwooli
Abstract:
Whereas they profess to be comrades in the fight to save souls, Born Again Churches in Uganda are shooting each other in the foot over yet to be understood reasons. For a long time, churches have sustained a bitter divide among themselves. The country has witnessed pastoral scandals, including church leaders dragging each other to court, setting each other’s churches ablaze, and even plotting assassination against each her. The most dreadful was when one pastor called a chest-thumping press conference at the demise of another. There is even an emergence of church-owned radio stations purposed to fuel this conflict. Worse still, the division among pastors has been transferred to their congregations to extent that at the first meeting, congregants ask each other where they pray from perhaps to know how to deal with each other. This has caused the born-again to maintain factions among themselves and keeping ready to fight in case there is a battle. This is quite a risk to peace and stability in the country. This kind of belligerence not only defeats the very existence of churches but is a threat to national peace and security, especially as the churches mushroom across the country. It is feared that the vice could spread to the rest of Eastern Africa and beyond, given the connectivity. There is already evidence to this. One Pastor was heard to call the late Ghanaian Pastor T. B. Joshua, a witch who has been training witches in Uganda. He said this at his demise while referring to pastors that subscribe to T. B. Joshua’s approach to preaching the Gospel. This is an abomination, especially in Africa! There is, therefore, an urgent need to understand the roots of this conflict and design measures to decisively manageit. The present study employs tools based on conflict resolution theory to conduct a deep qualitative analysis of the origin and progression of the Born-Againconflict in Uganda with intend to make recommendations of appropriate measures to resolve it.Keywords: uganda, shooting, pulpit, born again churches
Procedia PDF Downloads 12846 Exploring Challenges Faced by People Living with HIV/AIDS After Disclosure in Sub-Saharan Countries
Authors: Veliswa Nonfundo Hoho, Jabulani Gilford Kheswa
Abstract:
HIV/AIDS has been a long-term condition worldwide, which does not only affect physical health but also causes psychological and social challenges in people living with this condition. In Sub-Saharan countries, namely; Nigeria, Uganda, Zimbabwe and South Africa, people living with HIV/AIDS come across different challenges especially after one has disclosed his/her status. They experience stigma and discrimination, isolation, lack of accessing and receiving treatment, lack of support and experience psychological distress. By using the evidence-based systematic review as a form of methodology, journal articles, dissertations, internet, and books were explored. This paper seeks to describe the challenges faced by people living with HIV/AIDS after disclosure, which forms a critical component of HIV/AIDS prevention and treatment interventions. The disclosure process model is used to underpin the study. This theory allows one to understand when and why interpersonal and verbal self-disclosure is beneficial for individuals who live with concealable stigmatized identities such as HIV/AIDS. Literature findings advocate that both negative and positive results were noted after disclosing one’s HIV status and psychosocial well-being of the majority of people living with HIV/AIDS also get affected especially in societies which subscribe HIV/AIDS pandemic to witchcraft. As for the infected homosexuals, research indicates that they suffer in silence and to cover their emotional emptiness due to ostracism, they often report low- self-efficacy with regard to condom use and become susceptible to reinfections which further place their lives at heightened risk for low immune system. In this regard, this paper challenges the policies which protect the dignity of people living with HIV/AIDS and calls for unity and financial support in favour of psychoeducational programmes and support groups aimed at curbing discrimination.Keywords: disclosure, discrimination, homosexuality, self-efficacy
Procedia PDF Downloads 235