Search results for: demolition threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1093

Search results for: demolition threat

793 Forced Swim Stress Does Not Induce Structural Chromosomal Aberrations in Rat Bone Marrow

Authors: Mohammad Y. Alfaifi

Abstract:

Anything that poses a challenge or a threat to our well-being is a stress. Understanding the genetic material and cellular response of rats threatened with Repeated swimming stress provides insights that can influence human health. The aim of the present study was to assess the genetical damage and cytological changes caused by exposure of the test organism (Rattus rattus) to forced swimming stress. For this purpose, animals have been submerged in water path 15 minutes daily for 2 weeks. Following that, we performed a micronuclei (MN) test using MNNCE (Micronucleated normocromatic erythrocytes) and MNPCE (Micronucleated polychromatic erythrocytes), NDI (Nuclear division index) and cytological parameters using NDCI (nuclear division cytotoxicity index), necrotic and apoptotic cells in rat's bone marrow samples. Results showed that there was a slightly but not significant increase in the frequency of micronucleated as well as in cytological parameters in bone marrow cells.

Keywords: submergence stress, micronucleus, NDI, NDCI, toxicity, chromosomal aberrations

Procedia PDF Downloads 372
792 High Temperature Creep Analysis for Lower Head of Reactor Pressure Vessel

Authors: Dongchuan Su, Hai Xie, Naibin Jiang

Abstract:

Under severe accident cases, the nuclear reactor core may meltdown inside the lower head of the reactor pressure vessel (RPV). Retaining the melt pool inside the RPV is an important strategy of severe accident management. During this process, the inner wall of the lower head will be heated to high temperature of a thousand centigrade, and the outer wall is immersed in a large amount of cooling water. The material of the lower head will have serious creep damage under the high temperature and the temperature difference, and this produces a great threat to the integrity of the RPV. In this paper, the ANSYS program is employed to build the finite element method (FEM) model of the lower head, the creep phenomena is simulated under the severe accident case, the time dependent strain and stress distribution is obtained, the creep damage of the lower head is investigated, the integrity of the RPV is evaluated and the theoretical basis is provided for the optimized design and safety assessment of the RPV.

Keywords: severe accident, lower head of RPV, creep, FEM

Procedia PDF Downloads 206
791 Analyzing a Human Rights Approach to Poverty and Development Goals in the ASEAN Region

Authors: Nithya Devi

Abstract:

Poverty, hunger and water scarcity are threats to human rights and are assaults on human dignity. The very existence of man is questioned when his basic rights are violated. Addressing this social phenomenon should be a key objective of any human rights discourse. The origins of these problems have various root causes. For Asia, colonisation was an essential factor that caused great inequalities in the distribution of wealth. In the post-colonial era, the colonised states were developing nations grappling with these issues. Today, some of the developing states have progressed to developed nations. However, others remain as economically vulnerable countries. Within states, the widening income gap poses further threat to human rights. Hence ASEAN states have prioritised socio-economic rights, particularly basic needs, in the human rights discourse in this region. To date, poverty and development goals are given primary importance. This paper seeks to show how a human rights approach has dealt with poverty and development goals in this region and evaluates its effectiveness in addressing these concerns.

Keywords: ASEAN, development, human rights, poverty

Procedia PDF Downloads 324
790 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 162
789 Potential Assessment and Techno-Economic Evaluation of Photovoltaic Energy Conversion System: A Case of Ethiopia Light Rail Transit System

Authors: Asegid Belay Kebede, Getachew Biru Worku

Abstract:

The Earth and its inhabitants have faced an existential threat as a result of severe manmade actions. Global warming and climate change have been the most apparent manifestations of this threat throughout the world, with increasingly intense heat waves, temperature rises, flooding, sea-level rise, ice sheet melting, and so on. One of the major contributors to this disaster is the ever-increasing production and consumption of energy, which is still primarily fossil-based and emits billions of tons of hazardous GHG. The transportation industry is recognized as the biggest actor in terms of emissions, accounting for 24% of direct CO2 emissions and being one of the few worldwide sectors where CO2 emissions are still growing. Rail transportation, which includes all from light rail transit to high-speed rail services, is regarded as one of the most efficient modes of transportation, accounting for 9% of total passenger travel and 7% of total freight transit. Nonetheless, there is still room for improvement in the transportation sector, which might be done by incorporating alternative and/or renewable energy sources. As a result of these rapidly changing global energy situations and rapidly dwindling fossil fuel supplies, we were driven to analyze the possibility of renewable energy sources for traction applications. Even a small achievement in energy conservation or harnessing might significantly influence the total railway system and have the potential to transform the railway sector like never before. As a result, the paper begins by assessing the potential for photovoltaic (PV) power generation on train rooftops and existing infrastructure such as railway depots, passenger stations, traction substation rooftops, and accessible land along rail lines. As a result, a method based on a Google Earth system (using Helioscopes software) is developed to assess the PV potential along rail lines and on train station roofs. As an example, the Addis Ababa light rail transit system (AA-LRTS) is utilized. The case study examines the electricity-generating potential and economic performance of photovoltaics installed on AALRTS. As a consequence, the overall capacity of solar systems on all stations, including train rooftops, reaches 72.6 MWh per day, with an annual power output of 10.6 GWh. Throughout a 25-year lifespan, the overall CO2 emission reduction and total profit from PV-AA-LRTS can reach 180,000 tons and 892 million Ethiopian birrs, respectively. The PV-AA-LRTS has a 200% return on investment. All PV stations have a payback time of less than 13 years, and the price of solar-generated power is less than $0.08/kWh, which can compete with the benchmark price of coal-fired electricity. Our findings indicate that PV-AA-LRTS has tremendous potential, with both energy and economic advantages.

Keywords: sustainable development, global warming, energy crisis, photovoltaic energy conversion, techno-economic analysis, transportation system, light rail transit

Procedia PDF Downloads 60
788 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 136
787 Contributions of Search and Rescue to the World Peace

Authors: Dursun Kalebaşi

Abstract:

When we examine the history of mankind (from the past up to the present), we see that millions of people died because of the wars. Especially, since the beginning of 19th century, the increase of the human death rate is caused mostly by the regional conflicts and natural disasters rather than the wars. From that point of view, the biggest threat humanity face today is temperature increase and climate change that started to emerge in recent years. When we take into account the natural disasters on one hand and refuges that flee from regional conflicts on the other, it stands out as a dramatic situation because of the huge human losses. In this context, most of the countries started to give more importance to Search and Rescue (SAR) operations to stop the loss of lives or decrease the death rate. This article will tell about the SAR activities in Turkey since 2000 and discuss the Turkey’s contributions to Rescue Missions after the natural disasters in different parts of the world. Moreover, there will be some new highlights to a more habitable and more peaceful world through the SAR missions.

Keywords: search and rescue, natural disasters, migration and world peace, Turkish army forces

Procedia PDF Downloads 353
786 A Social Care Intervention for Improving the Quality of Life of People Living with HIV/AIDS in Ghana

Authors: Tina Abrefa-Gyan

Abstract:

Background: In Ghana and the rest of sub-Saharan Africa, HIV/AIDS is a public health threat and also causes medical crises for many who are infected with the virus. Objective: This study tested a social care intervention developed to help improve the quality of life of those living with HIV/AIDS in Ghana. Method: Adult respondents (N = 248) were assigned to receive the intervention or usual care for six weeks. Results: Results of the study revealed significant differences between the treatment and control groups in their reports of quality of life. Respondents reported better quality of life upon receiving the intervention. Implication: This study sheds light on the positive relationship between the intervention and quality of life among those living with HIV/AIDS in Ghana. Conclusion: The intervention is innovative and novel in the setting. It will, therefore, help to reduce the risks such as depression, low cognitive functioning, and low physical functioning associated with low quality of life among people living with HIV/AIDS in Ghana in specific, and in sub-Saharan Africa in general.

Keywords: social care intervention, HIV/AIDS, Ghana, quality of life

Procedia PDF Downloads 439
785 On-line Control of the Natural and Anthropogenic Safety in Krasnoyarsk Region

Authors: T. Penkova, A. Korobko, V. Nicheporchuk, L. Nozhenkova, A. Metus

Abstract:

This paper presents an approach of on-line control of the state of technosphere and environment objects based on the integration of Data Warehouse, OLAP and Expert systems technologies. It looks at the structure and content of data warehouse that provides consolidation and storage of monitoring data. There is a description of OLAP-models that provide a multidimensional analysis of monitoring data and dynamic analysis of principal parameters of controlled objects. The authors suggest some criteria of emergency risk assessment using expert knowledge about danger levels. It is demonstrated now some of the proposed solutions could be adopted in territorial decision making support systems. Operational control allows authorities to detect threat, prevent natural and anthropogenic emergencies and ensure a comprehensive safety of territory.

Keywords: decision making support systems, emergency risk assessment, natural and anthropogenic safety, on-line control, territory

Procedia PDF Downloads 377
784 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection

Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor

Abstract:

Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.

Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing

Procedia PDF Downloads 181
783 Threats and Preventive Methods to Avoid Bird Strikes at the Deblin Military Airfield, Poland

Authors: J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

The paper presents results of the project conducted in Poland devoted to study on bird strikes at military airfields. The main aim of this project was to develop methods of aircraft protection against threats from birds. The studies were carried out using two methods. One by transect and the other one by selected sector scanning. During the research, it was recorded, that 104 species of birds in the number about of 36000 were observed. The most frequent ones were starling Sturnus vulgaris (31.0%), jackdaw Corvus monedula (18.3%), rook Corvus frugilegus (15.9 %), lapwing Vanellus vanellus (6.2%). Moreover, it was found, that starlings constituted the most serious threat. It resulted from their relatively high attendance at the runway (about 300 individuals). Possible repellent techniques concerning of the Deblin military airfield were discussed. The analysis of the birds’ concentration depending on the altitude, part of the day, year, part of the airfield constituted a base to work out critical flight phase and appropriate procedures to prevent bird strikes.

Keywords: airport, bird strikes, flight safety, preventive methods

Procedia PDF Downloads 374
782 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 112
781 Corruption and the Entrenchment of the Rule of Law in Nigeria

Authors: Grace Titilayo, Kolawole-Amao

Abstract:

Influence and authority of law within society should be respected by all and sundry regardless of individual status. Rule of law implies that every citizen is subject to the law. In a society governed by the rule of law, government and its officials and agents are also held subject to and accountable under the law. Law should not be employed to suit individual tenets. Where the rule of law operates, the government is the government of law and not of men. Corruption is a factor that kills the growth of the rule of law. Where corruption flourishes, the rule of law fails, simply put, corruption is a threat to the rule of law. It bastardized and undermines the rule of law and good governance principles - where men rule at their discretion rather than the use of the rule of law which makes governance processes ineffective. Corruption is prevalent all over the world, and has extremely far reaching effects. Many of the world’s greatest challenges have been amplified by corruption, for example poverty, unequal distribution of wealth and resources, and world hunger and it weakens the application and the entrenchment of the rule of law. It saps citizens' trust in their governments and undercuts government credibility. This paper will discuss the rule of law in the present democratic system in Nigeria, the impact of corruption on the rule of law in Nigeria and how corruption undermines and subverts the entrenchment of the rule of law in the present day Nigeria.

Keywords: rule of law, corruption, Nigeria, influence, authority

Procedia PDF Downloads 531
780 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding

Authors: R. S. Remya, U. S. Sethulekshmi

Abstract:

Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.

Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering

Procedia PDF Downloads 336
779 Malaria Vulnerability Mapping from the Space: A Case Study of Damaturu Town-Nigeria

Authors: Isa Muhammad Zumo

Abstract:

Malaria is one of the worst illnesses that may affect humans. It is typically transmitted by the bite of a female Anopheles mosquito and is caused by parasitic protozoans from the Plasmodium parasite. Government and non-governmental organizations made numerous initiatives to combat the threat of malaria in communities. Nevertheless, the necessary attention was not paid to accurate and current information regarding the size and location of these favourable locations for mosquito development. Because mosquitoes can only reproduce in specific habitats with surface water, this study will locate and map those favourable sites that act as mosquito breeding grounds. Spatial and attribute data relating to favourable mosquito breeding places will be collected and analysed using Geographic Information Systems (GIS). The major findings will be in five classes, showing the vulnerable and risky areas for malaria cases. These risk categories are very high, high, moderate, low, and extremely low vulnerable areas. The maps produced by this study will be of great use to the health department in combating the malaria pandemic.

Keywords: Malaria, vulnerability, mapping, space, Damaturu

Procedia PDF Downloads 31
778 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 117
777 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 339
776 Divalent Iron Oxidative Process for Degradation of Carbon and Nitrogen Based Pollutants from Dye Intermediate Industrial Wastewater

Authors: Nibedita Pani, Vishnu Tejani, T. S. Anantha Singh

Abstract:

Water pollution resulting from discharge of partial/not treated textile wastewater containing high carbon and nitrogen pollutants pose a huge threat to the environment, ecosystem, and human health. It is essential to remove carbon- and nitrogen-based organic pollutants more effectively from industrial wastewater before discharging. The present study focuses on removal of carbon-based pollutant in particular COD (chemical oxygen demand) and nitrogen-based pollutants, in particular, ammoniacal nitrogen by Fenton oxidation process using Fe²⁺ and H₂O₂ as reagents. The study was carried out with high strength wastewater containing initial COD 5632 mg/L and NH⁴⁺-N 1372 mg/L. The major operating condition like pH was varied between 1.0 to 4.0. The maximum degradation was obtained at pH 3.0 taking the molar ratio of Fe²⁺/H₂O₂ as 1:1. At this pH, the removal efficiencies of COD and ammoniacal nitrogen were found to be 77.27% and 74.9%, respectively. The Fenton process can be the best alternative for the simultaneous removal of COD and NH4+-N from industrial wastewater.

Keywords: ammoniacal nitrogen, COD, Fenton oxidation, industrial wastewater

Procedia PDF Downloads 165
775 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey

Authors: Stephanie M. De Oliveira

Abstract:

For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.

Keywords: refugees, Turkey, asylum seekers, United Nations

Procedia PDF Downloads 337
774 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 128
773 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria

Authors: Paul Anyaogu, E. U. M. Igbo

Abstract:

This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.

Keywords: Aba Urban, child street hawking, dangers, disposition, poverty

Procedia PDF Downloads 255
772 Life in Bequia in the Era of Climate Change: Societal Perception of Adaptation and Vulnerability

Authors: Sherry Ann Ganase, Sandra Sookram

Abstract:

This study examines adaptation measures and factors that influence adaptation decisions in Bequia by using multiple linear regression and a structural equation model. Using survey data, the results suggest that households are knowledgeable and concerned about climate change but lack knowledge about the measures needed to adapt. The findings from the SEM suggest that a positive relationship exist between vulnerability and adaptation, vulnerability and perception, along with a negative relationship between perception and adaptation. This suggests that being aware of the terms associated with climate change and knowledge about climate change is insufficient for implementing adaptation measures; instead the risk and importance placed on climate change, vulnerability experienced with household flooding, drainage and expected threat of future sea level are the main factors that influence the adaptation decision. The results obtained in this study are beneficial to all as adaptation requires a collective effort by stakeholders.

Keywords: adaptation, Bequia, multiple linear regression, structural equation model

Procedia PDF Downloads 433
771 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 110
770 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 351
769 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 86
768 Create a Brand Value Assessment Model to Choosing a Cosmetic Brand in Tehran Combining DEMATEL Techniques and Multi-Stage ANFIS

Authors: Hamed Saremi, Suzan Taghavy, Seyed Mohammad Hanif Sanjari, Mostafa Kahali

Abstract:

One of the challenges in manufacturing and service companies to provide a product or service is recognized Brand to consumers in target markets. They provide most of their processes under the same capacity. But the constant threat of devastating internal and external resources to prevent a rise Brands and more companies are recognizing the stages are bankrupt. This paper has tried to identify and analyze effective indicators of brand equity and focuses on indicators and presents a model of intelligent create a model to prevent possible damage. In this study, the identified indicators of brand equity are based on literature study and according to expert opinions, set of indicators By techniques DEMATEL Then to used Multi-Step Adaptive Neural-Fuzzy Inference system (ANFIS) to design a multi-stage intelligent system for assessment of brand equity.

Keywords: brand, cosmetic product, ANFIS, DEMATEL

Procedia PDF Downloads 395
767 Dual Mode “Turn On-Off-On” Photoluminescence Detection of EDTA and Lead Using Moringa Oleifera Gum-Derived Carbon Dots

Authors: Anisha Mandal, Swambabu Varanasi

Abstract:

Lead is one of the most prevalent toxic heavy metal ions, and its pollution poses a significant threat to the environment and human health. On the other hand, Ethylenediaminetetraacetic acid is a widely used metal chelating agent that, due to its poor biodegradability, is an incessant pollutant to the environment. For the first time, a green, simple, and cost-effective approach is used to hydrothermally synthesise photoluminescent carbon dots using Moringa Oleifera Gum in a single step. Then, using Moringa Oleifera Gum-derived carbon dots, a photoluminescent "ON-OFF-ON" mechanism for dual mode detection of trace Pb2+ and EDTA was proposed. MOG-CDs detect Pb2+ selectively and sensitively using a photoluminescence quenching mechanism, with a detection limit (LOD) of 0.000472 ppm. (1.24 nM). The quenched photoluminescence can be restored by adding EDTA to the MOG-CD+Pb2+ system; this strategy is used to quantify EDTA at a level of detection of 0.0026 ppm. (8.9 nM). The quantification of Pb2+ and EDTA in actual samples encapsulated the applicability and dependability of the proposed photoluminescent probe.

Keywords: carbon dots, photoluminescence, sensor, moringa oleifera gum

Procedia PDF Downloads 75
766 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 100
765 The Hauntings of Empire: Imperial Nationalism and International Relations

Authors: Katie Hudson

Abstract:

A growing body of scholarship is dedicated to the concept of imperial nationalism, denoting a nostalgia for empire amongst former imperial powers and a yearning to recapture the grandeur of the imperial ‘golden age.’ Much research within this field has focused on Brexit, arguing that Britain’s imperialist identity has spawned Euroscepticism. However, the interaction between imperial nationalism and foreign policy remains underdeveloped and thus far has failed to consider cases outside of the UK. Using maximum variation sampling across post-2000 Britain, Spain and the Netherlands, this comparative analysis aims to explore the discursive invocation of empire in foreign policy framing, under which circumstances and in what ways imperial nationalism emerges. Preliminary findings demonstrate that empire is most often cited when there is a perceived threat to the sovereignty of the nation and that all cases frame foreign policy options according to their acute concerns with regaining the prestige associated with empire. This is present to a lesser extent in Spain, whose earlier period of decolonisation affected the extent to which imperialism has permeated their national psyche. This, therefore, provides an alternative lens through which we can view both Euroscepticism and international relations, conditioned by an imperial legacy.

Keywords: empire, nationalism, foreign policy, IR

Procedia PDF Downloads 73
764 Structuring the Role of Indonesia's Dilemma Position in ASEAN to Combat Human Trafficking

Authors: Febi Eka Putri, Prabowo Anggorono

Abstract:

Human Trafficking has become a threat in the global phenomenon, including Indonesia as a country adopting democracy to uphold the human rights value. Indonesia is classified as a source of trafficking in persons which dominate by women and children for sexual exploitation and forced labor purposes. In this case, Indonesia has committed to combat trafficking in persons by enacted domestic law to criminalize all types of human trafficking in domestic and international level. Tracing to the efforts, we cannot just simplify it, however, in 2016 Indonesia has placed as a tier 2 country because the government does not fully achieve the minimum standard by U. S. Trafficking Victims Protection Act due to only making efforts as progress. While as a part of ASEAN member, Indonesia has signed ASEAN Human Rights Declaration but when it comes to Human Trafficking issue, there is only few ASEAN member who has ratified ASEAN Convention on Trafficking in Persons, in particular Women and Children such as Singapore, Cambodia, and Thailand. This brings the evidence to structuring the role of Indonesia to combat human trafficking.

Keywords: Indonesia, Association of Southeast Asian Nations (ASEAN), human trafficking, Tier 2 country

Procedia PDF Downloads 335