Search results for: counter terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 704

Search results for: counter terrorism

374 Jirga: A Traditional Approach to Peacebuidling in Conflict Affected Fragile Communities of Khyber Pakhtunkhwa

Authors: Nizar Ahmad, Mushtaq Ahmad Jadoon, Farhat Ullah

Abstract:

This study investigates the peace efforts made by Pakhtun’s traditional institution Jirga in conflict-affected communities of Khyber Pakhtunkhwa. Data were collected through a structured interview schedule from a sample of 278 household members in four selected villages of Dir Upper and Dir Lower Districts. A Chi square test was applied to ascertain relationships between Jirga related factors with the state of peace in the study area. It was found that factors such as Jirga regularly conducted meetings (P=. 000), it inflicted punishment upon local militants (P=. 001), ex-combatants were re-integrated through Jirga (P= .000) and Jirga ordered the local the defiant to leave the community had a significant association with state of peace in the area. It is concluded that Jirga system had played a vital role in the peacebuilding process of the area through provision of support to government in peace operation and mobilizing local people for peace in the area. It is suggested that Jirga shall to be the part of peace process and government needs to provide its possible support to members of the Jirga in order to enhance their capacity of peace work.

Keywords: Jirga, peacebuilding, terrorism, traditional mechanism, conflict affect areas

Procedia PDF Downloads 317
373 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 279
372 Energy Saving and Performance Evaluation of an Air Handling Unit Integrated with a Membrane Energy Exchanger for Cold Climates

Authors: Peng Liu, Maria Justo Alonso, Hans Martin Mathisen

Abstract:

A theoretical model is developed to evaluate the performance and energy saving potential of an air handling unit integrated with a membrane energy exchanger in cold climates. The recovered sensible and latent heat, fan preheating use for frost prevention and heating energy consumed by heating coil after the ventilator is compared for the air handling unit combined heat and energy exchanger respectively. A concept of coefficient of performance of air handling unit is presented and applied to assess the energy use of air handling unit (AHU) in cold climates. The analytic results indicate downsizing of the preheating coil before exchanger and heating coils after exchanger are expected since the required power to preheat and condition the air is reduced compared to heat exchanger when the MEE is integrated with AHU. Simultaneously, a superior ratio of energy recovered (RER) is obtained from AHU build-in a counter-flow MEE. The AHU with sensible-only heat exchanger has noticeably low RER, around 1 at low outdoor air temperature where the maximum energy rate is desired to condition the severe cold and dry air.

Keywords: membrane energy exchanger, cold climate, energy efficient building, HVAC

Procedia PDF Downloads 302
371 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 247
370 Learning Management System Technologies for Teaching Computer Science at a Distance Education Institution

Authors: Leila Goosen, Dalize van Heerden

Abstract:

The performance outcomes of first year Computer Science and Information Technology students across the world are of great concern, whether they are being taught in a face-to-face environment or via distance education. In the face-to-face environment, it is, however, somewhat easier to teach and support students than it is in a distance education environment. The face-to-face academic can more easily gauge the level of understanding and participation of students and implement interventions to address issues, which may arise. With the inroads that Web 2.0 and Web 3.0 technologies are making, the world of online teaching and learning are rapidly expanding, bringing about technologies, which allows for similar interactions between online academics and their students as available to their face-to-face counter parts. At the University of South Africa (UNISA), the Learning Management System (LMS) is called myUNISA and it is deployed on a SAKAI platform. In this paper, we will take a look at some of the myUNISA technologies implemented in the teaching of a first year programming course, how they are implemented and, in some cases, we will indicate how this affects the performance outcomes of students.

Keywords: computer science, Distance Education Technologies, Learning Management System, face-to-face environment

Procedia PDF Downloads 477
369 Deterrents in Tourism Development in Pakistan: A Case Study of Northern Areas

Authors: Qurat Ul Ain Bashir

Abstract:

Since the inception of Pakistan Tourism industry was not on developed level but afterwards 9/11 the tourism has declined rapidly in the country. Despite Northern areas full potential, rich historical and cultural heritage, natural beauty, museums, art galleries, hiking tracks, tourism is not getting that response in Pakistan, which it deserves. In fact Pakistan has been blessed with all the features that could make her a tourist destination. On the other side the attitude of the local people, socio-political condition, lack of facilities of international standards, media’s way of reporting about country, governments’ negligence etc has more adversely affected the international tourism than domestic tourism. From 2013 onward some developments in the said industry has been shown but that is not much encouraging. In 2017 approximately two million tourist visited Pakistan in comparison to 1.75 million in 2016. In the light of above debate the paper attempts to diagnose the causes which are not allowing the reasonable growth of tourism in Pakistan and suggests steps which must be taken to develop the industry through a large scale campaign and long term planning. The methodology about this research is quantitative with reference to description, analysis and recommendations. The material would be collected from the government publications, articles, surveys, tourist accounts, books, internet, magazines.

Keywords: tourism, terrorism, barriers, infrastructure, culture, northern areas

Procedia PDF Downloads 120
368 Incorporation of Hibah as a Catalyst for Channelling Profits and Compensations in Islamic Transactions

Authors: Ameen Alshugaa, Farrukh Habib

Abstract:

Shariah (the Islamic law) sanctions a plethora of profit-sharing arrangements for financial transactions. However, when it comes to the practice of Islamic banking, it is felt by the scholars and practitioners that many of these arrangements often fail to compensate different parties of a financial transaction compared to conventional banking, due to the Riba (interest / usury) element. This issue is caused by the parties inability to codify these compensations in any contract so as to avoid Riba. Here, hibah (gift) may be regarded as one of the solutions. In essence, hibah is a unilateral charity contract where a party voluntarily gives away something to another party without any counter value. This paper attempts to analyse theoretical and practical aspects of hibah from the perspective of Islamic law, enunciating its legality and detailing its allowance in Islamic banking. It also discusses several practices evaluating the role of hibah in resolving issues related to Riba. In particular, these practices demonstrate the validity of hibah as a way to distribute revenues and compensate parties in Islamic financial transactions, while achieving competitive advantage over conventional banking, and avoiding the element of Riba.

Keywords: hibah (gift), Islamic Finance, Islamic Law of Contract, profit distribution, Shariah

Procedia PDF Downloads 276
367 Quantum Entangled States and Image Processing

Authors: Sanjay Singh, Sushil Kumar, Rashmi Jain

Abstract:

Quantum registering is another pattern in computational hypothesis and a quantum mechanical framework has a few helpful properties like Entanglement. We plan to store data concerning the structure and substance of a basic picture in a quantum framework. Consider a variety of n qubits which we propose to use as our memory stockpiling. In recent years classical processing is switched to quantum image processing. Quantum image processing is an elegant approach to overcome the problems of its classical counter parts. Image storage, retrieval and its processing on quantum machines is an emerging area. Although quantum machines do not exist in physical reality but theoretical algorithms developed based on quantum entangled states gives new insights to process the classical images in quantum domain. Here in the present work, we give the brief overview, such that how entangled states can be useful for quantum image storage and retrieval. We discuss the properties of tripartite Greenberger-Horne-Zeilinger and W states and their usefulness to store the shapes which may consist three vertices. We also propose the techniques to store shapes having more than three vertices.

Keywords: Greenberger-Horne-Zeilinger, image storage and retrieval, quantum entanglement, W states

Procedia PDF Downloads 282
366 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures

Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat

Abstract:

In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.

Keywords: association rules, clustering, similarity measure, statistical approaches

Procedia PDF Downloads 297
365 Rapid Method for Low Level 90Sr Determination in Seawater by Liquid Extraction Technique

Authors: S. Visetpotjanakit, N. Nakkaew

Abstract:

Determination of low level 90Sr in seawater has been widely developed for the purpose of environmental monitoring and radiological research because 90Sr is one of the most hazardous radionuclides released from atmospheric during the testing of nuclear weapons, waste discharge from the generation nuclear energy and nuclear accident occurring at power plants. A liquid extraction technique using bis-2-etylhexyl-phosphoric acid to separate and purify yttrium followed by Cherenkov counting using a liquid scintillation counter to determine 90Y in secular equilibrium to 90Sr was developed to monitor 90Sr in the Asia Pacific Ocean. The analytical performance was validated for the accuracy, precision, and trueness criteria. Sr-90 determination in seawater using various low concentrations in a range of 0.01 – 1 Bq/L of 30 liters spiked seawater samples and 0.5 liters of IAEA-RML-2015-01 proficiency test sample was performed for statistical evaluation. The results had a relative bias in the range from 3.41% to 12.28%, which is below accepted relative bias of ± 25% and passed the criteria confirming that our analytical approach for determination of low levels of 90Sr in seawater was acceptable. Moreover, the approach is economical, non-laborious and fast.

Keywords: proficiency test, radiation monitoring, seawater, strontium determination

Procedia PDF Downloads 146
364 Functional to Business Process Orientation in Business Schools

Authors: Sunitha Thappa

Abstract:

Business environment is a set of complex interdependent dimensions that corporates have to always be vigil in identifying the influential waves. Over the year business environment has evolved into a basket of uncertainties. Every organization strives to counter this dynamic nature of business environment by recurrently evaluating the primary and support activities of its value chain. This has led to companies redesigning their business models, reinvent business processes and operating procedure on unremitting basis. A few specific issues that are placed before the present day managers are breaking down the functional interpretation of any challenge that organizations confronts, reduction in organizational hierarchy and tackling the components of the value chain to retain their competitive advantage. It is how effectively managers detect the changes and swiftly reorient themselves to these changes that define their success or failure. Given the complexity of decision making in this dynamic environment, two important question placed before the B-schools of today. Firstly, are they grooming and nurturing managerial talent proficient enough to thrive in this multifaceted business environment? Secondly, are the management graduates walking through their portals, able to view challenges from a cross-functional perspective with emphasis to customer and process rather than hierarchy and functions. This paper focuses on the need for a process oriented approach to management education.

Keywords: management education, pedagogy, functional, process

Procedia PDF Downloads 313
363 Design, Control and Autonomous Trajectory Tracking of an Octorotor Rotorcraft

Authors: Seyed Jamal Haddadi, M. Reza Mehranpour, Roya Sadat Mortazavi, Zahra Sadat Mortazavi

Abstract:

Principal aim of this research is trajectory tracking, attitude and position control scheme in real flight mode by an Octorotor helicopter. For more stability, in this Unmanned Aerial Vehicle (UAV), number of motors is increased to eight motors which end of each arm installed two coaxial counter rotating motors. Dynamic model of this Octorotor includes of motion equation for translation and rotation. Utilized controller is proportional-integral-derivative (PID) control loop. The proposed controller is designed such that to be able to attenuate an effect of external wind disturbance and guarantee stability in this condition. The trajectory is determined by a Global Positioning System (GPS). Also an ARM CortexM4 is used as microprocessor. Electronic board of this UAV designed as able to records all of the sensors data, similar to an aircraft black box in external memory. Finally after auto landing of Octorotor, flight data is shown in MATLAB software and Experimental results of the proposed controller show the effectiveness of our approach on the Autonomous Quadrotor in real conditions.

Keywords: octorotor, design, PID controller, autonomous, trajectory tracking

Procedia PDF Downloads 277
362 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 324
361 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 273
360 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 246
359 Language and the Politics of Feminism through the Lens of Ba’s ‘So Long a Letter’ and Alkali’s ‘The Stillborn’

Authors: Jummai Aliyu Mohammed

Abstract:

The Sapir-Whorfian hypothesis postulates that the structure of a language determines the way in which species of that language view the world. It also states that the culture of a people finds reflection in their language. Consequently language becomes a vehicle of thought; a channel through which negative stereotypes of women is created and also one through which such images are dispelled. Women are generally portrayed as weaker vessels and inferior to men; a position which draws a counter reaction from women through their writings. In their writings, they attempt to reinvent womanhood and liberate the woman from the hitherto negative light they were portrayed. This position best describes the term feminism which argues that women be given equal rights in all spheres of life as men. This paper attempts to evaluate Ba’s ‘So Long a Letter’ and Alkali’s ‘The Stillborn’ with the view to identify the relationship between language and feminism. In evaluating this relationship, the paper concludes that there are several factors responsible for the variation in the speech pattern of male and female. All of these factors favour the male gender and further condemns the woman to oppression. Although the writers come from two different cultural backgrounds, the works amplify feminism and captured them as apostles of feminism.

Keywords: feminism, language, politics, Sapir-Whorfian hypothesis

Procedia PDF Downloads 152
358 Implementation of Maqasid Syari'ah in the Concept of Reforming the Indonesian Marriage Law Based on Gender Equality: Study of the Counter Legal Draft Compilation of Islamic Law

Authors: Nirmalasanti Pramesi

Abstract:

In 2004 the CLD KHI Team offered several new ideas in the field of Islamic family law, such as marriage, inheritance (waris), and waqf. The new idea is based on six main principles; pluralism, nationality, human rights, democracy, maslahah, and gender equality. However, the existence of this has actually caused various criticisms, appreciations, and controversies. For this reason, CLD-KHI, as the idea of reforming family law, especially in the field of marriage, really needs to be studied academically with a comprehensive method as an unfinished problem. The main issues examined in this study are what are the ideas for reforming the law of marriage that have been formulated by the CLD KHI team, as well as how to implement Maqasid Sharia in legal reform. The methodology used in this research is a qualitative method with a normative-empirical-sociological approach. The results of this research show every substance of the idea considers aspects of locality, nationality, and global ethics. The Maqasid approach used in most of the legal provisions is moderate (wasati). Meanwhile, in matters of wali niqah and inheritance, it is adjusted to the context of Indonesian society.

Keywords: Maqasid syari'ah, CLD KHI, marriage law reform, moderate

Procedia PDF Downloads 171
357 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 119
356 Bhumastra “Unmanned Ground Vehicle”

Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J

Abstract:

Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.

Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI

Procedia PDF Downloads 94
355 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 170
354 Explanation and Temporality in International Relations

Authors: Alasdair Stanton

Abstract:

What makes for a good explanation? Twenty years after Wendt’s important treatment of constitution and causation, non-causal explanations (sometimes referred to as ‘understanding’, or ‘descriptive inference’) have become, if not mainstream, at least accepted within International Relations. This article proceeds in two parts: firstly, it examines closely Wendt’s constitutional claims, and while it agrees there is a difference between causal and constitutional, rejects the view that constitutional explanations lack temporality. In fact, this author concludes that a constitutional argument is only possible if it relies upon a more foundational, causal argument. Secondly, through theoretical analysis of the constitutional argument, this research seeks to delineate temporal and non-temporal ways of explaining within International Relations. This article concludes that while the constitutional explanation, like other logical arguments, including comparative, and counter-factual, are not truly non-causal explanations, they are not bound as tightly to the ‘real world’ as temporal arguments such as cause-effect, process tracing, or even interpretivist accounts. However, like mathematical models, non-temporal arguments should aim for empirical testability as well as internal consistency. This work aims to give clear theoretical grounding to those authors using non-temporal arguments, but also to encourage them, and their positivist critics, to engage in thoroughgoing empirical tests.

Keywords: causal explanation, constitutional understanding, empirical, temporality

Procedia PDF Downloads 176
353 A Data Mining Approach for Analysing and Predicting the Bank's Asset Liability Management Based on Basel III Norms

Authors: Nidhin Dani Abraham, T. K. Sri Shilpa

Abstract:

Asset liability management is an important aspect in banking business. Moreover, the today’s banking is based on BASEL III which strictly regulates on the counterparty default. This paper focuses on prediction and analysis of counter party default risk, which is a type of risk occurs when the customers fail to repay the amount back to the lender (bank or any financial institutions). This paper proposes an approach to reduce the counterparty risk occurring in the financial institutions using an appropriate data mining technique and thus predicts the occurrence of NPA. It also helps in asset building and restructuring quality. Liability management is very important to carry out banking business. To know and analyze the depth of liability of bank, a suitable technique is required. For that a data mining technique is being used to predict the dormant behaviour of various deposit bank customers. Various models are implemented and the results are analyzed of saving bank deposit customers. All these data are cleaned using data cleansing approach from the bank data warehouse.

Keywords: data mining, asset liability management, BASEL III, banking

Procedia PDF Downloads 530
352 Development of Peptide Inhibitors against Dengue Virus Infection by in Silico Design

Authors: Aussara Panya, Nunghathai Sawasdee, Mutita Junking, Chatchawan Srisawat, Kiattawee Choowongkomon, Pa-Thai Yenchitsomanus

Abstract:

Dengue virus (DENV) infection is a global public health problem with approximately 100 million infected cases a year. Presently, there is no approved vaccine or effective drug available; therefore, the development of anti-DENV drug is urgently needed. The clinical reports revealing the positive association between the disease severity and viral titer has been reported previously suggesting that the anti-DENV drug therapy can possibly ameliorate the disease severity. Although several anti-DENV agents showed inhibitory activities against DENV infection, to date none of them accomplishes clinical use in the patients. The surface envelope (E) protein of DENV is critical for the viral entry step, which includes attachment and membrane fusion; thus, the blocking of envelope protein is an attractive strategy for anti-DENV drug development. To search the safe anti-DENV agent, this study aimed to search for novel peptide inhibitors to counter DENV infection through the targeting of E protein using a structure-based in silico design. Two selected strategies has been used including to identify the peptide inhibitor which interfere the membrane fusion process whereby the hydrophobic pocket on the E protein was the target, the destabilization of virion structure organization through the disruption of the interaction between the envelope and membrane proteins, respectively. The molecular docking technique has been used in the first strategy to search for the peptide inhibitors that specifically bind to the hydrophobic pocket. The second strategy, the peptide inhibitor has been designed to mimic the ectodomain portion of membrane protein to disrupt the protein-protein interaction. The designed peptides were tested for the effects on cell viability to measure the toxic to peptide to the cells and their inhibitory assay to inhibit the DENV infection in Vero cells. Furthermore, their antiviral effects on viral replication, intracellular protein level and viral production have been observed by using the qPCR, cell-based flavivirus immunodetection and immunofluorescence assay. None of tested peptides showed the significant effect on cell viability. The small peptide inhibitors achieved from molecular docking, Glu-Phe (EF), effectively inhibited DENV infection in cell culture system. Its most potential effect was observed for DENV2 with a half maximal inhibition concentration (IC50) of 96 μM, but it partially inhibited other serotypes. Treatment of EF at 200 µM on infected cells also significantly reduced the viral genome and protein to 83.47% and 84.15%, respectively, corresponding to the reduction of infected cell numbers. An additional approach was carried out by using peptide mimicking membrane (M) protein, namely MLH40. Treatment of MLH40 caused the reduction of foci formation in four individual DENV serotype (DENV1-4) with IC50 of 24-31 μM. Further characterization suggested that the MLH40 specifically blocked viral attachment to host membrane, and treatment with 100 μM could diminish 80% of viral attachment. In summary, targeting the hydrophobic pocket and M-binding site on the E protein by using the peptide inhibitors could inhibit DENV infection. The results provide proof of-concept for the development of antiviral therapeutic peptide inhibitors to counter DENV infection through the use of a structure-based design targeting conserved viral protein.

Keywords: dengue virus, dengue virus infection, drug design, peptide inhibitor

Procedia PDF Downloads 335
351 Massively-Parallel Bit-Serial Neural Networks for Fast Epilepsy Diagnosis: A Feasibility Study

Authors: Si Mon Kueh, Tom J. Kazmierski

Abstract:

There are about 1% of the world population suffering from the hidden disability known as epilepsy and major developing countries are not fully equipped to counter this problem. In order to reduce the inconvenience and danger of epilepsy, different methods have been researched by using a artificial neural network (ANN) classification to distinguish epileptic waveforms from normal brain waveforms. This paper outlines the aim of achieving massive ANN parallelization through a dedicated hardware using bit-serial processing. The design of this bit-serial Neural Processing Element (NPE) is presented which implements the functionality of a complete neuron using variable accuracy. The proposed design has been tested taking into consideration non-idealities of a hardware ANN. The NPE consists of a bit-serial multiplier which uses only 16 logic elements on an Altera Cyclone IV FPGA and a bit-serial ALU as well as a look-up table. Arrays of NPEs can be driven by a single controller which executes the neural processing algorithm. In conclusion, the proposed compact NPE design allows the construction of complex hardware ANNs that can be implemented in a portable equipment that suits the needs of a single epileptic patient in his or her daily activities to predict the occurrences of impending tonic conic seizures.

Keywords: Artificial Neural Networks (ANN), bit-serial neural processor, FPGA, Neural Processing Element (NPE)

Procedia PDF Downloads 298
350 Analyzing e-Leadership Literature in Applying an e-Leadership Model for Community College Leaders of Hybrid Remote Teams

Authors: Lori Timmis

Abstract:

The COVID-19 pandemic precipitated significant organizational change in employee turnover, retirements, and burnout exacerbated by enrollment declines in higher education, especially community colleges. To counter this downturn, community college leaders must thoughtfully examine meaningful work opportunities to retain an engaged and productive workforce. Higher education led fully remote teams during the pandemic, which highlighted the benefits and weaknesses of building and leading remote teams. Hybrid remote teams offer possibility to reimagine community college structures, though leading remote teams requires specific e-leadership competencies. This paper examines the literature of studies on e-leadership conducted during the pandemic and from several higher education studies, pre-pandemic, against an e-leadership competency framework. The e-leadership studies conducted pre-pandemic and from the pandemic complement the e-leadership competency framework, comprising six e-leadership competencies performed via information technology communications, which provides community college (and higher education) leaders to consider hybrid remote team structures and the necessary leadership skills to lead hybrid remote teams.

Keywords: community college, e-leadership, great resignation, hybrid remote teams

Procedia PDF Downloads 80
349 Flow Separation Control on an Aerofoil Using Grooves

Authors: Neel K. Shah

Abstract:

Wind tunnel tests have been performed at The University of Manchester to investigate the impact of surface grooves of a trapezoidal planform on flow separation on a symmetrical aerofoil. A spanwise array of the grooves has been applied around the maximum thickness location of the upper surface of an NACA-0015 aerofoil. The aerofoil has been tested in a two-dimensional set-up in a low-speed wind tunnel at an angle of attack (AoA) of 3° and a chord-based Reynolds number (Re) of ~2.7 x 105. A laminar separation bubble developed on the aerofoil at low AoA. It has been found that the grooves shorten the streamwise extent of the separation bubble by shedding a pair of counter-rotating vortices. However, the increase in leading-edge suction due to the shorter bubble is not significant since the creation of the grooves results in a decrease of surface curvature and an increase in blockage (increase in surface pressure). Additionally, the increased flow mixing by the grooves thickens the boundary layer near the trailing edge of the aerofoil also contributes to this limitation. As a result of these competing effects, the improvement in the pressure-lift and pressure-drag coefficients are small, i.e., by ~1.30% and ~0.30%, respectively, at 3° AoA. Crosswire anemometry shows that the grooves increase turbulence intensity and Reynolds stresses in the wake, thus indicating an increase in viscous drag.

Keywords: aerofoil flow control, flow separation, grooves, vortices

Procedia PDF Downloads 295
348 Localized Dynamic Lensing with Extended Depth of Field via Enhanced Light Sound Interaction

Authors: Hamid R. Chabok, Demetrios N. Christodoulides, Mercedeh Khajavikhan

Abstract:

In recent years, acousto-optic (AO) lenses with tunable foci have emerged as a powerful tool for optical beam shaping, imaging, and particle manipulation. In most current AO lenses, the incident light that propagates orthogonally to a standing ultrasonic wave converts to a Bessel-like beam pattern due to the Raman-Nath effect, thus forming annular fringes that result in compromised focus response. Here, we report a new class of AO dynamic lensing based on generating a 3D-variable refractive index profile via a z-axis-scan ultrasound transducer. By utilizing the co- /counter propagation of light and acoustic waves that interact over a longer distance, the laser beam can be strongly focused in a fully controllable manner. Using this approach, we demonstrate AO lenses with instantaneous extended depth of field (DoF) and laterally localized dynamic focusing. This new light-sound interaction scheme may pave the way towards applications that require remote focusing, 3D micromanipulation, and deep tissue therapy/imaging.

Keywords: acousto-optic, optical beam shaping, dynamic lensing, ultrasound

Procedia PDF Downloads 73
347 Isolation of Three Bioactive Phenantroindolizidine Alkaloids from the Fruit Latex of Ficus botryocarpa Miq.

Authors: Jayson Wau, David Timi, Anthony Harakuwe, Bruce Bowden, Cherie Motti, Harry Sakulas, Rag Gubag-Sipou

Abstract:

The latex of F. botryocarpa fruit is applied on sores, wounds and other skin infections in Papua New Guinea ethnotherapeutic practices. Systematic bioassay guided separation and isolation of subsequent fractions of latex extracts resulted in three bioactive fractions active against Staphylococcus aureus and Escherichia coli. This study reports structural elucidation of the three isolates. Structures were determined by physical (M.pt and Rf values) and spectroscopic (1D-1H NMR, 2D-HSQC NMR, 2D-HMBC NMR) and MS ESI-POS. The two methylene protons (2H-1) and (2H-3) resonate as triplets at δ 3.59 and δ 4.99 respectively. Electron dense δ 4.99 (2H-3) on (C-3) depicts the strong electron-withdrawing component, quaternary nitrogen (=N= +). Protons resonating at δ 3.88 and 3.89 are singlets depicting two methoxy groups. Both δ 3.88 and δ 3.89 are para-aryls substituents. The methines δ 9.13 and 8.60 are singlets depicting two lone protons on the indolizidinium aryl component. All isolates, (1), (2) and (3) were identified to be ficuseptine by comparing 1D-NMR assignments. 2D-NMR and MS of (2) found it to be ficuseptine chloride '2, 3-dihydro-6, 8-bis (4-methoxyphenyl)-, 1H-indolizinium chloride'. Their counter ions of the ficuseptines were not established and provide promising lead for the further investigation.

Keywords: Ficus botryocarpa, antimicrobial activity, ficuseptine, sores

Procedia PDF Downloads 503
346 Community Base Peacebuilding in Fragile Context

Authors: Nizar Ahmad

Abstract:

Peace without community participation will remain a vision, so, this study presents the contribution and efforts made by community base organization in views of local conflict affect population in Pakhtun society. A four conflict affected villages of Malakad Division were selected and a sample size of 278 household respondents were determined through online survey system software out of total 982 households. A Chi-square test was applied to ascertain association between various communication base organizations factors with state of peace in the area. It was found that provision of humanitarian aid, rehabilitation of displaced population, rebuilding of trust in government and peace festivals by communication organization had significant association with state of peace in the area. In contrast provision of training, peace education monitoring and reporting of human rights violation in war zone by local organization was non-significantly related to the state of peace in the area. Community base organization play an active role in building peace in the area but lack capacity, linkages with external actors and outside support. National and international organization actors working in the area of peace and conflict resolution need to focus on the capacity, networking and peace initiatives of local organizations working in fragile context.

Keywords: community base peacebuilding, conflict resolution, terrorism, violence

Procedia PDF Downloads 257
345 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study

Authors: Abass Braimah, Maha Hussein Abdallah

Abstract:

The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.

Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis

Procedia PDF Downloads 154