Search results for: national security exception
3086 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study
Authors: Nahian Salsabeel, Faria Leera
Abstract:
—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia
Procedia PDF Downloads 1543085 Shear Strength Evaluation of Ultra-High-Performance Concrete Flexural Members Using Adaptive Neuro-Fuzzy System
Authors: Minsu Kim, Hae-Chang Cho, Jae Hoon Chung, Inwook Heo, Kang Su Kim
Abstract:
For safe design of the UHPC flexural members, accurate estimations of their shear strengths are very important. However, since the shear strengths are significantly affected by various factors such as tensile strength of concrete, shear span to depth ratio, volume ratio of steel fiber, and steel fiber factor, the accurate estimations of their shear strengths are very challenging. In this study, therefore, the Adaptive Neuro-Fuzzy System (ANFIS), which has been widely used to solve many complex problems in engineering fields, was introduced to estimate the shear strengths of UHPC flexural members. A total of 32 experimental results has been collected from previous studies for training of the ANFIS algorithm, and the well-trained ANFIS algorithm provided good estimations on the shear strengths of the UHPC test specimens. Acknowledgement: This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT & Future Planning(NRF-2016R1A2B2010277).Keywords: ultra-high-performance concrete, ANFIS, shear strength, flexural member
Procedia PDF Downloads 1883084 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing
Authors: Thomas Yeboah
Abstract:
Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing
Procedia PDF Downloads 6283083 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 2543082 A Study of the Views of Information Technologies Teachers regarding In-Service Training
Authors: Halit Arslan, Ismail Sahin, Ahmet Oguz Akturk, Ismail Celik
Abstract:
Today, the means of following the developments in the area of science and technology is to keep up with the pace of the advancements in this area. As is in every profession, apart from their personal efforts, the training of teachers in the period after they start their careers is only possible through in-service training. The aim of the present study is to determine the views of Information Technologies (IT) teachers regarding the in-service training courses organized by the Ministry of National Education. In this study, in which quantitative research methods and techniques were employed, the views of 196 IT teachers were collected by using the “Views on In-service Training” questionnaire developed by the authors of the paper. Independent groups t-test was used to determine whether the views of IT teachers regarding in-service training differed depending on gender, age and professional seniority. One-way analysis of variance (ANOVA) was used to investigate whether the views of IT teachers regarding in-service training differed depending on the number of in-service training courses they joined and the type of in-service training course they wanted to take. According to the findings obtained in the study, the views of IT teachers on in-service training did not show a significant difference depending on gender and age, whereas those views differed depending on professional seniority, the number of in-service training courses they joined and the type of in-service training course they wanted to take.Keywords: in-service training, IT teachers, professional development, personal development
Procedia PDF Downloads 4173081 Examining Renewable Energy Policy Implementation for Sustainable Development in Kenya
Authors: Eliud Kiprop, Kenichi Matsui, Joseph Karanja, Hesborn Ondiba
Abstract:
To double the share of renewable energy in the global energy mix by 2030 as part of actions for the Paris Agreement, policymakers in each ratifying country must accelerate their efforts within the next few years by implementing their own renewable energy strategies. Kenya has increased its funding for research and development in renewable energy sources largely because it intends to reduce greenhouse gas GHG emissions by 30% from business as usual (BAU) levels (143 MtCO₂eq) by 2030. In 2013, the Kenyan government launched an ambitious plan to increase the installed power generation capacity from 1,768MW to more than 5,000MW by the end of 2017. This paper examines the formulation and implementation process of this plan and shows how this plan will affect Kenya’s renewable energy industry and national policy implementation in general. Results demonstrate that, despite having a well- documented policy in place, the Kenyan government cannot meet its target of 5000MW by the end of 2017. Among other factors, we find that the main reason is attributable to the failure in adhering to the main principles of the policy plan. We also find that the government has failed to consider the future energy demand. Had the policy been implemented on time, we argue that there would have been excess power.Keywords: policy implementation, policy plan, renewable energy, sustainable development
Procedia PDF Downloads 2163080 Flow Control Optimisation Using Vortex Generators in Turbine Blade
Authors: J. Karthik, G. Vinayagamurthy
Abstract:
Aerodynamic flow control is achieved by interaction of flowing medium with corresponding structure so that its natural flow state is disturbed to delay the transition point. This paper explains the aerodynamic effect and optimized design of Vortex Generators on the turbine blade to achieve maximum flow control. The airfoil is chosen from NREL [National Renewable Energy Laboratory] S-series airfoil as they are characterized with good lift characteristics and lower noise. Vortex generators typically chosen are Ogival, Rectangular, Triangular and Tapered Fin shapes attached near leading edge. Vortex generators are typically distributed from the primary to tip of the blade section. The design wind speed is taken as 6m/s and the computational analysis is executed. The blade surface is simulated using k- ɛ SST model and results are compared with X-FOIL results. The computational results are validated using Wind Tunnel Testing of the blade corresponding to the design speed. The effect of Vortex generators on the flow characteristics is studied from the results of analysis. By comparing the computational and test results of all shapes of Vortex generators; the optimized design is achieved for effective flow control corresponding to the blade.Keywords: flow control, vortex generators, design optimisation, CFD
Procedia PDF Downloads 4083079 Process Integration of Natural Gas Hydrate Production by CH₄-CO₂/H₂ Replacement Coupling Steam Methane Reforming
Authors: Mengying Wang, Xiaohui Wang, Chun Deng, Bei Liu, Changyu Sun, Guangjin Chen, Mahmoud El-Halwagi
Abstract:
Significant amounts of natural gas hydrates (NGHs) are considered potential new sustainable energy resources in the future. However, common used methods for methane gas recovery from hydrate sediments require high investment but with low gas production efficiency, and may cause potential environment and security problems. Therefore, there is a need for effective gas production from hydrates. The natural gas hydrate production method by CO₂/H₂ replacement coupling steam methane reforming can improve the replacement effect and reduce the cost of gas separation. This paper develops a simulation model of the gas production process integrated with steam reforming and membrane separation. The process parameters (i.e., reactor temperature, pressure, H₂O/CH₄ ratio) and the composition of CO₂ and H₂ in the feed gas are analyzed. Energy analysis is also conducted. Two design scenarios with different composition of CO₂ and H₂ in the feed gas are proposed and evaluated to assess the energy efficiency of the novel system. Results show that when the composition of CO₂ in the feed gas is between 43 % and 72 %, there is a certain composition that can meet the requirement that the flow rate of recycled gas is equal to that of feed gas, so as to ensure that the subsequent production process does not need to add feed gas or discharge recycled gas. The energy efficiency of the CO₂ in feed gas at 43 % and 72 % is greater than 1, and the energy efficiency is relatively higher when the CO₂ mole fraction in feed gas is 72 %.Keywords: Gas production, hydrate, process integration, steam reforming
Procedia PDF Downloads 1833078 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students
Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar
Abstract:
The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.Keywords: development, software, application, portable, fitness norms, cardiovascular endurance
Procedia PDF Downloads 5493077 The Assessment of Forest Wood Biomass Potential in Terms of Sustainable Development
Authors: Julija Konstantinavičienė, Vlada Vitunskienė
Abstract:
The role of sustainable biomass, including wood biomass, is becoming more important because of European Green Deal. The New EU Forest strategy is a flagship element of the European Green Deal and a key action on the EU biodiversity strategy for 2030. The first measure of this strategy is promoting sustainable forest management, including encouraging the sustainable use of wood-based resources. The first aim of this research was to develop and present a new approach to the concept of forest wood biomass potential in terms of sustainable development, distinguishing theoretical, technical and sustainable potential and detailing its constraints. The second aim was to prepare the methodology outline of sustainable forest wood biomass potential assessment and empirically check this methodology, considering economic, social and ecological constraints. The basic methodologies of the research: the review of research (with a combination of semi-systematic and integrative review methodologies), rapid assessment method and statistical data analysis. The developed methodology of assessment of forest wood potential in terms of sustainable development can be used in Lithuania and in other countries and will let us compare this potential a different time and spatial levels. The application of the methodology will be able to serve the development of new national strategies for the wood sector.Keywords: assessment, constraints, forest wood biomass, methodology, potential, sustainability
Procedia PDF Downloads 1233076 Investigating Translations of Websites of Pakistani Public Offices
Authors: Sufia Maroof
Abstract:
This empirical study investigated the web-translations of five Pakistani public offices (FPSC, FIA, HEC, USB, and Ministry of Finance) offering Urdu tab as an option to access information on their official websites. Triangulation of quantitative and qualitative research design informed the researcher of the semantic, lexical and syntactic caveats in these translations. The study hypothesized that majority of the Pakistani population is oblivious of the Supreme Court’s amendments in language policy concerning national and official language; hence, Urdu web-translations of the public departments have not been accessed effectively. Firstly, the researcher conducted an online survey, comprising of two sections, close ended and short answer based questions. Secondly, the researcher compiled corpus of the five selected websites in a tabular form to compare the data. Thirdly, the administrators of the departments had been contacted regarding the methods of translation and the expertise of the personnel involved. The corpus was assessed for TQA after examining the lexical, semantic, syntactical and technical alignment inaccuracies and imperfections. The study suggests the public offices to invest in their Urdu webs by either hiring expert translators or engaging expertise of a translation agency for this project to offer quality translation to public.Keywords: machine translations, public offices, Urdu translations, websites
Procedia PDF Downloads 1263075 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3453074 TomoTherapy® System Repositioning Accuracy According to Treatment Localization
Authors: Veronica Sorgato, Jeremy Belhassen, Philippe Chartier, Roddy Sihanath, Nicolas Docquiere, Jean-Yves Giraud
Abstract:
We analyzed the image-guided radiotherapy method used by the TomoTherapy® System (Accuray Corp.) for patient repositioning in clinical routine. The TomoTherapy® System computes X, Y, Z and roll displacements to match the reference CT, on which the dosimetry has been performed, with the pre-treatment MV CT. The accuracy of the repositioning method has been studied according to the treatment localization. For this, a database of 18774 treatment sessions, performed during 2 consecutive years (2016-2017 period) has been used. The database includes the X, Y, Z and roll displacements proposed by TomoTherapy® System as well as the manual correction of these proposals applied by the radiation therapist. This manual correction aims to further improve the repositioning based on the clinical situation and depends on the structures surrounding the target tumor tissue. The statistical analysis performed on the database aims to define repositioning limits to be used as security and guiding tool for the manual adjustment implemented by the radiation therapist. This tool will participate not only to notify potential repositioning errors but also to further improve patient positioning for optimal treatment.Keywords: accuracy, IGRT MVCT, image-guided radiotherapy megavoltage computed tomography, statistical analysis, tomotherapy, localization
Procedia PDF Downloads 2263073 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA
Authors: S. Saju, G. Thirugnanam
Abstract:
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet
Procedia PDF Downloads 5283072 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2783071 A New Suburb Renovation Concept
Authors: Anu Soikkelii, Laura Sorri
Abstract:
Finnish national research project, User- and Business-oriented Suburb Renovation Concept (KLIKK), was started in January 2012 and will end in June 2014. The perspective of energy efficiency is emphasised in the project, but also it addresses what improving the energy efficiency of suburban apartment buildings means from the standpoint of architecturally valuable buildings representing different periods. The project will also test the impacts of stricter energy efficiency requirements on renovation projects. The primary goal of the project is to develop a user-oriented, industrial, economic renovation concept for suburban apartment building renovation, extension and construction of additional storeys. The concept will make it possible to change from performance- and cost-based operation to novel service- and user-oriented, site-specifically tailored renovation methods utilizing integrated order and delivery chains.The present project is collaborating with Ministry of the Environment and participating cities in developing a new type of lighter town planning model for suburban renovations and in-fill construction. To support this, the project will simultaneously develop practices for environmental impact assessment tools in renovation and suburban supplementary and in-fill construction.Keywords: energy efficiency, prefabrication, renovation concept, suburbs, sustainability, user-orientated
Procedia PDF Downloads 3343070 Robust Recognition of Locomotion Patterns via Data-Driven Machine Learning in the Cloud Environment
Authors: Shinoy Vengaramkode Bhaskaran, Kaushik Sathupadi, Sandesh Achar
Abstract:
Human locomotion recognition is important in a variety of sectors, such as robotics, security, healthcare, fitness tracking and cloud computing. With the increasing pervasiveness of peripheral devices, particularly Inertial Measurement Units (IMUs) sensors, researchers have attempted to exploit these advancements in order to precisely and efficiently identify and categorize human activities. This research paper introduces a state-of-the-art methodology for the recognition of human locomotion patterns in a cloud environment. The methodology is based on a publicly available benchmark dataset. The investigation implements a denoising and windowing strategy to deal with the unprocessed data. Next, feature extraction is adopted to abstract the main cues from the data. The SelectKBest strategy is used to abstract optimal features from the data. Furthermore, state-of-the-art ML classifiers are used to evaluate the performance of the system, including logistic regression, random forest, gradient boosting and SVM have been investigated to accomplish precise locomotion classification. Finally, a detailed comparative analysis of results is presented to reveal the performance of recognition models.Keywords: artificial intelligence, cloud computing, IoT, human locomotion, gradient boosting, random forest, neural networks, body-worn sensors
Procedia PDF Downloads 113069 Decoupling PM₂.₅ Emissions and Economic Growth in China over 1998-2016: A Regional Investment Perspective
Abstract:
It is crucial to decouple economic growth from environmental pollution in China. This study aims to evaluate the decoupling degree between PM₂.₅ emissions and economic growth in China from a regional investment perspective. Using the panel data of 30 Chinese provinces for the period of 1998-2016, this study combines decomposition analysis with decoupling analysis to identify the roles of conventional factors and three novel investment factors in the mitigation and decoupling of PM₂.₅ emissions in China and its four sub-regions. The results show that China’s PM₂.₅ emissions were weakly decoupled to economic growth during the period of 1998-2016, as well as in China’s four sub-regions. At the national level, investment scale played the dominant role while investment structure had a marginal effect. In contrast, emission intensity was the largest driver in promoting the decoupling effect, followed by investment efficiency and energy intensity. The investment scale effect in the western region far exceeded those in other three sub-regions. At the provincial level, the investment structure of Inner Mongolia and investment scales of Xinjiang and Inner Mongolia had the greatest impacts on PM₂.₅ emission growth. Finally, several policy recommendations are raised for China to mitigate its PM₂.₅ emissions.Keywords: decoupling, economic growth, investment, PM₂.₅ emissions
Procedia PDF Downloads 1193068 The Effect of Artificial Intelligence on Human Rights Regulations
Authors: Karam Aziz Hamdy Fahmy
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 663067 Identifying the Goals of a Multicultural Curriculum for the Primary Education Course
Authors: Fatemeh Havas Beigi
Abstract:
The purpose of this study is to identify the objectives of a multicultural curriculum for the primary education period from the perspective of ethnic teachers and education experts and cultural professionals. The research paradigm is interpretive, the research approach is qualitative, the research strategy is content analysis, the sampling method is purposeful and it is a snowball, and the sample of informants in the research for Iranian ethnic teachers and experts until the theoretical saturation was estimated to be 67 people. The data collection tools used were based on semi-structured interviews and individual interviews and focal interviews were used to collect information. The data format was also in audio format and the first period coding and the second coding were used to analyze the data. Based on data analysis 11 Objective: Paying attention to ethnic equality, expanding educational opportunities and justice, peaceful coexistence, anti-ethnic and racial discrimination education, paying attention to human value and dignity, accepting religious diversity, getting to know ethnicities and cultures, promoting teaching-learning, fostering self-confidence, building national unity, and developing cultural commonalities for a multicultural curriculum were identified.Keywords: objective, multicultural curriculum, connect, elementary education period
Procedia PDF Downloads 943066 Designing and Implementation of MPLS Based VPN
Authors: Muhammad Kamran Asif
Abstract:
MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode
Procedia PDF Downloads 3313065 The X-Ray Response Team: Building a National Health Pre-Hospital Service
Authors: Julian Donovan, Jessica Brealey, Matthew Bowker, Marianne Feghali, Gregory Smith, Lee Thompson, Deborah Henderson
Abstract:
This article details the development of the X-ray response team (XRT), a service that utilises innovative technology to safely deliver acute and elective imaging and medical assessment service in the pre-hospital and community setting. This involves a partnership between Northumbria Healthcare NHS Foundation Trust’s Radiology and Emergency Medicine departments and the North East Ambulance Service to create a multidisciplinary prehospital team. The team committed to the delivery of a two-day acute service every week, alongside elective referrals, starting in November 2020. The service was originally made available to a 15-mile radius surrounding the Northumbria Hospital. Due to demand, this was expanded to include the North Tyneside and Northumberland regions. The target population was specified as frail and vulnerable patients, as well as those deemed to benefit from staying in their own environment. Within the first two months, thirty-six percent of patients assessed were able to stay at home due to the provision of off-site imaging. In the future, this service aims to allow patient transfer directly to an appropriate ward or clinic, bypassing the emergency department to improve the patient journey and reduce emergency care pressures.Keywords: frailty, imaging, pre-hospital, X-ray
Procedia PDF Downloads 2013064 Synthesis, Electrochemical and Fluorimetric Analysis of Caffeic Cinnamic and Acid-Conjugated Hemorphine Derivatives Designed as Potential Anticonvulsant Agents
Authors: Jana Tchekalarova, Stela Georgieva, Petia Peneva, Petar Todorov
Abstract:
In the present study, a series of bioconjugates of N-modified hemorphine analogs containing second pharmacophore cinnamic acids (CA) or caffeic acid (KA) were synthesized by a traditional solid-phase Fmoc chemistry method for peptide synthesis. Electrochemical and fluorometric analysis and in vivo anticonvulsant activity in mice were conducted on the compounds. The three CA (H4-CA, H5-CA, and H7-CA) and three KA (H4-KA, H5-KA, and H7-KA)-conjugated hemorphine derivatives showed dose-dependent anticonvulsant activity in the maximal electroshock test (MES) in mice. The KA-conjugated H5-KA derivate was the only compound that suppressed clonic seizures at the lowest dose of 0.5 µg/mouse in the scPTZ test. The activity against the psychomotor seizures in the 6-Hz test was detected only for the H4-CA (0.5 µg) and H4-KA (0.5 µg and 1 µg), respectively. The peptide derivates did not exhibit neurotoxicity in the rotarod test. Our findings suggest that conjugated CA and KA hemorphine peptides can be used as a background for developing hemorphin-related analogs with anticonvulsant activity. Acknowledgments: This study is funded by the European Union-NextGenerationEU, through the National Recovery and Resilience Plan of the Republic of Bulgaria, project № BG-RRP-2.004-0002, "BiOrgaMCT".Keywords: hemorphins, SPSS, caffeic/cinnamic acid, anticonvulsant activity, electrochemistry, fluorimetry
Procedia PDF Downloads 1523063 Enhancing a Recidivism Prediction Tool with Machine Learning: Effectiveness and Algorithmic Fairness
Authors: Marzieh Karimihaghighi, Carlos Castillo
Abstract:
This work studies how Machine Learning (ML) may be used to increase the effectiveness of a criminal recidivism risk assessment tool, RisCanvi. The two key dimensions of this analysis are predictive accuracy and algorithmic fairness. ML-based prediction models obtained in this study are more accurate at predicting criminal recidivism than the manually-created formula used in RisCanvi, achieving an AUC of 0.76 and 0.73 in predicting violent and general recidivism respectively. However, the improvements are small, and it is noticed that algorithmic discrimination can easily be introduced between groups such as national vs foreigner, or young vs old. It is described how effectiveness and algorithmic fairness objectives can be balanced, applying a method in which a single error disparity in terms of generalized false positive rate is minimized, while calibration is maintained across groups. Obtained results show that this bias mitigation procedure can substantially reduce generalized false positive rate disparities across multiple groups. Based on these results, it is proposed that ML-based criminal recidivism risk prediction should not be introduced without applying algorithmic bias mitigation procedures.Keywords: algorithmic fairness, criminal risk assessment, equalized odds, recidivism
Procedia PDF Downloads 1523062 Determination the Effects of Physico-Chemical Parameters on Groundwater Status by Water Quality Index
Authors: Samaneh Abolli, Mahdi Ahmadi Nasab, Kamyar Yaghmaeian, Mahmood Alimohammadi
Abstract:
The quality of drinking water, in addition to the presence of physicochemical parameters, depends on the type and geographical location of water sources. In this study, groundwater quality was investigated by sampling total dissolved solids (TDS), electrical conductivity (EC), total hardness (TH), Cl, Ca²⁺, and Mg²⁺ parameters in 13 sites, and 40 water samples were sent to the laboratory. Electrometric, titration, and spectrophotometer methods were used. In the next step, the water quality index (WQI) was used to investigate the impact and weight of each parameter in the groundwater. The results showed that only the mean of magnesium ion (40.88 mg/l) was lower than the guidelines of World Health Organization (WHO). Interpreting the WQI based on the WHO guidelines showed that the statuses of 21, 11, and 7 samples were very poor, poor, and average quality, respectively, and one sample had excellent quality. Among the studied parameters, the means of EC (2,087.49 mS/cm) and Cl (1,015.87 mg/l) exceeded the global and national limits. Classifying water quality of TH was very hard (87.5%), hard (7.5%), and moderate (5%), respectively. Based on the geographical distribution, the drinking water index in sites 4 and 11 did not have acceptable quality. Chloride ion was identified as the responsible pollutant and the most important ion for raising the index. The outputs of statistical tests and Spearman correlation had significant and direct correlation (p < 0.05, r > 0.7) between TDS, EC, and chloride, EC and chloride, as well as TH, Ca²⁺, and Mg²⁺.Keywords: water quality index, groundwater, chloride, GIS, Garmsar
Procedia PDF Downloads 1043061 Breakfast Eating Pattern Associated with Nutritional Status of Urban Primary Schoolchildren in Iran and India
Authors: Sahar Hooshmand, Mohammad Reza Bagherzadeh Anasari
Abstract:
The aim of this study was to examine the effect of breakfast eating pattern (between frequencies of breakfast consumers and non-consumers) on nutritional status (weight for age, height for age and weight for height). A total 4570 primary school children aged 6-9 years old constituted the sample. From these, 2234 Iranian school children (1218 girls and 1016 boys) and 2336 Indian school children (1096 girls and 1240 boys) were included in a cross sectional study. Breakfast frequency consumption was recorded through an interview with mothers of children. Height and wight of children were taken and body mass index were calculated. The World Health Organization’s (WHO) AnthroPlus software used to assess the nutritional status of the children. Weight for age z-scores were slightly associated with frequency of consuming breakfast in both India (χ2 = 60.083, p=0.000) and Iran (χ2 = 18.267, p=0.032). A significant association was seen between frequency of child‘s breakfast intake and the height z-scores in both India (χ2 = 31.334, p=0.000) and Iran (χ2 = 19.443, p=0.022). Most of children with normal height had breakfast daily in both countries. A significant association was seen with children‘s BMI z-scores of Indian children (χ2 = 31.247, p=0.000) but it was not significant in Iran (χ2 = 10.791, p=0.095). The present study confirms the observations of other studies that showed more frequency in having breakfast is associated with better nutritional status.Keywords: breakfast, schoolchildren, nutritional status, global food security
Procedia PDF Downloads 5163060 Regionalism or Ladder-Up: A Theoretical Perspective of Association of Southeast Asian Nations’ Reactions to Belt and Road Initiative
Authors: Yunqi Wang
Abstract:
As a vital region to the Chinese Belt and Road Initiative (BRI), members of the Association of Southeast Asian Nations (ASEAN) have responded to the grand strategy differently. Some expressed fervent support, while others played the 'hedging' card between great powers. This paper explores the underlying rationale behind such complexity by proposing two theoretical explanations: a Regionalism Hypothesis, where countries respond with hedging, balancing, and bandwagoning behaviours in line with national interests and norm-based 'ASEAN-Way'; and a Ladder-up Hypothesis, where countries consider the initiative as an incentive to remove bottlenecks of climbing up the economic ladder in Rostow's stage of the growth model. By analysing reactions from Myanmar, Laos, Indonesia, and Singapore, two patterns are observed. On an empirical note, the more developed economies are more inclined to the Regionalist explanation. On a theoretical note, there has been a gradual convergence between the two explanations, given the impact of economic globalisation on ASEAN. This paper will contribute to the current theoretical vacancy in the study of ASEAN and BRI by capturing the particular norms shared by this regional entity.Keywords: ASEAN, belt and road initiative, hedging, Rostow's stages of growth, regionalism
Procedia PDF Downloads 1173059 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 713058 The Influence of Advertising in the Respect of the Right to Adequate Food: Some Notes regarding the Portuguese Legal Framework
Authors: Susana Almeida
Abstract:
The right to adequate food is a human right protected under several international human rights treaties of universal or regional application. In addition, this social right is – as we intend to demonstrate – guaranteed under the Portuguese Constitution. Therefore, in order to assure the protection of this right, the Portuguese State must not only abstain from interfering with this human right (negative obligation) but also take action to secure the human right to adequate food (positive obligation). In this context, the Portuguese State has developed several governmental policies, such as taxing sugary drinks, setting the maximum amount of salt in the bread or creating the National Program for the Promotion of Healthy Food. Nevertheless, we intend to demonstrate that special attention should be given to advertising, as advertisements have an extreme influence on the consumers' decisions and hence on the food decisions. In this paper, besides explaining the cross construction of the human right to adequate food, we aim to examine the Advertising Portuguese Code and to study the several provisions that could be held by the Portuguese consumer to challenge some advertisements due to the violation of the right to health and the right to adequate food. Moreover, having in mind the influence of advertising on the food decisions and the serious problems that unhealthy food may bring (e.g., child obesity), one should ask if this legal framework should not be reviewed in order to lay out some restrictions on advertising, namely setting advices like in alcohol advertisements.Keywords: advertising code, consumer law, right to adequate food, social human right
Procedia PDF Downloads 1693057 The Effects of Different Parameters of Wood Floating Debris on Scour Rate Around Bridge Piers
Authors: Muhanad Al-Jubouri
Abstract:
A local scour is the most important of the several scours impacting bridge performance and security. Even though scour is widespread in bridges, especially during flood seasons, the experimental tests could not be applied to many standard highway bridges. A computational fluid dynamics numerical model was used to solve the problem of calculating local scouring and deposition for non-cohesive silt and clear water conditions near single and double cylindrical piers with the effect of floating debris. When FLOW-3D software is employed with the Rang turbulence model, the Nilsson bed-load transfer equation and fine mesh size are considered. The numerical findings of single cylindrical piers correspond pretty well with the physical model's results. Furthermore, after parameter effectiveness investigates the range of outcomes based on predicted user inputs such as the bed-load equation, mesh cell size, and turbulence model, the final numerical predictions are compared to experimental data. When the findings are compared, the error rate for the deepest point of the scour is equivalent to 3.8% for the single pier example.Keywords: local scouring, non-cohesive, clear water, computational fluid dynamics, turbulence model, bed-load equation, debris
Procedia PDF Downloads 69