Search results for: national security threat
3225 The Incoherence of the Philosophers as a Defense of Philosophy against Theology
Authors: Edward R. Moad
Abstract:
Al-Ghazali’s Tahāfat al Falāsifa is widely construed as an attack on philosophy in favor of theological fideism. Consequently, he has been blamed for ‘death of philosophy’ in the Muslim world. ‘Falsifa’ however is not philosophy itself, but rather a range of philosophical doctrines mainly influenced by or inherited form Greek thought. In these terms, this work represents a defense of philosophy against what we could call ‘falsifical’ fideism. In the introduction, Ghazali describes his target audience as, not the falasifa, but a group of pretenders engaged in taqlid to a misconceived understanding of falasifa, including the belief that they were capable of demonstrative certainty in the field of metaphysics. He promises to use falsifa standards of logic (with which he independently agrees), to show that that the falasifa failed to demonstratively prove many of their positions. Whether or not he succeeds in that, the exercise of subjecting alleged proofs to critical scrutiny is quintessentially philosophical, while uncritical adherence to a doctrine, in the name of its being ‘philosophical’, is decidedly unphilosophical. If we are to blame the intellectual decline of the Muslim world on someone’s ‘bad’ way of thinking, rather than more material historical circumstances (which is already a mistake), then blame more appropriately rests with modernist Muslim thinkers who, under the influence of orientalism (and like Ghazali’s philosophical pretenders) mistook taqlid to the falasifa as philosophy itself. The discussion of the Tahāfut takes place in the context of an epistemic (and related social) hierarchy envisioned by the falasifa, corresponding to the faculties of the sense, the ‘estimative imagination’ (wahm), and the pure intellect, along with the respective forms of discourse – rhetoric, dialectic, and demonstration – appropriate to each category of that order. Al-Farabi in his Book of Letters describes a relation between dialectic and demonstration on the one hand, and theology and philosophy on the other. The latter two are distinguished by method rather than subject matter. Theology is that which proceeds dialectically, while philosophy is (or aims to be?) demonstrative. Yet, Al-Farabi tells us, dialectic precedes philosophy like ‘nourishment for the tree precedes its fruit.’ That is, dialectic is part of the process, by which we interrogate common and imaginative notions in the pursuit of clearly understood first principles that we can then deploy in the demonstrative argument. Philosophy is, therefore, something we aspire to through, and from a discursive condition of, dialectic. This stands in apparent contrast to the understanding of Ibn Sina, for whom one arrives at the knowledge of first principles through contact with the Active Intellect. It also stands in contrast to that of Ibn Rushd, who seems to think our knowledge of first principles can only come through reading Aristotle. In conclusion, based on Al-Farabi’s framework, Ghazali’s Tahafut is a truly an exercise in philosophy, and an effort to keep the door open for true philosophy in the Muslim mind, against the threat of a kind of developing theology going by the name of falsifa.Keywords: philosophy, incoherence, theology, Tahafut
Procedia PDF Downloads 1633224 IT Perspective of Service-Oriented e-Government Enterprise
Authors: Anu Paul, Varghese Paul
Abstract:
The focal aspire of e-Government (eGovt) is to offer citizen-centered service delivery. Accordingly, the citizenry consumes services from multiple government agencies through national portal. Thus, eGovt is an enterprise with the primary business motive of transparent, efficient and effective public services to its citizenry and its logical structure is the eGovernment Enterprise Architecture (eGEA). Since eGovt is IT oriented multifaceted service-centric system, EA doesn’t do much on an automated enterprise other than the business artifacts. Service-Oriented Architecture (SOA) manifestation led some governments to pertain this in their eGovts, but it limits the source of business artifacts. The concurrent use of EA and SOA in eGovt executes interoperability and integration and leads to Service-Oriented e-Government Enterprise (SOeGE). Consequently, agile eGovt system becomes a reality. As an IT perspective eGovt comprises of centralized public service artifacts with the existing application logics belong to various departments at central, state and local level. The eGovt is renovating to SOeGE by apply the Service-Orientation (SO) principles in the entire system. This paper explores IT perspective of SOeGE in India which encompasses the public service models and illustrated with a case study the Passport service of India.Keywords: enterprise architecture, service-oriented e-Government enterprise, service interface layer, service model
Procedia PDF Downloads 5263223 3D Printing for Maritime Cultural Heritage: A Design for All Approach to Public Interpretation
Authors: Anne Eugenia Wright
Abstract:
This study examines issues in accessibility to maritime cultural heritage. Using the Pillar Dollar Wreck in Biscayne National Park, Florida, this study presents an approach to public outreach based on the concept of Design for All. Design for All advocates creating products that are accessible and functional for all users, including those with visual, hearing, learning, mobility, or economic impairments. As a part of this study, a small exhibit was created that uses 3D products as a way to bring maritime cultural heritage to the public. It was presented to the public at East Carolina University’s Joyner Library. Additionally, this study presents a methodology for 3D printing scaled photogrammetry models of archaeological sites in full color. This methodology can be used to present a realistic depiction of underwater archaeological sites to those who are incapable of accessing them in the water. Additionally, this methodology can be used to present underwater archaeological sites that are inaccessible to the public due to conditions such as visibility, depth, or protected status. This study presents a practical use for 3D photogrammetry models, as well as an accessibility strategy to expand the outreach potential for maritime archaeology.Keywords: Underwater Archaeology, 3D Printing, Photogrammetry, Design for All
Procedia PDF Downloads 1483222 Visible Light Communication and Challenges
Authors: Hamid Sharif, Nazish Saleem Abbas, Muhammad Haris Jamil
Abstract:
Visible light communication is an emerging technology for almost a decade now; there is a growing need for VLC systems to overcome the challenges faced by radio frequency RF communication systems. With the advancement in the development of solid-state sources, in the future would replace incandescent and fluorescent light sources. These solid-state devices are not only to be used for illumination but can also be employed for communication and navigational purposes. The replacement of conventional illumination sources with highly efficient light-emitting diodes (LED's) (generally white light) will reduce energy consumption as well as environmental pollution. White LEDs dissipate very less power as compared to conventional light sources. The use of LED's is not only beneficial in terms of power consumption, but it also has an intrinsic capability for indoor wireless communication as compared to indoor RF communication. It is considerably low in cost to operate than the RF systems such as Wi-Fi routers, allows convenient means of reusing the bandwidth, and there is a huge potential for high data rate transmissions with enhanced data security. This paper provides an overview of some of the current challenges with VLC and proposes a possible solution to deal with these challenges; it also examines some joint protocols to optimize the joint illumination and communication functionality.Keywords: visible light communication, line of sight, root mean square delay spread, light emitting diodes
Procedia PDF Downloads 763221 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 2523220 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms
Authors: Sekkal Nawel, Mahammed Nadir
Abstract:
The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network
Procedia PDF Downloads 733219 The Question of Choice in an Achievement Test: A Study on the Sudanese Case
Authors: Mahmoud Abdelrazig Mahmoud Barakat
Abstract:
Achievement tests administered at national level play a significant role in the lives of test-takers as well as the whole society. This paper aims to investigate the effect of giving students a choice between two optional questions on their overall performance in a high stake achievement test for university admission. It is hypothesized that questions targeting writing-based productive skills and language system necessitate display of abilities which are different from fact-based questions designed around story content. The two items are assumed to reflect different constructs that require different criteria of assessment. Consequently, the student’s overall score is affected by the item they choose to answer, which might not be reflective of their real language abilities. An open-ended interview was carried out with ten teachers working with grade 3 students in model secondary schools to investigate the nature of the two test items and their impact on the student’s performance. The data has proved that giving choice in an achievement test generates different performances that are assessed differently. It is recommended that in order to address the question of fairness, it is important to clearly define and balance the construct of the items that affect the student’s choice and performance.Keywords: achievement test, assessment, choice, fairness performance
Procedia PDF Downloads 2283218 Effects of Conversion of Indigenous Forest to Plantation Forest on the Diversity of Macro-Fungi in Kereita Forest, Kikuyu Escarpment, Kenya
Authors: Susan Mwai, Mary Muchane, Peter Wachira, Sheila Okoth, Muchai Muchane, Halima Saado
Abstract:
Tropical forests harbor a wide range of biodiversity and rich macro-fungi diversity compared to the temperate regions in the World. However, biodiversity is facing the threat of extinction following the rate of forest loss taking place before proper study and documentation of macrofungi is achieved. The present study was undertaken to determine the effect of converting indigenous habitat to plantation forest on macrofungi diversity. To achieve the objective of this study, an inventory focusing on macro-fungi diversity was conducted within Kereita block in Kikuyu Escarpment forest which is on the southern side of Aberdare mountain range. The macrofungi diversity was conducted in the indigenous forest and in more than 15 year old Patula plantation forest , during the wet (long rain season, December 2014) and dry (Short rain season, May, 2015). In each forest type, 15 permanent (20m x 20m) sampling plots distributed across three (3) forest blocks were used. Both field and laboratory methods involved recording abundance of fruiting bodies, taxonomic identity of species and analysis of diversity indices and measures in terms of species richness, density and diversity. R statistical program was used to analyze for species diversity and Canoco 4.5 software for species composition. A total number of 76 genera in 28 families and 224 species were encountered in both forest types. The most represented taxa belonged to the Agaricaceae (16%), Polyporaceae (12%), Marasmiaceae, Mycenaceae (7%) families respectively. Most of the recorded macro-fungi were saprophytic, mostly colonizing the litter 38% and wood 34% based substrates, which was followed by soil organic dwelling species (17%). Ecto-mycorrhiza fungi (5%) and parasitic fungi (2%) were the least encountered. The data established that indigenous forests (native ecosystems) hosts a wide range of macrofungi assemblage in terms of density (2.6 individual fruit bodies / m2), species richness (8.3 species / plot) and species diversity (1.49/ plot level) compared to the plantation forest. The Conversion of native forest to plantation forest also interfered with species composition though did not alter species diversity. Seasonality was also shown to significantly affect the diversity of macro-fungi and 61% of the total species being present during the wet season. Based on the present findings, forested ecosystems in Kenya hold diverse macro-fungi community which warrants conservation measures.Keywords: diversity, Indigenous forest, macro-fungi, plantation forest, season
Procedia PDF Downloads 2183217 Tokenization of Blue Bonds as an Emerging Green Finance Tool
Authors: Rodrigo Buaiz Boabaid
Abstract:
Tokenization of Blue Bonds is an emerging Green Finance tool that has the potential to scale Blue Carbon Projects to fight climate change. This innovative solution has a huge potential to democratize the green finance market and catalyze innovations in the climate change finance sector. Switzerland has emerged as a leader in the Green Finance space and is well-positioned to drive the adoption of Tokenization of Blue & Green Bonds. This unique approach has the potential to unlock new sources of capital and enable global investors to participate in the financing of sustainable blue carbon projects. By leveraging the power of blockchain technology, Tokenization of Blue Bonds can provide greater transparency, efficiency, and security in the investment process, while also reducing transaction costs. Investments are in line with the highest regulations and designed according to the stringent legal framework and compliance standards set by Switzerland. The potential benefits of Tokenization of Blue Bonds are significant and could transform the way that sustainable projects are financed. By unlocking new sources of capital, this approach has the potential to accelerate the deployment of Blue Carbon projects and create new opportunities for investors to participate in the fight against climate change.Keywords: blue carbon, blue bonds, green finance, Tokenization, blockchain solutions
Procedia PDF Downloads 783216 Growth and Biochemical Composition of Tetraselmis sp. and Chlorella sp. under Varied Growth Conditions
Authors: M. Alsull
Abstract:
In this study, Tetraselmis sp. and Chlorella sp. isolated from Penang National Park coastal waters, Malaysia, and cultivated under combined various laboratory conditions (temperature, light and nitrogen limitation and starvation). Growth rate, dry weight, chlorophyll a content, total lipids content and total carbohydrates content were estimated at mid-exponential growth phase. Tetraselmis sp. and Chlorella sp. showed remarkably decrease in growth rate, chlorophyll a content and dry weight when maintained under nitrogen limitation and starvation conditions, as well as when grown under 12:12 h light, dark regime conditions. Chlorella sp. showed ability to counter the fluctuation in temperature with no significant effects on the measured parameters; in contrast, Tetraselmis sp. showed a decrease in growth rate, chlorophyll a content and dry weight when grown under 15±1˚C temperature. Cultures maintained under nitrogen full concentration, and 24 h light regime showed decrease in total lipids content, compared with 12:12 h light, dark cycle regime, in the two tested species.Keywords: microalgae, biochemical composition, temperature, light, nitrogen limitation
Procedia PDF Downloads 2953215 Role of Television in Constructing Gender for Young Women
Authors: Bhavna Negi
Abstract:
Several studies highlight the significance of media in constructing realities around us. According to Forbes magazine the demand of televisions has increased several times in the developing nations. A recent survey reveals that 112 million Indian households have a television, with 61 percent accessing cable. The space and visibility of television has enormously grown over the last decade in Indian homes. This small box has indeed taken a large place in their daily routines. The multi channel viewing and TRPs puzzle the Indian audience. This medium creates and constructs social images and roles which form internal representation about societal functioing. According to National Council of Applied Economic Research about twenty seven percent Indian literate youth watches TV for recreation. The present study finds about the role of television and its impact on young college going women with reference to family based serials shown on television. It is interesting to see how young women perceive the popular family soaps and define norms, roles and spaces for a woman and a man. The paper further examines the subtle messages given to young women through television serials. It draws insights into the relationship between the contemporary Indian women and the images conceptualized and communicated on television.Keywords: media, women, gender, social roles
Procedia PDF Downloads 3813214 Privatization of Pakistan Gas Sector: Role of Regulator
Authors: Lala Rukh, Muhammad Abbas Choudhary, Saddam Akber Abbasi
Abstract:
In Pakistan, the privatization of major sector of the national economy i.e. power, telecom, and gas is very strongly advocated since 80s. With varying degree of progress made in these sectors, it has been the government’s approach that the privatization accelerates the sectorial growth, increases operational efficiency and attracts the foreign investment and is of special significance for developing economies. The gas sector was not an exception and the privatization in this sector has moved through various stages during this time within the realms of socio-political agenda. This paper presents the overview of the gas sector in the country. The Oil and Gas Regulatory Authority (OGRA) Ordinance and privatization commission policy position as depicted in the press briefings provides philosophical foundations to the privatization and sectorial restructuring in this paper. The role of the major players from privatization perspective is discussed with special reference to the importance of natural gas sector. The case study further discusses the economic regulations that are being adopted by utility regulators in Pakistan and elsewhere in the world and some issues that the Regulatory Authority will be concerned are outlined. Major operators in the gas sector including Oil & Gas Development Corporation (OGDC), Sui Northern Gas Pipelines Limited (SNGPL), Sui Southern Gas Pipelines Limited (SSGPL) is also presented.Keywords: privatization, economic regulation, OGDCL, SSGCL, SNGPL
Procedia PDF Downloads 4433213 Predictive Modelling Approaches in Food Processing and Safety
Authors: Amandeep Sharma, Digvaijay Verma, Ruplal Choudhary
Abstract:
Food processing is an activity across the globe that help in better handling of agricultural produce, including dairy, meat, and fish. The operations carried out in the food industry includes raw material quality authenticity; sorting and grading; processing into various products using thermal treatments – heating, freezing, and chilling; packaging; and storage at the appropriate temperature to maximize the shelf life of the products. All this is done to safeguard the food products and to ensure the distribution up to the consumer. The approaches to develop predictive models based on mathematical or statistical tools or empirical models’ development has been reported for various milk processing activities, including plant maintenance and wastage. Recently AI is the key factor for the fourth industrial revolution. AI plays a vital role in the food industry, not only in quality and food security but also in different areas such as manufacturing, packaging, and cleaning. A new conceptual model was developed, which shows that smaller sample size as only spectra would be required to predict the other values hence leads to saving on raw materials and chemicals otherwise used for experimentation during the research and new product development activity. It would be a futuristic approach if these tools can be further clubbed with the mobile phones through some software development for their real time application in the field for quality check and traceability of the product.Keywords: predictive modlleing, ann, ai, food
Procedia PDF Downloads 853212 Role of Music in the Mainstream Educational Curriculum: A Study in the Light of Noble Laureate Rabindranath Tagore's Educational Philosophy
Authors: Tripti Watwe
Abstract:
Music or art of any country is its national heritage and represents the cultural personality of that region. Noble Laureate Rabindranath Tagore through his international educational endeavour called ‘Visva-Bharati’ established this concept that music can very much be a part of the mainstream education of a country because the purpose of both music and education is to bring in transformation in an individual. An individual with musical veins is more focused and meditative towards his or her goal in life. That is why in Tagore’s Visva-Bharati, one can observe even the brightest brains from various fields of economics, science, social sciences or literature equally verbal and efficient in Rabindra songs which the poet created under his own name.Tagore established this phenomenon that music if made a part of education and life, brings in profound transformation in the character and over-all personality of a person giving better and responsible citizens to a nation. It is expected that this hypothesis that music and education can be a nectarine combination can be established and proved with the help of various recorded observations containing Tagore’s educational philosophy, his experiments in his own institution ‘Visva-Bharati’ and through recorded research materials which have been gathered during the author’s field work in Visva-Bharati.Keywords: Rabindranath Tagore, Visva-Bharati, education, music, philosophy
Procedia PDF Downloads 3043211 A Data-Driven Optimal Control Model for the Dynamics of Monkeypox in a Variable Population with a Comprehensive Cost-Effectiveness Analysis
Authors: Martins Onyekwelu Onuorah, Jnr Dahiru Usman
Abstract:
Introduction: In the realm of public health, the threat posed by Monkeypox continues to elicit concern, prompting rigorous studies to understand its dynamics and devise effective containment strategies. Particularly significant is its recurrence in variable populations, such as the observed outbreak in Nigeria in 2022. In light of this, our study undertakes a meticulous analysis, employing a data-driven approach to explore, validate, and propose optimized intervention strategies tailored to the distinct dynamics of Monkeypox within varying demographic structures. Utilizing a deterministic mathematical model, we delved into the intricate dynamics of Monkeypox, with a particular focus on a variable population context. Our qualitative analysis provided insights into the disease-free equilibrium, revealing its stability when R0 is less than one and discounting the possibility of backward bifurcation, as substantiated by the presence of a single stable endemic equilibrium. The model was rigorously validated using real-time data from the Nigerian 2022 recorded cases for Epi weeks 1 – 52. Transitioning from qualitative to quantitative, we augmented our deterministic model with optimal control, introducing three time-dependent interventions to scrutinize their efficacy and influence on the epidemic's trajectory. Numerical simulations unveiled a pronounced impact of the interventions, offering a data-supported blueprint for informed decision-making in containing the disease. A comprehensive cost-effectiveness analysis employing the Infection Averted Ratio (IAR), Average Cost-Effectiveness Ratio (ACER), and Incremental Cost-Effectiveness Ratio (ICER) facilitated a balanced evaluation of the interventions’ economic and health impacts. In essence, our study epitomizes a holistic approach to understanding and mitigating Monkeypox, intertwining rigorous mathematical modeling, empirical validation, and economic evaluation. The insights derived not only bolster our comprehension of Monkeypox's intricate dynamics but also unveil optimized, cost-effective interventions. This integration of methodologies and findings underscores a pivotal stride towards aligning public health imperatives with economic sustainability, marking a significant contribution to global efforts in combating infectious diseases.Keywords: monkeypox, equilibrium states, stability, bifurcation, optimal control, cost-effectiveness
Procedia PDF Downloads 923210 Surgical Site Infections Post Ventriculoperitoneal (VP) Shunting: A Matched Healthcare Cost and Length of Stay Study
Authors: Issa M. Hweidi, Saba W. Al-Ibraheem
Abstract:
This study aimed to assess the increased hospital length of stay and healthcare costs associated with SSIs among ventriculoperitoneal shunting surgery patients in Jordan. This study adopted a retrospective and nested 1:1 matched case-control design. A non-probability convenient sample of 48 VP shunt patients was recruited for the purpose of the study. The targeted groups of the study basically used to cross-match the variables investigated to minimize the risk of confounding. Information was extracted from the text of patients' electronic health records. As compared to the non-SSI group, the SSI group had an extra mean healthcare cost of $13,696.53 (p=0.001) and longer hospital length of stay (22.64 mean additional days). Furthermore, Acinetobacter baumannii and Klebsiella pneumonia were identified as being the most predominant causative agents of SSIs. The results of this study may provide baseline data for national and regional benchmarking to evaluate the quality of care provided to likewise patients. Adherence to infection control strategies and protocols considering new surveillance methods of SSIs is encouraged.Keywords: ventriculoperitoneal shunt, health care cost, length of stay, neurosurgery, surgical site infections
Procedia PDF Downloads 833209 A Case Study Report on Acoustic Impact Assessment and Mitigation of the Hyprob Research Plant
Authors: D. Bianco, A. Sollazzo, M. Barbarino, G. Elia, A. Smoraldi, N. Favaloro
Abstract:
The activities, described in the present paper, have been conducted in the framework of the HYPROB-New Program, carried out by the Italian Aerospace Research Centre (CIRA) promoted and funded by the Italian Ministry of University and Research (MIUR) in order to improve the National background on rocket engine systems for space applications. The Program has the strategic objective to improve National system and technology capabilities in the field of liquid rocket engines (LRE) for future Space Propulsion Systems applications, with specific regard to LOX/LCH4 technology. The main purpose of the HYPROB program is to design and build a Propulsion Test Facility (HIMP) allowing test activities on Liquid Thrusters. The development of skills in liquid rocket propulsion can only pass through extensive test campaign. Following its mission, CIRA has planned the development of new testing facilities and infrastructures for space propulsion characterized by adequate sizes and instrumentation. The IMP test cell is devoted to testing articles representative of small combustion chambers, fed with oxygen and methane, both in liquid and gaseous phase. This article describes the activities that have been carried out for the evaluation of the acoustic impact, and its consequent mitigation. The impact of the simulated acoustic disturbance has been evaluated, first, using an approximated method based on experimental data by Baumann and Coney, included in “Noise and Vibration Control Engineering” edited by Vér and Beranek. This methodology, used to evaluate the free-field radiation of jet in ideal acoustical medium, analyzes in details the jet noise and assumes sources acting at the same time. It considers as principal radiation sources the jet mixing noise, caused by the turbulent mixing of jet gas and the ambient medium. Empirical models, allowing a direct calculation of the Sound Pressure Level, are commonly used for rocket noise simulation. The model named after K. Eldred is probably one of the most exploited in this area. In this paper, an improvement of the Eldred Standard model has been used for a detailed investigation of the acoustical impact of the Hyprob facility. This new formulation contains an explicit expression for the acoustic pressure of each equivalent noise source, in terms of amplitude and phase, allowing the investigation of the sources correlation effects and their propagation through wave equations. In order to enhance the evaluation of the facility acoustic impact, including an assessment of the mitigation strategies to be set in place, a more advanced simulation campaign has been conducted using both an in-house code for noise propagation and scattering, and a commercial code for industrial noise environmental impact, CadnaA. The noise prediction obtained with the revised Eldred-based model has then been used for formulating an empirical/BEM (Boundary Element Method) hybrid approach allowing the evaluation of the barrier mitigation effect, at the design. This approach has been compared with the analogous empirical/ray-acoustics approach, implemented within CadnaA using a customized definition of sources and directivity factor. The resulting impact evaluation study is reported here, along with the design-level barrier optimization for noise mitigation.Keywords: acoustic impact, industrial noise, mitigation, rocket noise
Procedia PDF Downloads 1513208 Getting Out: A Framework for Exiting/Escaping Sex Trafficking
Authors: Amanda Noble
Abstract:
The process of exiting/escaping situations of sex trafficking can be arduous and fraught with numerous barriers. In this paper the results of a national Canadian study on escaping situations of sex trafficking is discussed. Surveys and focus groups were conducted with 201 stakeholders in 8 cities, including 50 survivors of sex trafficking, service providers, health care providers and police. The results show that survivors are both vulnerable to being exploited and experience barriers to exiting as a result of structural factors such as colonialism, poverty, and discrimination based on race and gender. Survivors also face numerous barriers within various systems such as child welfare and the legal system. In addition, survivors contend with multiple psychological and psychosocial factors when exiting including the trauma bond, complex trauma and mental health concerns, substance use, isolation, and adjusting to ‘mainstream’ life. In light of these factors, the service needs of survivors escaping sex trafficking are discussed, and promising practices, such as trauma-informed practice and working from a stages of change model are outlined. This paper is useful for service providers that work with survivors, policy makers, or anyone who has ever wondered why survivors that are not being physically detained don’t ‘just leave’ or escape their exploitative situations.Keywords: Barriers, Exiting, Promising Practices, Sex Trafficking
Procedia PDF Downloads 1003207 Experimental and Numerical Investigations of Impact Response on High-Speed Train Windshield
Authors: Wen Ma, Yong Peng, Zhixiang Li
Abstract:
Security journey is a vital focus on the field of Rail Transportation. Accidents caused by the damage of the high-speed train windshield have occurred many times and have given rise to terrible consequences. Train windshield consists of tempered glass and polyvinyl butyral (PVB) film. In this work, the quasi-static tests and the split Hopkinson pressure bar (SHPB) tests were carried out first to obtain the mechanical properties and constitutive model for the tempered glass and PVB film. These tests results revealed that stress and Young’s modulus of tempered glass were wake-sensitive to strain rate, but stress and Young’s modulus of PVB film were strong-sensitive to strain rate. Then impact experiment of the windshield was carried out to investigate dynamic response and failure characteristics of train windshield. In addition, a finite element model based on the combined finite element method was proposed to investigate fracture and fragmentation responses of train windshield under different-velocity impact. The results can be used for further design and optimization of the windshield for high-speed train application.Keywords: constitutive model, impact response, mechanism properties, PVB film, tempered glass
Procedia PDF Downloads 1483206 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Authors: Shaila Rana, Wasim Alhamdani
Abstract:
Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training
Procedia PDF Downloads 2233205 CFD Simulation for Air-Borne Infection Analysis in AII-Room
Authors: Young Kwon Yang, In Sung Kang, Jung Ha Hwang, Jin Chul Park
Abstract:
The present study is a foundational study for performance improvements on isolation wards to prevent proliferation of secondary infection of infectious diseases such as SARS, H1N1, and MERS inside hospitals. Accordingly, the present study conducted an analysis of the effect of sealing mechanisms and filling of openings on ensuring air tightness performance in isolation wards as well as simulation on air currents in improved isolation wards. The study method is as follows. First, previous studies on aerial infection type and mechanism were reviewed, and the review results were utilized as basic data of analysis on simulation of air current. Second, national and international legislations and regulations in relation to isolation wards as well as case studies on developed nations were investigated in order to identify the problems in isolation wards in Korea and improvement plans. Third, construction and facility plans were compared and analyzed between general and isolation wards focusing on large general hospitals in Korea, thereby conducting comparison and analysis on the performance and effects of air-tightness of general and isolation wards through CFD simulations. The study results showed that isolation wards had better air-tightness performance than that of general wards.Keywords: AII Room, air-borne infection, CFD, computational fluid dynamics
Procedia PDF Downloads 2943204 Regime under Trade Related Intellectual Property Rights Agreement 1994 and Its Impacts on Health in Pakistan: A Case Study of Pharmaceutical Patents
Authors: Muhammad Danyal Khan
Abstract:
The standards of patentability are drawing a great impact upon medicine industry of Pakistan which is indirectly troubling the right to health of ordinary citizen. Globalization of intellectual property laws is directly impacting access to medicine for population in Pakistan. Pakistan has enacted Patent Ordinance 2000 to develop the standards of Patent laws in consonance with international commitments. Moreover, Pakistan is signatory to UN Millennium Development Goals (2000-2015), and three of them directly put stress upon the health standards. This article will provide a critical brief about implications of TRIPS Agreement on standards of health in Pakistan and will also propose a futuristic approach for the pharmaceutical industry. This paper will define the paradox of globalization and national preparedness on pharmaceutical patents utilizing industry statistics and case laws from Pakistan. Moreover, this work will contribute towards debate on access to medicine at legislative and interpretative levels that will further help development of equilibrium between pharmaceutical patents and right to health.Keywords: TRIPS (Trade Related Intellectual Property Rights), patents, compulsory licensing, patent, lifesaving drugs, WTO, infringement
Procedia PDF Downloads 2203203 An Effective and Efficient Web Platform for Monitoring, Control, and Management of Drones Supported by a Microservices Approach
Authors: Jorge R. Santos, Pedro Sebastiao
Abstract:
In recent years there has been a great growth in the use of drones, being used in several areas such as security, agriculture, or research. The existence of some systems that allow the remote control of drones is a reality; however, these systems are quite simple and directed to specific functionality. This paper proposes the development of a web platform made in Vue.js and Node.js to control, manage, and monitor drones in real time. Using a microservice architecture, the proposed project will be able to integrate algorithms that allow the optimization of processes. Communication with remote devices is suggested via HTTP through 3G, 4G, and 5G networks and can be done in real time or by scheduling routes. This paper addresses the case of forest fires as one of the services that could be included in a system similar to the one presented. The results obtained with the elaboration of this project were a success. The communication between the web platform and drones allowed its remote control and monitoring. The incorporation of the fire detection algorithm in the platform proved possible a real time analysis of the images captured by the drone without human intervention. The proposed system has proved to be an asset to the use of drones in fire detection. The architecture of the application developed allows other algorithms to be implemented, obtaining a more complex application with clear expansion.Keywords: drone control, microservices, node.js, unmanned aerial vehicles, vue.js
Procedia PDF Downloads 1553202 Bhumastra “Unmanned Ground Vehicle”
Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J
Abstract:
Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI
Procedia PDF Downloads 1293201 The Emergence of Cold War Heritage: United Kingdom Cold War Bunkers and Sites
Authors: Peter Robinson, Milka Ivanova
Abstract:
Despite the growing interest in the Cold War period and heritage, little attention has been paid to the presentation and curatorship of Cold War heritage in eastern or western Europe. In 2021 Leeds Beckett University secured a British Academy Grant to explore visitor experiences, curatorship, emotion, and memory at Cold War-related tourist sites, comparing the perspectives of eastern and western European sites through research carried out in the UK and Bulgaria. The research explores the themes of curatorship, experience, and memory. Many of the sites included in the research in the UK-based part of the project are nuclear bunkers that have been decommissioned and are now open to visitors. The focus of this conference abstract is one of several perspectives drawn from a British Academy Grant-funded project exploring curatorship, visitor experience and nostalgia and memory in former cold war spaces in the UK, bringing together critical comparisons between western and eastern European sites. The project identifies specifically the challenges of ownership, preservation and presentation and discusses the challenges facing those who own, manage, and provide access to cold war museums and sites. The research is underpinned by contested issues of authenticity and ownership, discussing narrative accounts of those involved in caring for and managing these sites. The research project draws from interviews with key stakeholders, site observations, visitor surveys, and content analysis of Trip advisor posts. Key insights from the project include the external challenges owners and managers face from a lack of recognition of and funding for important Cold War sites in the UK that are at odds with interest shown in cold war sites by visitors to Cold War structures and landmarks. The challenges center on the lack of consistent approaches toward cold war heritage conservation, management, and ownership, lack of curatorial expertise and over-reliance on no-expert interpretation and presentation of heritage, the effect of the passage of time on personal connections to cold war heritage sites, the dissipating technological knowledge base, the challenging structure that does not lend themselves easily as visitor attractions or museums, the questionable authenticity of artifacts, the limited archival material, and quite often limited budgets. A particularly interesting insight focusing on nuclear bunkers has been on the difficulties in site reinterpretation because of the impossibility of fully exploring the enormity of nuclear war as a consistent threat of the Cold War. Further insights from the research highlight the secrecy of many of the sites as a key marketing strategy, particularly in relation to the nuclear bunker sites included in the project.Keywords: cold war, curatorship, heritage, nuclear bunkers.
Procedia PDF Downloads 823200 Teachers’ Attitudes and Techniques in EFL Writing in Secondary Schools in Egypt
Authors: Hosam Mohamed Darwish
Abstract:
In 2008, the Egyptian Ministry of Education introduced a new national coursebook ‘Hello for Secondary Schools, which recommends a shift in EFL teachers’ instructional practices. Since then, very little attention has been paid to teachers’ techniques in EFL writing classes. Hence, this study aimed at investigating teaching writing practices in secondary schools and exploring the teachers’ attitudes towards EFL writing skill in addition to exploring the difficulties that teachers encountered in EFL writing lessons. The study depended on data triangulation through administering two questionnaires: one to 44 teachers and the other to 24 students, and conducting semi-structured interviews with 11 teachers. Both teachers and students were asked to describe teaching practices in EFL writing classes while the open-ended questions and interviews collected data about the teachers’ difficulties in writing lessons. The questionnaires indicate that teachers have negative attitudes towards teaching writing, and most of their practices are still traditional. Five factors have influenced teachers’ practices: backwash of the test, teachers’ professional development, students’ culture of reading and large classes. The study recommends there has to be a necessary change in the students’ examination system, and ongoing teachers’ professional development should be considered. Finally, a teaching model and implications are suggested.Keywords: EFL writing, Egyptian secondary schools, teachers’ attitudes, teachers’ techniques
Procedia PDF Downloads 4263199 Reaching to the Unreachable: Can Local Adaptation Plan of Action (LAPA) Overcome the Current Barriers to Reach to the Vulnerable?
Authors: Bimal Raj Regmi, Cassandra Star
Abstract:
Climate change adaptation is now the priority of many Least Developed Countries (LDCs). The country governments in LDCs are designing institutional and financing architecture to implement adaptation programmes. Nepal has introduced the concept of Local Adaptation Plan of Action (LAPA) to facilitate adaptation at the local level. However, there is lack of clarity and ambiguity on whether or not LAPA can be effective means to reach to the most vulnerable. This research paper aims to generate evidences to assess the applicability and significance of LAPA. The study used a case study approach and relied on data gathered from field studies carried out in Pyuthan and Nawalparasi district of Nepal. The findings show that LAPA has potentials to link the community based adaptation with national adaptation initiatives and thus act as middle range approach to adaptation planning. However, the current scale of LAPA and its approaches to planning and delivery are constraints by socio-economic and governance barriers. This research paper argue that the in order to address the constraints a more flexible and co-management approach to LAPA is needed.Keywords: community based adaptation, local adaptation, co-management, climate change
Procedia PDF Downloads 2653198 Leveraging NFT Secure and Decentralized Lending: A Defi Solution
Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.
Abstract:
In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.Keywords: blockchain, defi, NFT, ethereum, marketplace
Procedia PDF Downloads 563197 An Application for Risk of Crime Prediction Using Machine Learning
Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento
Abstract:
The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.Keywords: crime prediction, machine learning, public safety, smart city
Procedia PDF Downloads 1183196 Crime against Women in India: A Geospatial Analysis
Authors: V. S. Binu, Amitha Puranik, Sintomon Mathew, Sebin Thomas
Abstract:
Globally, women are more vulnerable to various forms of crimes than males. The crimes that are directed specifically towards women are classified as crime against women. Crime against women in India is observed to increase year after year and according to the National Crime Records Bureau (NCRB) report, in 2014 there was an increase of 9.2% cases of crime against women compared to the previous year. The violence in a population depends on socio-demographic factors, unemployment, poverty, number of police officials etc. There are very few studies that explored to identify hotspots of various types of crime against women in India. Hotspots are geographical regions where the number of observed cases is more than the expected number for that region. It is important to identify the hotspots of crime against women in India in order to control and prevent violence against women in that region. The goal of this study is to identify the hotspots of crime against women in India using spatial data analysis techniques. For the present study, we used the district level data of various types of crime against women in India in the year 2011 published by NCRB and the 2011 Census population in each of these districts. The study used spatial scan statistic to identify the hotspots using SaTScan software.Keywords: crime, hotspots, India, Satscan, Women
Procedia PDF Downloads 417