Search results for: World Trade Center Attack
10354 The Phenomena of Virtual World Adoption: Antecedents and Consequences of Virtual World Experience
Authors: Norita Ahmad, Reza Barkhi, Xiaobo Xu
Abstract:
We design an experimental study to learn about the cognitive implications of the use of avatars in a Virtual World (VW) (i.e., Second Life). The results support our proposed model, where a positive flow experience with VW influences the attitude towards VW, in turn influencing intention to use VW. Furthermore, VW flow experience can itself be impacted by perceived peer influence, familiarity with VW, and personality of the individuals behind the avatars in VW.Keywords: avatar, flow experience, personality type, second life, virtual world
Procedia PDF Downloads 59810353 Ancient Malay and Spice Trade Routes: A Study of Ancient Malay from the Perspectives of Linguistics and Archaeology
Authors: Totok Suhardijanto, Ninie Susanti Tedjowasono
Abstract:
This paper discusses the relationship between the distribution of Ancient Malay inscriptions and Spice Trade Route, especially in the relation with material cultures that accompany them, to understand how Malay could spread out around the archipelago beyond its original native-speakers’ region. The archipelago was known as the Spice Islands from the very beginning of the first century due to mace, cloves, and nutmeg that were originally exclusively found there. According to the Indian record, since the 2nd century, there has been a contact established between Indian and Indonesian people. A Chinese document from 3rd Century has mentioned Wangka (now widely known as Bangka) an island near Sumatra where some Chinese expeditions had visited. All of these records supported the existence of a maritime trade system and route between the archipelago and other countries during the first millennium. This paper will discuss first the Ancient Malay inscription spread around the archipelago from the perspectives of language variation and writing system style. Analyzing language variations of inscriptions certainly is not as easy as studying current spoken language variations in modern sociolinguistics. A huge amount of data is available for such kind of studies. On the contrary, in language variation research with inscription texts as an object, data is insufficient. Other resources will be needed to support the linguistic analysis. For this reason, this research made use of epigraphical evidence in the surrounding areas of the inscriptions to explain the variation of language and writing style. The research next expands the analysis to figure out the relationship between language variation and inscriptions distribution to the Spice Trade Route that spreads from the Molucca Sea to Mediterranian Sea. Data in this research consists of six different inscriptions: Kedukan Bukit, Koto Kapur, Dapunta Salendra, Sang Hyang Wintang, Ligor, and Laguna from the 7th-9th Century and found in Sumatra, Jawa, and the Philippines. In addition, as a comparative resource, this research also used Hikayat Tanjung Tanah, the first-founded Ancient Malay manuscript. In language analysis, we conduct a sociolinguistic method to explore the language variation and writing style of the inscriptions. For dealing with archaeological data, we conducted a hermeneutic method to analyze the possible meaning and social uses of the data. Language variations and writing system style in this research can be classified into two main groups. The language, epigraphical, and archaeological evidence explain that Ancient Malay had been widely used in the Eastern area of Spice Trade Route because it played an important role in the region as a lingua franca between people from different ethnic groups with different languages.Keywords: Ancient Malay, Spice trade route, language variation, writing system variation
Procedia PDF Downloads 19310352 Analysing the Influence of COVID-19 on Major Agricultural Commodity Prices in South Africa
Authors: D. Mokatsanyane, J. Jansen Van Rensburg
Abstract:
This paper analyses the influence and impact of COVID-19 on major agricultural commodity prices in South Africa. According to a World Bank report, the agricultural sector in South Africa has been unable to reduce the domestic food crisis that has been occurring over the past years, hence the increased rate of poverty, which is currently at 55.5 percent as of April 2020. Despite the significance of this sector, empirical findings concluded that the agricultural sector now accounts for 1.88 percent of South Africa's gross domestic product (GDP). Suggesting that the agricultural sector's contribution to the economy has diminished. Despite the low contribution to GDP, this primary sector continues to play an essential role in the economy. Over the past years, multiple factors have contributed to the soaring commodities prices, namely, climate shocks, biofuel demand, demand and supply shocks, the exchange rate, speculation in commodity derivative markets, trade restrictions, and economic growth. The COVID-19 outbursts have currently disturbed the supply and demand of staple crops. To address the disruption, the government has exempted the agricultural sector from closure and restrictions on movement. The spread of COVID-19 has caused turmoil all around the world, but mostly in developing countries. According to Statistic South Africa, South Africa's economy decreased by seven percent in 2020. Consequently, this has arguably made the agricultural sector the most affected sector since slumped economic growth negatively impacts food security, trade, farm livelihood, and greenhouse gas emissions. South Africa is sensitive to the fruitfulness of global food chains. Restrictions in trade, reinforced sanitary control systems, and border controls have influenced food availability and prices internationally. The main objective of this study is to evaluate the behavior of agricultural commodity prices pre-and during-COVID to determine the impact of volatility drivers on these crops. Historical secondary data of spot prices for the top five major commodities, namely white maize, yellow maize, wheat, soybeans, and sunflower seeds, are analysed from 01 January 2017 to 1 September 2021. The timeframe was chosen to capture price fluctuations between pre-COVID-19 (01 January 2017 to 23 March 2020) and during-COVID-19 (24 March 2020 to 01 September 2021). The Generalised Autoregressive Conditional Heteroscedasticity (GARCH) statistical model will be used to measure the influence of price fluctuations. The results reveal that the commodity market has been experiencing volatility at different points. Extremely high volatility is represented during the first quarter of 2020. During this period, there was high uncertainty, and grain prices were very volatile. Despite the influence of COVID-19 on agricultural prices, the demand for these commodities is still existing and decent. During COVID-19, analysis indicates that prices were low and less volatile during the pandemic. The prices and returns of these commodities were low during COVID-19 because of the government's actions to respond to the virus's spread, which collapsed the market demand for food commodities.Keywords: commodities market, commodity prices, generalised autoregressive conditional heteroscedasticity (GARCH), Price volatility, SAFEX
Procedia PDF Downloads 17410351 Over the Air Programming Method for Learning Wireless Sensor Networks
Authors: K. Sangeeth, P. Rekha, P. Preeja, P. Divya, R. Arya, R. Maneesha
Abstract:
Wireless sensor networks (WSN) are small or tiny devices that consists of different sensors to sense physical parameters like air pressure, temperature, vibrations, movement etc., process these data and sends it to the central data center to take decisions. The WSN domain, has wide range of applications such as monitoring and detecting natural hazards like landslides, forest fire, avalanche, flood monitoring and also in healthcare applications. With such different applications, it is being taught in undergraduate/post graduate level in many universities under department of computer science. But the cost and infrastructure required to purchase WSN nodes for having the students getting hands on expertise on these devices is expensive. This paper gives overview about the remote triggered lab that consists of more than 100 WSN nodes that helps the students to remotely login from anywhere in the world using the World Wide Web, configure the nodes and learn the WSN concepts in intuitive way. It proposes new way called over the air programming (OTAP) and its internals that program the 100 nodes simultaneously and view the results without the nodes being physical connected to the computer system, thereby allowing for sparse deployment.Keywords: WSN, over the air programming, virtual lab, AT45DB
Procedia PDF Downloads 37710350 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete
Authors: Gashaw Abebaw
Abstract:
Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan
Procedia PDF Downloads 12010349 Resource Sharing Issues of Distributed Systems Influences on Healthcare Sector Concurrent Environment
Authors: Soo Hong Da, Ng Zheng Yao, Burra Venkata Durga Kumar
Abstract:
The Healthcare sector is a business that consists of providing medical services, manufacturing medical equipment and drugs as well as providing medical insurance to the public. Most of the time, the data stored in the healthcare database is to be related to patient’s information which is required to be accurate when it is accessed by authorized stakeholders. In distributed systems, one important issue is concurrency in the system as it ensures the shared resources to be synchronized and remains consistent through multiple read and write operations by multiple clients. The problems of concurrency in the healthcare sector are who gets the access and how the shared data is synchronized and remains consistent when there are two or more stakeholders attempting to the shared data simultaneously. In this paper, a framework that is beneficial to distributed healthcare sector concurrent environment is proposed. In the proposed framework, four different level nodes of the database, which are national center, regional center, referral center, and local center are explained. Moreover, the frame synchronization is not symmetrical. There are two synchronization techniques, which are complete and partial synchronization operation are explained. Furthermore, when there are multiple clients accessed at the same time, synchronization types are also discussed with cases at different levels and priorities to ensure data is synchronized throughout the processes.Keywords: resources, healthcare, concurrency, synchronization, stakeholders, database
Procedia PDF Downloads 15010348 Implication of Built-Up Area, Vegetation, and Motorized Vehicles to Urban Microclimate in Bandung City Center
Authors: Ira Irawati, Muhammad Rangga Sururi
Abstract:
The expansion of built-up areas in many cities, particularly, as the consequences of urbanization process, is a common phenomenon in our contemporary world. As happened in many cities in developing world, this horizontal expansion let only a handful size of the area left for green open spaces, creating an extreme unbalance between built-up and green spaces. Combined with the high density and variety of human activities with its transportation modes; a process of urban heat island will occur, resulting in an increase in air temperature. This is one of the indicators of decreasing of the quality of urban microclimate. This paper will explore the effect of several variables of built-up areas and open spaces to the increase of air temperature using multiple linear regression analysis. We selected 11 zones within the radius of 1 km in Inner Bandung city center, and each zones measured within 300 m radius to represent the variety of land use, as well as the composition of buildings and green open spaces. By using a quantitative method which is multiple linear regression analysis, six dependent variables which are a) tree density-x1, b) shade level of tree-x2, c) surface area of buildings’ side which are facing west and east-x3, d) surface area of building side material-x4, e) surface area of pathway material, and f) numbers of motorized vehicles-x6; are calculated to find those influence to the air temperature as an independent variable-y. Finally, the relationship between those variables shows in this equation: y = 30.316 - 3.689 X1 – 6.563 X2 + 0.002 X3 – 2,517E6 X4 + 1.919E-9 X5 + 1.952E-4 X6. It shows that the existence of vegetation has a great impact on lowering temperature. In another way around, built up the area and motorized vehicles would increase the temperature. However, one component of built up area, the surface area of buildings’ sides which are facing west and east, has different result due to the building material is classified in low-middle heat capacity.Keywords: built-up area, microclimate, vehicles, urban heat island, vegetation
Procedia PDF Downloads 25910347 Schools of Thought in the Field of Social Entrepreneurship
Authors: Cris Bravo
Abstract:
Social entrepreneurship is a new and exciting topic that holds a great promise in helping alleviate the social problems of the world. As a new subject, the meaning of the term is too broad and this is counterproductive in trying to build understanding around the concept. The purpose of this study is to identify and compare the elements of social entrepreneurship as defined by seven international organizations leading social entrepreneurship projects: Ashoka Foundation, Skoll Foundation, Schwab Foundation and Yunus Center; as well as from three other institutions fostering social entrepreneurship: Global Social Benefit Institute, BRAC University, and Socialab. The study used document analysis from Skoll Foundation, Schwab Foundation, Yunus Center and Ashoka Foundation; and open ended interview to experts from the Global Social Benefit Institute at Santa Clara University in United States, BRAC University from Bangladesh, and Socialab from Argentina. The study identified three clearly differentiated schools of thought, based on their views on revenue, scalability, replicability and geographic location. While this study is by no means exhaustive, it provides an indication of the patterns of ideas fostered by important players in the field. By clearly identifying the similarities and differences in the concept of social entrepreneurship, research and practitioners are better equipped to build on the subject, and to promote more adequate and accurate social policies to foster the development of social entrepreneurship.Keywords: replicability, revenue, scalability, schools of thought, social entrepreneurship
Procedia PDF Downloads 38110346 Literature Review: Adversarial Machine Learning Defense in Malware Detection
Authors: Leidy M. Aldana, Jorge E. Camargo
Abstract:
Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.Keywords: Malware, adversarial, machine learning, defense, attack
Procedia PDF Downloads 6310345 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 33010344 Pakistan Nuclear Security: Threats from Non-State Actors
Authors: Jennifer Wright
Abstract:
The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism
Procedia PDF Downloads 22610343 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel
Authors: Afif J. Arabi
Abstract:
On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory
Procedia PDF Downloads 4410342 Curriculum Based Measurement and Precision Teaching in Writing Empowerment Enhancement: Results from an Italian Learning Center
Authors: I. Pelizzoni, C. Cavallini, I. Salvaderi, F. Cavallini
Abstract:
We present the improvement in writing skills obtained by 94 participants (aged between six and 10 years) with special educational needs through a writing enhancement program based on fluency principles. The study was planned and conducted with a single-subject experimental plan for each of the participants, in order to confirm the results in the literature. These results were obtained using precision teaching (PT) methodology to increase the number of written graphemes per minute in the pre- and post-test, by curriculum based measurement (CBM). Results indicated an increase in the number of written graphemes for all participants. The average overall duration of the intervention is 144 minutes in five months of treatment. These considerations have been analyzed taking account of the complexity of the implementation of measurement systems in real operational contexts (an Italian learning center) and important aspects of replicability and cost-effectiveness of such interventions.Keywords: curriculum based measurement, precision teaching, writing skill, Italian learning center
Procedia PDF Downloads 12910341 The Effect of Customs Commission Customer Satisfaction
Authors: Menelik Tilahun Alemu
Abstract:
Customs administrations are now increasingly regarded as the key border agencies responsible for all transactions related to issues arising from the border crossings of goods and people. Raising revenue has traditionally been high on the agenda of governments, represented by the Ministry of Finance (MOF), because of the critical importance of import duties as a source of budget revenue for many developing countries. Most of these functions are undertaken in close cooperation with other national agencies. Due to the need to make structural reforms that consider the nature of business activities in the world and the needs of consumers, the institution was previously divided into the Ministry of Revenue and the Customs Commission. Accordingly, the Ministry of Revenue is primarily responsible for administering and collecting local taxes, while the Customs Commission is responsible for administering customs matters; It supports exports and collects revenue from it. The National Import and Export Trade Service System is working to make the world more transparent and standardized and adapt to the current situation by formulating various guidelines, rules and procedures to provide a clear, simple, predictable and accessible service to customers. As a result, the commission will be able to streamline the business process by enabling Paperless customer service to support the service delivery technology and eliminate the customer iteration without having to incur unnecessary costs and inconveniences.Keywords: business, consumers, adapt, transparent
Procedia PDF Downloads 5010340 Total Life Cycle Cost and Life Cycle Assessment of Mass Timber Buildings in the US
Authors: Hongmei Gu, Shaobo Liang, Richard Bergman
Abstract:
With current worldwide trend in designs to have net-zero emission buildings to mitigate climate change, widespread use of mass timber products, such as Cross Laminated Timber (CLT), or Nail Laminated Timber (NLT) or Dowel Laminated Timber (DLT) in buildings have been proposed as one approach in reducing Greenhouse Gas (GHG) emissions. Consequentially, mass timber building designs are being adopted more and more by architectures in North America, especially for mid- to high-rise buildings where concrete and steel buildings are currently prevalent, but traditional light-frame wood buildings are not. Wood buildings and their associated wood products have tended to have lower environmental impacts than competing energy-intensive materials. It is common practice to conduct life cycle assessments (LCAs) and life cycle cost analyses on buildings with traditional structural materials like concrete and steel in the building design process. Mass timber buildings with lower environmental impacts, especially GHG emissions, can contribute to the Net Zero-emission goal for the world-building sector. However, the economic impacts from CLT mass timber buildings still vary from the life-cycle cost perspective and environmental trade-offs associated with GHG emissions. This paper quantified the Total Life Cycle Cost and cradle-to-grave GHG emissions of a pre-designed CLT mass timber building and compared it to a functionally-equivalent concrete building. The Total life cycle Eco-cost-efficiency is defined in this study and calculated to discuss the trade-offs for the net-zero emission buildings in a holistic view for both environmental and economic impacts. Mass timber used in buildings for the United States is targeted to the materials from the nation’s sustainable managed forest in order to benefit both national and global environments and economies.Keywords: GHG, economic impact, eco-cost-efficiency, total life-cycle costs
Procedia PDF Downloads 14010339 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 16910338 Assessment of the Egyptian Agricultural Foreign Trade with Common Market for Eastern and Southern Africa Countries
Authors: Doaa H. I. Mahmoud, El-Said M. Elsharkawy, Saad Z. Soliman, Soher E. Mustfa
Abstract:
The opening of new promising foreign markets is one of the objectives of Egypt’s foreign trade policies, especially for agricultural exports. This study aims at the examination of the commodity structure of the Egyptian agricultural imports and exports with the COMESA countries. In addition, estimation of the surplus/deficit of the Egyptian commodities and agricultural balance with these countries is made. Time series data covering the period 2004-2016 is used. Estimation of the growth function along with the derivation of the annual growth rates of the study’s variables is made. Some of the results of the study period display the following: (1) The average total Egyptian exports to the COMESA (Common Market for Eastern and Southern Africa) countries is estimated at 1,491 million dollars, with an annual growth rate of 14.4% (214.7 million dollars). (2) The average annual Egyptian agricultural exports to these economies is estimated at 555 million dollars, with an annual growth rate of 19.4% (107.7 million dollars). (3) The average annual value of agricultural imports from the COMESA countries is set at 289 Million Dollars, with an annual growth rate of 14.4% (41.6 million dollars). (4) The study shows that there is a continuous surplus in the agricultural balance with these economies, whilst having a deficit in the raw-materials agricultural balance, as well as the balance of input requirements with these countries.Keywords: COMESA, Egypt, growth rates, trade balance
Procedia PDF Downloads 20910337 Neo-Liberal Challenge - Apple in China
Authors: Mark McKeown
Abstract:
Press articles opining on how China has become the West’s biggest threat have become so common as to feel like old news. Since the United States shifted diplomatic recognition from Taiwan to the People’s Republic of China in 1979 the relationship between the world’s two largest economies has been at best a brittle one. This coiled tension has grown as trade between the two countries snaked ever upwards. As a byproduct of globalization Apple have focused much of their production and assembly in China. This has left the U.S. Big Tech company with several challenges. This paper focusses on the tightrope Apple now has to traverse. The majority of the data and analysis within this paper is sourced from my current ongoing PhD research on the influence of Big Tech lobbying on U.S. foreign policy. One of the main conclusions from this analysis is Apple has to adopt a carefully nuanced strategy of appeasement to avoid friction, with both the governments of China and the United States.Keywords: apple, China, Taiwan, war
Procedia PDF Downloads 6510336 Sustainable Development, China’s Emerging Role via One Belt, One Road
Authors: Saeid Rabiei Majd, Motahareh Alvandi, Mehrad Rabiei
Abstract:
The rapid economic and technological development of any country depends on access to cheap sources of energy. Competition for access to petroleum resources is always accompanied by numerous environmental risks. These factors have caused more attention to environmental issues and sustainable development in petroleum contracts and activities. Nowadays, a sign of developed countries is adhering to the principles and rules of international environmental law and sustainable development of commercial contracts. China has entered into play through the massive project plan, One Belt, One Road. China is becoming a new emerging power in the world. China's bilateral investment treaties have an impact on environmental rights and sustainable development through regional and international foreign direct investment. The aim of this research is to examine China's key position to promote and improve environmental principles and international law and sustainable development in the energy sector in the world through the initiative, One Belt, One Road. Based on this hypothesis, it seems that in the near future, China's investment bilateral investment treaties will become popular investment model used in global trade, especially in the field of energy and sustainable development. They will replace the European and American models. The research method is including literature review, analytical and descriptive methods.Keywords: principles of sustainable development, oil and gas law, Chinas BITs, One Belt One Road, environmental rights
Procedia PDF Downloads 30610335 Banking Crisis and Economic Effects of the Banking Crisis in Turkey
Authors: Sevilay Konya, Sadife Güngör, Zeynep Karaçor
Abstract:
Turkish economy is occurred depending on different factors from time to time and the banking crises of different magnitudes. Foremost among the factors which hinder the development of countries and societies- crises in the country's economy. Countries' economic growth rates affect inflation, unemployment and external trade. In this study, effect of November 2000, February 2001 and 2008 banking crisis on Turkey's economy and banking crisis will be examined and announced as conceptual. In this context, this study is investigates Turkey's GDP, inflation, unemployment and foreign trade figures. Turkey's economy affected have been identified from 2000 November 2001 February and 2008 banking crisis.Keywords: banking crises, Turkey’s economy, economic effects, Turkey
Procedia PDF Downloads 29510334 Marketing Management and Cultural Learning Center: The Case Study of Arts and Cultural Office, Suansunandha Rajabhat University
Authors: Pirada Techaratpong
Abstract:
This qualitative research has 2 objectives: to study marketing management of the cultural learning center in Suansunandha Rajabhat University and to suggest guidelines to improve its marketing management. This research is based on a case study of the Arts and Culture Office in Suansunandha Rajabhat University, Bangkok. This research found the Art and Culture Office has no formal marketing management. However, the marketing management is partly covered in the overall business plan, strategic plan, and action plan. The process can be divided into 5 stages. The marketing concept has long been introduced to its policy but not apparently put into action due to inflexible system. Some gaps are found in the process. The research suggests the Art and Culture Office implement the concept of marketing orientation, meeting the needs and wants of its target customers and adapt to the changing situation. Minor guidelines for improvement are provided.Keywords: cultural learning center, marketing, management, museum
Procedia PDF Downloads 38610333 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 25010332 The Technological Problem of Simulation of the Logistics Center
Authors: Juraj Camaj, Anna Dolinayova, Jana Lalinska, Miroslav Bariak
Abstract:
Planning of infrastructure and processes in logistic center within the frame of various kinds of logistic hubs and technological activities in them represent quite complex problem. The main goal is to design appropriate layout, which enables to realize expected operation on the desired levels. The simulation software represents progressive contemporary experimental technique, which can support complex processes of infrastructure planning and all of activities on it. It means that simulation experiments, reflecting various planned infrastructure variants, investigate and verify their eligibilities in relation with corresponding expected operation. The inducted approach enables to make qualified decisions about infrastructure investments or measures, which derive benefit from simulation-based verifications. The paper represents simulation software for simulation infrastructural layout and technological activities in marshalling yard, intermodal terminal, warehouse and combination between them as the parts of logistic center.Keywords: marshalling yard, intermodal terminal, warehouse, transport technology, simulation
Procedia PDF Downloads 52110331 The Impact of Information Communication Technology on Promoting Travel Trade Industry in a Developing Economy, Case Study Nigeria
Authors: Murtala Mohammed Alamai, Abdullahi Marshal Idris, Adama Idris
Abstract:
Today, marketing does not only involve selecting target markets, but it also involves communicating with the customers through various means to put across your selling point. Modern marketing involves driving new product development based on customer needs by getting feedback from them. Utilizing the latest technology for better communication with the customers is the latest advancement in Marketing in the 21st century. The survey approach was used where a sample of tourist destinations across the six geographical zones of the country at random was done to ascertain the use of information communication systems in promoting their products and or services, the findings revealed that only a few utilize these modern advanced means in marketing and promoting their products and a need to develop effective and up to date online services for marketing was proffered as solutions to the findings observed.Keywords: information, communication, travel, trade, promotion
Procedia PDF Downloads 32310330 Nanotechnology in Construction as a Building Security
Authors: Hanan Fayez Hussein
Abstract:
‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.Keywords: nanomaterial, global warming, building security, smart homes
Procedia PDF Downloads 8210329 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View
Authors: Khalid Ishola Bello
Abstract:
Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.Keywords: wellbeing, healthcare, demonic possession, cupping, jinn
Procedia PDF Downloads 6410328 Investigation on the Functional Expectation and Professional Support Needs of Special Education Resource Center
Authors: Hongxia Wang, Yanjie Wang, Xiuqin Wang, Linlin Mo, Shuangshuang Niu
Abstract:
Special Education Resource Center (SERC) is the localized product in the development of inclusive education in People’s Republic of China, which provides professional support and service for the students with special education needs(SEN) and their parents, teachers as well as inclusive schools. The study investigated 155 administrators, resource teachers and inclusive education teachers from primary and secondary schools in Beijing. The results indicate that: (1) The surveyed teachers put highest expectation of SERC on specialized guidance and teacher training , instead of research and administration function; (2) Each dimension of professional support needs gets higher scores, in which individual guidance gets highest score, followed by instruction guidance, psychological counseling, proposing suggestions, informational support and teacher training; (3) locality and training experience of surveyed teachers significantly influence their expectations and support needs of SERC.Keywords: special education resource center (SERC) , functional expectation, professional support needs, support system
Procedia PDF Downloads 38010327 Current Starved Ring Oscillator Image Sensor
Authors: Devin Atkin, Orly Yadid-Pecht
Abstract:
The continual demands for increasing resolution and dynamic range in CMOS image sensors have resulted in exponential increases in the amount of data that needs to be read out of an image sensor, and existing readouts cannot keep up with this demand. Interesting approaches such as sparse and burst readouts have been proposed and show promise, but at considerable trade-offs in other specifications. To this end, we have begun designing and evaluating various new readout topologies centered around an attempt to parallelize the sensor readout. In this paper, we have designed, simulated, and started testing a new light-controlled oscillator topology with dual column and row readouts. We expect the parallel readout structure to offer greater speed and alleviate the trade-off typical in this topology, where slow pixels present a major framerate bottleneck.Keywords: CMOS image sensors, high-speed capture, wide dynamic range, light controlled oscillator
Procedia PDF Downloads 8710326 A Temporal Analysis on the Legal Status of the Turkish Straits in the Scope of National and International Legislation
Authors: Gizem Kodak, Birsen Koldemir
Abstract:
The Turkish Straits are at the crossroads of Europe and Asia continents and are unique waterways connecting the Black Sea countries to the rest of the world. Because of the geostrategic value of the location, passage of trade and war ships through the Turkish Straits has become a vital attraction and importance for the great powers and the riparian states throughout the history. This study contains a temporal analysis of the legal measures implemented in the Turkish Straits System. In this context, the historical alternation of the Turkish Straits has been examined, taking into account the relevant national and international regulations. In other words, relevant national and international regulations have been examined in this study according to historical time schedules. Parallel to the main concept mentioned above, the first chapter focuses on international regulations. These arrangements are organized according to date order and in three subheadings: Sèvres Treaty (1920), Lausanne Treaty (1923) and Montreux Convention (1936). Another topic, the national regulations, has been examined under five subheadings. These; (1982), Port Regulations of Canakkale (1982), Marine Traffic Regulations of the Turkish Straits and Marmara Region (1994) and Maritime Traffic Regulations for the Turkish Straits (1998). In doing so, the aim was to identify the differences in legal arrangements throughout the time regarding the navigation through the Turkish Straits. The current situation of the Turkish Straits has been presented in detail in the last part of the work, taking Montreux Convention into consideration. In this context, the articles of the Convention which regulate the passage of trade vessels have been examined from two perspectives; Peace time and war time. As for the measures that can be implemented in time of war, three options put forward depending on Turkey's stance: ‘Turkey not being belligerent’, ‘Turkey being belligerent’ and ‘situation in which Turkey considers herself threatened with imminent danger of war’.Keywords: temporal analysis, maritime law, Turkish straits, maritime accidents
Procedia PDF Downloads 15210325 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers
Authors: Pawan Kumar, Pitamber Singh Negi
Abstract:
Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed
Procedia PDF Downloads 148