Search results for: mutual vulnerability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1141

Search results for: mutual vulnerability

721 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 522
720 Relations of Progression in Cognitive Decline with Initial EEG Resting-State Functional Network in Mild Cognitive Impairment

Authors: Chia-Feng Lu, Yuh-Jen Wang, Yu-Te Wu, Sui-Hing Yan

Abstract:

This study aimed at investigating whether the functional brain networks constructed using the initial EEG (obtained when patients first visited hospital) can be correlated with the progression of cognitive decline calculated as the changes of mini-mental state examination (MMSE) scores between the latest and initial examinations. We integrated the time–frequency cross mutual information (TFCMI) method to estimate the EEG functional connectivity between cortical regions, and the network analysis based on graph theory to investigate the organization of functional networks in aMCI. Our finding suggested that higher integrated functional network with sufficient connection strengths, dense connection between local regions, and high network efficiency in processing information at the initial stage may result in a better prognosis of the subsequent cognitive functions for aMCI. In conclusion, the functional connectivity can be a useful biomarker to assist in prediction of cognitive declines in aMCI.

Keywords: cognitive decline, functional connectivity, MCI, MMSE

Procedia PDF Downloads 356
719 The Relations between Language Diversity and Similarity and Adults' Collaborative Creative Problem Solving

Authors: Z. M. T. Lim, W. Q. Yow

Abstract:

Diversity in individual problem-solving approaches, culture and nationality have been shown to have positive effects on collaborative creative processes in organizational and scholastic settings. For example, diverse graduate and organizational teams consisting of members with both structured and unstructured problem-solving styles were found to have more creative ideas on a collaborative idea generation task than teams that comprised solely of members with either structured or unstructured problem-solving styles. However, being different may not always provide benefits to the collaborative creative process. In particular, speaking different languages may hinder mutual engagement through impaired communication and thus collaboration. Instead, sharing similar languages may have facilitative effects on mutual engagement in collaborative tasks. However, no studies have explored the relations between language diversity and adults’ collaborative creative problem solving. Sixty-four Singaporean English-speaking bilingual undergraduates were paired up into similar or dissimilar language pairs based on the second language they spoke (e.g., for similar language pairs, both participants spoke English-Mandarin; for dissimilar language pairs, one participant spoke English-Mandarin and the other spoke English-Korean). Each participant completed the Ravens Progressive Matrices Task individually. Next, they worked in pairs to complete a collaborative divergent thinking task where they used mind-mapping techniques to brainstorm ideas on a given problem together (e.g., how to keep insects out of the house). Lastly, the pairs worked on a collaborative insight problem-solving task (Triangle of Coins puzzle) where they needed to flip a triangle of ten coins around by moving only three coins. Pairs who had prior knowledge of the Triangle of Coins puzzle were asked to complete an equivalent Matchstick task instead, where they needed to make seven squares by moving only two matchsticks based on a given array of matchsticks. Results showed that, after controlling for intelligence, similar language pairs completed the collaborative insight problem-solving task faster than dissimilar language pairs. Intelligence also moderated these relations. Among adults of lower intelligence, similar language pairs solved the insight problem-solving task faster than dissimilar language pairs. These differences in speed were not found in adults with higher intelligence. No differences were found in the number of ideas generated in the collaborative divergent thinking task between similar language and dissimilar language pairs. In conclusion, sharing similar languages seem to enrich collaborative creative processes. These effects were especially pertinent to pairs with lower intelligence. This provides guidelines for the formation of groups based on shared languages in collaborative creative processes. However, the positive effects of shared languages appear to be limited to the insight problem-solving task and not the divergent thinking task. This could be due to the facilitative effects of other factors of diversity as found in previous literature. Background diversity, for example, may have a larger facilitative effect on the divergent thinking task as compared to the insight problem-solving task due to the varied experiences individuals bring to the task. In conclusion, this study contributes to the understanding of the effects of language diversity in collaborative creative processes and challenges the general positive effects that diversity has on these processes.

Keywords: bilingualism, diversity, creativity, collaboration

Procedia PDF Downloads 285
718 Positioning Food Safety in Halal Assurance

Authors: Marin Neio Demirci, Jan Mei Soon, Carol A. Wallace

Abstract:

Muslims follow the religion of Islam and the food they eat should be Halal, meaning lawful or permissible. Muslims are allowed to eat halal and wholesome food that has been provided for them. However, some of the main prohibitions are swine flesh, blood, carrion, animals not slaughtered according to Islamic laws and alcoholic drinks. At present Halal assurance is in a complicated state, with various Halal standards differing from each other without gaining mutual acceptance. The world is starting to understand the need for an influential globally accepted standard that would open doors to global markets and gain consumer confidence. This paper discusses issues mainly related to food safety in Halal assurance. The aim was to discover and describe the approach to food safety requirements in Halal food provision and how this is incorporated in the Halal assurance systems. The position of food safety regulation within Halal requirements or Halal standards’ requirements for food safety is still unclear. This review also considers whether current Halal standards include criteria in common with internationally accepted food hygiene standards and emphasizes the potential of using the HACCP system for Halal assurance.

Keywords: certification, GHP, HACCP, Halal standard

Procedia PDF Downloads 329
717 Emotional Intelligence: A Panacea in the Management and Marketing of Hospitality and Tourism Good and Services

Authors: M. Azugama, P. Okoro Ugo Chigozie, A. O. Nnamocha

Abstract:

Emotional Intelligence constitutes powerful psychological forces that can strongly influence performance in behaviour, interaction and relationship management. Surprisingly how emotions are interpreted and employed in marketing of hospitality experience have had limited comprehension. Marketing of hospitality experiences have important emotional dimensions which the traditional marketing techniques tend to underplay. Guest and host relationship are challenged by mutual hospitableness obligations; suggesting that the commercial practice of delivering satisfactory guest experience has much to gain from traditional understanding of hospitality. By understanding the emotion-based hospitality transaction between guests and hosts, customers’ experiences can be delivered over and against competitor pressure. In this paper, marketing strategies and tactics in hospitality and tourism are principally concerned with adjusting each of the 6P & T elements (i.e. product, place, price and promotion; and adding people, processes and Time in service contexts), to provide a competitive offer (experience) to customers.

Keywords: Emotional intelligence, hospitality and tourism, relationship management, marketing

Procedia PDF Downloads 446
716 Comparative Study of Urdu and Hindko Language

Authors: Tahseen Bibi

Abstract:

Language is a source of communicating the ideas, emotions and feelings to others. Languages are different from one another on the basis of symbols and articulation. Regional languages play a role of unification in any country. National language of any country gives strength to its masses as it evaporates the mutual indifferences. There are various regional languages in Pakistan like Sindhi, Pushto, Hindko and Balochi. Hindko language dates back to the ancient times and the Hindko speakers can also easily understand and speak Urdu language. Urdu language is an amalgam of various languages. These languages are interconnected. Thus we can draw an analogy between the two languages under discussion on the basis of the pronunciation. The research will show that there are so many words in both the languages which have the similar pronunciation. It will further tell that the roots of Urdu language lie in Hindko. The reason behind this resemblance is that Urdu has got extracted from Hindko and other languages. Hindko language has played a prominent role in the development of Urdu language. Thus the role of Hindko language in the emergence and development of Urdu cannot be denied. This article will use the qualitative and comparative study as methodology. The research will highlight that there is close resemblance in both the languages on the basis of pronunciation, signifying that Urdu language has been extracted from Hindkon language.

Keywords: Hindko, Urdu, regional languages, vocabulary

Procedia PDF Downloads 379
715 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 76
714 Gesture in the Arabic and Malay Languages a Comparative Study

Authors: Siti Sara binti Hj Ahmad, Adil Elshiekh Abdalla

Abstract:

The Arabic and Malay languages belong to different language’s families; while the Arabic language descends from the Semitic language, Malay belongs to the Austronesian (Malayo-Polynesian) family. Hence, the grammatical systems of the two languages differ from each other. Arabic, being a language found in the heart of the dessert, and Malay is the language found in the heart of thick equatorial forests, is another source of vital cultural differences. Consequently, it is expected that this situation will create differences in the ways of how speakers of the two languages perceive the world around them, convey and understand their messages. On the other hand, as the majority of the speakers of Malay language are Muslims, Arabic language found its way in this region; currently, Arabic is widely taught in school, some terms of it found their way in the Malay language. Accordingly, the Arabic language and culture have widely penetrated into the Malay language. This study is proposed with the aim to find out the differences and similarities between the two languages, in the term of the nonverbal communication. The result of this study will be of high significance, as it will help in enhancing the mutual understanding between the speakers of these languages. The comparative analysis approach will be utilized in this study.

Keywords: gesture, Arabic language, Malay language, comparative analysis

Procedia PDF Downloads 538
713 Conceptualizing of Priorities in the Dynamics of Public Administration Contemporary Reforms

Authors: Larysa Novak-Kalyayeva, Aleksander Kuczabski, Orystlava Sydorchuk, Nataliia Fersman, Tatyana Zemlinskaia

Abstract:

The article presents the results of the creative analysis and comparison of trends in the development of the theory of public administration during the period from the second half of the 20th to the beginning of the 21st century. The process of conceptualization of the priorities of public administration in the dynamics of reforming was held under the influence of such factors as globalization, integration, information and technological changes and human rights is examined. The priorities of the social state in the concepts of the second half of the 20th century are studied. Peculiar approaches to determining the priorities of public administration in the countries of "Soviet dictatorship" in Central and Eastern Europe in the same period are outlined. Particular attention is paid to the priorities of public administration regarding the interaction between public power and society and the development of conceptual foundations for the modern managerial process. There is a thought that the dynamics of the formation of concepts of the European governance is characterized by the sequence of priorities: from socio-economic and moral-ethical to organizational-procedural and non-hierarchical ones. The priorities of the "welfare state" were focused on the decent level of material wellbeing of population. At the same time, the conception of "minimal state" emphasized priorities of human responsibility for their own fate under the conditions of minimal state protection. Later on, the emphasis was placed on horizontal ties and redistribution of powers and competences of "effective state" with its developed procedures and limits of responsibility at all levels of government and in close cooperation with the civil society. The priorities of the contemporary period are concentrated on human rights in the concepts of "good governance" and all the following ones, which recognize the absolute priority of public administration with compliance, provision and protection of human rights. There is a proved point of view that civilizational changes taking place under the influence of information and technological imperatives also stipulate changes in priorities, redistribution of emphases and update principles of managerial concepts on the basis of publicity, transparency, departure from traditional forms of hierarchy and control in favor of interactivity and inter-sectoral interaction, decentralization and humanization of managerial processes. The necessity to permanently carry out the reorganization, by establishing the interaction between different participants of public power and social relations, to establish a balance between political forces and social interests on the basis of mutual trust and mutual understanding determines changes of social, political, economic and humanitarian paradigms of public administration and their theoretical comprehension. The further studies of theoretical foundations of modern public administration in interdisciplinary discourse in the context of ambiguous consequences of the globalizational and integrational processes of modern European state-building would be advisable. This is especially true during the period of political transformations and economic crises which are the characteristic of the contemporary Europe, especially for democratic transition countries.

Keywords: concepts of public administration, democratic transition countries, human rights, the priorities of public administration, theory of public administration

Procedia PDF Downloads 146
712 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 276
711 Barred from Each Other: Why Normative Husbands Remain Married to Incarcerated Wives

Authors: Tomer Einat, Sharon Rabinovitz, Inbal Harel-Aviram

Abstract:

This study explores men’s motivation and justification to remain married to their criminal, imprisoned wives. Using semi-structured interviews and content-analysis, data were collected and analyzed from eight men who maintain stable marriage relationships with their incarcerated wives. Participants are normative men who describe incarceration as a challenge that enhances mutual responsibility and commitment. They exaggerate the extent to which their partners resemble archetypal romantic ideals. They use motivational accounts to explain the woman’s criminal conduct, which is perceived as non-relevant to her real identity. Physical separation and lack of physical intimacy are perceived as the major difficulties in maintaining their marriage relations. Length of imprisonment and marriage was found to be related to the decision whether to continue or terminate the relationships. Women-inmates’ partners experience difficulties and use coping strategies very similar to those cited by other normative spouses facing lengthy separation.

Keywords: female inmates, marriage, normative spouses, romantic accounts

Procedia PDF Downloads 437
710 Effects of the Exit from Budget Support on Good Governance: Findings from Four Sub-Saharan Countries

Authors: Magdalena Orth, Gunnar Gotz

Abstract:

Background: Domestic accountability, budget transparency and public financial management (PFM) are considered vital components of good governance in developing countries. The aid modality budget support (BS) promotes these governance functions in developing countries. BS engages in political decision-making and provides financial and technical support to poverty reduction strategies of the partner countries. Nevertheless, many donors have withdrawn their support from this modality due to cases of corruption, fraud or human rights violations. This exit from BS is leaving a finance and governance vacuum in the countries. The evaluation team analyzed the consequences of terminating the use of this modality and found particularly negative effects for good governance outcomes. Methodology: The evaluation uses a qualitative (theory-based) approach consisting of a comparative case study design, which is complemented by a process-tracing approach. For the case studies, the team conducted over 100 semi-structured interviews in Malawi, Uganda, Rwanda and Zambia and used four country-specific, tailor-made budget analysis. In combination with a previous DEval evaluation synthesis on the effects of BS, the team was able to create a before-and-after comparison that yields causal effects. Main Findings: In all four countries domestic accountability and budget transparency declined if other forms of pressure are not replacing BS´s mutual accountability mechanisms. In Malawi a fraud scandal created pressure from the society and from donors so that accountability was improved. In the other countries, these pressure mechanisms were absent so that domestic accountability declined. BS enables donors to actively participate in political processes of the partner country as donors transfer funds into the treasury of the partner country and conduct a high-level political dialogue. The results confirm that the exit from BS created a governance vacuum that, if not compensated through external/internal pressure, leads to a deterioration of good governance. For example, in the case of highly aid dependent Malawi did the possibility of a relaunch of BS provide sufficient incentives to push for governance reforms. Overall the results show that the three good governance areas are negatively affected by the exit from BS. This stands in contrast to positive effects found before the exit. The team concludes that the relationship is causal, because the before-and-after comparison coherently shows that the presence of BS correlates with positive effects and the absence with negative effects. Conclusion: These findings strongly suggest that BS is an effective modality to promote governance and its abolishment is likely to cause governance disruptions. Donors and partner governments should find ways to re-engage in closely coordinated policy-based aid modalities. In addition, a coordinated and carefully managed exit-strategy should be in place before an exit from similar modalities is considered. Particularly a continued framework of mutual accountability and a high-level political dialogue should be aspired to maintain pressure and oversight that is required to achieve good governance.

Keywords: budget support, domestic accountability, public financial management and budget transparency, Sub-Sahara Africa

Procedia PDF Downloads 120
709 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa

Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq

Abstract:

The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.

Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa

Procedia PDF Downloads 68
708 Preparation vADL.net: A Software Architecture Tool with Support to All of Architectural Concepts Title

Authors: Adel Smeda, Badr Najep

Abstract:

Software architecture is a method of describing the architecture of a software system at a high level of abstraction. It represents a common abstraction of a system that stakeholders can use as a basis for mutual understanding, negotiation, consensus, and communication. It also manifests the earliest design decisions about a system, and these early bindings carry weight far out of proportion to their individual gravity with respect to the system's remaining development, its deployment, and its maintenance life, therefore it is the earliest point at which design decisions governing the system to be built can be analyzed. In this paper, we present a tool to model the architecture of software systems. It represents the first method by which system defects can be detected, and provide a clear representation of a system’s components and interactions at a high level of abstraction. It can be distinguished from other tools by its support to all software architecture elements. The tool is built using VB.net 2010. We used this tool to describe two well know systems, i.e. Capitalize and Client/Server, and the descriptions we obtained support all architectural elements of the two systems.

Keywords: software architecture, architecture description languages, modeling

Procedia PDF Downloads 443
707 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 329
706 Language Use in Computer-Mediated Communication and Users’ Social Identity

Authors: Miramar Damanhouri

Abstract:

This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.

Keywords: Arabizi, computer mediated communication, digital communication, language use

Procedia PDF Downloads 113
705 BER of the Leaky Feeder under Rayleigh Fading Multichannel Reception with Imperfect Phase Estimation

Authors: Hasan Farahneh, Xavier Fernando

Abstract:

Leaky Feeder (LF) has been a proven technology for many decades and its promises broadband wireless access in short range but being overlooked until now. The LF is a natural MIMO transceiver ideal for micro and pico cells. In this work, the LF is considered as a linear antenna array MultiInput-Single-Output (MISO) and derive the average bit error rate (BER) in Rayleigh fading channel considering ideal and independent paths (iid) which consider there is no correlation and mutual coupling between transmit antennas (slots) or receiver antenna considering QPSK modulation with imperfect phase estimation. We consider maximal ratio transmission (MRT) at the transmit end and maximal ratio combining (MRC) at the receiving end. Analytical expressions are derived for the BER with radiating cable transmitters. The effects of slot spacing and carrier frequency on the BER are also studied. Numerical evaluations show the radiating cable transmitter offer much lower BER than a single antenna transmitter with same SNR.

Keywords: leaky feeder, BER, QPSK, rayleigh fading, channel gain, phase mismatch

Procedia PDF Downloads 357
704 Links between Landscape Management and Environmental Risk Assessment: Considerations from the Italian Context

Authors: Mara Balestrieri, Clara Pusceddu

Abstract:

Issues relating to the destructive phenomena that can damage people and goods have returned to the centre of debate in Italy with the increase in catastrophic episodes in recent years in a country which is highly vulnerable to hydrological risk. Environmental factors and geological and geomorphological territorial characteristics play an important role in determining the level of vulnerability and the natural tendency to risk. However, a territory has also been subjected to the requirements of and transformations of society, and this brings other relevant factors. The reasons for the increase in destructive phenomena are often to be found in the territorial development models adopted. Stewardship of the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about this connection and at the same time to clarify the role of environmental risk assessment as a tool to aid in the sustainable management of landscape. How planners relate to this problem and which aspects should be monitored in order to prepare responsible and useful interventions?

Keywords: assessment, landscape, risk, planning

Procedia PDF Downloads 441
703 Weaknesses and Performance Defects of Steel Structures According to the Executive Criteria

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provide appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 127
702 Climate Change and Economic Performance in Selected Oil-Producing African Countries: A Trend Analysis Approach

Authors: Waheed O. Majekodunmi

Abstract:

Climate change is a real global phenomenon and an unquestionable threat to our quest for a healthy and livable planet. It is now regarded as potentially the most monumental environmental challenge people and the planet will be confronted with over the next centuries. Expectedly, climate change mitigation was one of the central themes of COP 28. Despite contributing the least to climate change, Africa is and remains the hardest hit by the negative consequences of climate change including poor growth performance. Currently, it is being hypothesized that the high level of vulnerability and exposure to climate-related disasters, low adaptive capacity against global warming and high mitigation costs of climate change across the continent could be linked to the recent abysmal economic performance of African countries, especially in oil-producing countries where greenhouse gas emissions, is potentially more prevalent. This paper examines the impact of climate change on the economic performance of selected oil-producing countries in Africa using evidence from Nigeria, Algeria and Angola. The objective of the study is to determine whether or not climate change influences the economic performance of oil-producing countries in Africa by examining the nexus between economic growth and climate-related variables. The study seeks to investigate the effect of climate change on the pace of economic growth in African oil-producing countries. To achieve the research objectives, this study utilizes a quantitative approach by using historical and current secondary data sets to determine the relationship between climate-related variables and economic growth variables in the selected countries. The study employed numbers, percentages, tables and trend graphs to explain the trends or common patterns between climate change, economic growth and determinants of economic growth: governance effectiveness, infrastructure, macroeconomic stability and regulatory efficiency. Results from the empirical analysis of data show that the trends of economic growth and climate-related variables in the selected oil-producing countries are in the opposite directions as the increasing share of renewable energy sources in total energy consumption and the reduction in greenhouse gas emissions per capita in the oil-producing countries did not translate to higher economic growth. Further findings show that annual surface temperatures in the selected countries do not share similar trends with the food imports ratio and GDP per capita annual growth rate suggesting that climate change does not impact significantly agricultural productivity and economic growth in oil-producing countries in Africa. Annual surface temperature was also found to not share a similar pattern with governance effectiveness, macroeconomic stability and regulatory efficiency reinforcing the claim that some economic growth variables are independent of climate change. The policy implication of this research is that oil-producing African countries need to focus more on improving the macroeconomic environment and streamlining governance and institutional processes to boost their economic performance before considering the adoption of climate change adaptation and mitigation strategies.

Keywords: climate change, climate vulnerability, economic growth, greenhouse gas emissions per capita, oil-producing countries, share of renewable energy in total energy consumption

Procedia PDF Downloads 25
701 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 180
700 A Review of Intelligent Fire Management Systems to Reduce Wildfires

Authors: Nomfundo Ngombane, Topside E. Mathonsi

Abstract:

Remote sensing and satellite imaging have been widely used to detect wildfires; nevertheless, the technologies present some limitations in terms of early wildfire detection as the technologies are greatly influenced by weather conditions and can miss small fires. The fires need to have spread a few kilometers for the technologies to provide accurate detection. The South African Advanced Fire Information System uses MODIS (Moderate Resolution Imaging Spectroradiometer) as satellite imaging. MODIS has limitations as it can exclude small fires and can fall short in validating fire vulnerability. Thus in the future, a Machine Learning algorithm will be designed and implemented for the early detection of wildfires. A simulator will be used to evaluate the effectiveness of the proposed solution, and the results of the simulation will be presented.

Keywords: moderate resolution imaging spectroradiometer, advanced fire information system, machine learning algorithm, detection of wildfires

Procedia PDF Downloads 63
699 The Influence of Thomson Effect on the Performance of N-Type Skutterudite Thermoelement

Authors: Anbang Liu, Huaqing Xie, Zihua Wu, Xiaoxiao Yu, Yuanyuan Wang

Abstract:

Due to the temperature-dependence and mutual coupling of thermoelectric parameters, the Thomson effect always exists, which is derived from temperature gradients during thermoelectric conversion. The synergistic effect between the Thomson effect and non-equilibrium heat transport of charge carriers leads to local heat absorption or release in thermoelements, thereby affecting its power generation performance and conversion efficiency. This study verified and analyzed the influence and mechanism of the Thomson effect on N-type skutterudite thermoelement through quasi-steady state testing under approximate vacuum conditions. The results indicate the temperature rise/fall of N-type thermoelement at any position is affected by Thomson heat release/absorption. Correspondingly, the Thomson effect also contributes advantageously/disadvantageously to the output power of N-type skutterudite thermoelement when the Thomson coefficients are positive/negative. In this work, the output power can be promoted or decreased maximally by more than 27% due to the presence of Thomson heat when the absolute value of the Thomson coefficient is around 36 μV/℃.

Keywords: Thomson effect, heat transport, thermoelectric conversion, numerical simulation

Procedia PDF Downloads 40
698 Non-Profit Organizations and the Future: Framework for the Preparation and Presentation of Annual Reports

Authors: Nadzira Yahaya, Saunah Zainon, Marshita Hashim, Ruhaya Atan

Abstract:

Non-profit organizations (NPOs) in Malaysia are diverse in their origins, structures, objectives, and stakeholders. The largest category of NPOs is from charity and religious category while many other categories such as youth, professionals, women, education and mutual benefits either operate independently or controlled by governments. NPOs have stewardship obligations to their stakeholders and other users of their annual reports, including the public at large. The existing accounting practices without the proper framework of the preparation and presentation of annual reports resulted in a lack of uniformity in the preparation and presentation of NPOs annual reports. Furthermore, a lack of awareness of the applicability of accounting standards and the adoption of different bases of accounting resulted in the need for framework in the preparation and presentation of financial statements for true and fair view of the state of affairs and the operating result of the NPOs activities. This study presents the proposed framework for the preparation and presentation of NPOs annual reports to help the organizations provide high-quality reporting for them to be accountable for good stewardship.

Keywords: annual reports, framework, NPOs, preparation and presentation

Procedia PDF Downloads 417
697 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 271
696 Environmentally Friendly Palm Oil-Based Polymeric Plasticiser for Poly (Vinyl Chloride)

Authors: Nur Zahidah Rozaki, Desmond Ang Teck Chye

Abstract:

Environment-friendly polymeric plasticisers for poly(vinyl chloride), PVC were synthesised using palm oil as the main raw material. The synthesis comprised of 2 steps: (i) transesterification of palm oil, followed by (ii) polycondensation between the products of transesterification with diacids. The synthesis involves four different formulations to produce plasticisers with different average molecular weight. Chemical structures of the plasticiser were studied using FTIR (Fourier-Transformed Infra-Red) and 1H-NMR (Proton-Nuclear Magnetic Resonance).The molecular weights of these palm oil-based polymers were obtained using GPC (Gel Permeation Chromatography). PVC was plasticised with the polymeric plasticisers through solvent casting technique using tetrahydrofuran, THF as the mutual solvent. Some of the tests conducted to evaluate the effectiveness of the plasticiser in the PVC film including thermal stability test using thermogravimetric analyser (TGA), differential scanning calorimetry (DSC) analysis to determine the glass transition temperature, Tg, and mechanical test to determine tensile strength, modulus and elongation at break of plasticised PVC using standard test method ASTM D882.

Keywords: alkyd, palm oil, plasticiser, pvc

Procedia PDF Downloads 260
695 Finite Element Analysis of the Ordinary Reinforced Concrete Bridge Piers

Authors: Nabin Raj Chaulagain

Abstract:

Most of the concrete bridges in Nepal constructed during 90's and before are made up of low strength ordinary concrete which might be one of the reasons for damage in higher magnitude earthquake. Those bridges were designed by the outdated bridge codes which might not account the large seismic loads. This research investigates the seismic vulnerability of the existing single column ordinary concrete bridge pier by finite element modeling, using the software Seismostruct. The existing bridge pier capacity has been assessed using nonlinear pushover analysis and performance is compared after retrofitting those pier models with CFRP. Furthermore, the seismic evaluation was made by conducting cyclic loading test at different drift percentage. The performance analysis of bridge pier by nonlinear pushover analysis is further validated by energy dissipation phenomenon measured from the hysteric loop for each model of ordinary concrete piers.

Keywords: finite element modeling, ordinary concrete bridge pier, performance analysis, retrofitting

Procedia PDF Downloads 295
694 Relationship of Sleep Duration with Obesity and Dietary Intake

Authors: Seyed Ahmad Hosseini, Makan Cheraghpour, Saeed Shirali, Roya Rafie, Matin Ghanavati, Arezoo Amjadi, Meysam Alipour

Abstract:

Background: There is a mutual relationship between sleep duration and obesity. We studied the relationship between sleep duration with obesity and dietary Intake. Methods: This cross-sectional study was conducted on 444 male students in Ahvaz Jundishapur University of Medical Science. Dietary intake was analyzed by food frequency questionnaire (FFQ). Anthropometric indices were analyzed. Participants were being asked about their sleep duration and they were categorized into three groups according to their responses (less than six hours, between six and eight hours, and more than eight hours). Results: Macronutrient, micronutrient, and antioxidant intake did not show significant difference between three groups. Moreover, we did not observe any significant difference between anthropometric indices (weight, body mass index, waist circumference, and percentage body fat). Conclusions: Our study results show no significant relationship between sleep duration, nutrition pattern, and obesity. Further study is recommended.

Keywords: sleep duration, obesity, dietary intake, cross-sectional

Procedia PDF Downloads 320
693 Fostering Multiculturalism on University Campuses: A Global Perspective

Authors: Ashok Chaskar

Abstract:

The present paper aims at fostering multiculturalism on the university campuses as each university campus now a day is crowded with variety of students representing different countries and cultures. The students of different countries and communities have to respect cultural diversity and promote the idea of inclusion. Multiculturalism has defining promotional values and functions, which establish cultural contacts, exchanges cultural ideologies and promotes the value of harmonious coexistence of many cultures. Living together on university campuses is a life-long experience to the students coming from various backgrounds, therefore multiculturalism can teach them the value of appreciation of interdependence, understanding cultural differences, spirit of respect, mutual understanding, peaceful coexistence, spirit of solidarity and help them in managing conflicts. By fostering multiculturalism on the university campuses, the students can learn new things; they can share their new experiences and contribute innovative ideas with each other. However, religious and ethnic diversity enrich the educational experiences of the students of various backgrounds.

Keywords: culture, cultural pluralism, cultural diversity, ethnic diversity, ethnic groups, egalitarianism, autonomy, socio-cultural harmony, tolerance, harmonious coexistence

Procedia PDF Downloads 478
692 Peace Based Diplomacy, Peace Communication and Peace Lobbying in the Example of Turkey-France Relations

Authors: Bilgehan Gültekin, Tuba Gültekin

Abstract:

The first stage to procure peace communication is to construct a mutual accordance, which can be defined as: To constitute reconciliation ground in order to open and constitute the right peace and dialogue areas. For example: In Turkey’s EU entry process, in order to procure French public opinion, to constitute a communication frame is a must. For the constitution of this frame, the titles of discussion in which it will be moved and for which French public opinion will show its support must be determined. The most important title of this ground is Turkey’s peace potential for Europe with its strategic position. For this reason, it’s is so strategic for peace communication that Turkey’s contributions for Europe and World should be opened up for discussion in public opinion in France and be introduced as a strong accordance ground.Peace based diplomacy, peace communication strategies and peace lobbying in the example of Turkey-France relations presents a strong peace titles.

Keywords: intercultural communication, mediation education, common sense leaders, artistic sensitivity

Procedia PDF Downloads 433