Search results for: military bridging
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 810

Search results for: military bridging

360 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming

Authors: Meesun Sun, Yongmin Kim

Abstract:

Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.

Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost

Procedia PDF Downloads 136
359 Disruptive Innovation in Low-Income Countries: The Role of the Sharing Economy in Shaping the People Transportation Market in Nigeria

Authors: D. Tappi

Abstract:

In the past decades, the idea of innovation moved from being considered the result of development to being seen as its means. Innovation and its diffusion are indeed keys to the development and economic catch-up of a country. However, the process of diffusing existing innovation in low income countries has demonstrated dependent on inadequate infrastructures and institutions. The paper examines the role of disruptive innovation in bridging the technology gap between high- and low-income countries, overcoming the lack in infrastructures and institutions. In particular, the focus of this paper goes to the role of disruptive innovation in people transportation in Nigeria. Uber, Taxify, and Smartcab are covering a small and interesting market that was underserved, between the high-end private driver markets, the personal car owners and the low-priced traditional cab and the Keke (tricycle). Indeed the small Nigerian middle class and international community have found in the sharing people transportation market a safe, reasonably priced means of transportation in Nigerian big cities. This study uses mainly qualitative data collection methods in the form of semi-structured interviews with major players and users and quantitative data analysis in the form of a survey among users in order to assess the role of these new transportation modes in shaping the market and even creating a new niche. This paper shows how the new sharing economy in people transportation is creating new solutions to old problems as well as creating new challenges for both the existing market players and institutions. By doing so, the paper shows how disruptive innovations applied to low income countries, not only can overcome the lacking infrastructure problem but could also help bridge the technology gap between those and high income countries. This contribution proves that it is indeed exactly because the market presents these obstacles that disruptive innovations can succeed in countries such as Nigeria.

Keywords: development, disruptive innovation, sharing economy, technology gap

Procedia PDF Downloads 111
358 Lunar Exploration based on Ground-Based Radar: Current Research Progress and Future Prospects

Authors: Jiangwan Xu, Chunyu Ding

Abstract:

Lunar exploration is of significant importance in the development and utilization of in-situ lunar resources, water ice exploration, space and astronomical science, as well as in political and military strategy. In recent years, ground-based radar (GBR) has gained increasing attention in the field of lunar exploration due to its flexibility, low cost, and penetrating capabilities. This paper reviews the scientific research on lunar exploration using GBR, outlining the basic principles of GBR and the progress made in lunar exploration studies. It introduces the fundamental principles of lunar imaging using GBR, and systematically reviews studies on lunar surface layer detection, inversion of lunar regolith dielectric properties, and polar water ice detection using GBR. In particular, the paper summarizes the current development status of Chinese GBR and forecasts future development trends in China. This review will enhance the understanding of lunar exploration results using GBR radar, systematically demonstrate the main applications and scientific achievements of GBR in lunar exploration, and provide a reference for future GBR radar lunar exploration missions.

Keywords: ground-based radar, lunar exploration, radar imaging, lunar surface/subsurface detection

Procedia PDF Downloads 22
357 Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network

Authors: Joshua Midha

Abstract:

The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations.

Keywords: terrorism, behavioral intervention, propaganda, SNA, extremism

Procedia PDF Downloads 93
356 Surface Plasmon Resonance Imaging-Based Epigenetic Assay for Blood DNA Post-Traumatic Stress Disorder Biomarkers

Authors: Judy M. Obliosca, Olivia Vest, Sandra Poulos, Kelsi Smith, Tammy Ferguson, Abigail Powers Lott, Alicia K. Smith, Yang Xu, Christopher K. Tison

Abstract:

Post-Traumatic Stress Disorder (PTSD) is a mental health problem that people may develop after experiencing traumatic events such as combat, natural disasters, and major emotional challenges. Tragically, the number of military personnel with PTSD correlates directly with the number of veterans who attempt suicide, with the highest rate in the Army. Research has shown epigenetic risks in those who are prone to several psychiatric dysfunctions, particularly PTSD. Once initiated in response to trauma, epigenetic alterations in particular, the DNA methylation in the form of 5-methylcytosine (5mC) alters chromatin structure and represses gene expression. Current methods to detect DNA methylation, such as bisulfite-based genomic sequencing techniques, are laborious and have massive analysis workflow while still having high error rates. A faster and simpler detection method of high sensitivity and precision would be useful in a clinical setting to confirm potential PTSD etiologies, prevent other psychiatric disorders, and improve military health. A nano-enhanced Surface Plasmon Resonance imaging (SPRi)-based assay that simultaneously detects site-specific 5mC base (termed as PTSD base) in methylated genes related to PTSD is being developed. The arrays on a sensing chip were first constructed for parallel detection of PTSD bases using synthetic and genomic DNA (gDNA) samples. For the gDNA sample extracted from the whole blood of a PTSD patient, the sample was first digested using specific restriction enzymes, and fragments were denatured to obtain single-stranded methylated target genes (ssDNA). The resulting mixture of ssDNA was then injected into the assay platform, where targets were captured by specific DNA aptamer probes previously immobilized on the surface of a sensing chip. The PTSD bases in targets were detected by anti-5-methylcytosine antibody (anti-5mC), and the resulting signals were then enhanced by the universal nanoenhancer. Preliminary results showed successful detection of a PTSD base in a gDNA sample. Brighter spot images and higher delta values (control-subtracted reflectivity signal) relative to those of the control were observed. We also implemented the in-house surface activation system for detection and developed SPRi disposable chips. Multiplexed PTSD base detection of target methylated genes in blood DNA from PTSD patients of severity conditions (asymptomatic and severe) was conducted. This diagnostic capability being developed is a platform technology, and upon successful implementation for PTSD, it could be reconfigured for the study of a wide variety of neurological disorders such as traumatic brain injury, Alzheimer’s disease, schizophrenia, and Huntington's disease and can be extended to the analyses of other sample matrices such as urine and saliva.

Keywords: epigenetic assay, DNA methylation, PTSD, whole blood, multiplexing

Procedia PDF Downloads 116
355 Villar Settlement Farm School for the Aetas: Assimilation through American Colonial Education in Zambales, Philippines

Authors: Julian E. Abuso, Alberto T. Paala Jr.

Abstract:

The creation of settlement farm schools at the outset of American colonization of the Philippines was not a matter of accident; rather, their establishment was a major component of a grand plan on public education based on the benevolent assimilation policy of the United States. This argument is illustrated by the case of Villar Settlement Farm School, a school for the Aetas as a non-Christian tribal community in 1907. The study aims to: (1) identify and describe the antecedents for the establishment of Settlement Farm School, (2) explicate the cultural conflicts encountered by Aetas in school, (3) appraise the consequences of education as acculturation among Aeta population. The study made use of the following: historical data based on primary and secondary sources and life histories from primary informants. The Settlement Farm School for the Aetas was borne out of the American’s change in policy from military to civilian authority, recognition of education as a tool for benevolent assimilation. The narratives of informants manifested resistance to certain aspects of the educational process.

Keywords: settlement farm school Aetas, tribe, colonial education, Aeta, non-Christian tribal community

Procedia PDF Downloads 314
354 Inter-Communication-Management in Cases with Disabled Children (ICDC)

Authors: Dena A. Hussain

Abstract:

The objective of this project is to design an Information and Communication Technologies (ICT) tool based on a standardized platform to assist the work-integrated learning process of caretakers of disabled children. The tool should assist the intercommunication between caretakers and improve the learning process through knowledge bridging between all involved caretakers. Some children are born with disabilities while others have special needs after an illness or accident. Special needs children often need help in their learning process and require tools and services in a different way. In some cases the child has multiple disabilities that affect several capabilities in different ways. These needs are to be transformed into different learning techniques that the staff or personal (called caretakers in this project) caring for the child needs to learn and adapt. The caretakers involved are also required to learn new learning or training techniques and utilities specialized for the child’s needs. In many cases the number of people caring for the child’s development is rather large; the parents, specialist pedagogues, teachers, therapists, psychologists, personal assistants, etc. Each group of specialists has different objectives and in some cases the merge between theses specifications is very unique. This makes the synchronization between different caretakers difficult, resulting often in low level cooperation. By better intercommunication between professions both the child’s development could be improved but also the caretakers’ methods and knowledge of each other’s work processes and their own profession. This introduces a unique work integrated learning environment for all personnel involve, merging learning and knowledge in the work environment and at the same time assist the children’s development process. Creating an iterative process generates a unique learning experience for all involved. Using a work integrated platform will help encourage and support the process of all the teams involved in the process.We believe that working with children who have special needs is a continues learning/working process that is always integrated to achieve one main goal, which is to make a better future for all children.

Keywords: information and communication technologies (ICT), work integrated learning (WIL), sustainable learning, special needs children

Procedia PDF Downloads 292
353 Bridging the Gaping Levels of Information Entree for Visually Impaired Students in the Sri Lankan University Libraries

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

Education is a key determinant of future success, and every person deserves non-discriminant access to information for educational inevitabilities in any case. Analysing and understanding complex information is a crucial learning tool, especially for students. In order to compete equally with sighted students, visually impaired students require the unhinged access to access to all the available information resources. When the education of visually impaired students comes to a focal point, it can be stated that visually impaired students encounter several obstacles and barriers before they enter the university and during their time there as students. These obstacles and barriers are spread across technical, organizational and social arenas. This study reveals the possible approaches to absorb and benefit from the information provided by the Sri Lankan University Libraries for visually impaired students. Purposive sampling technique was used to select sample visually impaired students attached to the Sri Lankan National universities. There are 07 National universities which accommodate the visually impaired students and with the identified data, they were selected for this study and 80 visually impaired students were selected as the sample group. Descriptive type survey method was used to collect data. Structured questionnaires, interviews and direct observation were used as research instruments. As far as the Sri Lankan context spread is concerned, visually impaired students are able to finish their courses through their own determination to overcome the barriers they encounter on their way to graduation, through moral and practical support from their own friends and very often through a high level of creativity. According to the findings there are no specially trained university librarians to serve visually impaired users and less number of assistive technology equipment are available at present. This paper enables all university libraries in Sri Lanka to be informed about the social isolation of visually compromised students at the Sri Lankan universities and focuses on the rectification issues by considering their distinct case for interaction.

Keywords: information access, Sri Lanka, university libraries, visual impairment

Procedia PDF Downloads 232
352 Art and Society: Greek Migrant Artists in Paris during 1970s

Authors: Sapfo A. Mortaki

Abstract:

From the early 1960s and until the middle of the next decade, the lack of favorable conditions for the development of art along with the imposition of the 1967 military dictatorship resulted in a great flow of Greek artists abroad. The fall of the dictatorship and the change of the political scene after 1974 constitute crucial milestones in the cultural life of the country. In the field of visual arts significant changes are attempted in the state's effort to formulate a national cultural policy. This article examines the presence of Greek migrant artists (painters and sculptors) in Paris during the 1970s. Since the mid-1970s, and particularly in the early 1980s, Modern Greek Diaspora undergoes a new transition phase, when the concept of immigration changes. The aim of this study is to record and give prominence to the presence of the Greek artists -through archival research in the daily and periodical press- as well as present the impact of their artistic activity on French intellectual life and on the country’s society during this period. Furthermore, the presence and work of these artists are discussed in an environment of cultural coexistence which, to a certain extent, can be regarded as the result of the social phenomenon of their migration in the era of postmodernity. Finally, their contribution to the development of the cultural life of Greece, inside and outside its borders, is also being examined.

Keywords: art and society, cultural policy, Greek artists, postmodernity

Procedia PDF Downloads 227
351 Digital Media Use and Access among Rural Youth in South Africa: The Prospects for Female Empowerment

Authors: Fulufhelo Oscar Makananise

Abstract:

Digital technologies have played a significant role in bridging the information gap between the haves and the have nots in society. In developing countries such as South Africa, historically marginalised groups such as women in rural communities have an opportunity to use digital technologies to network among themselves as well as interact with their government, thereby enhancing prospects for poverty eradication, political participation, community development and democracy. However, the extent to which these goals can be achieved in a developing context through harnessing digital technologies is not quite clear, particularly given the fact that access to these technologies is not evenly distributed and the fact that women’s access to digital technologies is hampered by factors that go beyond the question of infrastructure. Informed by the technological dependency theory, this paper is about how female youth in rural South Africa are deploying digital media tools for socio-economic empowerment. In particular, the study investigated the extent to which female youth in Limpopo province, South Africa access and use digital media platforms and gadgets and the extent to which those technologies are breaking down barriers that stand in the way of female youth empowerment. Data were gathered using a self-administered questionnaire disseminated to selected 100 female youth in Limpopo Province, South Africa. The data were analysed using SPSS version 9, and the results were analysed using descriptive statistics. The paper argues that wider and constant access to digital media by female youth in rural areas is indicative of the great potential for empowering female youth in rural areas through harnessing digital media. The study established that the majority of female youth had access to digital media technologies and used them to share valuable information among themselves. The study further established that female youth are active users of digital media in South Africa, which is the significant driver for socio-economic empowerment.

Keywords: digital technologies, empowerment, female youth, South Africa, survey, technological dependency

Procedia PDF Downloads 129
350 The Role of Art and Music in Enriching Adult Learning in Maltese as a Second Language

Authors: Jacqueline Zammit

Abstract:

Currently, a considerable number of individuals from different backgrounds are being drawn to Malta due to its favourable environment for business, investment, and employment. This influx has led to a growing interest among expats in learning Maltese as a second language (ML2) to enrich their experience of working and residing in Malta. However, the intricacies of Maltese grammar, particularly challenging for second language (L2) learners unfamiliar with Arabic, can pose difficulties in the learning process. Furthermore, it's worth noting that the teaching of ML2 is an emerging field with limited existing research on effective pedagogical strategies. The realm of second language acquisition (SLA) can be notably demanding for adults, requiring well-founded interventions to facilitate learning. Among these interventions, approaches grounded in empirical evidence have incorporated artistic and musical elements to augment SLA. Both art and music have proven roles in facilitating L2 communication, aiding vocabulary retention, and improving comprehension skills. This study aims to delve into the utilization of music and art as catalysts for enhancing the progress of adult learners in mastering ML2. The research employs a qualitative methodology, employing a sample selected through convenience sampling, which encompassed 37 adult learners of ML2. These participants engaged in individual interviews. The data derived from these interviews were subjected to thorough analysis. The outcomes of the study underscore the substantial positive influence exerted by art and music on the academic advancement of adult ML2 learners. Notably, it emerged from the participants' accounts that the current ML2 curricula lack the integration of art and music. Therefore, this study advocates for the incorporation of art and music components within both traditional classroom settings and online ML2 courses. The intention is to bolster the academic accomplishments of adult learners in the realm of Maltese as a second language, bridging the current gap between theory and practice.

Keywords: academic accomplishment, mature learners, visual art, learning Maltese as a second language, musical involvement, acquiring a second language

Procedia PDF Downloads 79
349 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 517
348 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 89
347 Beyond Empathy: From Justice to Reconciliation

Authors: Nissim Avissar

Abstract:

This paper aims to question the practice of bringing together people belonging to groups in conflict with the aim of bridging differences through universal empathy and interpersonal connections. It is argued that in cases where one group has the power, and the other is in a struggle to change the balance assuming universal equality between the groups and encouraging emphatic understanding is a non-emphatic practice. Accordingly, a new concept is posited–justice-sensitive empathy, conditioning empathy in such situations on the acknowledgement of an imbalance of power/injustice. With this reframing in mind, educational practices promoting social justice are discussed. In order to create conditions for justice-seeking or politically sensitive empathy, we need to go beyond the conventional definitions of empathy and offer other means and possibilities. Three possibilities are discussed. The first focuses on intra-group (as opposed to inter-group) processes within each group. It means temporary and tactical separation that may allow each group to focus on its own needs and values and perhaps to return to the dialogue more confidently. The second option emphasizes the notion of "constructive conflict," which means that each side still aspires to promote his own interests but without demolishing the other side (which is a rival but also an unwanted and forced partner). Here, alongside the "obligation to resist" and to act to promote justice as we view and understand it, we have to take into account the other side. The third and last option relates to the practice of Restorative Justice. This practice originated in the Truth and Reconciliation committees in South Africa, but it is now widely used in other contexts. Those committees had the authority to punish (or pardon) people; however, their main purpose was to seek truth and, from there, nourish reconciliation. This is the main idea of restorative justice; it seeks justice for the sake of restoring relationships. All the above options involve action and are aware of power relations (i.e., politics). They all seek justice. They may create conditions for the more conventional empathic practice to evolve, but no less than that, they are examples of justice-seeking and politically sensitive empathetic practice.

Keywords: education, empathy, justice, reconciliation

Procedia PDF Downloads 94
346 Bridging between Shariah Law and Legal Framework: A Study of Problems and Solutions of Islamic Banking System in Bangladesh

Authors: Md. Abdul Kader, Md. Akiz Uddin

Abstract:

The Islamic banking system is based on the Islamic shariah principles. Islamic banking is set up to avoid riba (interest)--which is prohibited in Islam-- and to prevent unscrupulous practices and participate actively in achieving the welfare-oriented Islamic economy. In the process of offering Islamic banking services, practitioners have been facing several challenges. Out of many challenges, this paper particularly highlights the need for a centralized legal framework for Islamic banks that should be compliant with the shariah law. The researchers employed a qualitative method to collect case studies from high-profile Islamic Bankers and analyzed respective legal documents and policy papers to conduct the study. This study investigates the Shariah Governance Framework (SGF), amended Banking Companies Act, 1991 (Act No. 14 of 1991), and the Shariah Supervisory Board (SSB) of Islamic banks in Bangladesh to evaluate how legal framework supervise and/or monitor Islamic banking system under the jurisdiction of shariah law. The study reveals that the Shariah governance system in Bangladesh is mainly voluntary rather than regulatory, and there is an absence of full-fledged SGF. Though there is no complete Islamic Banking Act for controlling, guiding, and supervising the Islamic banks in Bangladesh, some Islamic banking provisions have already been incorporated in the amended Banking Companies Act, 1991 (Act No. 14 of 1991). Bangladesh Bank did not set up any separate Department at its Head Office to control, guide and supervise the operation of the Islamic banks. So, ensuring the implementation of Shariah principles concurrent with the legal framework of banking policies is recommended in this study. This study also prescribes that the government should enact a law or policy for the operations of Islamic banks in order to improve the Islamic Banking system of Bangladesh. In addition, the central bank can set up a Central Shariah Supervisory Board (CSSB) or authorize the existing Central Shariah Board for Islamic Banks of Bangladesh (CSBIB) to supervise and monitor overall activities of Islamic banks and resolve the disputes among the stakeholders concerning the Shariah issues of Islamic banks.

Keywords: islamic banking, shariah law, banking policies, shariah governance framework (SGF)

Procedia PDF Downloads 69
345 Value Gaps Between Patients and Doctors

Authors: Yih-Jer Wu, Ling-Lang Huang

Abstract:

Shared decision-making (SDM) is a critical aspect of determining optimal medical strategies. However, current patient decision aids (PDAs) often prioritize evidence-based discussions over value-based considerations. Despite its significance, there is limited research addressing the 'value gap' between patients and healthcare providers. To address this gap, we developed the 'Patient-Doctor Relationship Questionnaire,' consisting of 12 questions. To explore potential variations in the patient-doctor value gap across different medical specialties, we conducted interviews with physicians, surgeons, and their respective patients, utilizing the questionnaire. Between 2020 and 2022, we interviewed a total of 144 patients and 19 doctors. Among the 12 questions, physicians demonstrated significant patient-doctor value gaps in 5 questions, while surgeons in 3 questions. Only one question turned out significant gaps in both physicians and surgeons. When asking both doctors and their patients to choose one from the following 6 answers (1. No issue significant; 2. Not knowing how to make a medical decision; 3. Not confident in the doctor’s clinical judgment; 4. Not knowing how to articulate one’s own condition; 5. Unable to afford medical expenses; 6. Not understanding what doctors explain) in response to the question “what the most significant issue is in the medical consultation”, over 50% of doctors chose “Not knowing how to make a medical decision” (physicians vs. patients, 50% vs. 11%, p=0.046; surgeon vs. patients, 83% vs. 29%, p=0.001), while significantly more patients chose “No issue significant” (10% vs. 52%, p=0.002; 0% vs. 33%, p<0.001, respectively). Our findings indicate that value gaps do exist between patients and doctors and that most patients in Taiwan "fully trust" their doctors' recommendations for medical decisions. However, when treatment outcomes are far from ideal, this overinflated "trust" may turn into frustration, which could become the catalyst for medical disputes. Doctors should spend more time having more effective communication with their patients, particularly regarding potentially dissatisfactory treatment outcomes. This study underscores the substantial variability in the patient-doctor value gap, often overlooked in SDM. Patients from different clinical backgrounds may hold values distinct from those of their healthcare providers. Bridging this value gap is imperative for achieving genuine and effective SDM.

Keywords: share-decision making, value gaps, communication, doctor-patient relationship

Procedia PDF Downloads 44
344 Coagulation-flocculation Process with Metal Salts, Synthetic Polymers and Biopolymers for the Removal of Trace Metals (Cu, Pb, Ni, Zn) from Wastewater

Authors: Andrew Hargreaves, Peter Vale, Jonathan Whelan, Carlos Constantino, Gabriela Dotro, Pablo Campo

Abstract:

As a consequence of their potential to cause harm, there are strong regulatory drivers that require metals to be removed as part of the wastewater treatment process. Bioavailability-based standards have recently been specified for copper (Cu), lead (Pb), nickel (Ni) and zinc (Zn) and are expected to reduce acceptable metal concentrations. In order to comply with these standards, wastewater treatment works may require new treatment types to enhance metal removal and it is, therefore, important to examine potential treatment options. A substantial proportion of Cu, Pb, Ni and Zn in effluent is adsorbed to and/or complexed with macromolecules (eg. proteins, polysaccharides, aminosugars etc.) that are present in the colloidal size fraction. Therefore, technologies such as coagulation-flocculation (CF) that are capable of removing colloidal particles have good potential to enhance metals removal from wastewater. The present study investigated the effectiveness of CF at removing trace metals from humus effluent using the following coagulants; ferric chloride (FeCl3), the synthetic polymer polyethyleneimine (PEI), and the biopolymers chitosan and Tanfloc. Effluent samples were collected from a trickling filter treatment works operating in the UK. Using jar tests, the influence of coagulant dosage and the velocity and time of the slow mixing stage were studied. Chitosan and PEI had a limited effect on the removal of trace metals (<35%). FeCl3 removed 48% Cu, 56% Pb and 41% Zn at the recommended dose of 0.10 mg/L. At the recommended dose of 0.25 mg/L Tanfloc removed 77% Cu, 68% Pb, 18% Ni and 42% Zn. The dominant mechanism for particle removal by FeCl3 was enmeshment in the precipitates (i.e. sweep flocculation) whereas, for Tanfloc, inter-particle bridging was the dominant removal mechanism. Overall, FeCl3 and Tanfloc were found to be most effective at removing trace metals from wastewater.

Keywords: coagulation-flocculation, jar test, trace metals, wastewater

Procedia PDF Downloads 237
343 A Unified Approach for Naval Telecommunication Architectures

Authors: Y. Lacroix, J.-F. Malbranque

Abstract:

We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.

Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion

Procedia PDF Downloads 288
342 Relay Node Placement for Connectivity Restoration in Wireless Sensor Networks Using Genetic Algorithms

Authors: Hanieh Tarbiat Khosrowshahi, Mojtaba Shakeri

Abstract:

Wireless Sensor Networks (WSNs) consist of a set of sensor nodes with limited capability. WSNs may suffer from multiple node failures when they are exposed to harsh environments such as military zones or disaster locations and lose connectivity by getting partitioned into disjoint segments. Relay nodes (RNs) are alternatively introduced to restore connectivity. They cost more than sensors as they benefit from mobility, more power and more transmission range, enforcing a minimum number of them to be used. This paper addresses the problem of RN placement in a multiple disjoint network by developing a genetic algorithm (GA). The problem is reintroduced as the Steiner tree problem (which is known to be an NP-hard problem) by the aim of finding the minimum number of Steiner points where RNs are to be placed for restoring connectivity. An upper bound to the number of RNs is first computed to set up the length of initial chromosomes. The GA algorithm then iteratively reduces the number of RNs and determines their location at the same time. Experimental results indicate that the proposed GA is capable of establishing network connectivity using a reasonable number of RNs compared to the best existing work.

Keywords: connectivity restoration, genetic algorithms, multiple-node failure, relay nodes, wireless sensor networks

Procedia PDF Downloads 238
341 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 452
340 Reducing Weight and Fuel Consumption of Civil Aircraft by EML

Authors: Luca Bertola, Tom Cox, Pat Wheeler, Seamus Garvey, Herve Morvan

Abstract:

Electromagnetic launch systems have been proposed for military applications to accelerate jet planes on aircraft carriers. This paper proposes the implementation of similar technology to aid civil aircraft take-off, which can provide significant economic, environmental and technical benefits. Assisted launch has the potential of reducing ground noise and emissions near airports and improving overall aircraft efficiency through reducing engine thrust requirements. This paper presents a take-off performance analysis for an Airbus A320-200 taking off with and without the assistance of the electromagnetic catapult. Assisted take-off allows for a significant reduction in take-off field length, giving more capacity with existing airport footprints and reducing the necessary footprint of new airports, which will both reduce costs and increase the number of suitable sites. The electromagnetic catapult may allow the installation of smaller engines with lower rated thrust. The consequent fuel consumption and operational cost reduction are estimated. The potential of reducing the aircraft operational costs and the runway length required making electromagnetic launch system an attractive solution to the air traffic growth in busy airports.

Keywords: electromagnetic launch, fuel consumption, take-off analysis, weight reduction

Procedia PDF Downloads 330
339 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students

Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar

Abstract:

The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.

Keywords: development, software, application, portable, fitness norms, cardiovascular endurance

Procedia PDF Downloads 546
338 Modelling of Structures by Advanced Finites Elements Based on the Strain Approach

Authors: Sifeddine Abderrahmani, Sonia Bouafia

Abstract:

The finite element method is the most practical tool for the analysis of structures, whatever the geometrical shape and behavior. It is extensively used in many high-tech industries, such as civil or military engineering, for the modeling of bridges, motor bodies, fuselages, and airplane wings. Additionally, experience demonstrates that engineers like modeling their structures using the most basic finite elements. Numerous models of finite elements may be utilized in the numerical analysis depending on the interpolation field that is selected, and it is generally known that convergence to the proper value will occur considerably more quickly with a good displacement pattern than with a poor pattern, saving computation time. The method for creating finite elements using the strain approach (S.B.A.) is presented in this presentation. When the results are compared with those provided by equivalent displacement-based elements, having the same total number of degrees of freedom, an excellent convergence can be obtained through some application and validation tests using recently developed membrane elements, plate bending elements, and flat shell elements. The effectiveness and performance of the strain-based finite elements in modeling structures are proven by the findings for deflections and stresses.

Keywords: finite elements, plate bending, strain approach, displacement formulation, shell element

Procedia PDF Downloads 96
337 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 341
336 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 350
335 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 312
334 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 335
333 Chemical Life Cycle Alternative Assessment as a Green Chemical Substitution Framework: A Feasibility Study

Authors: Sami Ayad, Mengshan Lee

Abstract:

The Sustainable Development Goals (SDGs) were designed to be the best possible blueprint to achieve peace, prosperity, and overall, a better and more sustainable future for the Earth and all its people, and such a blueprint is needed more than ever. The SDGs face many hurdles that will prevent them from becoming a reality, one of such hurdles, arguably, is the chemical pollution and unintended chemical impacts generated through the production of various goods and resources that we consume. Chemical Alternatives Assessment has proven to be a viable solution for chemical pollution management in terms of filtering out hazardous chemicals for a greener alternative. However, the current substitution practice lacks crucial quantitative datasets (exposures and life cycle impacts) to ensure no unintended trade-offs occur in the substitution process. A Chemical Life Cycle Alternative Assessment (CLiCAA) framework is proposed as a reliable and replicable alternative to Life Cycle Based Alternative Assessment (LCAA) as it integrates chemical molecular structure analysis and Chemical Life Cycle Collaborative (CLiCC) web-based tool to fill in data gaps that the former frameworks suffer from. The CLiCAA framework consists of a four filtering layers, the first two being mandatory, with the final two being optional assessment and data extrapolation steps. Each layer includes relevant impact categories of each chemical, ranging from human to environmental impacts, that will be assessed and aggregated into unique scores for overall comparable results, with little to no data. A feasibility study will demonstrate the efficiency and accuracy of CLiCAA whilst bridging both cancer potency and exposure limit data, hoping to provide the necessary categorical impact information for every firm possible, especially those disadvantaged in terms of research and resource management.

Keywords: chemical alternative assessment, LCA, LCAA, CLiCC, CLiCAA, chemical substitution framework, cancer potency data, chemical molecular structure analysis

Procedia PDF Downloads 87
332 Exploring the Intersection of Accounting, Business, and Economics: Bridging Theory and Practice for Sustainable Growth

Authors: Stephen Acheampong Amoafoh

Abstract:

In today's dynamic economic landscape, businesses face multifaceted challenges that demand strategic foresight and informed decision-making. This abstract explores the pivotal role of financial analytics in driving business performance amidst evolving market conditions. By integrating accounting principles with economic insights, organizations can harness the power of data-driven strategies to optimize resource allocation, mitigate risks, and capitalize on emerging opportunities. This presentation will delve into the practical applications of financial analytics across various sectors, highlighting case studies and empirical evidence to underscore its efficacy in enhancing operational efficiency and fostering sustainable growth. From predictive modeling to performance benchmarking, attendees will gain invaluable insights into leveraging advanced analytics tools to drive profitability, streamline processes, and adapt to changing market dynamics. Moreover, this abstract will address the ethical considerations inherent in financial analytics, emphasizing the importance of transparency, integrity, and accountability in data-driven decision-making. By fostering a culture of ethical conduct and responsible stewardship, organizations can build trust with stakeholders and safeguard their long-term viability in an increasingly interconnected global economy. Ultimately, this abstract aims to stimulate dialogue and collaboration among scholars, practitioners, and policymakers, fostering knowledge exchange and innovation in the realms of accounting, business, and economics. Through interdisciplinary insights and actionable recommendations, participants will be equipped to navigate the complexities of today's business environment and seize opportunities for sustainable success.

Keywords: financial analytics, business performance, data-driven strategies, sustainable growth

Procedia PDF Downloads 46
331 Development and Validation of the 'Short Form BASIC Scale' Psychotic Tendencies Subscale

Authors: Chia-Chun Wu, Ying-Yao Cheng

Abstract:

The purpose of this study was developing the 'short-form BASIC scale' psychotic tendencies subscale so as to provide a more efficient, economical and effective way to assess the mental health of recruits. 1749 students from Naval Recruit Training Center participated in this study. The multidimensional constructs of psychotic tendencies subscale include four dimensions: schizophrenic tendencies, manic tendencies, depression tendencies, and suicidal ideation. We cut down the 36-item psychotic tendencies subscale to 25 items by using multidimension Rasch techniques. They were applied to assess model-data fit and to provide the validity evidence of the short form BASIC scale of psychotic tendencies subscale. The person separation reliabilities of the measures from four dimensions were .70, .67, .74 and .57, respectively. In addition, there is a notable correlation between the length version and short version of schizophrenic tendencies (scaled .89), manic tendencies (.96), depression tendencies (.97) and suicidal ideation (.97). The results have indicated that the development of the study of short-form scale sufficient to replace the original scale. Therefore, it is suggested that short-form basic scale is used to assess the mental health with participants being more willing to answer questions to ensure the validation of assessments.

Keywords: BASIC scale, military, Rasch analysis, short-form scale

Procedia PDF Downloads 357