Search results for: security theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7167

Search results for: security theory

1857 The Science of Dreaming and Sleep in Selected Charles Dickens' Novels and Letters

Authors: Olga Colbert

Abstract:

The present work examines the representation of dreaming in Charles Dickens’ novels, particularly Oliver Twist. Dickens showed great interest in the science of dreaming and had ample knowledge of the latest dream theories in the Victorian era, as can be seen in his personal correspondence, most notably in his famous letter to Dr. Thomas Stone on 2/2/1851. This essay places Dickens’ personal writings side by side with his novels to elucidate whether the scientific paradigm about dreaming included in the novel is consistent with the current (in Dickens’ time) scientific knowledge, or whether it is anachronistic or visionary (ahead of his time). Oliver Twist is particularly useful because it contains entire passages pondering on the nature of dreaming, enumerating types of common dreams, and taking a stand on the interference of sensory perception during the dreaming state. The author is particularly intrigued by Dickens’ assumption of the commonality and universality of lucid dreaming as revealed in these passages. This essay places popular Victorian dream theories, such as those contained in Robert Macnish’s The Philosophy of Sleep, side by side with recent dream theory, particularly psychophysiologist Stephen LaBerge’s numerous articles and books on the topic of lucid dreaming to see if Dickens deviated in any way from the reigning paradigm of the Victorian era in his representation of dreaming in his novels. While Dickens puts to great narrative use many of the characteristics of dreaming described by leading Victorian theorists, the author of this study argues, however, that Dickens’ most visionary statements derive from his acute observations of his own dreaming experiences.

Keywords: consciousness, Dickens, dreaming, lucid dreaming, Victorian

Procedia PDF Downloads 279
1856 Applying Serious Game Design Frameworks to Existing Games for Integration of Custom Learning Objectives

Authors: Jonathan D. Moore, Mark G. Reith, David S. Long

Abstract:

Serious games (SGs) have been shown to be an effective teaching tool in many contexts. Because of the success of SGs, several design frameworks have been created to expedite the process of making original serious games to teach specific learning objectives (LOs). Even with these frameworks, the time required to create a custom SG from conception to implementation can range from months to years. Furthermore, it is even more difficult to design a game framework that allows an instructor to create customized game variants supporting multiple LOs within the same field. This paper proposes a refactoring methodology to apply the theoretical principles from well-established design frameworks to a pre-existing serious game. The expected result is a generalized game that can be quickly customized to teach LOs not originally targeted by the game. This methodology begins by describing the general components in a game, then uses a combination of two SG design frameworks to extract the teaching elements present in the game. The identified teaching elements are then used as the theoretical basis to determine the range of LOs that can be taught by the game. This paper evaluates the proposed methodology by presenting a case study of refactoring the serious game Battlespace Next (BSN) to teach joint military capabilities. The range of LOs that can be taught by the generalized BSN are identified, and examples of creating custom LOs are given. Survey results from users of the generalized game are also provided. Lastly, the expected impact of this work is discussed and a road map for future work and evaluation is presented.

Keywords: serious games, learning objectives, game design, learning theory, game framework

Procedia PDF Downloads 108
1855 Aural Skills Pedagogy for Students with Absolute Pitch

Authors: Rika Uchida

Abstract:

In teaching sophomore level aural skills, I have dealt with students with absolute pitch do poorly in my courses, particularly in harmonic dictation. They can identify triads; however, identifying quality of seventh chords or chromatic chords poses serious challenges. Most often, they need to spell all the pitches before identifying the chord qualities and Roman Numerals. Growing up in a country where acquiring absolute pitch is considered essential, I started my early music training with fixed do system at age three and learned all my music with solfege. When I was assigned as a TA in aural skills courses at graduate school in US, I had to learn relative pitch quickly. My survival method was listening to music with absolute pitch first, then quickly "translate" to relative pitch. In teaching my courses, I have been using chord progressions (5-8 chords total), in which students are asked to sing chord arpeggiation with movable do solfege. I use same progressions for harmonic dictation; I hoped that students learn to incorporate singing and listening skills by overlapping same materials. This method has proven to be successful for most students; in particular, it has helped students with absolute pitch to hear chord quality and function. Although original progressions are written in C as a tonic, they can identify chords in harmonic dictation in other keys as well. In short, I believe singing chord progression with movable do arpeggiation helps students with absolute pitch to improve hearing function and quality of chords in harmonic dictation.

Keywords: aural skills pedagogy, music theory, absolute pitch, harmonic dictation

Procedia PDF Downloads 130
1854 Symptoms Experiences among Thai Adults with Chronic Illnesses: A Study in an Urban Community Area of Bangkok

Authors: Orapan Thosingha, Tassana Boontong, Prapa Yuttatri, Vilaivan Thongcharoen, Soparn Potaya, Mattika Chaichan, Chanin Chakkrapopyodhin, Khwanthida Phimphakarn, Taddao Nabnean

Abstract:

This research aimed to explore symptom experiences among Thai adults with chronic illnesses living in an urban community area of Bangkok. The sample was 670 adults with ages ranging from 20-59 years. The majority of them (65.2%) had more than one disease. Hypertension, dyslipidemia, and diabetes were the first three diseases among them. About 58% were female, and 51.1 % stayed with their couples. The studied sample had relatively low socioeconomic status; 33.7% were wage workers, 15.2% were street vendors, and 10.4% were unemployed. About 54 % had family incomes less than 10,000 baht (300 US Dollars) per month, and 41.6% addressed that their incomes were not adequate for daily living. Although the majority of them (63.7%) did not have to pay for hospital visits, they still had to pay for public transportation and could not earn a wage or any income on the hospital visit day. The first three physical symptoms they experienced were knee pain (60.5%) due to being overweight, headache (47.0%), and insomnia (44.6%). About 45% stated that their incomes decreased after having chronic illnesses and 37.2% expressed that having lower incomes affected their living, 34.5% perceived being a burden, and 34.3% regret about depending on others. It can be concluded that adults with low socioeconomic status who experienced chronic illnesses and resided in an urban community area had complex needs. While caring for them, nurses should pay attention not only to a disease-related domain but also to a social-related domain. Reached-out clinics led by professional nurses who are well-prepared for primary medical care and home visit are strongly recommended. National Health Security Office should adopt this policy and develop an action plan to serve the needs of chronically ill adults with low socioeconomic status.

Keywords: chronic illnesses, urban community, socioeconomic status, symptom experiences, low incomes

Procedia PDF Downloads 104
1853 One-Pot Synthesis of 5-Hydroxymethylfurfural from Hexose Sugar over Chromium Impregnated Zeolite Based Catalyst, Cr/H-ZSM-5

Authors: Samuel K. Degife, Kamal K. Pant, Sapna Jain

Abstract:

The world´s population and industrialization of countries continued to grow in an alarming rate irrespective of the security for food, energy supply, and pure water availability. As a result, the global energy consumption is observed to increase significantly. Fossil energy resources that mainly comprised of crude oil, coal, and natural gas have been used by mankind as the main energy source for almost two centuries. However, sufficient evidences are revealing that the consumption of fossil resource as transportation fuel emits environmental pollutants such as CO2, NOx, and SOx. These resources are dwindling rapidly besides enormous amount of problems associated such as fluctuation of oil price and instability of oil-rich regions. Biomass is a promising renewable energy candidate to replace fossil-based transportation fuel and chemical production. The present study aims at valorization of hexose sugars (glucose and fructose) using zeolite based catalysts in imidazolium based ionic liquid (1-butyl-3-methylimidazolium chloride, [BMIM] Cl) reaction media. The catalytic effect chromium impregnated H-ZSM-5 (Cr/H-ZSM-5) was studied for dehydration of hexose sugars. The wet impregnation method was used to prepare Cr/H-ZSM-5 catalyst. The characterization of the prepared catalyst was performed using techniques such as Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction analysis (XRD), Temperature-programmed desorption of ammonia (NH3-TPD) and BET-surface area analysis. The dehydration product, 5-hydroxymethylfurfural (5-HMF), was analyzed using high-performance liquid chromatography (HPLC). Cr/H-ZSM-5 was effective in dehydrating fructose with 87% conversion and 55% yield 5-HMF at 180 oC for 30 min of reaction time compared with H-ZSM-5 catalyst which yielded only 31% of 5-HMF at identical reaction condition.

Keywords: chromium, hexose, ionic liquid, , zeolite

Procedia PDF Downloads 166
1852 The Role and Significance of Mobile Gerdarmarie Battalions in the Canakkale Battles

Authors: Muzaffer Topgül, Ersi̇n Yilmaz

Abstract:

One of the unknown aspects of Çanakkale Battles is that the importance and contributions of Mobile Gendarmarie Battalion have not been fully understood. It was because the battles of the troops which were deployed more in interior parts of Gallipoli Peninsula, and the contributions of battle on level tactical troops were not considered as much as the studies on strategical or operative level troops. When the operation field and battle plans are examined, instead of deploying along the coast to put the forces with a power at zero level landing on the coast out of action, the main battle components are seen to have deployed as strong reserves in the more inner areas. The negative effect of the field on the great trop operation reveals the need for time in order to use the intervention forces. ‘Time’ emerged as the main factor in victory as a result of giving intervention opportunity to the troops. While ordering his soldiers in Conkbayırı to die rather than fight, Liutenant Colonel Mustafa Kemal, the Commander of the 19th division, also emphasized the significance of time. In this respect, the contribution of Mobile Gendarmarie Battalion which saved time for the troops to intervene can be clearly seen. During the study, the memoirs and the works written by military institutions based on the record sources under the light of the notes taken during the trips to the region were used. By preventing the enemies from capturing the area, Mobile Gendarmerie Battalions had an important role in Battles of Kerevizdere, Kireçtepe and Alçıtepe which were of great importance among the battles. The success of these battalions was expressed with compliment by both Turkish and foreign commanders that participated in the war. During the battles the losses of armed forces commissioned to keep the security and order brought about the formation of the regions deficient in state authority.

Keywords: Canakkale battles, mustafa kemal, mobile gerdarmarie, Ottoman empire, time

Procedia PDF Downloads 437
1851 Bilateral Relations in Matter of Defense between Argentina-United States and Argentina-China along the Period 2005-2015: Advice to Develop a Rational Defense Foreign Policy for Peripheral Countries

Authors: Alvarez Magañini, María Victoria-Rubbi, Lautaro Nahuel

Abstract:

At present, we are facing an unstable international context, conditioned by a relative decline of the US power, primarily in the economic sphere and, to a lesser extent, in the military sphere. This scenario of multipolarity creates tension and uncertainty in the peripheral countries when the issue of their foreign policy arises. This paper presents an analysis of the bilateral relations that were maintained by the Argentine Republic, a peripheral country, along with the United States and China during the period of 2005-2015 in matters of defense in order to identify the empirical consequences resulted from the Argentine actions. Based on the conceptual framework of Peripheral Realism, we analyze indicators related to the weapon trade, defense loans, joint exercises, and personnel training, among others. There will also be a comparative analysis of the conventional military forces of the two powers in question, United States and China. As a conclusion, the cost of having closer relations with China instead of the United States in the defense agenda has been clearly higher than the benefits obtained. The conclusions drawn are empirically aligned with the theoretical paradigm of peripheral realism. Although there are certain conceptual and methodological digressions, these conclusions they could be useful to update and adapt the theory to the current complex international scenario.

Keywords: China, United States, Argentine, peripheral country, peripheral realism

Procedia PDF Downloads 370
1850 The Effects of Self-Efficacy on Challenge and Threat States

Authors: Nadine Sammy, Mark Wilson, Samuel Vine

Abstract:

The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.

Keywords: cardiovascular, challenge, performance, threat

Procedia PDF Downloads 224
1849 Hybrid Intelligent Optimization Methods for Optimal Design of Horizontal-Axis Wind Turbine Blades

Authors: E. Tandis, E. Assareh

Abstract:

Designing the optimal shape of MW wind turbine blades is provided in a number of cases through evolutionary algorithms associated with mathematical modeling (Blade Element Momentum Theory). Evolutionary algorithms, among the optimization methods, enjoy many advantages, particularly in stability. However, they usually need a large number of function evaluations. Since there are a large number of local extremes, the optimization method has to find the global extreme accurately. The present paper introduces a new population-based hybrid algorithm called Genetic-Based Bees Algorithm (GBBA). This algorithm is meant to design the optimal shape for MW wind turbine blades. The current method employs crossover and neighborhood searching operators taken from the respective Genetic Algorithm (GA) and Bees Algorithm (BA) to provide a method with good performance in accuracy and speed convergence. Different blade designs, twenty-one to be exact, were considered based on the chord length, twist angle and tip speed ratio using GA results. They were compared with BA and GBBA optimum design results targeting the power coefficient and solidity. The results suggest that the final shape, obtained by the proposed hybrid algorithm, performs better compared to either BA or GA. Furthermore, the accuracy and speed convergence increases when the GBBA is employed

Keywords: Blade Design, Optimization, Genetic Algorithm, Bees Algorithm, Genetic-Based Bees Algorithm, Large Wind Turbine

Procedia PDF Downloads 310
1848 The Evolution Characteristics of Urban Ecological Patterns in Parallel Range-Valley Areas, China

Authors: Wen Feiming

Abstract:

As the ecological barrier of the Yangtze River, the ecological security of the Parallel Range-Valley area is very important. However, the unique geomorphic features aggravate the contradiction between man and land, resulting in the encroachment of ecological space. In recent years , relevant researches has focused on the single field of land science, ecology and landscape ecology, and it is difficult to systematically reflect the regularities of distribution and evolution trends of ecological patterns in the process of urban development. Therefore, from the perspective of "Production-Living-Ecological space", using spatial analysis methods such as Remote Sensing (RS) and Geographic Information Systems (GIS), this paper analyzes the evolution characteristics and driving factors of the ecological pattern of mountain towns in the parallel range-valley region from the aspects of land use structure, change rate, transformation relationship, and spatial correlation. It is concluded that the ecological pattern of mountain towns presents a trend from expansion and diffusion to agglomeration, and the dynamic spatial transfer is a trend from artificial transformation to the natural origin, while the driving effect analysis shows the significant characteristics of terrain attraction and construction barrier. Finally, combined with the evolution characteristics and driving mechanism, the evolution modes of "mountain area - concentrated growth", "trough area - diffusion attenuation" and "flat area - concentrated attenuation" are summarized, and the differentiated zoning and stratification ecological planning strategies are proposed here, in order to provide the theoretical basis for the sustainable development of mountain towns in parallel range-valley areas.

Keywords: parallel range-valley, ecological pattern, evolution characteristics, driving factors

Procedia PDF Downloads 87
1847 Grammatical Forms and Functions in Selected Political Interviews of Nigerian Presidential Aspirants in 2015 General Election

Authors: Temitope Abiodun Balogun

Abstract:

Political interviews are one of the ways by which political office-seekers in Nigeria sell themselves to the electorates. Extant studies have examined the discourse of political interviews from conversational, philosophical, rhetorical, stylistic and pragmatic perspectives with insufficient attention paid to grammatical forms and communicative intentions of the interviews granted by the two presidential aspirants in the 2015 Nigerian general election. This study fills this scholarly gap to unmask their grammatical forms and communicative styles, intention and credibility. The paper adopts Halliday’s Systemic Functional Grammar, specifically interpersonal function coupled with Searle’s Model of Speech Acts Theory as a theoretical framework. A total of six interviews granted by the two presidential aspirants in media serve as the source of data. It is discovered that, in most cases, politicians’ communicative intention is to “pull-down” their political opponents. While declarative and interrogatives are simple, direct and straightforward, the intention is to condemn, lambast and castigate their opponents. This communicative style does not allow the general populace to decipher the political manifestoes of the political aspirants and the party they represent. The paper recommends that before Nigeria can boast of any sustainable growth and development, there is the need for her political office-seekers to adopt effective communication strategies and styles to unveil their intention and manifestoes so that electorates can evaluate their performance after their tenure of office.

Keywords: general election, grammatical forms and function, political interviews, presidential aspirants

Procedia PDF Downloads 147
1846 Establishing a Change Management Model for Precision Machinery Industry in Taiwan

Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, , Hui-Yu Chuang

Abstract:

Due to the rapid development of modern technology, the widespread usage of the Internet makes business environment changing quickly. In order to be a leader in the global competitive market and to pursuit survive, “changing” becomes an unspoken rules need to follow for the company survival. The purpose of this paper is to build change model by using SWOT, strategy map, and balance scorecard, KPI and change management theory. The research findings indicate that organizational change plan formulated by the case company should require the employee to resist change factors and performance management system issues into consideration and must be set organizational change related programs, such as performance appraisal reward system, consulting and counseling mechanisms programs to improve motivation and reduce staff negative emotions. Then according to the model revised strategy maps and performance indicators proposed in this paper, such as strategy maps add and modify corporate culture, improve internal processes management, increase the growth rate of net income and other strategies. The performance indicators are based on strategy maps new and modified by adding net income growth rate, to achieve target production rate, manpower training achievement rates and other indicators, through amendments to achieve the company’s goal, be a leading brand of precision machinery industry.

Keywords: organizational change, SWOT analysis, strategy maps, performance indicators

Procedia PDF Downloads 276
1845 Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network

Authors: Serkan Tezgel

Abstract:

Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace.

Keywords: postmodern navy, transnational navy, transnational mentality, institutional network

Procedia PDF Downloads 506
1844 The Effect of Career Decision Self Efficacy on Coping with Career Indecision among Young Adults

Authors: Yuliya Lipshits-Braziler

Abstract:

For many young adults, career decision making is a difficult and complex process that may lead to indecision. Indecision is frequently associated with great psychological distress and low levels of well-being. One important resource for dealing with indecision is career decision self-efficacy (CDSE), which refers to people’s beliefs about their ability to successfully accomplish certain tasks involved in career choice. Drawing from Social Cognitive Theory, it has been hypothesized that CDSE correlates with (a) people’s likelihood to engage in or avoid career decision making tasks, (b) the amount of effort put into the decision making process, (c) the people’s persistence in decision making efforts when faced with difficulties, and (d) the eventual success in arriving at career decisions. Based on these assumptions, the present study examines the associations between the CDSE and 14 strategies for coping with career indecision among young adults. Using the structural equation modeling (SEM), the results showed that CDSE is positively associated with the use of productive coping strategies, such as information-seeking, problem-solving, positive thinking, and self-regulation. In addition, CDSE was negatively associated with nonproductive coping strategies, such as avoidance, isolation, ruminative thinking, and blaming others. Contrary to our expectations, CDSE was not significantly correlated with instrumental help-seeking, while it was negatively correlated with emotional help-seeking. The results of this study can be used to facilitate the development of interventions aiming to reinforce young adults’ career decision making self-efficacy, which may provide them with a basis for overcoming career indecision more effectively.

Keywords: career decision self-efficacy, career indecision, coping strategies, career counseling

Procedia PDF Downloads 249
1843 The Rational Design of Original Anticancer Agents Using Computational Approach

Authors: Majid Farsadrooh, Mehran Feizi-Dehnayebi

Abstract:

Serum albumin is the most abundant protein that is present in the circulatory system of a wide variety of organisms. Although it is a significant macromolecule, it can contribute to osmotic blood pressure and also, plays a superior role in drug disposition and efficiency. Molecular docking simulation can improve in silico drug design and discovery procedures to propound a lead compound and develop it from the discovery step to the clinic. In this study, the molecular docking simulation was applied to select a lead molecule through an investigation of the interaction of the two anticancer drugs (Alitretinoin and Abemaciclib) with Human Serum Albumin (HSA). Then, a series of new compounds (a-e) were suggested using lead molecule modification. Density functional theory (DFT) including MEP map and HOMO-LUMO analysis were used for the newly proposed compounds to predict the reactivity zones on the molecules, stability, and chemical reactivity. DFT calculation illustrated that these new compounds were stable. The estimated binding free energy (ΔG) values for a-e compounds were obtained as -5.78, -5.81, -5.95, -5,98, and -6.11 kcal/mol, respectively. Finally, the pharmaceutical properties and toxicity of these new compounds were estimated through OSIRIS DataWarrior software. The results indicated no risk of tumorigenic, irritant, or reproductive effects and mutagenicity for compounds d and e. As a result, compounds d and e, could be selected for further study as potential therapeutic candidates. Moreover, employing molecular docking simulation with the prediction of pharmaceutical properties helps to discover new potential drug compounds.

Keywords: drug design, anticancer, computational studies, DFT analysis

Procedia PDF Downloads 66
1842 Effect of Phaseolus vulgaris Inoculation on P. vulgaris and Zea mays Growth and Yield Cultivated in Intercropping

Authors: Nour Elhouda Abed, Bedj Mimi, Wahid Slimani, Mourad Atif, Abdelhakim Ouzzane, Hocine Irekti, Abdelkader Bekki

Abstract:

The most frequent system of cereal production in Algeria is fallow-wheat. This is an extensive system that meets only the half needs some cereals and fodder demand. Resorption of fallow has become a strategic necessity to ensure food security in response to the instability of supply and the persistence of higher food prices on the world market. Despite several attempts to replace the fallow by crop cultures, choosing the best crop remains. Today, the agronomic and economic interests of legumes are demonstrated. However, their crop culture remains marginalized because of the weakness and instability of their performance. In the context of improving legumes and cereals crops as well as fallow resorption, we undertook to test, in the field, the effect of rhizobial inoculation of Phaseolus vulgaris in association with Zea Mays. We firstly studied the genetic diversity of rhizobial strains that nodulate P.vulgaris isolated from fifteen (15) different regions. ARDRA had shown 18 different genetic profiles. Symbiotic characterization highlighted a strain that highly significantly improved the fresh and dry weight of the host plant, in comparison to the negative control (un-inoculated) and the positive control (inoculated with the reference strain CIAT 899). In the field, the selected strain increased significantly the growth and yield of P.vulgaris and Zea Mays comparing to the non-inoculated control. However, the mix inoculation (selected strain+ Ciat 899) had not given the best parameters showing, thus, no synergy between the strains. These results indicate the replacing fallow by a crop legume in intercropping with cereals crops.

Keywords: fallow, intercropping, inoculation, legumes-cereals

Procedia PDF Downloads 356
1841 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 253
1840 Trust: The Enabler of Knowledge-Sharing Culture in an Informal Setting

Authors: Emmanuel Ukpe, S. M. F. D. Syed Mustapha

Abstract:

Trust in an organization has been perceived as one of the key factors behind knowledge sharing, mainly in an unstructured work environment. In an informal working environment, to instill trust among individuals is a challenge and even more in the virtual environment. The study has contributed in developing the framework for building trust in an unstructured organization in performing knowledge sharing in a virtual environment. The artifact called KAPE (Knowledge Acquisition, Processing, and Exchange) was developed for knowledge sharing for the informal organization where the framework was incorporated. It applies to Cassava farmers to facilitate knowledge sharing using web-based platform. A survey was conducted; data were collected from 382 farmers from 21 farm communities. Multiple regression technique, Cronbach’s Alpha reliability test; Tukey’s Honestly significant difference (HSD) analysis; one way Analysis of Variance (ANOVA), and all trust acceptable measures (TAM) were used to test the hypothesis and to determine noteworthy relationships. The results show a significant difference when there is a trust in knowledge sharing between farmers, the ones who have high in trust acceptable factors found in the model (M = 3.66 SD = .93) and the ones who have low on trust acceptable factors (M = 2.08 SD = .28), (t (48) = 5.69, p = .00). Furthermore, when applying Cognitive Expectancy Theory, the farmers with cognitive-consonance show higher level of trust and satisfaction with knowledge and information from KAPE, as compared with a low level of cognitive-dissonance. These results imply that the adopted trust model KAPE positively improved knowledge sharing activities in an informal environment amongst rural farmers.

Keywords: trust, knowledge, sharing, knowledge acquisition, processing and exchange, KAPE

Procedia PDF Downloads 107
1839 Feasibility Study of Tidal Current of the Bay of Bengal to Generate Electricity as a Renewable Energy

Authors: Myisha Ahmad, G. M. Jahid Hasan

Abstract:

Electricity is the pinnacle of human civilization. At present, the growing concerns over significant climate change have intensified the importance of the use of renewable energy technologies for electricity generation. The interest is primarily due to better energy security, smaller environmental impact and providing a sustainable alternative compared to the conventional energy sources. Solar power, wind, biomass, tidal power, and wave power are some of the most reliable sources of renewable energy. Ocean approximately holds 2×10³ TW of energy and has the largest renewable energy resource on the planet. Ocean energy has many forms namely, encompassing tides, ocean circulation, surface waves, salinity and thermal gradients. Ocean tide in particular, associates both potential and kinetic energy. The study is focused on the latter concept that deals with tidal current energy conversion technologies. Tidal streams or marine currents generate kinetic energy that can be extracted by marine current energy devices and converted into transmittable energy form. The principle of technology development is very comparable to that of wind turbines. Conversion of marine tidal resources into substantial electrical power offers immense opportunities to countries endowed with such resources and this work is aimed at addressing such prospects of Bangladesh. The study analyzed the extracted current velocities from numerical model works at several locations in the Bay of Bengal. Based on current magnitudes, directions and available technologies the most fitted locations were adopted and possible annual generation capacity was estimated. The paper also examines the future prospects of tidal current energy along the Bay of Bengal and establishes a constructive approach that could be adopted in future project developments.

Keywords: bay of Bengal, energy potential, renewable energy, tidal current

Procedia PDF Downloads 367
1838 Need for Privacy in the Technological Era: An Analysis in the Indian Perspective

Authors: Amrashaa Singh

Abstract:

In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application.

Keywords: Article 21, data protection, dissent, fundamental right, India, privacy

Procedia PDF Downloads 110
1837 Ab Initio Calculations of Structure and Elastic Properties of BexZn1−xO Alloys

Authors: S. Lakel, F. Elhamra, M. Ibrir, K. Almi

Abstract:

There is a growing interest in Zn1-xBexO (ZBO)/ZnO hetero structures and quantum wells since the band gap energy of Zn1-xBexO solid solutions can be turned over a very large range (3.37–10.6 eV) as a function of the Be composition. ZBO/ZnO has been utilized in ultraviolet light emission diodes and lasers, and may find applications as active elements of various other electronic and optoelectronic devices. Band gap engineering by Be substitution enables the facile preparation of barrier layers and quantum wells in device structures. In addition, ZnO and its ternary alloys, as piezoelectric semiconductors, have been used for high-frequency surface acoustic wave devices in wireless communication systems due to their high acoustic velocities and large electromechanical coupling. However, many important parameters such as elastic constants, bulk modulus, Young’s modulus and band-gap bowing. First-principles calculations of the structural, electrical and elastic properties of Zn1-xBexO as a function of the Be concentration x have been performed within density functional theory using norm-conserving pseudopotentials and local density approximation (LDA) for the exchange and correlation energy. The alloys’ lattice constants may deviate from the Vegard law. As Be concentration increases, the elastic constants, the bulk modulus and Young’s modulus of the alloys increase, the band gap increases with increasing Be concentration and Zn1-xBexO alloys have direct band. Our calculated results are in good agreement with experimental data and other theoretical calculations.

Keywords: DFT calculation, norm-conserving pseudopotentials, ZnBeO alloys, ZnO

Procedia PDF Downloads 513
1836 Multimodal Sentiment Analysis With Web Based Application

Authors: Shreyansh Singh, Afroz Ahmed

Abstract:

Sentiment Analysis intends to naturally reveal the hidden mentality that we hold towards an entity. The total of this assumption over a populace addresses sentiment surveying and has various applications. Current text-based sentiment analysis depends on the development of word embeddings and Machine Learning models that take in conclusion from enormous text corpora. Sentiment Analysis from text is presently generally utilized for consumer loyalty appraisal and brand insight investigation. With the expansion of online media, multimodal assessment investigation is set to carry new freedoms with the appearance of integral information streams for improving and going past text-based feeling examination using the new transforms methods. Since supposition can be distinguished through compelling follows it leaves, like facial and vocal presentations, multimodal opinion investigation offers good roads for examining facial and vocal articulations notwithstanding the record or printed content. These methodologies use the Recurrent Neural Networks (RNNs) with the LSTM modes to increase their performance. In this study, we characterize feeling and the issue of multimodal assessment investigation and audit ongoing advancements in multimodal notion examination in various spaces, including spoken surveys, pictures, video websites, human-machine, and human-human connections. Difficulties and chances of this arising field are additionally examined, promoting our theory that multimodal feeling investigation holds critical undiscovered potential.

Keywords: sentiment analysis, RNN, LSTM, word embeddings

Procedia PDF Downloads 110
1835 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 416
1834 First-Principles Calculations of Hydrogen Adsorbed in Multi-Layer Graphene

Authors: Mohammad Shafiul Alam, Mineo Saito

Abstract:

Graphene-based materials have attracted much attention because they are candidates for post silicon materials. Since controlling of impurities is necessary to achieve nano device, we study hydrogen impurity in multi-layer graphene. We perform local spin Density approximation (LSDA) in which the plane wave basis set and pseudopotential are used. Previously hydrogen monomer and dimer in graphene is well theoretically studied. However, hydrogen on multilayer graphene is still not clear. By using first-principles electronic structure calculations based on the LSDA within the density functional theory method, we studied hydrogen monomers and dimers in two-layer graphene. We found that the monomers are spin-polarized and have magnetic moment 1 µB. We also found that most stable dimer is much more stable than monomer. In the most stable structures of the dimers in two-layer graphene, the two hydrogen atoms are bonded to the host carbon atoms which are nearest-neighbors. In this case two hydrogen atoms are located on the opposite sides. Whereas, when the two hydrogen atoms are bonded to the same sublattice of the host materials, magnetic moments of 2 µB appear in two-layer graphene. We found that when the two hydrogen atoms are bonded to third-nearest-neighbor carbon atoms, the electronic structure is nonmagnetic. We also studied hydrogen monomers and dimers in three-layer graphene. The result is same as that of two-layer graphene. These results are very important in the field of carbon nanomaterials as it is experimentally difficult to show the magnetic state of those materials.

Keywords: first-principles calculations, LSDA, multi-layer gra-phene, nanomaterials

Procedia PDF Downloads 325
1833 Animation: A Footpath for Enhanced Awareness Creation on Malaria Prevention in Rural Communities

Authors: Stephen Osei Akyiaw, Divine Kwabena Atta Kyere-Owusu

Abstract:

Malaria has been a worldwide menace of a health condition to human beings for several decades with majority of people on the African continent with most causalities where Ghana is no exception. Therefore, this study employed the use of animation to enhance awareness creation on the spread and prevention of Malaria in Effutu Communities in the Central Region of Ghana. Working with the interpretivist paradigm, this study adopted Art-Based Research, where the AIDA Model and Cognitive Theory of Multimedia Learning (CTML) served as the theories underpinning the study. Purposive and convenience sampling techniques were employed in selecting sample for the study. The data collection instruments included document review and interviews. Besides, the study developed an animation using the local language of the people as the voice over to foster proper understanding by the rural community folks. Also, indigenous characters were used for the animation for the purpose of familiarization with the local folks. The animation was publicized at Health Town Halls within the communities. The outcomes of the study demonstrated that the use of animation was effective in enhancing the awareness creation for preventing and controlling malaria disease in rural communities in Effutu Communities in the Central Region of Ghana. Health officers and community folks expressed interest and desire to practice the preventive measures outlined in the animation to help reduce the spread of Malaria in their communities. The study, therefore, recommended that animation could be used to curtail the spread and enhanced the prevention of Malaria.

Keywords: malaria, animation, prevention, communities

Procedia PDF Downloads 71
1832 Techno-Apocalypse in Christian End-Time Literature

Authors: Sean O'Callaghan

Abstract:

Around 2011/2012, a whole new genre of Christian religious writing began to emerge, focused on the role of advanced technologies, particularly the GRIN technologies (Genetics, Robotics, Information Technology and Nanotechnology), in bringing about a techno-apocalypse, leading to catastrophic events which would usher in the end of the world. This genre, at first niche, has now begun to grow in significance in many quarters of the more fundamentalist and biblically literalist branches of evangelicalism. It approaches science and technology with more than extreme skepticism. It accuses transhumanists of being in league with satanic powers and a satanic agenda and contextualizes transhumanist scientific progress in terms of its service to what it believes to be a soon to come Antichrist figure. The genre has moved beyond literature and videos about its message can be found on YouTube and other forums, where many of the presentations there get well over a quarter of a million views. This paper will examine the genre and its genesis, referring to the key figures involved in spreading the anti-intellectualist and anti-scientific message. It will demonstrate how this genre of writing is similar in many respects to other forms of apocalyptic writing which have emerged in the twentieth and twenty-first centuries, all in response to both scientific and political events which are interpreted in the light of biblical prophecy. It will also set the genre in the context of a contemporary pre-occupation with conspiracy theory. The conclusions of the research conducted in this field by the author are that it does a grave disservice to both the scientific and Christian audiences which it targets, by misrepresenting scientific advances and by creating a hermeneutic of suspicion which makes it impossible for Christians to place their trust in scientific claims.

Keywords: antichrist, catastrophic, Christian, techno-apocalypse

Procedia PDF Downloads 195
1831 Student Teachers' Experiences and Perceptions of a Curriculum Designed to Promote Social Justice

Authors: Emma Groenewald

Abstract:

In 1994, numerous policies of a democratic dispensation envisage social justice and the transformation of the South Africa society. The drive for transformation and social justice resulted in an increasing number of university students from diverse backgrounds, which in turn, lead to the establishment of Sol Plaatje University (SPU) in 2014. A re-curriculated B. Ed. programme at SPU aims to equip students with knowledge and skills to realise the aim of social justice and to enhance the transformation of the South African society. The aim of this study is to explore the experiences and perceptions of students at a diverse university campus on a curriculum that aims to promote social justice. Four education modules, with the assumption that it reflects social justice content, were selected. Four students, representative of different ethnic and language groupings found at the SPU, were chosen as participants. Data were generated by the participants through four reflective exercises on each of the modules, spread over a period of four years. The module aims, linked with the narratives of the participants' perceptions and experiences of each module, provided an overview of the enacted curriculum. A qualitative research design with an interpretivist approach informed by Vygotsky's theory of learning was used. The participants' experiences of the four modules were analysed, and their views were interpreted. The students' narratives shed light on the strengths and weaknesses of how the B.Ed. Curriculum works towards social justice and revealed student's perceptions of otherness. From the narratives it became apparent that module did promote a social justice orientation in prospective teachers trained at a university.

Keywords: student diversity, social justice, transformation, teacher education

Procedia PDF Downloads 132
1830 Ensuring Safe Operation by Providing an End-To-End Field Monitoring and Incident Management Approach for Autonomous Vehicle Based on ML/Dl SW Stack

Authors: Lucas Bublitz, Michael Herdrich

Abstract:

By achieving the first commercialization approval in San Francisco the Autonomous Driving (AD) industry proves the technology maturity of the SAE L4 AD systems and the corresponding software and hardware stack. This milestone reflects the upcoming phase in the industry, where the focus is now about scaling and supervising larger autonomous vehicle (AV) fleets in different operation areas. This requires an operation framework, which organizes and assigns responsibilities to the relevant AV technology and operation stakeholders from the AV system provider, the Remote Intervention Operator, the MaaS provider and regulatory & approval authority. This holistic operation framework consists of technological, processual, and organizational activities to ensure safe operation for fully automated vehicles. Regarding the supervision of large autonomous vehicle fleets, a major focus is on the continuous field monitoring. The field monitoring approach must reflect the safety and security criticality of incidents in the field during driving operation. This includes an automatic containment approach, with the overall goal to avoid safety critical incidents and reduce downtime by a malfunction of the AD software stack. An End-to-end (E2E) field monitoring approach detects critical faults in the field, uses a knowledge-based approach for evaluating the safety criticality and supports the automatic containment of these E/E faults. Applying such an approach will ensure the scalability of AV fleets, which is determined by the handling of incidents in the field and the continuous regulatory compliance of the technology after enhancing the Operational Design Domain (ODD) or the function scope by Functions on Demand (FoD) over the entire digital product lifecycle.

Keywords: field monitoring, incident management, multicompliance management for AI in AD, root cause analysis, database approach

Procedia PDF Downloads 61
1829 Ownership, Management Responsibility and Corporate Performance of the Listed Firms in Kazakhstan

Authors: Gulnara Moldasheva

Abstract:

The research explores the relationship between management responsibility and corporate governance of listed companies in Kazakhstan. This research employs firm level data of randomly selected listed non-financial firms and firm level data “operational” financial sector, consisted from banking sector, insurance companies and accumulated pension funds using multivariate regression analysis under fixed effect model approach. Ownership structure includes institutional ownership, managerial ownership and private investor’s ownership. Management responsibility of the firm is expressed by the decision of the firm on amount of leverage. Results of the cross sectional panel study for non-financial firms showed that only institutional shareholding is significantly negatively correlated with debt to equity ratio. Findings from “operational” financial sector show that leverage is significantly affected only by the CEO/Chair duality and the size of financial institutions, and insignificantly affected by ownership structure. Also, the findings show, that there is a significant negative relationship between profitability and the debt to equity ratio for non-financial firms, which is consistent with pecking order theory. Generally, the found results suggest that corporate governance and a management responsibility play important role in corporate performance of listed firms in Kazakhstan.

Keywords: ownership, corporate governance, debt to equity ratio, corporate performance

Procedia PDF Downloads 337
1828 Integration of Agroforestry Shrub for Diversification and Improved Smallholder Production: A Case of Cajanus cajan-Zea Mays (Pigeonpea-Maize) Production in Ghana

Authors: F. O. Danquah, F. Frimpong, E. Owusu Danquah, T. Frimpong, J. Adu, S. K. Amposah, P. Amankwaa-Yeboah, N. E. Amengor

Abstract:

In the face of global concerns such as population increase, climate change, and limited natural resources, sustainable agriculture practices are critical for ensuring food security and environmental stewardship. The study was conducted in the Forest zones of Ghana during the major and minor seasons of 2023 cropping seasons to evaluate maize yield productivity improvement and profitability of integrating Cajanus cajan (pigeonpea) into a maize production system described as a pigeonpea-maize cropping system. This is towards an integrated soil fertility management (ISFM) with a legume shrub pigeonpea for sustainable maize production while improving smallholder farmers' resilience to climate change. A split-plot design with maize-pigeonpea (Pigeonpea-Maize intercrop – MPP and No pigeonpea/ Sole maize – NPP) and inorganic fertilizer rate (250 kg/ha of 15-15-15 N-P2O5-K2O + 250 kg/ha Sulphate of Ammonia (SoA) – Full rate (FR), 125 kg/ha of 15-15-15 N-P2O5-K2O + 125 kg/ha Sulphate of Ammonia (SoA) – Half rate (HR) and no inorganic fertilizer (NF) as control) was used as the main plot and subplot treatments respectively. The results indicated a significant interaction of the pigeonpea-maize cropping system and inorganic fertilizer rate on the growth and yield of the maize with better and similar maize productivity when HR and FR were used with pigeonpea biomass. Thus, the integration of pigeonpea and its biomass would result in the reduction of recommended fertiliser rate to half. This would improve farmers’ income and profitability for sustainable maize production in the face of climate change.

Keywords: agroforestry tree, climate change, integrated soil fertility management, resource use efficiency

Procedia PDF Downloads 48