Search results for: union threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1684

Search results for: union threat

1174 Preliminary Design of Maritime Energy Management System: Naval Architectural Approach to Resolve Recent Limitations

Authors: Seyong Jeong, Jinmo Park, Jinhyoun Park, Boram Kim, Kyoungsoo Ahn

Abstract:

Energy management in the maritime industry is being required by economics and in conformity with new legislative actions taken by the International Maritime Organization (IMO) and the European Union (EU). In response, the various performance monitoring methodologies and data collection practices have been examined by different stakeholders. While many assorted advancements in operation and technology are applicable, their adoption in the shipping industry stays small. This slow uptake can be considered due to many different barriers such as data analysis problems, misreported data, and feedback problems, etc. This study presents a conceptual design of an energy management system (EMS) and proposes the methodology to resolve the limitations (e.g., data normalization using naval architectural evaluation, management of misrepresented data, and feedback from shore to ship through management of performance analysis history). We expect this system to make even short-term charterers assess the ship performance properly and implement sustainable fleet control.

Keywords: data normalization, energy management system, naval architectural evaluation, ship performance analysis

Procedia PDF Downloads 443
1173 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 154
1172 Contributions of Search and Rescue to the World Peace

Authors: Dursun Kalebaşi

Abstract:

When we examine the history of mankind (from the past up to the present), we see that millions of people died because of the wars. Especially, since the beginning of 19th century, the increase of the human death rate is caused mostly by the regional conflicts and natural disasters rather than the wars. From that point of view, the biggest threat humanity face today is temperature increase and climate change that started to emerge in recent years. When we take into account the natural disasters on one hand and refuges that flee from regional conflicts on the other, it stands out as a dramatic situation because of the huge human losses. In this context, most of the countries started to give more importance to Search and Rescue (SAR) operations to stop the loss of lives or decrease the death rate. This article will tell about the SAR activities in Turkey since 2000 and discuss the Turkey’s contributions to Rescue Missions after the natural disasters in different parts of the world. Moreover, there will be some new highlights to a more habitable and more peaceful world through the SAR missions.

Keywords: search and rescue, natural disasters, migration and world peace, Turkish army forces

Procedia PDF Downloads 372
1171 A Social Care Intervention for Improving the Quality of Life of People Living with HIV/AIDS in Ghana

Authors: Tina Abrefa-Gyan

Abstract:

Background: In Ghana and the rest of sub-Saharan Africa, HIV/AIDS is a public health threat and also causes medical crises for many who are infected with the virus. Objective: This study tested a social care intervention developed to help improve the quality of life of those living with HIV/AIDS in Ghana. Method: Adult respondents (N = 248) were assigned to receive the intervention or usual care for six weeks. Results: Results of the study revealed significant differences between the treatment and control groups in their reports of quality of life. Respondents reported better quality of life upon receiving the intervention. Implication: This study sheds light on the positive relationship between the intervention and quality of life among those living with HIV/AIDS in Ghana. Conclusion: The intervention is innovative and novel in the setting. It will, therefore, help to reduce the risks such as depression, low cognitive functioning, and low physical functioning associated with low quality of life among people living with HIV/AIDS in Ghana in specific, and in sub-Saharan Africa in general.

Keywords: social care intervention, HIV/AIDS, Ghana, quality of life

Procedia PDF Downloads 461
1170 On-line Control of the Natural and Anthropogenic Safety in Krasnoyarsk Region

Authors: T. Penkova, A. Korobko, V. Nicheporchuk, L. Nozhenkova, A. Metus

Abstract:

This paper presents an approach of on-line control of the state of technosphere and environment objects based on the integration of Data Warehouse, OLAP and Expert systems technologies. It looks at the structure and content of data warehouse that provides consolidation and storage of monitoring data. There is a description of OLAP-models that provide a multidimensional analysis of monitoring data and dynamic analysis of principal parameters of controlled objects. The authors suggest some criteria of emergency risk assessment using expert knowledge about danger levels. It is demonstrated now some of the proposed solutions could be adopted in territorial decision making support systems. Operational control allows authorities to detect threat, prevent natural and anthropogenic emergencies and ensure a comprehensive safety of territory.

Keywords: decision making support systems, emergency risk assessment, natural and anthropogenic safety, on-line control, territory

Procedia PDF Downloads 397
1169 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection

Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor

Abstract:

Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.

Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing

Procedia PDF Downloads 197
1168 Identifying Future Helminth Zoonotic in Indonesian Slow Loris (Nycticebus coucang)

Authors: Nafisatul Ulfa, Elok Budi Retnani, R. P. Agus Lelana

Abstract:

Emerging zoonotic parasite infection could originate in wildlife so its time very important to identify zoonotic agents in wild populations or maintained. According to the International Union Conservation of Nature (IUCN), Sumateran slow loris (Nycticebus coucang) was protected primate which have vulnerable status. Their population in wildlife decreased cause hunting for trade and destroy habitat. Helminthiasis can caused dead regularly and its so The study was conducted to know prevalence of gastrointestinal helminth infection of slow loris (Nycticebus coucang) in The Centre of Primate Rehabilitation of International Animal Rescue Indonesia (YIARI). Total of 13 fecal sampel from captive group of Nycticebus coucang were collected for 6 days and analysed from Februari-Mei 2014 by using McMaster, flotasion and Baermann technique. All fecal sampel was examined based on its fecal pool. Out of 13 fecal sampel examined, all of sampel (100%) was infected with five types of helminth Ascaris (84,61%), Hymenolepis (76,92%), Strongylid (61,54%), Oxyurid (15,38%) dan Trichuris (7,69%). The average number of egg per gram (EPG) was 11-1810.

Keywords: fecal, helminth, Nycticebus coucang, parasite, prevalence, slow loris

Procedia PDF Downloads 558
1167 Threats and Preventive Methods to Avoid Bird Strikes at the Deblin Military Airfield, Poland

Authors: J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

The paper presents results of the project conducted in Poland devoted to study on bird strikes at military airfields. The main aim of this project was to develop methods of aircraft protection against threats from birds. The studies were carried out using two methods. One by transect and the other one by selected sector scanning. During the research, it was recorded, that 104 species of birds in the number about of 36000 were observed. The most frequent ones were starling Sturnus vulgaris (31.0%), jackdaw Corvus monedula (18.3%), rook Corvus frugilegus (15.9 %), lapwing Vanellus vanellus (6.2%). Moreover, it was found, that starlings constituted the most serious threat. It resulted from their relatively high attendance at the runway (about 300 individuals). Possible repellent techniques concerning of the Deblin military airfield were discussed. The analysis of the birds’ concentration depending on the altitude, part of the day, year, part of the airfield constituted a base to work out critical flight phase and appropriate procedures to prevent bird strikes.

Keywords: airport, bird strikes, flight safety, preventive methods

Procedia PDF Downloads 394
1166 Nearly Zero-Energy Regulation and Buildings Built with Prefabricated Technology: The Case of Hungary

Authors: András Horkai, Attila Talamon, Viktória Sugár

Abstract:

There is an urgent need nowadays to reduce energy demand and the current level of greenhouse gas emission and use renewable energy sources increase in energy efficiency. On the other hand, the European Union (EU) countries are largely dependent on energy imports and are vulnerable to disruption in energy supply, which may, in turn, threaten the functioning of their current economic structure. Residential buildings represent a significant part of the energy consumption of the building stock. Only a small part of the building stock is exchanged every year, thus it is essential to increase the energy efficiency of the existing buildings. Present paper focuses on the buildings built with industrialized technology only, and their opportunities in the boundaries of nearly zero-energy regulation. Current paper shows the emergence of panel construction method, and past and present of the ‘panel’ problem in Hungary with a short outlook to Europe. The study shows as well as the possibilities for meeting the nearly zero and cost optimized requirements for residential buildings by analyzing the renovation scenarios of an existing residential typology.

Keywords: Budapest, energy consumption, industrialized technology, nearly zero-energy buildings

Procedia PDF Downloads 340
1165 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 130
1164 Culturally Responsive Teaching for Learner Diversity in Czech Schools: A Literature Review

Authors: Ntite Orji Kalu, Martina Kurowski

Abstract:

Until recently, the Czech Republic had an educational system dominated by indigenous people, who accounted for 95% of the school population. With the increasing influx of migrants and foreign students, especially from outside European Union, came a great disparity among the quality of learners and their learning needs and consideration for the challenges associated with being a minority and living within a foreign culture. This has prompted the research into ways of tailoring the educational system to meet the rising demand of learning styles and needs for the diverse learners in the Czech classrooms. Literature is reviewed regarding the various ways to accommodate the international students considering racial differences, focusing on theoretical approach and pedagogical principles. This study examines the compulsory educational system of the Czech Republic and the position and responsibility of the teacher in fostering a culturally sensitive and inclusive learning environment. Descriptive and content analysis is relied upon for this study. Recommendations are made for stakeholders to imbibe a more responsive environment that enhances the cultural and social integration of all learners.

Keywords: culturally responsive teaching, cultural competence, diversity, learners, inclusive education, Czech schools

Procedia PDF Downloads 142
1163 Current Situation of Maritime Transport and Logistics in Myanmar

Authors: S. N. S. Thein, H. L. Yang, Z. B. Liu

Abstract:

There are many modes of transport. Among them, maritime transport is a major transportation mode of international trade. In the Republic of the Union of Myanmar (Burma), water transportation served as one of the most important modes of transport for country's exports and imports. Getting the accurate information and data-gathering activity are the most important aspects for any study field. Therefore, in this research, a historical review of the development of ports in Myanmar and how they have changed had been carried out. All the relevant literature and documents have also been reviewed, studied, and organized. The sources of collected data are from reports, journals, internet, as well as from the publications of authorized organizations and international associations. To get better understanding about real situation of maritime transport and logistics in Myanmar; current condition of existing ports, expansion and on-going projects, and future port development plans are described successively. Hence, the main purpose of this study is to build up a comprehensive picture of maritime transport and logistics, in addition to border trade within ASEAN and Myanmar. It will help for academic researchers, decision makers, and stakeholders for national planning as well as for the local and foreign investors to recognize current situation of maritime transport and logistics in Myanmar.

Keywords: ASEAN, border trade, logistics, maritime transport, ports of Myanmar

Procedia PDF Downloads 216
1162 Corruption and the Entrenchment of the Rule of Law in Nigeria

Authors: Grace Titilayo, Kolawole-Amao

Abstract:

Influence and authority of law within society should be respected by all and sundry regardless of individual status. Rule of law implies that every citizen is subject to the law. In a society governed by the rule of law, government and its officials and agents are also held subject to and accountable under the law. Law should not be employed to suit individual tenets. Where the rule of law operates, the government is the government of law and not of men. Corruption is a factor that kills the growth of the rule of law. Where corruption flourishes, the rule of law fails, simply put, corruption is a threat to the rule of law. It bastardized and undermines the rule of law and good governance principles - where men rule at their discretion rather than the use of the rule of law which makes governance processes ineffective. Corruption is prevalent all over the world, and has extremely far reaching effects. Many of the world’s greatest challenges have been amplified by corruption, for example poverty, unequal distribution of wealth and resources, and world hunger and it weakens the application and the entrenchment of the rule of law. It saps citizens' trust in their governments and undercuts government credibility. This paper will discuss the rule of law in the present democratic system in Nigeria, the impact of corruption on the rule of law in Nigeria and how corruption undermines and subverts the entrenchment of the rule of law in the present day Nigeria.

Keywords: rule of law, corruption, Nigeria, influence, authority

Procedia PDF Downloads 553
1161 Uses for Closed Coal Mines: Construction of Underground Pumped Storage Hydropower Plants

Authors: Javier Menéndez, Jorge Loredo

Abstract:

Large scale energy storage systems (LSESS) such as pumped-storage hydro-power (PSH) are required in the current energy transition towards a low carbon economy by using green energies that produce low levels of greenhouse gas (GHG) emissions. Coal mines are currently being closed in the European Union and their underground facilities may be used to build PSH plants. However, the development of this projects requires the excavation of a network of tunnels and a large cavern that would be used as a powerhouse to install the Francis turbine and motor-generator. The technical feasibility to excavate the powerhouse cavern has been analyzed in the North of Spain. Three-dimensional numerical models have been conducted to analyze the stability considering shale and sandstone rock mass. Total displacements and thickness of plastic zones were examined considering different support systems. Systematic grouted rock bolts and fibre reinforced shotcrete were applied at the cavern walls and roof. The results obtained show that the construction of the powerhouse is feasible applying proper support systems.

Keywords: closed mines, mine water, numerical model, pumped-storage, renewable energies

Procedia PDF Downloads 89
1160 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding

Authors: R. S. Remya, U. S. Sethulekshmi

Abstract:

Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.

Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering

Procedia PDF Downloads 352
1159 Malaria Vulnerability Mapping from the Space: A Case Study of Damaturu Town-Nigeria

Authors: Isa Muhammad Zumo

Abstract:

Malaria is one of the worst illnesses that may affect humans. It is typically transmitted by the bite of a female Anopheles mosquito and is caused by parasitic protozoans from the Plasmodium parasite. Government and non-governmental organizations made numerous initiatives to combat the threat of malaria in communities. Nevertheless, the necessary attention was not paid to accurate and current information regarding the size and location of these favourable locations for mosquito development. Because mosquitoes can only reproduce in specific habitats with surface water, this study will locate and map those favourable sites that act as mosquito breeding grounds. Spatial and attribute data relating to favourable mosquito breeding places will be collected and analysed using Geographic Information Systems (GIS). The major findings will be in five classes, showing the vulnerable and risky areas for malaria cases. These risk categories are very high, high, moderate, low, and extremely low vulnerable areas. The maps produced by this study will be of great use to the health department in combating the malaria pandemic.

Keywords: Malaria, vulnerability, mapping, space, Damaturu

Procedia PDF Downloads 54
1158 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 142
1157 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 357
1156 Divalent Iron Oxidative Process for Degradation of Carbon and Nitrogen Based Pollutants from Dye Intermediate Industrial Wastewater

Authors: Nibedita Pani, Vishnu Tejani, T. S. Anantha Singh

Abstract:

Water pollution resulting from discharge of partial/not treated textile wastewater containing high carbon and nitrogen pollutants pose a huge threat to the environment, ecosystem, and human health. It is essential to remove carbon- and nitrogen-based organic pollutants more effectively from industrial wastewater before discharging. The present study focuses on removal of carbon-based pollutant in particular COD (chemical oxygen demand) and nitrogen-based pollutants, in particular, ammoniacal nitrogen by Fenton oxidation process using Fe²⁺ and H₂O₂ as reagents. The study was carried out with high strength wastewater containing initial COD 5632 mg/L and NH⁴⁺-N 1372 mg/L. The major operating condition like pH was varied between 1.0 to 4.0. The maximum degradation was obtained at pH 3.0 taking the molar ratio of Fe²⁺/H₂O₂ as 1:1. At this pH, the removal efficiencies of COD and ammoniacal nitrogen were found to be 77.27% and 74.9%, respectively. The Fenton process can be the best alternative for the simultaneous removal of COD and NH4+-N from industrial wastewater.

Keywords: ammoniacal nitrogen, COD, Fenton oxidation, industrial wastewater

Procedia PDF Downloads 195
1155 Repeatable Scalable Business Models: Can Innovation Drive an Entrepreneurs Un-Validated Business Model?

Authors: Paul Ojeaga

Abstract:

Can the level of innovation use drive un-validated business models across regions? To what extent does industrial sector attractiveness drive firm’s success across regions at the time of start-up? This study examines the role of innovation on start-up success in six regions of the world (namely Sub Saharan Africa, the Middle East and North Africa, Latin America, South East Asia Pacific, the European Union and the United States representing North America) using macroeconomic variables. While there have been studies using firm level data, results from such studies are not suitable for national policy decisions. The need to drive a regional innovation policy also begs for an answer, therefore providing room for this study. Results using dynamic panel estimation show that innovation counts in the early infancy stage of new business life cycle. The results are robust even after controlling for time fixed effects and the study present variance-covariance estimation robust standard errors.

Keywords: industrial economics, un-validated business models, scalable models, entrepreneurship

Procedia PDF Downloads 275
1154 The Asia-European Union (EU) Traffic Safety Benchmarking

Authors: Ghazwan Al-Haji

Abstract:

Traffic safety has become a major concern in Southeast Asia due to the increasing number of road accidents resulting in fatalities and injuries. Southeast Asia has one of the highest road traffic fatality rates in the world, in terms of both population and number of cars, nearly six times higher than the EU region. One of the reasons for this concerning trend is the increasing share of motorcycles as a form of transportation throughout Southeast Asia. The purpose of this study is to benchmark traffic safety situations and statistics in six countries in Asia and the EU, which Indonesia, Malaysia, Vietnam, Italy, Portugal and Sweden. The research will assess the priorities and causes of road accidents in the target nations. Further, the study will analyze the existing practices and promote best practices that can be implemented toward safer roads in Asian target countries. In order to achieve this goal, the study categorizes various factors contributing to traffic accidents and best practices into 4 pillars (Safer Behavior, Safer Roads, Safer Vehicles and Road Safety Management). The result of the study consists of a list of recommendations that can be applied by policymakers to promote safer roads in Asia towards 2030. The study is co-financed by the EU project ASIASAFE.

Keywords: traffic safety, ASIASAFE, Southeast Asia, EU project

Procedia PDF Downloads 61
1153 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 255
1152 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 157
1151 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria

Authors: Paul Anyaogu, E. U. M. Igbo

Abstract:

This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.

Keywords: Aba Urban, child street hawking, dangers, disposition, poverty

Procedia PDF Downloads 274
1150 Life in Bequia in the Era of Climate Change: Societal Perception of Adaptation and Vulnerability

Authors: Sherry Ann Ganase, Sandra Sookram

Abstract:

This study examines adaptation measures and factors that influence adaptation decisions in Bequia by using multiple linear regression and a structural equation model. Using survey data, the results suggest that households are knowledgeable and concerned about climate change but lack knowledge about the measures needed to adapt. The findings from the SEM suggest that a positive relationship exist between vulnerability and adaptation, vulnerability and perception, along with a negative relationship between perception and adaptation. This suggests that being aware of the terms associated with climate change and knowledge about climate change is insufficient for implementing adaptation measures; instead the risk and importance placed on climate change, vulnerability experienced with household flooding, drainage and expected threat of future sea level are the main factors that influence the adaptation decision. The results obtained in this study are beneficial to all as adaptation requires a collective effort by stakeholders.

Keywords: adaptation, Bequia, multiple linear regression, structural equation model

Procedia PDF Downloads 454
1149 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 129
1148 Applying Genetic Algorithm in Exchange Rate Models Determination

Authors: Mehdi Rostamzadeh

Abstract:

Genetic Algorithms (GAs) are an adaptive heuristic search algorithm premised on the evolutionary ideas of natural selection and genetic. In this study, we apply GAs for fundamental and technical models of exchange rate determination in exchange rate market. In this framework, we estimated absolute and relative purchasing power parity, Mundell-Fleming, sticky and flexible prices (monetary models), equilibrium exchange rate and portfolio balance model as fundamental models and Auto Regressive (AR), Moving Average (MA), Auto-Regressive with Moving Average (ARMA) and Mean Reversion (MR) as technical models for Iranian Rial against European Union’s Euro using monthly data from January 1992 to December 2014. Then, we put these models into the genetic algorithm system for measuring their optimal weight for each model. These optimal weights have been measured according to four criteria i.e. R-Squared (R2), mean square error (MSE), mean absolute percentage error (MAPE) and root mean square error (RMSE).Based on obtained Results, it seems that for explaining of Iranian Rial against EU Euro exchange rate behavior, fundamental models are better than technical models.

Keywords: exchange rate, genetic algorithm, fundamental models, technical models

Procedia PDF Downloads 267
1147 Russian, Soviet and Post-Soviet Studies on Ismailism

Authors: Dagikhudo Dagiev

Abstract:

This paper is a thorough contribution to the analysis of Russian, Soviet and post-Soviet scholarship on the study of Ismailism in Central Asia. It focuses on the lengthy development of Russian studies on Ismailism from the Russian colonial domination to the entire period of Soviet rule, down to the collapse of the Soviet Union and the last two decades of post-Soviet history. These studies, conducted along the lines of various disciplines in the span of more than one hundred years, have resulted in a large amount of scholarly contributions. This paper aims at probing the virtues and shortcoming of such scholarship. Particularly, our investigation of the specialised fields in the Russian-Soviet Studies has required laborious researches in Russian and Central Asian libraries, which have enabled us to provide a guide through this literature, assessing its ideological leanings and qualities, institutions and level of scholarship. Despite some shortcomings, due to Marxism and the authoritarian rule of the Communist Party over the socio-religious life of the people and religious communities, Soviet studies have produced many positive insights on Ismailis studies. These captured almost every aspects of the life of the Ismaili community from anthropology to archaeology, ethnography, history, philosophy, ritual practice and, most importantly, collection and preservation of Ismaiili manuscripts, which will be examined and assessed in this study.

Keywords: Central Asian Studies, Ismailism, Russian Studies, Soviet Studies

Procedia PDF Downloads 286
1146 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes

Authors: Jiri Barta

Abstract:

At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.

Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety

Procedia PDF Downloads 329
1145 Drainage Management In A Cascade Hydroponic System: Combination Of Cucumber And Melon Crops

Authors: Nikolaos Katsoulas, Ioannis Naounoulis, Sofia Faliagka

Abstract:

Cascade hydroponic systems have the potential to minimize environmental impact and improve resource efficiency by recycling the nutrient solution drained from a hydroponic (primary-donor) crop to irrigate another (secondary-receiver), less sensitive to salinity crop. However, it remains unclear if the drained solution from the primary crop can fully meet the nutritional requirements of a secondary crop and whether the productivity of the secondary crop is affected. To address this question, a prototype cascade hydroponic system was designed and tested using a cucumber crop as the donor crop and a melon as secondary crop. The performance of the system in terms of productivity and water and nutrient use efficiency was evaluated by measuring plant growth, fresh and dry matter production, nutrients content, and photosynthesis rate in the secondary crop. The amount of water and nutrients used for the primary and secondary crops was also recorded. This work was carried out under the ECONUTRI project that has received funding from the European Union’s Horizon 2020 research and innovation programme under the Horizon Europe Grant agreement: 101081858.

Keywords: hydroponics, salinity, water use efficiencu, nutrients use efficiency

Procedia PDF Downloads 65