Search results for: crisis computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2163

Search results for: crisis computing

1563 Analysis of Two-Phase Flow Instabilities in Conventional Channel of Nuclear Power Reactor

Authors: M. Abdur Rashid Sarkar, Riffat Mahmud

Abstract:

Boiling heat transfer plays a crucial role in cooling nuclear reactor for safe electricity generation. A two phase flow is susceptible to thermal-hydrodynamic instabilities, which may cause flow oscillations of constant amplitude or diverging amplitude. These oscillations may induce boiling crisis, disturb control systems, or cause mechanical damage. Based on their mechanisms, various types of instabilities can be classified for a nuclear reactor. From a practical engineering point of view one of the major design difficulties in dealing with multiphase flow is that the mass, momentum, and energy transfer rates and processes may be quite sensitive to the geometric configuration of the heat transfer surface. Moreover, the flow within each phase or component will clearly depend on that geometric configuration. The complexity of this two-way coupling presents a major challenge in the study of multiphase flows and there is much that remains to be done. Yet, the parametric effects on flow instability such as the effect of aspect ratio, pressure drop, channel length, its orientation inlet subcooling and surface roughness etc. have been analyzed. Another frequently occurring instability, known as the Kelvin–Helmholtz instability has been briefly reviewed. Various analytical techniques for predicting parametric effect on the instability are analyzed in terms of their applicability and accuracy.

Keywords: two phase flows, boiling crisis, thermal-hydrodynamic instabilities, water cooled nuclear reactors, kelvin–helmholtz instability

Procedia PDF Downloads 395
1562 Bioinformatics High Performance Computation and Big Data

Authors: Javed Mohammed

Abstract:

Right now, bio-medical infrastructure lags well behind the curve. Our healthcare system is dispersed and disjointed; medical records are a bit of a mess; and we do not yet have the capacity to store and process the crazy amounts of data coming our way from widespread whole-genome sequencing. And then there are privacy issues. Despite these infrastructure challenges, some researchers are plunging into bio medical Big Data now, in hopes of extracting new and actionable knowledge. They are doing delving into molecular-level data to discover bio markers that help classify patients based on their response to existing treatments; and pushing their results out to physicians in novel and creative ways. Computer scientists and bio medical researchers are able to transform data into models and simulations that will enable scientists for the first time to gain a profound under-standing of the deepest biological functions. Solving biological problems may require High-Performance Computing HPC due either to the massive parallel computation required to solve a particular problem or to algorithmic complexity that may range from difficult to intractable. Many problems involve seemingly well-behaved polynomial time algorithms (such as all-to-all comparisons) but have massive computational requirements due to the large data sets that must be analyzed. High-throughput techniques for DNA sequencing and analysis of gene expression have led to exponential growth in the amount of publicly available genomic data. With the increased availability of genomic data traditional database approaches are no longer sufficient for rapidly performing life science queries involving the fusion of data types. Computing systems are now so powerful it is possible for researchers to consider modeling the folding of a protein or even the simulation of an entire human body. This research paper emphasizes the computational biology's growing need for high-performance computing and Big Data. It illustrates this article’s indispensability in meeting the scientific and engineering challenges of the twenty-first century, and how Protein Folding (the structure and function of proteins) and Phylogeny Reconstruction (evolutionary history of a group of genes) can use HPC that provides sufficient capability for evaluating or solving more limited but meaningful instances. This article also indicates solutions to optimization problems, and benefits Big Data and Computational Biology. The article illustrates the Current State-of-the-Art and Future-Generation Biology of HPC Computing with Big Data.

Keywords: high performance, big data, parallel computation, molecular data, computational biology

Procedia PDF Downloads 360
1561 Children Beliefs about Illness, Treatments and Vaccines after the Experience of Covid 19 Pandemic

Authors: Margarida Maria Cabugueira Csutódio dos Santos, Joana Filipa Pintéus Pereira

Abstract:

The way children understand the concept of health and illness influences their reaction in contexts where these concepts are present (e.g.,illness; vaccination). The recognition of the importance of children's beliefs/representations about health and disease has led to the development of models that seek to explain the development process of these concepts. In the construction of their representations, children are influenced not only by their cognitive competence but also by their life experiences. In the last 3 years, children have experienced a pandemic health crisis that has exposed them to anomalous and stressful situations. Objective: the aim of this study was (1) to identify children’s representations about disease (including symptoms, causes, control/treatment) and prevention (including health procedures and vaccines) and (2) whether COVID19 is mentioned and influences their representations. Methodology: a qualitative study in which 67 children with 7 to 10 years old (mean 8,8) participated. A semi-structured interview was used following the Bibace and Walsh model, focusing on the representation of the disease and its prevention. Results show a marked influence of the lived experience with regard to causes of the disease, disease control and treatment, and adherence to vaccination. Age-dependent differences were found with older children being able to talk about illness and contamination process and younger displaying more basic, concrete and rigid representations. Conclusions: The results of this study bring clues to the adequacy of communication with the child in the context of health and illness and discriminately in a future health pandemic crisis.

Keywords: childen, health beliefs, pediatrics, covid19, vaccines

Procedia PDF Downloads 84
1560 Pod and Wavelets Application for Aerodynamic Design Optimization

Authors: Bonchan Koo, Junhee Han, Dohyung Lee

Abstract:

The research attempts to evaluate the accuracy and efficiency of a design optimization procedure which combines wavelets-based solution algorithm and proper orthogonal decomposition (POD) database management technique. Aerodynamic design procedure calls for high fidelity computational fluid dynamic (CFD) simulations and the consideration of large number of flow conditions and design constraints. Even with significant computing power advancement, current level of integrated design process requires substantial computing time and resources. POD reduces the degree of freedom of full system through conducting singular value decomposition for various field simulations. For additional efficiency improvement of the procedure, adaptive wavelet technique is also being employed during POD training period. The proposed design procedure was applied to the optimization of wing aerodynamic performance. Throughout the research, it was confirmed that the POD/wavelets design procedure could significantly reduce the total design turnaround time and is also able to capture all detailed complex flow features as in full order analysis.

Keywords: POD (Proper Orthogonal Decomposition), wavelets, CFD, design optimization, ROM (Reduced Order Model)

Procedia PDF Downloads 462
1559 The Potential of Hybrid Microgrids for Mitigating Power Outage in Lebanon

Authors: R. Chedid, R. Ghajar

Abstract:

Lebanon electricity crisis continues to escalate. Rationing hours still apply across the country but with different rates. The capital Beirut is subjected to 3 hours cut while other cities, town and villages may endure 9 to 14 hours of power shortage. To mitigate this situation, private diesel generators distributed illegally all over the country are being used to bridge the gap in power supply. Almost each building in large cities has its own generator and individual villages may have more than one generator supplying their loads. These generators together with their private networks form incomplete and ill-designed and managed microgrids (MG) but can be further developed to become renewable energy-based MG operating in island- or grid-connected modes. This paper will analyze the potential of introducing MG to help resolve the energy crisis in Lebanon. It will investigate the usefulness of developing MG under the prevailing situation of existing private power supply service providers and in light of the developed national energy policy that supports renewable energy development. A case study on a distribution feeder in a rural area will be analyzed using HOMER software to demonstrate the usefulness of introducing photovoltaic (PV) arrays along the existing diesel generators for all the stakeholders; namely, the developers, the customers, the utility and the community at large. Policy recommendations regarding MG development in Lebanon will be presented on the basis of the accumulated experience in private generation and the privatization and public-private partnership laws.

Keywords: decentralized systems, distributed generation, microgrids, renewable energy

Procedia PDF Downloads 130
1558 R Data Science for Technology Management

Authors: Sunghae Jun

Abstract:

Technology management (TM) is important issue in a company improving the competitiveness. Among many activities of TM, technology analysis (TA) is important factor, because most decisions for management of technology are decided by the results of TA. TA is to analyze the developed results of target technology using statistics or Delphi. TA based on Delphi is depended on the experts’ domain knowledge, in comparison, TA by statistics and machine learning algorithms use objective data such as patent or paper instead of the experts’ knowledge. Many quantitative TA methods based on statistics and machine learning have been studied, and these have been used for technology forecasting, technological innovation, and management of technology. They applied diverse computing tools and many analytical methods case by case. It is not easy to select the suitable software and statistical method for given TA work. So, in this paper, we propose a methodology for quantitative TA using statistical computing software called R and data science to construct a general framework of TA. From the result of case study, we also show how our methodology is applied to real field. This research contributes to R&D planning and technology valuation in TM areas.

Keywords: technology management, R system, R data science, statistics, machine learning

Procedia PDF Downloads 451
1557 Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud

Authors: Maha Shamseddine, Amjad Nusayr, Wassim Itani

Abstract:

In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform.

Keywords: privacy enforcement, platform-as-a-service privacy awareness, cloud computing privacy

Procedia PDF Downloads 222
1556 Objectives of the Standardization of Technical Terminology Nowadays in Albanian

Authors: Gani Pllana

Abstract:

In the conditions of the rapid development of technics and technology in recent years, the cooperation of the scientific-technical language with the standard Albanian language is continuing with a higher intensity than before. We notice a vigor of enrichment in the vocabulary of technical terminology, due to the birth and formation of new fields and subfields of technics, technology, as computing, mechatronics, telemetry, a multitude of concepts many of which, on the one hand, are marked with names of the languages they come from, mainly from English, but on the other hand, they meet their needs with the lexical mother tongue composition (by common words being raised to terms) and with the activation of other layers, such as compound word terms. Thus, for example, in the field of computing, we notice in it the inclusion of the ordinary vocabulary for reproductive reasons, like mi, dritare, flamur, adresë, skedar (Engl: mouse, window, flag, address, file), and along with them, the compound word terms, serving to differentiate relevant concepts, like, adresë e hiperlidhjes, adresë e uebit, adresë relative, adresë virtuale (Engl. address hyperlink, web address, relative address, virtual address) etc.

Keywords: common words, Albanian language, technical terminology, standardization

Procedia PDF Downloads 288
1555 Fighting the Crisis with 4.0 Competences: Higher Education Projects in the Times of Pandemic

Authors: Jadwiga Fila, Mateusz Jezowski, Pawel Poszytek

Abstract:

The outbreak of the global COVID-19 pandemic started the times of crisis full of uncertainty, especially in the field of transnational cooperation projects based on the international mobility of their participants. This is notably the case of Erasmus+ Program for higher education, which is the flagship European initiative boosting cooperation between educational institutions, businesses, and other actors, enabling students and staff mobility, as well as strategic partnerships between different parties. The aim of this abstract is to study whether competences 4.0 are able to empower Erasmus+ project leaders in sustaining their international cooperation in times of global crisis, widespread online learning, and common project disruption or cancellation. The concept of competences 4.0 emerged from the notion of the industry 4.0, and it relates to skills that are fundamental for the current labor market. For the aim of the study presented in this abstract, four main 4.0 competences were distinguished: digital, managerial, social, and cognitive competence. The hypothesis for the study stipulated that the above-mentioned highly-developed competences may act as a protective shield against the pandemic challenges in terms of projects’ sustainability and continuation. The objective of the research was to assess to what extent individual competences are useful in managing projects in times of crisis. For this purpose, the study was conducted, involving, among others, 141 Polish higher education project leaders who were running their cooperation projects during the peak of the COVID-19 pandemic (Mar-Nov 2020). The research explored the self-perception of the above-mentioned competences among Erasmus+ project leaders and the contextual data regarding the sustainability of the projects. The quantitative character of data permitted validation of scales (Cronbach’s Alfa measure), and the use of factor analysis made it possible to create a distinctive variable for each competence and its dimensions. Finally, logistic regression was used to examine the association of competences and other factors on project status. The study shows that the project leaders’ competence profile attributed the highest score to digital competence (4.36 on the 1-5 scale). Slightly lower values were obtained for cognitive competence (3.96) and managerial competence (3.82). The lowest score was accorded to one specific dimension of social competence: adaptability and ability to manage stress (1.74), which proves that the pandemic was a real challenge which had to be faced by project coordinators. For higher education projects, 10% were suspended or prolonged because of the COVID-19 pandemic, whereas 90% were undisrupted (continued or already successfully finished). The quantitative analysis showed a positive relationship between the leaders’ levels of competences and the projects status. In the case of all competences, the scores were higher for project leaders who finished projects successfully than for leaders who suspended or prolonged their projects. The research demonstrated that, in the demanding times of the COVID-19 pandemic, competences 4.0, to a certain extent, do play a significant role in the successful management of Erasmus+ projects. The implementation and sustainability of international educational projects, despite mobility and sanitary obstacles, depended, among other factors, on the level of leaders’ competences.

Keywords: Competences 4.0, COVID-19 pandemic, Erasmus+ Program, international education, project sustainability

Procedia PDF Downloads 89
1554 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 332
1553 Improving System Performance through User's Resource Access Patterns

Authors: K. C. Wong

Abstract:

This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.

Keywords: adaptation-based systems, operating systems, resource access patterns, system performance

Procedia PDF Downloads 133
1552 A Genetic Algorithm for the Load Balance of Parallel Computational Fluid Dynamics Computation with Multi-Block Structured Mesh

Authors: Chunye Gong, Ming Tie, Jie Liu, Weimin Bao, Xinbiao Gan, Shengguo Li, Bo Yang, Xuguang Chen, Tiaojie Xiao, Yang Sun

Abstract:

Large-scale CFD simulation relies on high-performance parallel computing, and the load balance is the key role which affects the parallel efficiency. This paper focuses on the load-balancing problem of parallel CFD simulation with structured mesh. A mathematical model for this load-balancing problem is presented. The genetic algorithm, fitness computing, two-level code are designed. Optimal selector, robust operator, and local optimization operator are designed. The properties of the presented genetic algorithm are discussed in-depth. The effects of optimal selector, robust operator, and local optimization operator are proved by experiments. The experimental results of different test sets, DLR-F4, and aircraft design applications show the presented load-balancing algorithm is robust, quickly converged, and is useful in real engineering problems.

Keywords: genetic algorithm, load-balancing algorithm, optimal variation, local optimization

Procedia PDF Downloads 179
1551 Role of International Organizations towards Good Governance: Recent Trends

Authors: E. Prema Shyam

Abstract:

The role of international organizations has contributed in various ways for the good governance in the world at large. Since the beginning of the 1990s international organizations, particularly those active in the areas of human rights, trade and economic etc., have embraced a 'good governance'. It is also pertinent to mention that the application of the concept of good governance to international organizations themselves and not exclusively to national or regional polities is a more recent phenomenon. Especially since the second half of the 1990s, a number of international organizations have carried out major governance reforms, assuming that their calls for governments to heed higher standards of good governance will be all the more credible provided that they develop a good governance standard for themselves. In addition to this number of organizations such as the United Nations (UN), Organisation for Economic Co-operation and Development (OECD), European Union (EU), International Committee of the Red Cross and World Trade Organization (WTO). OECD has been specifically mobilized to fight corruption. The World Bank was the first international organization to address the issue of good governance when it attributed the African development crisis to a crisis of governance in a 1989 report. International organizations are often denounced for their lack of transparency and democracy. However, in the last few years, a number of them have pushed through impressive reforms aimed at enhancing good governance standards within their own organizations, especially in the light of their long-standing secrecy. This is a remnant of the traditional conception of international organizations, which renders them merely answerable to their Members. International organizations have already gone quite some way in the areas of good management and opening up to the public. However, as far as participatory governance is concerned, lot to be done for the larger interest of society. In this paper, an attempt has been made to focus the issues on international organisations with regard to good governance.

Keywords: good governance, World Trade Organisation, international organisation, governance reforms

Procedia PDF Downloads 447
1550 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 88
1549 Emotional Impact and Moral Panic in Swedish Social Media during the COVID-19 Crisis

Authors: Sophia Yakhlef

Abstract:

In spring 2020, the spread of coronavirus disease 2019 (COVID-19) reached the epidemiological criteria to be declared a global pandemic. Global action was taken in order to stop the spread of the virus, such as, for example, restrictions regarding spending time outside of your home and, in several countries, periods of mandatory quarantine. Sweden's method of handling the pandemic has stood out among other European nations, and the tactic of relying on citizens' sense of civic solidarity, rather than enforcing legal restrictions preventing people from spending time outside, has been highly criticised in international news media. This situation has entailed a moral dilemma concerning the proper conduct of behaviour in everyday situations in Sweden, which is also reflected in public news media and social media. This media study focuses on Swedish social media debates and attitudes concerning moral dilemmas of handling this sense of civic solidarity. Comments on social media forums expressing outrage and anger regarding, amongst others, the actions of public media figures (such as celebrities, journalists, and bloggers) are analyzed. Drawing on a social psychological perspective on emotions, the study identifies ambiguities of moral disagreements and moral panics as ways of expressing that a moral norm has been violated. The findings suggest that social media is used in order to handle such ambiguities and make sense of the loosely defined norms of civic solidarity.

Keywords: COVID-19 crisis, moral disagreements, moral panic, social media, social norms, social psychology, Sweden

Procedia PDF Downloads 123
1548 Power-Sharing Politics: A Panacea to Conflict Resolution and Stability in Africa

Authors: Emmanuel Dangana Monday

Abstract:

Africa as a continent has been ravaged and bedeviled by series of political conflicts associated with politics and power-sharing maneuvering. As a result it has become the most unstable continent in the world in terms of power distribution and stable political culture. This paper examines the efficacy of conscious and deliberate power-sharing strategies to settle or resolve political conflicts in Africa in the arrangements of creation of states, revenue and resources allocation, and office distribution systems. The study is concerned with the spatial impact of conflicts generated in some renowned African countries in which power-sharing would have been a solution. Ethno-regional elite groups are identified as the major actors in the struggles for the distribution of territorial, economic and political powers in Africa. The struggle for power has become so intense that it has degenerated to conflicts and wars of inter and intra-political classes and parties respectively. Secondary data and deductive techniques were used in data collection and analysis. It is discovered that power-sharing has become an indispensable tool to curb the incessant political and power crisis in Africa. It is one of the finest tolerable modality of mediating elite’ competition, since it reflects the interests of both the dominant and the perceived marginalized groups. The study recommends that countries and regions of political, ethnic and religious differences in Africa should employed power-sharing strategy in order to avoid unnecessary political tension and resultant crisis. Interest groups should always come to the negotiation table to reach a realistic, durable and expected compromise to secure a peacefully resolute Africa.

Keywords: Africa, power-sharing, conflicts, politics and political stability

Procedia PDF Downloads 321
1547 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 157
1546 Solar-Powered Water Purification Using Ozone and Sand Filtration

Authors: Kayla Youhanaie, Kenneth Dott, Greg Gillis-Smith

Abstract:

Access to clean water is a global challenge that affects nearly one-third of the world’s population. A lack of safe drinking water negatively affects a person’s health, safety, and economic status. However, many regions of the world that face this clean water challenge also have high solar energy potential. To address this worldwide issue and utilize available resources, a solar-powered water purification device was developed that could be implemented in communities around the world that lack access to potable water. The device uses ozone to destroy water-borne pathogens and sand filtration to filter out particulates from the water. To select the best method for this application, a quantitative energy efficiency comparison of three water purification methods was conducted: heat, UV light, and ozone. After constructing an initial prototype, the efficacy of the device was tested using agar petri dishes to test for bacteria growth in treated water samples at various time intervals after applying the device to contaminated water. The results demonstrated that the water purification device successfully removed all bacteria and particulates from the water within three minutes, making it safe for human consumption. These results, as well as the proposed design that utilizes widely available resources in target communities, suggest that the device is a sustainable solution to address the global water crisis and could improve the quality of life for millions of people worldwide.

Keywords: clean water, solar powered water purification, ozonation, sand filtration, global water crisis

Procedia PDF Downloads 70
1545 Old and New Paradigms for Pre-Earthquake Prevention and Post-Earthquake Regeneration of Territories in Crisis in Italy

Authors: Maria Angela Bedini, Fabio Bronzini

Abstract:

Most of the Italian territory is at seismic risk. Many earthquakes have hit Italy, and devastating effects have been generated. The specific objective of the research is to distinguish the negative approaches that have generated unacceptable social situations of marginalization, abandonment, and economic regression, from positive methodological approaches. On the basis of the different situations examined, the study proposes strategies and guidelines to obtain the best possible results, in Italy or abroad, in the event of new earthquakes. At national and international level, many theoretical studies address the aspects of prevention, while the comparisons, carried out in this study, between the techniques and the operative procedures applied and the results obtained are rare. The adopted methodology compares the different pre-earthquake urban-planning approaches, for the emergency (temporary urban planning), and for the post-earthquake (socio-economic-territorial processes) in Italy. Attention is placed on the current consolidated planning and programming acquisitions, pre and post-earthquake. The main results of the study concern the prospects in Italy of protection from seismic risks in the next decades. An integrated settlement system for a new economic and social model, aimed at the rebirth of territories in crisis, is proposed. Finally, the conclusions describe the disciplinary positions, procedures and the fundamental points generally shared by the scientific community for each approach, in order to identify the strategic choices and the disciplinary and management paths that will be followed in the coming decades.

Keywords: post-earthquake, seismic emergency, seismic prevention, urban planning interventions in Italy

Procedia PDF Downloads 124
1544 Multilingualism as an Impetus to Nigerian Religious and Political Crises: the Way Forward

Authors: Kehinde, Taye Adetutu

Abstract:

The fact that Nigeria as a nation is faced by myriads of problems associated with religious crises and political insecurity is no news, the spoken statement and actions of most political giant were the major cause of this unrest. The 'unlearnt' youth within the regions has encompassed the situation. This scenario is further compounded by multilingual nature of the country as it is estimated that there exists amount 400 indigenous languages in Nigeria. It is an indisputable fact that english language which has assumed the status of an official language in Nigeria, given its status has a language of power and captivity by a few with no privilege to attend school. However, educating people in their indigenous language; crises can be averted through the proper orientation and mass literacy campaign, especially for the timid illiterate one, so as to live in unity, peace, tranquillity, and harmony as indivisible nation. In investigating the problem in this study with an emphasis on three major Nigerian language (Yoruba, Igbo and Hausa), participants observations and survey questionnaire were administered to about one hundred and twenty (120) respondents who were randomly selected throughout the three major ethnic groups in Nigeria. Findings from this study reveals that teaching and learning of cognitive words and information are more effective in ones mother tongue and helps in stimulating new ideas and changes. This paper was able to explore and critically examine the current state of affairs in Nigeria and proffer possible solutions to the prevailing situations by identifying how indigenous languages and linguistics can be used to ameliorate the present political and religious crisis for Nigeria, thus providing a proper recommendation to achieve meaningful stability and coexistence within a nation.

Keywords: multilingualism, political crisis, religious, Nigeria

Procedia PDF Downloads 436
1543 The Uruguayan Left Wing from the XX to XXI Century: International Dimensions

Authors: Anton Andreev

Abstract:

With the collapse of the Soviet Union and the collapse of a large part of the socialist regimes, left-wing parties all over the world entered the space of crisis, of problems with ideology, identity, with the definition of its goals and objectives. First of all, we can say that the communist parties actually lost their foundation. In 1992, despite the victory of left-wing forces, a Broad Front in which was the winner in the struggle against dictatorship plunged into a deep crisis, the nature of which is looking for a new platform, a new foundation, new goals. Thus, in the late 20th century, the party has revised theoretical beliefs and positions. Radical communist ideology was moderated to social reformism. Modern leftist movement in Uruguay is a movement of moderate reform. Left forces suggest going through successive changes. Changes in ideology and ideas have influenced to the understanding of foreign policy. After the collapse of the Soviet Union Broad Front has changed the direction of its diplomacy from the orientation to the Soviet state to support the USA policy. Government formed by Broad Front, supported the integration processes in the South America. Uruguay was developing the cooperation in the framework of MERCOSUR and began to create relationship with the new centers of power in world political space. Uruguay in the early 21st century is a country that starts to play important role in the international arena. Elections of 26 October 2014 should answer the question of support of internal policy of a Broad Front, as well as of the support of the diplomatic work of the "Left" governments of the country.

Keywords: Uruguay, broad front, Vazquez, international dimensions

Procedia PDF Downloads 352
1542 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 133
1541 Reconceptualising Faculty Teaching Competence: The Role of Agency during the Pandemic

Authors: Ida Fatimawati Adi Badiozaman, Augustus Raymond Segar

Abstract:

The Covid-19 pandemic transformed teaching contexts at an unprecedented level. Although studies have focused mainly on its impact on students, little is known about how emergency online teaching affects faculty members in higher education. Given that the pandemic has robbed teachers of opportunities for adequate preparation, it is vital to understand how teaching competencies were perceived in the crisis-response transition to online teaching and learning (OTL). Therefore, the study explores how academics perceive their readiness for OTL and what competencies were perceived to be central. Therefore, through a mixed-methods design, the study first explores through a survey how academics perceive their readiness for OTL and what competencies were perceived to be central. Emerging trends from the quantitative data of 330 academics (three public and three private Higher learning institutions) led to the formulation of interview guides for the subsequent qualitative phase. The authors use critical sensemaking (CSM) to analyse interviews with twenty-two teachers (n = 22) (three public; three private HEs) toward understanding the interconnected layers of influences they draw from as they make sense of their teaching competence. The sensemaking process reframed competence and readiness in that agentic competency emerged as crucial in shaping resilience and adaptability during the transition to OTL. The findings also highlight professional learningcriticalto teacher competence: course design, communication, time management, technological competence, and identity (re)construction. The findings highlight opportunities for strategic orientation to change during crisis. Implications for pedagogy and policy are discussed.

Keywords: online teaching, pedagogical competence, agentic competence, agency, technological competence

Procedia PDF Downloads 78
1540 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 401
1539 A Novel Way to Create Qudit Quantum Error Correction Codes

Authors: Arun Moorthy

Abstract:

Quantum computing promises to provide algorithmic speedups for a number of tasks; however, similar to classical computing, effective error-correcting codes are needed. Current quantum computers require costly equipment to control each particle, so having fewer particles to control is ideal. Although traditional quantum computers are built using qubits (2-level systems), qudits (more than 2-levels) are appealing since they can have an equivalent computational space using fewer particles, meaning fewer particles need to be controlled. Currently, qudit quantum error-correction codes are available for different level qudit systems; however, these codes have sometimes overly specific constraints. When building a qudit system, it is important for researchers to have access to many codes to satisfy their requirements. This project addresses two methods to increase the number of quantum error correcting codes available to researchers. The first method is generating new codes for a given set of parameters. The second method is generating new error-correction codes by using existing codes as a starting point to generate codes for another level (i.e., a 5-level system code on a 2-level system). So, this project builds a website that researchers can use to generate new error-correction codes or codes based on existing codes.

Keywords: qudit, error correction, quantum, qubit

Procedia PDF Downloads 155
1538 The Fifth Political Theory and Countering Terrorism in the Post 9/11 Era

Authors: Rana Eijaz Ahmad

Abstract:

This paper is going to explain about the Fifth Political Theory that challenges all existing three plus one (Capitalism, Marxism and Fascism + Fourth Political Theory) theories. It says, ‘it is human ambiance evolve any political system to survive instead of borrowing other imported thoughts to live in a specific environment, in which Legitimacy leads to authority and promotes humanism.’ According to this theory, no other state is allowed to dictate or install any political system upon other states. It is the born right of individuals to choose a political system or a set of values that are going to make their structures and functions efficient enough to support the system harmony and counter the negative forces successfully. In the post 9/11 era, it is observed that all existing theories like Capitalism, Marxism, Fascism and Fourth Political Theory remained unsuccessful in resolving the global crisis. The so-called war against terrorism is proved as a war for terrorism and creates a vacuum on the global stage, worsening the crisis. The fifth political theory is an answer to counter terrorism in the twenty-first century. It calls for accountability of the United Nations for its failure in sustaining peace at global level. Therefore, the UN charter is supposed to be implemented in its true letter and spirit. All independent sovereign states have right to evolve their own system to carry out a political system that suits them best for sustaining harmony at home. This is the only way to counter terrorism. This paper is comprised of mixed method. Qualitative, quantitative and comparative methods will be used along with secondary sources. The objective of this paper is to create knowledge for the benefit of human beings with a logical and rational argument. It will help political scientists and scholars in conflict management and countering terrorism on pragmatic grounds.

Keywords: capitalism, fourth political theory, fifth political theory, Marxism, fascism

Procedia PDF Downloads 374
1537 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 168
1536 Imbalance on the Croatian Housing Market in the Aftermath of an Economic Crisis

Authors: Tamara Slišković, Tomislav Sekur

Abstract:

This manuscript examines factors that affect demand and supply of the housing market in Croatia. The period from the beginning of this century, until 2008, was characterized by a strong expansion of construction, housing and real estate market in general. Demand for residential units was expanding, and this was supported by favorable lending conditions of banks. Indicators on the supply side, such as the number of newly built houses and the construction volume index were also increasing. Rapid growth of demand, along with the somewhat slower supply growth, led to the situation in which new apartments were sold before the completion of residential buildings. This resulted in a rise of housing price which was indication of a clear link between the housing prices with the supply and demand in the housing market. However, after 2008 general economic conditions in Croatia worsened and demand for housing has fallen dramatically, while supply descended at much slower pace. Given that there is a gap between supply and demand, it can be concluded that the housing market in Croatia is in imbalance. Such trend is accompanied by a relatively small decrease in housing price. The final result of such movements is the large number of unsold housing units at relatively high price levels. For this reason, it can be argued that housing prices are sticky and that, consequently, the price level in the aftermath of a crisis does not correspond to the discrepancy between supply and demand on the Croatian housing market. The degree of rigidity of the housing price can be determined by inclusion of the housing price as the explanatory variable in the housing demand function. Other independent variables are demographic variable (e.g. the number of households), the interest rate on housing loans, households' disposable income and rent. The equilibrium price is reached when the demand for housing equals its supply, and the speed of adjustment of actual prices to equilibrium prices reveals the extent to which the prices are rigid. The latter requires inclusion of the housing prices with time lag as an independent variable in estimating demand function. We also observe the supply side of the housing market, in order to explain to what extent housing prices explain the movement of new construction activity, and other variables that describe the supply. In this context, we test whether new construction on the Croatian market is dependent on current prices or prices with a time lag. Number of dwellings is used to approximate new construction (flow variable), while the housing prices (current or lagged), quantity of dwellings in the previous period (stock variable) and a series of costs related to new construction are independent variables. We conclude that the key reason for the imbalance in the Croatian housing market should be sought in the relative relationship of price elasticities of supply and demand.

Keywords: Croatian housing market, economic crisis, housing prices, supply imbalance, demand imbalance

Procedia PDF Downloads 267
1535 Ifrs Adoption, Enforcement, and the Value Relevant of Accounting Amounts: The Particular Case of South Africa

Authors: Edward Chamisa, Colin C. Smith, Hamutyinei H. Pamburai, Abdul C. Abdulla

Abstract:

South Africa (SA) adopted International Financial Reporting Standards (IFRS) for listed firms effective 1 January 2005. However, it was not until 2011 that substantial financial reporting enforcement changes were introduced, which were meant to ensure compliance with IFRS. This innovative setting allows us to examine the value relevance of accounting amounts during the (1) pre-IFRS adoption period (2002-2004); (2) post-IFRS adoption, but pre-enforcement changes period (2006-2010); and (3) post-enforcement changes period (2011-2012). The results show that accounting amounts were most value relevant in the post-enforcement changes period (R2, 75.5%) compared to both the pre-IFRS adoption period (adjusted R2 is 24.3%) and the period after IFRS adoption but before enforcement changes (adjusted R2 is 37.5%). Also, during the 2008 financial crisis, the equity book value per share was significantly value relevant (at 1%) but not earnings per share, whereas before the crisis, the opposite was true. We make two important contributions to the literature. First, we identify SA as an innovative setting that allows researchers to examine separately the effects of IFRS adoption and enforcement changes on capital markets and accounting quality. This is a departure from prior studies that are dominated by the European Union setting, where IFRS adoption occurred contemporaneously with enforcement and other regulatory changes. Second, we provide preliminary findings which suggest that while the adoption of IFRS seems to have improved the financial reporting quality of accounting amounts of SA listed firms, its impact appears to be limited unless combined with effective enforcement.

Keywords: international financial reporting standards (ifrs), ifrs adoption, financial reporting enforcement, value relevance, price model, equity book value, earnings per share

Procedia PDF Downloads 68
1534 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 154