Search results for: crisis communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1707

Search results for: crisis communications

1077 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.

Keywords: displaced people, human security, irregular migration, refugees

Procedia PDF Downloads 296
1076 Hybrid Approach for the Min-Interference Frequency Assignment

Authors: F. Debbat, F. T. Bendimerad

Abstract:

The efficient frequency assignment for radio communications becomes more and more crucial when developing new information technologies and their applications. It is consists in defining an assignment of frequencies to radio links, to be established between base stations and mobile transmitters. Separation of the frequencies assigned is necessary to avoid interference. However, unnecessary separation causes an excess requirement for spectrum, the cost of which may be very high. This problem is NP-hard problem which cannot be solved by conventional optimization algorithms. It is therefore necessary to use metaheuristic methods to solve it. This paper proposes Hybrid approach based on simulated annealing (SA) and Tabu Search (TS) methods to solve this problem. Computational results, obtained on a number of standard problem instances, testify the effectiveness of the proposed approach.

Keywords: cellular mobile communication, frequency assignment problem, optimization, tabu search, simulated annealing

Procedia PDF Downloads 366
1075 Illicit Return Practices of Irregular Migrants from Greece to Turkey

Authors: Enkelejda Koka, Denard Veshi

Abstract:

Since 2011, in the name of ‘humanitarianism’ and deaths in the Mediterranean Sea, the legal and political justification delivered by Greece to manage the refugee crisis is pre-emptive interception. Although part of the EU, Greece adopted its own strategy. These practices have also created high risks for migrants generally resulting in non-rescue episodes and push-back practices having lethal consequences to the life of the irregular migrant. Thus, this article provides an analysis of the Greek ‘compassionate border work’ policy, a practice known as push-back. It is argued that these push-back practices violate international obligations, notably the ‘right to life’, the ‘duty to search and rescue’, the prohibition of inhuman or degrading treatment or punishment and the principle of non-refoulement.

Keywords: Greece, migrants, push-back policy, violation of international law

Procedia PDF Downloads 124
1074 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 288
1073 International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability

Authors: Anthony Vandarakis

Abstract:

Today’s International Service Learning practices require an update: modern technologies, fresh educational frameworks, and a new operating system to accountably prosper. This paper describes a model of International Service Learning (ISL), which combines current technological hardware, electronic platforms, and asynchronous communications that are grounded in inclusive pedagogy. This model builds on the work around collaborative field trip learning, extending the reach to international partnerships across continents. Mobile technology, 21st century skills and summit-basecamp modeling intersect to support novel forms of learning that tread lightly on fragile natural ecosystems, affirm local reciprocal partnership in projects, and protect traveling participants from common yet avoidable cultural pitfalls.

Keywords: International Service Learning, ISL, field experiences, mobile technology, out there in here, summit basecamp pedagogy

Procedia PDF Downloads 162
1072 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory

Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni

Abstract:

Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.

Keywords: volatile memory, REGEX, digital forensics, memory acquisition

Procedia PDF Downloads 172
1071 Directors’ Compensation: Analyzing the Multilevel Factors That Exert the Greatest Influence

Authors: Isabel Acero, Nuria Alcalde

Abstract:

The economic crisis and notorious corporate scandals have caused social indignation and sparked the debate concerning the underlying rationality of the compensation that directors receive. In this context, this study examines the determinants of the remuneration of directors in listed Spanish companies using individualized data. A multilevel methodology appropriate for this type of data has been used that allows us to differentiate between inter-company variations and intra-company variations. The results show that company size is the variable (at the company level) that exerts the greatest influence on the level of director´s compensation. One surprising finding is that the presence of independent directors on the board has a positive influence on remuneration. At the individual level, tenure and experience have a significant influence on the level of compensation, while the director´s level of education does not appear to have an effect on it.

Keywords: board of directors, compensation, experience, multilevel, tenure

Procedia PDF Downloads 319
1070 Stating Best Commercialization Method: An Unanswered Question from Scholars and Practitioners

Authors: Saheed A. Gbadegeshin

Abstract:

Commercialization method is a means to make inventions available at the market for final consumption. It is described as an important tool for keeping business enterprises sustainable and improving national economic growth. Thus, there are several scholarly publications on it, either presenting or testing different methods for commercialization. However, young entrepreneurs, technologists and scientists would like to know the best method to commercialize their innovations. Then, this question arises: What is the best commercialization method? To answer the question, a systematic literature review was conducted, and practitioners were interviewed. The literary results revealed that there are many methods but new methods are needed to improve commercialization especially during these times of economic crisis and political uncertainty. Similarly, the empirical results showed there are several methods, but the best method is the one that reduces costs, reduces the risks associated with uncertainty, and improves customer participation and acceptability. Therefore, it was concluded that new commercialization method is essential for today's high technologies and a method was presented.

Keywords: commercialization method, technology, knowledge, intellectual property, innovation, invention

Procedia PDF Downloads 324
1069 The Study of Digital Transformation Skills and Competencies Framework at Umm Alqura University

Authors: Anod H. Alhazmi, Hanaa A. Yamani

Abstract:

The lack of digital transformation professionals could prevent Saudi Arabia’s universities from providing digital services. The task of understanding what digital skills are needed within an organization, measuring the existing skills, and developing or attracting talents is a complex task. This paper provides a comprehensive analysis of the digital transformation skills needed in the organizations who seek digital transformation and identifies the skills and competencies framework DigSC built on Skills Framework for the Informational Age (SFIA) framework that is adopted by the Ministry of Communications and Information Technology (MCIT) in Saudi Arabia. The framework adopted identifies the main digital transformation skills clusters, categories and levels of responsibilities for each job description to fill the gap between this requirement and the digital skills supplied by the Umm Alqura University (UQU).

Keywords: competencies, digital transformation, framework, skills, Umm Alqura university

Procedia PDF Downloads 170
1068 A Qualitative Approach to Engineering Design Issues, Problems, and Solutions

Authors: M. U. Arshid, M. A. Kamal

Abstract:

The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.

Keywords: engineering design, engineering design issues, innovation, public sector projects

Procedia PDF Downloads 326
1067 An Adaptive Cooperative Scheme for Reliability of Transmission Using STBC and CDD in Wireless Communications

Authors: Hyun-Jun Shin, Jae-Jeong Kim, Hyoung-Kyu Song

Abstract:

In broadcasting and cellular system, a cooperative scheme is proposed for the improvement of performance of bit error rate. Up to date, the coverage of broadcasting system coexists with the coverage of cellular system. Therefore each user in a cellular coverage is frequently involved in a broadcasting coverage. The proposed cooperative scheme is derived from the shared areas. The users receive signals from both broadcasting base station and cellular base station. The proposed scheme selects a cellular base station of a worse channel to achieve better performance of bit error rate in cooperation. The performance of the proposed scheme is evaluated in fading channel.

Keywords: cooperative communication, diversity, STBC, CDD, channel condition, broadcasting system, cellular system

Procedia PDF Downloads 490
1066 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 720
1065 Socio-Demographic, Cause, and Benefit of Internal and International Migration: A Case Study of Mazar-i-Sharif, Balkh Province, Afghanistan

Authors: Baqir Khawari

Abstract:

Migration has a long history in Afghanistan even before, but it has been exacerbated in the last decade. Using actual household data of 1060 in Mazar-i-Sharif, the capital of Balkh province, obtained from a strictly random process, the study examined to evaluate the main causes and benefits of the migration. It is found that the main reasons for internal migration are unemployment and income inequality, in addition to war and poverty as international parameters for migration. Furthermore, the study demonstrated that households receive benefits from their migrants through remittances to increase their income and smooth consumption. Thus, the study suggests that to manage migration in Afghanistan, the government and international organizations should work together for peace and reduction of poverty in Afghanistan otherwise, the crisis of migration will continue in the future as well.

Keywords: migration, remittances, socio-demographic, household, Afghanistan

Procedia PDF Downloads 56
1064 Indo-US Strategic Collaboration in Space Capabilities and its Effect on the Stability of South Asian Region

Authors: Shahab Khan, Damiya Saghir

Abstract:

With the advent of space technology, a new era began where space, considered the new ‘High ground,’ is used for a variety of commercial (communications, weather and navigational information, Earth resources monitoring and imagery) and military applications (surveillance, tracking, reconnaissance and espionage of adversaries). With the ever-evolving geo-political environment, where now the US foreseeing India as a counterbalance to China’s economic and military rise, significant growth in strategic collaboration between US and India has been witnessed, particularly in the space domain. This is creating a strategic imbalance in South Asia with implications for all regional countries. This research explores the present and future of Indo-US strategic collaboration in the space domain with envisaged effects and challenges for countries in the South Asian region.

Keywords: space, satellites, Indo-US strategic agreements in space domain, balance of power in South Asian region

Procedia PDF Downloads 104
1063 Problems of the Management of Legal Entities of Private Law in Georgia

Authors: Ketevan Kokrashvili, Rusudan Kutateladze, Nino Pailodze

Abstract:

Importance of management of legal entities under private law of which especially corporate management, as well as looking for ways of its improvement and perfection has become especially relevant in the twenty-first century, which was greatly contributed to by the global economic crisis. Some states have adopted Corporate Governance Codes; the European Union has set to work on a series of directives the main purpose of which is an improvement of corporate governance, provision of greater transparency and implementation of an effective control mechanism. This process is not yet completed, and various problematic issues associated with management of legal persons are still being debated among practitioner experts and scholars. Georgia is not an exception in this regard. The article discusses the legislative gaps, and in some cases, discrepancies having arisen in legal relationships under private law and having caused many practical problems. This especially applies to the management of capital companies.

Keywords: business entities, corporate management, capital public management, existing problems, legal discrepancies

Procedia PDF Downloads 266
1062 Modelling Export Dynamics in the CSEE Countries Using GVAR Model

Authors: S. Jakšić, B. Žmuk

Abstract:

The paper investigates the key factors of export dynamics for a set of Central and Southeast European (CSEE) countries in the context of current economic and financial crisis. In order to model the export dynamics a Global Vector Auto Regressive (GVAR) model is defined. As opposed to models which model each country separately, the GVAR combines all country models in a global model which enables obtaining important information on spill-over effects in the context of globalization and rising international linkages. The results of the study indicate that for most of the CSEE countries, exports are mainly driven by domestic shocks, both in the short run and in the long run. This study is the first application of the GVAR model to studying the export dynamics in the CSEE countries and therefore the results of the study present an important empirical contribution.

Keywords: export, GFEVD, global VAR, international trade, weak exogeneity

Procedia PDF Downloads 284
1061 Extracting Spatial Information Using Stereo Imageries for Mapping Slum Areas in Karachi, Pakistan

Authors: Mohammed Raza Mehdi, Kamran Ahmed

Abstract:

Mega-city Karachi has numerous unplanned slum areas and squatter settlements with irregular growth of building structures. Due to weak development policy and lack of development control, such settlements are increasing at a rapid pace. Mapping such areas for planning and infrastructure development requires an integrated approach of socio-spatial and technological tools. Therefore in this study, an attempt is made to create GIS information layers on complex inbound built-up areas of slums at the coastal belt of Karachi by using a stereo pair of satellite images. The outcome expected is technological application to aid planning institutions for crisis management and infrastructure development in irregularly developed slum areas of Karachi, Pakistan.

Keywords: slum, satellite imageries, GIS, Karachi, Pakistan

Procedia PDF Downloads 126
1060 Outputs from the Implementation of 'PHILOS' Programme: Emergency Health Response to Refugee Crisis, Greece, 2017

Authors: K. Mellou, G. Anastopoulos, T. Zakinthinos, C. Botsi, A. Terzidis

Abstract:

‘PHILOS – Emergency health response to refugee crisis’ is a programme of the Greek Ministry of Health, implemented by the Hellenic Center for Disease Control and Prevention (HCDCP). The programme is funded by the Asylum, Migration and Integration Fund (AMIF) of EU’s DG Migration and Home Affairs. With the EU Member States accepting, the last period, accelerating migration flows, Greece inevitably occupies a prominent position in the migratory map due to this geographical location. The main objectives of the programme are a) reinforcement of the capacity of the public health system and enhancement of the epidemiological surveillance in order to cover refugees/migrant population, b) provision of on-site primary health care and psychological support services, and c) strengthening of national health care system task-force. The basic methods for achieving the aforementioned goals are: a) implementation of syndromic surveillance system at camps and enhancement of public health response with the use of mobile medical units (Sub-action A), b) enhancement of health care services inside the camps via increasing human resources and implementing standard operating procedures (Sub-action B), and c) reinforcement of the national health care system (primary healthcare units, hospitals, and emergency care spots) of affected regions with personnel (Sub-action C). As a result, 58 health professionals were recruited under sub-action 2 and 10 mobile unit teams (one or two at each health region) were formed. The main actions taken so far by the mobile units are the evaluation, of syndromic surveillance, of living conditions at camps and medical services. Also, vaccination coverage of children population was assessed, and more than 600 catch-up vaccinations were performed by the end of June 2017. Mobile units supported transportation of refugees/migrants from camps to medical services reducing the load of the National Center for Emergency Care (more than 350 transportations performed). The total number of health professionals (MD, nurses, etc.) placed at camps was 104. Common practices were implemented in the recording and collection of psychological and medical history forms at the camps. Protocols regarding maternity care, gender based violence and handling of violent incidents were produced and distributed at personnel working at camps. Finally, 290 health care professionals were placed at primary healthcare units, public hospitals and the National Center for Emergency Care at affected regions. The program has, also, supported training activities inside the camps and resulted to better coordination of offered services on site.

Keywords: migrants, refugees, public health, syndromic surveillance, national health care system, primary care, emergency health response

Procedia PDF Downloads 187
1059 Early Warning Signals: Role and Status of Risk Management in Small and Medium Enterprises

Authors: Alexander Kelíšek, Denisa Janasová, Veronika Mitašová

Abstract:

Weak signals using is often associated with early warning. It is possible to find a link between early warning, respectively early problems detection and risk management. The idea of early warning is very important in the context of crisis management because of the risk prevention possibility. Weak signals are likened to risk symptoms. Nowadays, their usefulness as a tool of proactive problems solving is emphasized. Based on it, it is possible to use weak signals not only in strategic planning, project management, or early warning system, but also as a subsidiary element in risk management. The main question is how to effectively integrate weak signals into risk management. The main aim of the paper is to point out the possibilities of weak signals using in small and medium enterprises risk management.

Keywords: early warning system, weak signals, risk management, small and medium enterprises (SMEs)

Procedia PDF Downloads 413
1058 Reasons and Implications of the Use of Social Media by Kuwaiti Women

Authors: Bashayer Alsana

Abstract:

Communication technologies are changing the way we experience life. More specifically, such technologies have changed the interaction system through which women express themselves. Interaction with the other gender, accessibility to useful content, and creative public expression are but a few facets of the new living experience now being offered to women through the use of technology, especially in areas where females are bounded by societal taboos and traditions. An evaluation of the new female experience of expressing themselves through technology is yet to be done. This study aims to fill the void of research conducted around that topic. The study explores women’s use of communication technologies in Kuwait in terms of reasons and effects. women’s responses to survey questions present an overview of the new and changing female experience in this traditional middle eastern country, and draws a framework through which implications and suggestions for future research are discussed to better serve the advancement of women in developing countries.

Keywords: communications, kuwait, social media, women

Procedia PDF Downloads 277
1057 Cost-Effective Hybrid Cloud Framework for HEI’s

Authors: Shah Muhammad Butt, Ahmed Masaud Ansari

Abstract:

Present Financial crisis in Higher Educational Institutes (HEIs) facing lots of problems considerable budget cuts, make difficult to meet the ever growing IT-based research and learning needs, institutions are rapidly planning and promoting cloud-based approaches for their academic and research needs. A cost effective Hybrid Cloud framework for HEI’s will provide educational services for campus or intercampus communication. Hybrid Cloud Framework comprises Private and Public Cloud approaches. This paper will propose the framework based on the Open Source Cloud (OpenNebula for Virtualization, Eucalyptus for Infrastructure, and Aneka for programming development environment) combined with CSP’s services which are delivered to the end-user via the Internet from public clouds.

Keywords: educational services, hybrid campus cloud, open source, electrical and systems sciences

Procedia PDF Downloads 440
1056 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 301
1055 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 558
1054 Women Entrepreneurial Resiliency Amidst COVID-19

Authors: Divya Juneja, Sukhjeet Kaur Matharu

Abstract:

Purpose: The paper is aimed at identifying the challenging factors experienced by the women entrepreneurs in India in operating their enterprises amidst the challenges posed by the COVID-19 pandemic. Methodology: The sample for the study comprised 396 women entrepreneurs from different regions of India. A purposive sampling technique was adopted for data collection. Data was collected through a self-administered questionnaire. Analysis was performed using the SPSS package for quantitative data analysis. Findings: The results of the study state that entrepreneurial characteristics, resourcefulness, networking, adaptability, and continuity have a positive influence on the resiliency of women entrepreneurs when faced with a crisis situation. Practical Implications: The findings of the study have some important implications for women entrepreneurs, organizations, government, and other institutions extending support to entrepreneurs.

Keywords: women entrepreneurs, analysis, data analysis, positive influence, resiliency

Procedia PDF Downloads 100
1053 Chaotic Control, Masking and Secure Communication Approach of Supply Chain Attractor

Authors: Unal Atakan Kahraman, Yilmaz Uyaroğlu

Abstract:

The chaotic signals generated by chaotic systems have some properties such as randomness, complexity and sensitive dependence on initial conditions, which make them particularly suitable for secure communications. Since the 1990s, the problem of secure communication, based on chaos synchronization, has been thoroughly investigated and many methods, for instance, robust and adaptive control approaches, have been proposed to realize the chaos synchronization. In this paper, an improved secure communication model is proposed based on control of supply chain management system. Control and masking communication simulation results are used to visualize the effectiveness of chaotic supply chain system also performed on the application of secure communication to the chaotic system. So, we discover the secure phenomenon of chaos-amplification in supply chain system

Keywords: chaotic analyze, control, secure communication, supply chain attractor

Procedia PDF Downloads 498
1052 Causality between the Construction Industry and the GDP in the United Arab Emirates

Authors: Hasan S. Mahmoud, Salwa M. Beheiry, Vian Ahmed

Abstract:

In light of the repercussions of the 2008 global economic crisis, the response of the United Arab Emirates economy and growth, and the vast construction activities that are undergoing, there is a need to investigate the relationship between construction activities and the Gross Domestic Product (GDP). This study aims to investigate the causality relationship between the construction industry in the United Arab Emirates and the GDP of the country in the last decade. For that, this study will investigate the relationship between the growth of the GDP and the growth of construction activities and their value addition to the economy. To ascertain this relationship, Granger Causality method is used to identify the causality between the time-dependent series.

Keywords: construction value addition, Granger causality, growth of gross domestic product, United Arab Emirates

Procedia PDF Downloads 130
1051 Agent-Base Modeling of IoT Applications by Using Software Product Line

Authors: Asad Abbas, Muhammad Fezan Afzal, Muhammad Latif Anjum, Muhammad Azmat

Abstract:

The Internet of Things (IoT) is used to link up real objects that use the internet to interact. IoT applications allow handling and operating the equipment in accordance with environmental needs, such as transportation and healthcare. IoT devices are linked together via a number of agents that act as a middleman for communications. The operation of a heat sensor differs indoors and outside because agent applications work with environmental variables. In this article, we suggest using Software Product Line (SPL) to model IoT agents and applications' features on an XML-based basis. The contextual diversity within the same domain of application can be handled, and the reusability of features is increased by XML-based feature modelling. For the purpose of managing contextual variability, we have embraced XML for modelling IoT applications, agents, and internet-connected devices.

Keywords: IoT agents, IoT applications, software product line, feature model, XML

Procedia PDF Downloads 77
1050 Community Communications and Micro-Level Shifts: The Case of Video Volunteers’ IndiaUnheard Program

Authors: Pooja Ichplani, Archna Kumar, Jessica Mayberry

Abstract:

Community Video (CV) is a participatory medium that has immense potential to strengthen community communications and amplify the voice of people for their empowerment. By building capacities especially of marginalized community groups and providing a platform to freely voice their ideas, CV endeavours to bring about shifts towards more participatory, bottom up development processes and greater power in the hands of the people, especially the disadvantaged. In various parts of the world, among marginalized community groups, community video initiatives have become instrumental in facilitating micro-level, yet significant changes in communities. Video Volunteers (VV) is an organization that promotes community media and works towards providing disadvantaged communities with journalistic, critical thinking and creative skills they need for catalysing change in their communities. Working since 2002, VV has evolved a unique community media model fostering locally-owned and managed media production, as well as building people’s capacities to articulate and share their perspectives on the issues that matter to them – on a local and a global scale. Further, by integrating a livelihood aspect within its model, VV has actively involved people from poor marginalized communities and provided them a new tool for serving their communities whilst keeping their identities intact. This paper, based on a qualitative research, seeks to map the range of VV impacts in communities and provide an in-depth analysis of factors contributing to VV impacting change in communities. Study tools included content analysis of a longitudinal sample of impact videos produced, narratives of community correspondents using the Most Significant Change Technique (MSCT) and interviews with key informants. Using a multi-fold analysis, the paper seeks to gain holistic insights. At the first level, the paper profiles the Community Correspondents (CCs), spearheading change, and maps their personal and social context and their perceptions about VV in their personal lives. Secondly, at an organizational level, the paper maps the significance of impacts brought about in the CCs communities and their association, challenges and achievements while working with VV. Lastly, at the community level, it consists of analysis of the nature of impacts achieved and aspects influencing the same. Finally, the study critiques the functioning of Video Volunteers as a community media initiative using the tipping point theory emphasizing on the power of context that is constituted by their socio-cultural environment. It concludes how empowerment of its Community Correspondents, multifarious activities during pre and post video production, and other innovative mechanisms have enabled in center staging issues of marginalized communities and snowballing processes of change in communities.

Keywords: community media, empowerment, participatory communication, social change

Procedia PDF Downloads 122
1049 Experimental Investigation of On-Body Channel Modelling at 2.45 GHz

Authors: Hasliza A. Rahim, Fareq Malek, Nur A. M. Affendi, Azuwa Ali, Norshafinash Saudin, Latifah Mohamed

Abstract:

This paper presents the experimental investigation of on-body channel fading at 2.45 GHz considering two effects of the user body movement; stationary and mobile. A pair of body-worn antennas was utilized in this measurement campaign. A statistical analysis was performed by comparing the measured on-body path loss to five well-known distributions; lognormal, normal, Nakagami, Weibull and Rayleigh. The results showed that the average path loss of moving arm varied higher than the path loss in sitting position for upper-arm-to-left-chest link, up to 3.5 dB. The analysis also concluded that the Nakagami distribution provided the best fit for most of on-body static link path loss in standing still and sitting position, while the arm movement can be best described by log-normal distribution.

Keywords: on-body channel communications, fading characteristics, statistical model, body movement

Procedia PDF Downloads 337
1048 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense

Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali

Abstract:

This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.

Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ

Procedia PDF Downloads 58