Search results for: critical security studies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17717

Search results for: critical security studies

16997 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 519
16996 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 321
16995 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 314
16994 Social Imagination and History Teaching: Critical Thinking's Possibilities in the Australian Curriculum

Authors: Howard Prosser

Abstract:

This paper examines how critical thinking is framed, especially for primary-school students, in the recently established Australian Curriculum: History. Critical thinking is one of the curriculum’s 'general capabilities.' History provides numerous opportunities for critical thinking’s application in everyday life. The so-called 'history wars' that took place just prior to the curriculum’s introduction in 2014 sought to bring to light the limits of a singular historical narrative and reveal that which had been repressed. Consequently, the Australian history curriculum reflects this shifting mindset. Teachers are presented with opportunities to treat history in the classroom as a repository of social possibility, especially related to democratic potential, beyond hackneyed and jingoistic tales of Australian nationhood. Yet such opportunities are not explicit within the document and are up against pre-existing pedagogic practices. Drawing on political thinker Cornelius Castoriadis’s rendering of the 'social-historical' and 'paidea,' as well as his mobilisation of psychoanalysis, the study outlines how the curriculum’s critical-thinking component opens up possibilities for students and teachers to revise assumptions about how history is understood. This ontological shift is ultimately creative: the teachers’ imaginations connect the students’ imaginations, and vice versa, to the analysis that is at the heart of historical thinking. The implications of this social imagination add to the current discussions about historical consciousness among scholars like Peter Seixas. But, importantly, it has practical application in the primary-school classroom where history becomes creative acts, like play, that is indeterminate and social rather than fixed and individual.

Keywords: Australia, Castoriadis, critical thinking, history, imagination

Procedia PDF Downloads 301
16993 Using Immersive Study Abroad Experiences to Strengthen Preservice Teachers’ Critical Reflection Skills on Future Classroom Practices

Authors: Meredith Jones, Susan Catapano, Carol McNulty

Abstract:

Study abroad experiences create unique learning opportunities for preservice teachers to strengthen their reflective thinking practices through applied learning experiences. Not only do study abroad experiences provide opportunities for students to expand their cultural sensitivity, but incorporating applied learning experiences in study abroad trips creates unique opportunities for preservice teachers to engage in critical reflection on their teaching skills. Applied learning experiences are designed to nurture learning and growth through a reflective, experiential process outside the traditional classroom setting. As students participate in applied learning experiences, they engage in critical reflection independently, with their peers, and with university faculty. Critical reflection within applied learning contexts generates, deepens, and documents learning but must be intentionally designed to be effective. Grounded in Dewey’s model of reflection, this qualitative study examines longitudinal data from various study abroad cohorts from a particular university. Reflective data was collected during the study abroad trip, and follow up data on critical reflection of teaching practices were collected six months and a year after the trip. Dewey’s model of reflection requires preservice teachers to make sense of their experiences by reflecting on theoretical knowledge, experiences, and pedagogical knowledge. Guided reflection provides preservice teachers with a framework to respond to questions and ideas critical to the applied learning outcomes. Prompts are used to engage preservice teachers in reflecting on situations they have experienced and how they can be transferred to their teaching. Findings from this study noted that students with previous field experiences, or work in the field, engaged in more critical reflection on pedagogical knowledge throughout their applied learning experience. Preservice teachers with limited experiences in the field benefited from engaging in critical reflection prompted by university faculty during the applied learning experience. However, they were able to independently engage in critical reflection once they began work in the field through university field placements, internships, or student teaching. Finally, students who participated in study abroad applied learning experiences reported their critical reflection on their teaching practices, and cultural sensitivity enhanced their teaching and relationships with children once they formally entered the teaching profession.

Keywords: applied learning experiences, critical reflection, cultural sensitivity, preservice teachers, teacher education

Procedia PDF Downloads 131
16992 Sukuk Issuance and Its Regulatory Framework in Saudi Arabia

Authors: Ali Alshamrani

Abstract:

This article aims to give a comprehensive and critical review of sukuk issuance in Saudi Arabia, and the extent to which the issuance of sukuk in Saudi Arabia is consistent with Shariah requirements. The article is divided into two sections. Accordingly, the first section of this article begins with an examination of sukuk in general, and includes the concept of sukuk, the basic principles of sukuk, common types of sukuk, and a critical analysis of the most important differences between sukuk and conventional bonds. The second section gives a critical analysis of how sukuk work in Saudi Arabia, offering the regulatory framework of the issuance of sukuk in the KSA, and the legal challenges from Shariah point of view, and provide recommendations to overcome these challenges.

Keywords: sukuk issuance, Shariah, Saudi Arabia, capital market authority

Procedia PDF Downloads 463
16991 An Analysis of the Contemporary Western Academic Works in the Genre of Quranic Studies: a Case Study of Encyclopaedia of the Quran

Authors: Iffat Batool

Abstract:

An extensive body of literature produced by the contemporary Western academia is an indication of their grave interest in the field of Qur’ānic studies. What increases its significance is the writings of the western scholars that underscore the element of objectivity and impartiality in the recent western academic works on the Qur’ān. Moreover, the participation of some Muslim scholars in the western academia is also highlighted by western thinkers to ensure the objectivity of western Qur’ānic scholarship. More specifically, with the publication of ‘Encyclopaedia of the Qur’ān by Brill’ the western academia seems to assign these elements to this work vigorously. Being the foremost work of its nature, ‘Encyclopaedia of the Qur’ān’ has attracted the academicians from across the world yet, with multiple receptions. The present study aims at locating the status of this work in the recent Western scholarship and its contribution towards the subject of Qur’ānic Studies. Through a critical analysis of articles, various features of this work are highlighted. This work concludes that although Encyclopaedia of the Qur’ān presents wide-ranging and extensive study, yet, it lacks a perfect, rigorous and thorough scholarship of the Qur’ān. Besides, this work argues that because of the marginal contribution of Muslim researchers, the majority conclusions of this anthology are in contrast to the traditional Muslim standpoint

Keywords: academic, encyclopeadia, objectivity, quran

Procedia PDF Downloads 189
16990 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 450
16989 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security

Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika

Abstract:

Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.

Keywords: food security, institutional strengthening, model implementation, women farmer group

Procedia PDF Downloads 175
16988 Flipped Classroom in Bioethics Education: A Blended and Interactive Online Learning Courseware That Enhances Active Learning and Student Engagement

Authors: Molly Pui Man Wong

Abstract:

In this study, a blended and interactive e-learning Courseware that our team developed will be introduced, and our team’s experiences on how the e-learning Courseware and the flipped classroom benefit student learning in bioethics in the medical program will be shared. This study is a continuation of the previously established study, which provides a summary of the well-developed e-learning Courseware in a blended learning approach and an update on its efficiency and efficacy. First, a collection of animated videos capturing selected topics of bioethics and related ethical issues and dilemma will be introduced. Next, a selection of problem-based learning videos (“simulated doctor-patient role play”) with pop-up questions and discussions will be further discussed. Our recent findings demonstrated that these activities launched by the Courseware strongly engaged students in bioethics education and enhanced students’ critical thinking and creativity, which were consistent with the previous data in the preliminary studies. Moreover, the educational benefits of the online art exhibition, art jamming, and competition will be discussed, through which students could express bioethics through arts and enrich their learning in medical research in an interactive, fun, and entertaining way, strengthening their interests in bioethics. Furthermore, online survey questionnaires and focus group interviews were conducted. Consistent with the preliminary studies, our results indicated that implementing the e-learning Courseware with a flipped classroom in bioethics education enhanced both active learning and student engagement. In conclusion, our Courseware not only reinforces education in art, bioethics, and medicine but also benefits students in understanding and critical thinking in socio-ethical issues and serves as a valuable learning tool in bioethics teaching and learning.

Keywords: bioethics, courseware, e-learning, flipped classroom

Procedia PDF Downloads 118
16987 Critical Behaviour and Filed Dependence of Magnetic Entropy Change in K Doped Manganites Pr₀.₈Na₀.₂−ₓKₓMnO₃ (X = .10 And .15)

Authors: H. Ben Khlifa, W. Cheikhrouhou-Koubaa, A. Cheikhrouhou

Abstract:

The orthorhombic Pr₀.₈Na₀.₂−ₓKₓMnO₃ (x = 0.10 and 0.15) manganites are prepared by using the solid-state reaction at high temperatures. The critical exponents (β, γ, δ) are investigated through various techniques such as modified Arrott plot, Kouvel-Fisher method, and critical isotherm analysis based on the data of the magnetic measurements recorded around the Curie temperature. The critical exponents are derived from the magnetization data using the Kouvel-Fisher method, are found to be β = 0.32(4) and γ = 1.29(2) at TC ~ 123 K for x = 0.10 and β = 0.31(1) and γ = 1.25(2) at TC ~ 133 K for x = 0.15. The critical exponent values obtained for both samples are comparable to the values predicted by the 3D-Ising model and have also been verified by the scaling equation of state. Such results demonstrate the existence of ferromagnetic short-range order in our materials. The magnetic entropy changes of polycrystalline samples with a second-order phase transition are investigated. A large magnetic entropy change deduced from isothermal magnetization curves, is observed in our samples with a peak centered on their respective Curie temperatures (TC). The field dependence of the magnetic entropy changes are analyzed, which shows power-law dependence ΔSmax ≈ a(μ0 H)n at the transition temperature. The values of n obey the Curie Weiss law above the transition temperature. It is shown that for the investigated materials, the magnetic entropy change follows a master curve behavior. The rescaled magnetic entropy change curves for different applied fields collapse onto a single curve for both samples.

Keywords: manganites, critical exponents, magnetization, magnetocaloric, master curve

Procedia PDF Downloads 161
16986 Determining a Sustainability Business Model Using Materiality Matrices in an Electricity Bus Factory

Authors: Ozcan Yavas, Berrak Erol Nalbur, Sermin Gunarslan

Abstract:

A materiality matrix is a tool that organizations use to prioritize their activities and adapt to the increasing sustainability requirements in recent years. For the materiality index to move from business models to the sustainability business model stage, it must be done with all partners in the raw material, supply, production, product, and end-of-life product stages. Within the scope of this study, the Materiality Matrix was used to transform the business model into a sustainability business model and to create a sustainability roadmap in a factory producing electric buses. This matrix determines the necessary roadmap for all stakeholders to participate in the process, especially in sectors that produce sustainable products, such as the electric vehicle sector, and to act together with the cradle-to-cradle approach of sustainability roadmaps. Global Reporting Initiative analysis was used in the study conducted with 1150 stakeholders within the scope of the study, and 43 questions were asked to the stakeholders under the main headings of 'Legal Compliance Level,' 'Environmental Strategies,' 'Risk Management Activities,' 'Impact of Sustainability Activities on Products and Services,' 'Corporate Culture,' 'Responsible and Profitable Business Model Practices' and 'Achievements in Leading the Sector' and Economic, Governance, Environment, Social and Other. The results of the study aimed to include five 1st priority issues and four 2nd priority issues in the sustainability strategies of the organization in the short and medium term. When the studies carried out in the short term are evaluated in terms of Sustainability and Environmental Risk Management, it is seen that the studies are still limited to the level of legal legislation (60%) and individual studies in line with the strategies (20%). At the same time, the stakeholders expect the company to integrate sustainability activities into its business model within five years (35%) and to carry out projects to become the first company that comes to mind with its success leading the sector (20%). Another result obtained within the study's scope is identifying barriers to implementation. It is seen that the most critical obstacles identified by stakeholders with climate change and environmental impacts are financial deficiency and lack of infrastructure in the dissemination of sustainable products. These studies are critical for transitioning to sustainable business models for the electric vehicle sector to achieve the EU Green Deal and CBAM targets.

Keywords: sustainability business model, materiality matrix, electricity bus, carbon neutrality, sustainability management

Procedia PDF Downloads 48
16985 Teaching Science Content Area Literacy to 21st Century Learners

Authors: Melissa C. Ingram

Abstract:

The use of new literacies within science classrooms needs to be balanced by teachers to both teach different forms of communication while assessing content area proficiency. Using new literacies such as Twitter and Facebook needs to be incorporated into science content area literacy studies in addition to continuing to use generally-accepted forms of scientific content area presentation, which include scientific papers and textbooks. The research question this literature review seeks to answer is “What are some ways in which new forms of literacy are better suited to teach scientific content area literacy to 21st Century learners?” The research question is addressed through a literature review that highlights methods currently being used to educate the next wave of learners in the world of science content area literacy. Both temporal discourse analysis (TDA) and critical discourse analysis (CDA) were used to determine the need to use new literacies to teach science content area literacy. Increased use of digital technologies and a change in science content area pedagogy were explored.

Keywords: science content area literacy, new literacies, critical discourse analysis, temporal discourse analysis

Procedia PDF Downloads 216
16984 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 239
16983 Microstructure and Excess Conductivity of Bulk, Ag-Added FeSe Superconductors

Authors: Michael Koblischka, Yassine Slimani, Thomas Karwoth, Anjela Koblischka-Veneva, Essia Hannachi

Abstract:

On bulk FeSe superconductors containing different additions of Ag, a thorough investigation of the microstructures was performed using optical microscopy, SEM and TEM. The electrical resistivity was measured using four-point measurements in the temperature range 2 K ≤ T ≤ 150 K. The data obtained are analyzed in the framework of the excess conductivity approach using the Aslamazov-Larkin (AL) model. The investigated samples comprised of five distinct fluctuation regimes, namely short-wave (SWF), onedimensional (1D), two-dimensional (2D), three-dimensional (3D), and critical (CR) fluctuation regimes. The coherence length along the c-axis at zero-temperature (ξc(0)), the lower and upper critical magnetic fields (Bc1 and Bc2), the critical current density (Jc) and numerous other superconducting parameters were estimated with respect to the Ag content in the samples. The data reveal a reduction of the resistivity and a strong decrease of ξc(0) when doping the 11-samples with silver. The optimum content of the Ag-addition is found at 4 wt.-% Ag, yielding the highest critical current density.

Keywords: iron-based superconductors, FeSe, Ag-addition, excess conductivity, microstructure

Procedia PDF Downloads 138
16982 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 154
16981 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies

Authors: Kristina Thorell

Abstract:

Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.

Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices

Procedia PDF Downloads 311
16980 Developing English L2 Critical Reading and Thinking Skills through the PISA Reading Literacy Assessment Framework: A Case Study of EFL Learners in a Thai University

Authors: Surasak Khamkhong

Abstract:

This study aimed to investigate the use of the PISA reading literacy assessment framework (PRF) to improve EFL learners’ critical reading and thinking skills. The sample group, selected by the purposive sampling technique, included 36 EFL learners from a university in Northeastern Thailand. The instruments consisted of 8 PRF-based reading lessons, a 27-item-PRF-based reading test which was used as a pre-test and a post-test, and an attitude questionnaire toward the designed lessons. The statistics used for data analysis were percentage, mean, standard deviation, and the Wilcoxon signed-rank test. The results revealed that before the intervention, the students’ English reading proficiency were low as is evident from their low pre-test scores (M=14.00). They did fairly well for the access-and-retrieve questions (M=6.11), but poorly for the integrate-and-interpret questions (M=4.89) and the reflect-and-evaluate questions (M=3.00), respectively. This means that the students could comprehend the texts but they could hardly interpret or evaluate them. However, after the intervention, they could do better as their post-test scores were higher (M=18.01). They could comprehend (M=6.78), interpret (M=6.00) and evaluate (M=5.25) well. This means that after the intervention, their critical reading skills had improved. In terms of their attitude towards the designed lessons and instruction, most students were satisfied with the lessons and the instruction. It may thus be concluded that the designed lessons can help improve students’ English critical reading proficiency and may be used as a teaching model for improving EFL learners’ critical reading skills.

Keywords: second language reading, critical reading and thinking skills, PISA reading literacy framework, English L2 reading development

Procedia PDF Downloads 184
16979 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 215
16978 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?

Authors: Abdoulahad Allamine

Abstract:

The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.

Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data

Procedia PDF Downloads 379
16977 Contribution at Dimensioning of the Energy Dissipation Basin

Authors: M. Aouimeur

Abstract:

The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.

Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment

Procedia PDF Downloads 580
16976 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 356
16975 Quality Based Approach for Efficient Biologics Manufacturing

Authors: Takashi Kaminagayoshi, Shigeyuki Haruyama

Abstract:

To improve the manufacturing efficiency of biologics, such as antibody drugs, a quality engineering framework was designed. Within this framework, critical steps and parameters in the manufacturing process were studied. Identification of these critical steps and critical parameters allows a deeper understanding of manufacturing capabilities, and suggests to process development department process control standards based on actual manufacturing capabilities as part of a PDCA (plan-do-check-act) cycle. This cycle can be applied to each manufacturing process so that it can be standardized, reducing the time needed to establish each new process.

Keywords: antibody drugs, biologics, manufacturing efficiency, PDCA cycle, quality engineering

Procedia PDF Downloads 340
16974 Meta-Analysis Comparing the Femoral Tunnel Length, Femoral Tunnel Position and Graft Bending Angle of Transtibial, Anteromedial and Outside-In Techniques for Single-Bundle Anterior Cruciate Ligament Reconstruction

Authors: Andrew Tan Hwee Chye, Yeo Zhen Ning

Abstract:

This study aims to meta-analyse clinical studies comparing femoral tunnel position (FTP), femoral tunnel length (FTL) and graft bending angle (GBA) of single-bundle Anterior Cruciate Ligament (ACL) reconstruction using Transtibial (TT), Anteromedial (AM) and Outside-in (OI) techniques. A meta-analysis comparing the FTP, FTL and GBA of single-bundle ACL reconstruction utilising the TT, AM and OI was performed. Prospective Comparative Studies (PCS) and Retrospective Comparative Studies (RCS) from PubMed, Cochrane Library, and Embase were included. A total of 17 studies were included in this study. TT had the longest FTL, when compared to AM (Mean difference = 7.38, 95% CI: 3.76 to 11.00, P < 0.001) and OI (Mean difference = 9.47, 95% CI: 4.89 to 14.05, P < 0.001). In the deep-to-shallow direction, the OI resulted in a significantly deeper femoral tunnel as compared to the TT (Mean difference = 4.36, 95% CI: 1.39 to 7.33, P = 0.004) (Figure 6B). The AM technique also contributed to a significantly lower tunnel position as compared to the OI technique (Mean difference = 2.34, 95% CI: 0.76 to 3.92, P = 0.004). There were no significant differences in the graft bending angle between TT, AM and OI techniques. AM and OI techniques provide a more anatomical position as compared to the TT. Although FTL in the TT is longer than the AM and OI, all three techniques exceed the critical length of 25mm. There are no differences in the GBA between the three techniques.

Keywords: femoral tunnel position, femoral tunnel length, anterior cruciate ligament, transtibial, graft bending angle, anteromedial, outside-in

Procedia PDF Downloads 120
16973 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 300
16972 Climate Change and Land Grabbing

Authors: Akachi Odoemene

Abstract:

Climate change and land grabbing are tightly interconnected in ways that are both diverse and complex. They have impacted each other in significant ways too. Both phenomena are not only a political reality, but have diverse dire implications, especially for food and livelihood security of vulnerable populations in developing economies. The critical nexus and interactions of climate change and land grabbing remain one of the challenges of sustainable development in modern times. The nuanced understanding of the nexus, importance and implications of climate change and land grabbing are the primary focus of this chapter. It begins with conceptual clarifications, particularly arguing that the absence of some important principles of engagement underline and define a land grab. It also analyses and notes a good number of contemporary land deals as 'one-sided', in which wealthy entities connive with local elites to exploit and disposes rural poor populations. The paper not only examines both global and local factors that drive land grabbing and, in some cases, their connections with the incidence of climate change, but also explores their crucial links with such sector as agriculture. It is argued and exhibited in the paper why certain societies are susceptible to the incidence of climate change and land grabbing, while the overall consequences of these phenomena on the affected societies are further interrogated. The paper concludes that the lack of political will by global political leaders to effectively combat and resolve critical issues associated with both climate change and land grabbing remains a daunting challenge. It notes that these phenomena – climate change and land grabbing – if not abated, will certainly become another set of global tragic episodes to be regretted in the future.

Keywords: climate change, land grabbing, global governance, developing economies

Procedia PDF Downloads 287
16971 The Impact of Iso 9001 Certification on Brazilian Firms’ Performance: Insights from Multiple Case Studies

Authors: Matheus Borges Carneiro, Fabiane Leticia Lizarelli, José Carlos De Toledo

Abstract:

The evolution of quality management by companies was strongly enabled by, among others, ISO 9001 certification, which is considered a crucial requirement for several customers. Likewise, performance measurement provides useful insights for companies to identify the reflection of their decision-making process on their improvement. One of the most used performance measurement models is the balanced scorecard (BSC), which uses four perspectives to address a firm’s performance: financial, internal process, customer satisfaction, and learning and growth. Studies related to ISO 9001 and business performance have mostly adopted a quantitative approach to identify the standard’s causal effect on a firm’s performance. However, to verify how this influence may occur, an in-depth analysis within a qualitative approach is required. Therefore, this paper aims to verify the impact of ISO 9001:2015 on Brazilian firms’ performance based on the balanced scorecard perspective. Hence, nine certified companies located in the Southeast region of Brazil were studied through a multiple case study approach. Within this study, it was possible to identify the positive impact of ISO 9001 on firms’ overall performance, and four Critical Success Factors (CSFs) were identified as relevant on the linkage among ISO 9001 and firms’ performance: employee involvement, top management, process management, and customer focus. Due to the COVID-19 pandemic, the number of interviews was limited to the quality manager specialist, and the sample was limited since several companies were closed during the period of the study. This study presents an in-depth analysis of how the relationship between ISO 9001 certification and firms’ performance in a developing country is.

Keywords: balanced scorecard, Brazilian firms’ performance, critical success factors, ISO 9001 certification, performance measurement

Procedia PDF Downloads 191
16970 Application Programming Interface Security in Embedded and Open Finance

Authors: Andrew John Zeller, Artjoms Formulevics

Abstract:

Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.

Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management

Procedia PDF Downloads 34
16969 Detection of Coupling Misalignment in a Rotor System Using Wavelet Transforms

Authors: Prabhakar Sathujoda

Abstract:

Vibration analysis of a misaligned rotor coupling bearing system has been carried out while decelerating through its critical speed. The finite element method (FEM) is used to model the rotor system and simulate flexural vibrations. A flexible coupling with a frictionless joint is considered in the present work. The continuous wavelet transform is used to extract the misalignment features from the simulated time response. Subcritical speeds at one-half, one-third, and one-fourth the critical speed have appeared in the wavelet transformed vibration response of a misaligned rotor coupling bearing system. These features are also verified through a parametric study.

Keywords: Continuous Wavelet Transform, Flexible Coupling, Rotor System, Sub Critical Speed

Procedia PDF Downloads 155
16968 Enhancing Transit Trade, Facilitation System and Supply Chain Security for Local, Regional and an International Corridor

Authors: Moh’d A. AL-Shboul

Abstract:

Recently, and due to Arab spring and terrorism around the globe, pushing and driving most governments potentially to harmonize their border measures particularly the regional and an international transit trade within and among Customs Unions. The main purpose of this study is to investigate and provide an insight for monitoring and controlling the trade supply chain within and among different countries by using technological advancement (i.e. an electronic tracking system, etc.); furthermore, facilitate the local and intra-regional trade among countries through reviewing the recent trends and practical implementation of an electronic transit traffic and cargo that related to customs measures by introducing and supporting some case studies of several international and landlocked transit trade countries. The research methodology employed in this study was described as qualitative by conducting few interviews with managers, transit truck drivers, and traders and reviewing the related literature to collect qualitative data from secondary sources such as statistical reports, previous studies, etc. The results in this study show that Jordan and other countries around the globe that used an electronic tracking system for monitoring transit trade has led to a significant reduction in cost, effort and time in physical movement of goods internally and crossing through other countries. Therefore, there is no need to escort transit trucks by customs staff; hence, the rate of escort transit trucks is reduced by more than ninety percent, except the bulky and high duty goods. Electronic transit traffic has been increased; the average transit time journey has been reduced by more than seventy percent and has led to decrease in rates of smuggling up to fifty percent. The researcher recommends considering Jordan as regional and international office for tracking electronically and monitoring the transit trade for many considerations.

Keywords: electronic tracking system, facilitation system, regional and international corridor, supply chain security, transit trade

Procedia PDF Downloads 494