Search results for: new deal
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1115

Search results for: new deal

1055 The Role of Immunologic Diamonds in Dealing with Mycobacterium Tuberculosis; Responses of Immune Cells in Affliction to the Respiratory Tuberculosis

Authors: Seyyed Mohammad Amin Mousavi Sagharchi, Elham Javanroudi

Abstract:

Introduction: Tuberculosis (TB) is a known disease with hidden features caused by Mycobacterium tuberculosis (MTB). This disease, which is one of the 10 deadliest in the world, has caused millions of deaths in recent decades. Furthermore, TB is responsible for infecting about 30% population of world. Like any infection, TB can activate the immune system by locating and colonization in the human body, especially in the alveoli. TB is granulomatosis, so MTB can absorb the host’s immune cells and other cells to form granuloma. Method: Different databases (e.g., PubMed) were recruited to prepare this paper and fulfill our goals to search and find effective papers and investigations. Results: Immune response to MTB is related to T cell killers and contains CD1, CD4, and CD8 T lymphocytes. CD1 lymphocytes can recognize glycolipids, which highly exist in the Mycobacterial fatty cell wall. CD4 lymphocytes and macrophages form granuloma, and it is the main line of immune response to Mycobacteria. On the other hand, CD8 cells have cytolytic function for directly killing MTB by secretion of granulysin. Other functions and secretion to the deal are interleukin-12 (IL-12) by induction of expression interferon-γ (INF-γ) for macrophages activation and creating a granuloma, and tumor necrosis factor (TNF) by promoting macrophage phagolysosomal fusion. Conclusion: Immune cells in battle with MTB are macrophages, dendritic cells (DCs), neutrophils, and natural killer (NK) cells. These immune cells can recognize the Mycobacterium by various receptors, including Toll-like receptors (TLRs), Nod-like receptors (NLRs), and C-type lectin receptors (CLRs) located in the cell surface. In human alveoli exist about 50 dendritic macrophages, which have close communication with other immune cells in the circulating system and epithelial cells to deal with Mycobacteria. Against immune cells, MTB handles some factors (e.g., cordfactor, O-Ag, lipoarabinomannan, sulfatides, and adenylate cyclase) and practical functions (e.g., inhibition of macrophages).

Keywords: mycobacterium tuberculosis, immune responses, immunological mechanisms, respiratory tuberculosis

Procedia PDF Downloads 73
1054 Transitioning Classroom Students to Working Learners: Lived Experiences of Senior High School Work Immersion Students

Authors: Rico Herrero

Abstract:

The study looked into the different lived experiences of senior high school to work immersion and how they were able to cope up in the transition stage from being classroom students into immersion students in work immersion site. The participants of the study were the ten senior high school students from Punta Integrated School. Using interview guide questions, the researchers motivated the participants to reveal their thoughts, feelings, and experiences in the interviews via video recording. The researchers utilized the qualitative research design, but the approach used was grounded theory. The findings revealed the participants’ lived experiences on how to cope or overcome the transition stage during the work immersion program. They unanimously responded to the interview questions. And based on the themes that emerged from the testimonies of the Senior High School students, the classroom learners benefited a lot from authentic learning opportunity of immersion program. Work immersion provides the students the opportunity to learn and develop their skills/ competencies related to the field of specialization. The hands-on training provides them simulation of work. They realized that theoretical learning in school is not enough to be equipped to work. Immersion program also provides venue for values and standard transformation. Senior High School students felt a high demand of self-confidence at the beginning of their race. Good thing, self-esteem of an individual helps bring out one’s potential at its best. Students find it challenging to get along with people in all ages. But, the endeavour absolutely helps them to grow maturely. Participants also realized that it’s not easy to deal with time pressure. Hence, the immersion program taught them to learn about time management. Part of the best training is to expose the learners to the harsh reality. Despite of the things that the school had taught them, still, students realized that they are not yet ready to deal with the demands of work. Furthermore, they also found out that they need to develop an interpersonal skill to improve their human relationships.

Keywords: grounded theory, lived experiences, senior high school, work immersion

Procedia PDF Downloads 124
1053 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 115
1052 Competition Law as a “Must Have” Course in Legal Education

Authors: Noemia Bessa Vilela, Jose Caramelo Gomes

Abstract:

All law student are familiarized, in the first years of their bachelor of laws with the concepts of “public goods” and “ private goods”; often, such legal concept does not exactly match such economic concept, and there are consequences are some sort of confusion being created. The list of goods that follow under each category is not exhaustive, nor are students given proper mechanisms to acknowledge that some legal fields can, on its own, be considered as a “public good”; this is the case of Competition. Legal authors consider that “competition law is used to promote public interest” and, as such, it is a “public good”; in economics theory, Competition is the first public good in a market economy, as the enabler of allocation efficiency. Competition law is the legal tool to support the proper functioning of the market economy and democracy itself. It is fact that Competition Law only applies to economic activities, still, competition is object of private litigation as an integral part of Public Law. Still, regardless of the importance of Competition Law in the economic activity and market regulation, most student complete their studies in law, join the Bar Associations and engage in their professional activities never having been given sufficient tools to deal with the increasing demands of a globalized world. The lack of knowledge of economics, market functioning and the mechanisms at their reach in order to ensure proper realization of their duties as lawyers/ attorneys-at-law would be tackled if Competition Law would be included as part of the curricula of Law Schools. Proper teaching of Competition Law would combine the foundations of Competition Law, doctrine, case solving and Case Law study. Students should to understand and apply the analytical model. Special emphasis should be given to EU Competition Law, namely the TFEU Articles 101 to 106. Damages Directive should also be part of the curriculum. Students must in the first place acquire and master the economic rationale as competition and the world of competition law are the cornerstone of sound and efficient market. The teaching of Competition Law in undergraduate programs in Law would contribute to fulfill the potential of the students who will deal with matters related to consumer protection, economic and commercial law issues both in private practice and as in-house lawyers for companies.

Keywords: higher education, competition law, legal education, law, market economy, industrial economics

Procedia PDF Downloads 125
1051 Implications about the Impact of COVID-19 on Business

Authors: Anwar Kashgari

Abstract:

COVID-19 has severe impacts on business all over the world. The great lockdown of many business owners requires a sage deal with this pandemic. This paper seeks to support business leaders with a standpoint about the COVID-19 situation and provides implications for the (Small and Medium Enterprises) SMEs and companies. The paper reflects the author's view about the impact of COVID-19 on business activities. We discussed the impact of COVID-19 upon three aspects, namely, startups, SMEs, and e-commerce. The KSA is an example of the developing countries about which we present the current situation. Finally, recommendations to policy and decision-makers are given.

Keywords: COVID 19, business networking, globalization

Procedia PDF Downloads 171
1050 DHL CSI Solution Design Project

Authors: Mohammed Al-Yamani, Yaser Miaji

Abstract:

DHL Customer Solutions and Innovation Department (CSI) have been experiencing difficulties while comparing quotes for different customers in different years. Currently, the employees are processing data by opening several loaded Excel files where the quotes are and manually copying values to another Excel Workbook where the comparison is made. This project consists of developing a new and effective database for DHL CSI department so that information is stored altogether on the same catalog. That being said, we have been assigned to find an efficient algorithm that can deal with the different formats of the Excel Workbooks to copy and store the express customer rates for core products (DOX, WPX, IMP) for comparisons purposes.

Keywords: DHL, solution design, ORACLE, EXCEL

Procedia PDF Downloads 388
1049 Assessing India’s Foreign Policy Towards Afghanistan

Authors: Saifurahman Fayiz

Abstract:

Afghanistan and India have close technical, political, economic, and diplomatic bilateral ties. The ties is not limited between the governments of the two countries, but their relationship are among the peoples. India is the best regional trustworthy partner and biggest donor for the development of Afghanistan. The objectives of this study to assess India’s foreign policy towards Afghanistan since 9\11. The research method conducted based on qualitative research method with descriptive. The research findings propose that; India should deal with and build up its strategy relations with neighbor countries.

Keywords: strategy, policy, India, Afghanistan

Procedia PDF Downloads 307
1048 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan

Authors: Sehrish Qayyum

Abstract:

Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.

Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security

Procedia PDF Downloads 88
1047 China's Role in Promoting Regionalism in East Asia in Post-Maoist Era: An Analysis through Uneven and Combined Development

Authors: Ali Jibran

Abstract:

China was considered as a revisionist state by the countries of East Asia during Maoist era; but China’s role changed from a revisionist state to a constructive member of East Asian Community in post-Maoist era. This research will mainly investigate the two phenomena: what were reasons of behavioral change of China in East Asia and what role has China played to promote regionalism in East Asia since Open Door Policy of Deng Xiaoping. To understand these two phenomena, this study applies the international relations theory of Uneven and Combined Development (U&CD). The central finding of this study is that ‘whip of external necessity’ posed by the Western dominance during the Chinese ‘century of ignominy’ resulted in a Maoist regime in China in 1948 which was hostile to its neighbors due to ideological tensions. Maoist regime in China could not solve the challenges posed by the ‘international’; therefore after Mao’s death, a new economic approach was introduced in China to deal with the challenges postured by the ‘international’. Due to Deng Xiaoping’s 'Open Door Policy' era, China used its ‘privilege of historic backwardness’ and witnessed unprecedented economic growth. As the societies are multiple and exist in real time, therefore interaction among societies is pertinent. Export oriented domestic policy pushed China to concentrate less on class struggle and improve its relations with its neighbors in East Asia. As China soon become a global hub of trade after market oriented reforms, therefore friendly relations with the states of East Asia was pertinent. This study will investigate Chinese role in regionalism in East Asia in three area: Chinese role in promoting regionalism in East Asia, China’s role in economic integration in East Asia and China’s role in combatting terrorism in East Asia. This study will be divided in two section. The first section will deal with the transformation in Chinese behavior in East Asia in post Maoist era, and the second section will analyze China’s role in East Asia by looking at Chinese role in institutional mechanism, economic integration and combatting terrorism in East Asia.

Keywords: East Asia, regionalism, institutionlism, economic integration

Procedia PDF Downloads 357
1046 An Advanced Method of Minimizing Unforeseen Disruptions within a Manufacturing System: A Case Study of Amico, South Africa

Authors: Max Moleke

Abstract:

Manufacturing industries are faced with different types of problems. One of the most important role of controlling and monitoring a production process is to actually determine how to deal with unforeseen disruption when they arise. A majority of manufacturing tern to spend huge amount of money in order to meet up with their customers requirements and demand but due to instabilities within the manufacturing process, this objectives and goals are difficult to be achieved. In this research, we have developed a feedback control system that can minimize instability within the manufacturing system in order to boost the system output and productivity.

Keywords: disruption, scheduling, manufacturing, instability

Procedia PDF Downloads 305
1045 The Experiences and Needs of Fathers’ of Children With Cancer in Coping With the Child's Illness

Authors: Karina Lõbus, Silver Muld, Kadri Kööp, Mare Tupits

Abstract:

Aim: The aim of the research is to describe the experiences and needs of fathers’ of children with cancer in coping with the child's disease. Background: Today, about 80% of children diagnosed with malignancy in developed countries survive. Despite the positive statistics, recovery is not always certain, treatment is often very intensive and long-term. Cancer is affecting an increasing number of the population, which is increasing the demand for quality care, but the nature of expected care is currently unclear. This topic is important for the development of professional practice, as nurses complain that their knowledge to deal with the relatives of a patient with a difficult diagnosis is limited and would therefore like additional information to deal with the situation. Design: Qualitative, empirical, descriptive research. Method: The data were collected through semi-structured interviews and analysed by inductive content analysis method. Interviews were conducted during Autumn 2020. 4 subjects participated in the research. Results and Conclusions: The thesis revealed that fathers had different experiences and needs in dealing with the child's illness. Fathers' experiences of coping with child's diseases encompassed experiences with information, social relationships, healthcare, changes in personal health and experiences regarding the child. Regarding information, the respondents pointed out bad experiences with the availability of information and the ability to convey the necessary information. Experiences regarding social relationships included experiences with relatives and strangers. Regarding healthcare, fathers mentioned experiences related to the child's health and healthcare professionals. In regards to personal health, fathers pointed out negative changes in their mental and physical health. In relation to the child, the subjects revealed experiences regarding changed values, way of life and raising the child. According to the research, fathers’ needs in relation to dealing with child's cancer included material, social, and spiritual needs. In regard to material needs, fathers pointed out the need for state assistance and the needs related to the surrounding environment. The needs concerning social belonging involved needs for a driving force and involvement in the treatment process. Regarding spiritual needs, fathers expressed mixed feelings towards the need for outside and professional help.

Keywords: father, coping, cancer, child, experience, need

Procedia PDF Downloads 111
1044 Local People’s Livelihoods and Coping Strategies in the Wake of a Co-management System in the Campo Ma'an National Park, Cameroon

Authors: Nchanji Yvonne Kiki, Mala William Armand, Nchanji Eileen Bogweh, Ramcilovik-Suominen Sabaheta, Kotilainen Juha

Abstract:

The Campo Ma'an National Park was created as part of an environmental and biodiversity compensation for the Chad-Cameroon Oil Pipeline Project, which was meant to help alleviate poverty and boost the livelihood of rural communities around the area. This paper examines different strategies and coping mechanisms employed by the indigenous people and local communities to deal with the national and internationally driven conservation policies and initiatives in the case of the Campo Ma'an National Park. While most literature on park management/co-management/nature conservation has focused on the negative implications for local peoples’ livelihoods, fewer studies have investigated the strategies of local people to respond to these policies and renegotiate their position in a way that enables them to continue their traditional livelihoods using the existing local knowledge systems. This study contributes to the current literature by zooming into not only the impacts of nature conservation policies but also the local individual and collective strategies and responses to such policies and initiatives. We employ a qualitative research approach using ethnomethodology and a convivial lens to analyze data collected from October to November 2018. We find that conservation policies have worsened some existing livelihoods on the one hand and constrained livelihood improvement of indigenous people and local communities (IPLC) on the other hand. Nonetheless, the IPLC has devised individual and collective coping mechanisms to deal with these conservation interventions and the negative effects they have caused. Upon exploring these mechanisms and their effectiveness, this study proposes a management approach to conservation centered on both people and nature, based on indigenous and local people's knowledge and practices, promoting nature for and by humans and strengthening both livelihood and conservation. We take inspiration from the convivial conservation approach and thinking by Bucher and Fletcher.

Keywords: conservation policies, national park management, indigenous and local people’s experiences, livelihoods, local knowledge, coping strategies, conviviality

Procedia PDF Downloads 161
1043 Comparison of Frequency-Domain Contention Schemes in Wireless LANs

Authors: Li Feng

Abstract:

In IEEE 802.11 networks, it is well known that the traditional time-domain contention often leads to low channel utilization. The first frequency-domain contention scheme, the time to frequency (T2F), has recently been proposed to improve the channel utilization and has attracted a great deal of attention. In this paper, we survey the latest research progress on the weighed frequency-domain contention. We present the basic ideas, work principles of these related schemes and point out their differences. This paper is very useful for further study on frequency-domain contention.

Keywords: 802.11, wireless LANs, frequency-domain contention, T2F

Procedia PDF Downloads 431
1042 Assessment of Mortgage Applications Using Fuzzy Logic

Authors: Swathi Sampath, V. Kalaichelvi

Abstract:

The assessment of the risk posed by a borrower to a lender is one of the common problems that financial institutions have to deal with. Consumers vying for a mortgage are generally compared to each other by the use of a number called the Credit Score, which is generated by applying a mathematical algorithm to information in the applicant’s credit report. The higher the credit score, the lower the risk posed by the candidate, and the better he is to be taken on by the lender. The objective of the present work is to use fuzzy logic and linguistic rules to create a model that generates Credit Scores.

Keywords: credit scoring, fuzzy logic, mortgage, risk assessment

Procedia PDF Downloads 383
1041 Powerful Laser Diode Matrixes for Active Vision Systems

Authors: Dzmitry M. Kabanau, Vladimir V. Kabanov, Yahor V. Lebiadok, Denis V. Shabrov, Pavel V. Shpak, Gevork T. Mikaelyan, Alexandr P. Bunichev

Abstract:

This article is deal with the experimental investigations of the laser diode matrixes (LDM) based on the AlGaAs/GaAs heterostructures (lasing wavelength 790-880 nm) to find optimal LDM parameters for active vision systems. In particular, the dependence of LDM radiation pulse power on the pulse duration and LDA active layer heating as well as the LDM radiation divergence are discussed.

Keywords: active vision systems, laser diode matrixes, thermal properties, radiation divergence

Procedia PDF Downloads 586
1040 Model Averaging for Poisson Regression

Authors: Zhou Jianhong

Abstract:

Model averaging is a desirable approach to deal with model uncertainty, which, however, has rarely been explored for Poisson regression. In this paper, we propose a model averaging procedure based on an unbiased estimator of the expected Kullback-Leibler distance for the Poisson regression. Simulation study shows that the proposed model average estimator outperforms some other commonly used model selection and model average estimators in some situations. Our proposed methods are further applied to a real data example and the advantage of this method is demonstrated again.

Keywords: model averaging, poission regression, Kullback-Leibler distance, statistics

Procedia PDF Downloads 494
1039 A Dual-Mode Infinite Horizon Predictive Control Algorithm for Load Tracking in PUSPATI TRIGA Reactor

Authors: Mohd Sabri Minhat, Nurul Adilla Mohd Subha

Abstract:

The PUSPATI TRIGA Reactor (RTP), Malaysia reached its first criticality on June 28, 1982, with power capacity 1MW thermal. The Feedback Control Algorithm (FCA) which is conventional Proportional-Integral (PI) controller, was used for present power control method to control fission process in RTP. It is important to ensure the core power always stable and follows load tracking within acceptable steady-state error and minimum settling time to reach steady-state power. At this time, the system could be considered not well-posed with power tracking performance. However, there is still potential to improve current performance by developing next generation of a novel design nuclear core power control. In this paper, the dual-mode predictions which are proposed in modelling Optimal Model Predictive Control (OMPC), is presented in a state-space model to control the core power. The model for core power control was based on mathematical models of the reactor core, OMPC, and control rods selection algorithm. The mathematical models of the reactor core were based on neutronic models, thermal hydraulic models, and reactivity models. The dual-mode prediction in OMPC for transient and terminal modes was based on the implementation of a Linear Quadratic Regulator (LQR) in designing the core power control. The combination of dual-mode prediction and Lyapunov which deal with summations in cost function over an infinite horizon is intended to eliminate some of the fundamental weaknesses related to MPC. This paper shows the behaviour of OMPC to deal with tracking, regulation problem, disturbance rejection and caters for parameter uncertainty. The comparison of both tracking and regulating performance is analysed between the conventional controller and OMPC by numerical simulations. In conclusion, the proposed OMPC has shown significant performance in load tracking and regulating core power for nuclear reactor with guarantee stabilising in the closed-loop.

Keywords: core power control, dual-mode prediction, load tracking, optimal model predictive control

Procedia PDF Downloads 141
1038 Scar Removal Stretegy for Fingerprint Using Diffusion

Authors: Mohammad A. U. Khan, Tariq M. Khan, Yinan Kong

Abstract:

Fingerprint image enhancement is one of the most important step in an automatic fingerprint identification recognition (AFIS) system which directly affects the overall efficiency of AFIS. The conventional fingerprint enhancement like Gabor and Anisotropic filters do fill the gaps in ridge lines but they fail to tackle scar lines. To deal with this problem we are proposing a method for enhancing the ridges and valleys with scar so that true minutia points can be extracted with accuracy. Our results have shown an improved performance in terms of enhancement.

Keywords: fingerprint image enhancement, removing noise, coherence, enhanced diffusion

Procedia PDF Downloads 491
1037 Consideration of Uncertainty in Engineering

Authors: A. Mohammadi, M. Moghimi, S. Mohammadi

Abstract:

Engineers need computational methods which could provide solutions less sensitive to the environmental effects, so the techniques should be used which take the uncertainty to account to control and minimize the risk associated with design and operation. In order to consider uncertainty in engineering problem, the optimization problem should be solved for a suitable range of the each uncertain input variable instead of just one estimated point. Using deterministic optimization problem, a large computational burden is required to consider every possible and probable combination of uncertain input variables. Several methods have been reported in the literature to deal with problems under uncertainty. In this paper, different methods presented and analyzed.

Keywords: uncertainty, Monte Carlo simulated, stochastic programming, scenario method

Procedia PDF Downloads 386
1036 Small and Medium Sized Ports between Specialisation and Diversification: A Framework Tool for Sustainable Development

Authors: Christopher Meyer, Laima Gerlitz

Abstract:

European ports are facing high political pressure through the implementation of initiatives such as the European Green Deal or IMO's 2030 targets (Fit for 55). However, small and medium-sized ports face even higher challenges compared to bigger ones due to lower capacities in various fields such as investments, infra-structure, Human Resources, and funding opportunities. Small and Medium-Sized Ports (SMPs) roles in economic systems are various depending on their specific functionality in maritime ecosystems. Depending on their different situations, being an actor in multiport gateways, aligned to core ports, regional nodes in peripheries for the hinterland, specialized cluster members, or logistical nodes, different strategic business models may be applied to increase SMPs' competitiveness among other bigger ports. Additionally, SMPs are facing more challenges for future development in terms of digital and green transition of their operations. Thus, it is necessary to evaluate the own strategical position and apply management strategies alongside the regional growth and innovation strategies for diversification or specialisation of own port businesses. The research uses inductive perspectives to set up a transferable framework based on case studies to be analysed. In line with particular research and document analysis, qualitative approaches were considered. The research is based on a deep literature review on SMPs as well as theories on diversification and specialisation. Existing theories from different fields are evaluated on their application for the port sector and these specific maritime actors, paying respect to enabling innovation incorporation to enhance digital and environmental transition with fu-ture perspectives for SMPs. The paper aims to provide a decision-making matrix for the strategic positioning of SMPs in Europe, including opportunities to get access to particular EU funds for future development alongside the Regional In-novation Strategies on Smart Specialisation.

Keywords: strategic planning, sustainability transition, competitiveness portfolio, EU green deal

Procedia PDF Downloads 59
1035 An Alternative Way to Mapping Cone

Authors: Yousuf Alkhezi

Abstract:

Since most of the literature on algebra does not make much deal with the special case of mapping cone. This paper is an alternative way to examine the special tensor product and mapping cone. Also, we show that the isomorphism that implies the mapping cone commutes with the tensor product for the ordinary tensor product no longer holds for the pinched tensor product. However, we show there is a morphism. We will introduce an alternative way of mapping cone. We are looking for more properties which is our future project. Also, we want to apply these new properties in some application. Many results and examples with classical algorithms will be provided.

Keywords: complex, tensor product, pinched tensore product, mapping cone

Procedia PDF Downloads 104
1034 Reculturing: The Key to Sustainability of Private Universities

Authors: Yu Sing Ong

Abstract:

This article explores the key issues and challenges facing private university leaders today. Universities are reculturing their operational processes, academic content and interactions with stakeholders. Many challenges centred around the need for university leaders to reculture the institutions and the redesigning of the teaching profession. It recommends a framework for university leaders to deal with the challenges they face. Only through reculturing, private universities can maintain the sustainability of its workforce and student population. The article has both theoretical and practical significance for private university leaders to follow.

Keywords: university leadership, reculturing, improvement, teacher education, motivation, private education

Procedia PDF Downloads 236
1033 Routing Metrics and Protocols for Wireless Mesh Networks

Authors: Samira Kalantary, Zohre Saatzade

Abstract:

Wireless Mesh Networks (WMNs) are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Thus, routing metrics and protocols are evolving by designing algorithms that consider link quality to choose the best routes. In this work, we analyse the state of the art in WMN metrics and propose taxonomy for WMN routing protocols. Performance measurements of a wireless mesh network deployed using various routing metrics are presented and corroborate our analysis.

Keywords: wireless mesh networks, routing protocols, routing metrics, bioinformatics

Procedia PDF Downloads 427
1032 "Project" Approach in Urban: A Response to Uncertainty

Authors: Mouhoubi Nedjima, Sassi Boudemagh Souad

Abstract:

In this paper, we will try to demonstrate the importance of the project approach in the urban to deal with uncertainty, the importance of the involvement of all stakeholders in the urban project process and that the absence of an actor can lead to project failure but also the importance of the urban project management. These points are handled through the following questions: Does the urban adhere to the theory of complexity? Does the project approach bring hope and solution to make urban planning "sustainable"? How converging visions of actors for the same project? Is the management of urban project the solution to support the urban project approach?

Keywords: strategic planning, project, urban project stakeholders, management

Procedia PDF Downloads 480
1031 Identification of Dynamic Friction Model for High-Precision Motion Control

Authors: Martin Goubej, Tomas Popule, Alois Krejci

Abstract:

This paper deals with experimental identification of mechanical systems with nonlinear friction characteristics. Dynamic LuGre friction model is adopted and a systematic approach to parameter identification of both linear and nonlinear subsystems is given. The identification procedure consists of three subsequent experiments which deal with the individual parts of plant dynamics. The proposed method is experimentally verified on an industrial-grade robotic manipulator. Model fidelity is compared with the results achieved with a static friction model.

Keywords: mechanical friction, LuGre model, friction identification, motion control

Procedia PDF Downloads 391
1030 Emerging Technologies for Learning: In Need of a Pro-Active Educational Strategy

Authors: Pieter De Vries, Renate Klaassen, Maria Ioannides

Abstract:

This paper is about an explorative research into the use of emerging technologies for teaching and learning in higher engineering education. The assumption is that these technologies and applications, which are not yet widely adopted, will help to improve education and as such actively work on the ability to better deal with the mismatch of skills bothering our industries. Technologies such as 3D printing, the Internet of Things, Virtual Reality, and others, are in a dynamic state of development which makes it difficult to grasp the value for education. Also, the instruments in current educational research seem not appropriate to assess the value of such technologies. This explorative research aims to foster an approach to better deal with this new complexity. The need to find out is urgent, because these technologies will be dominantly present in the near future in all aspects of life, including education. The methodology used in this research comprised an inventory of emerging technologies and tools that potentially give way to innovation and are used or about to be used in technical universities. The inventory was based on both a literature review and a review of reports and web resources like blogs and others and included a series of interviews with stakeholders in engineering education and at representative industries. In addition, a number of small experiments were executed with the aim to analyze the requirements for the use of in this case Virtual Reality and the Internet of Things to better understanding the opportunities and limitations in the day-today learning environment. The major findings indicate that it is rather difficult to decide about the value of these technologies for education due to the dynamic state of change and therefor unpredictability and the lack of a coherent policy at the institutions. Most decisions are being made by teachers on an individual basis, who in their micro-environment are not equipped to select, test and ultimately decide about the use of these technologies. Most experiences are being made in the industry knowing that the skills to handle these technologies are in high demand. The industry though is worried about the inclination and the capability of education to help bridge the skills gap related to the emergence of new technologies. Due to the complexity, the diversity, the speed of development and the decay, education is challenged to develop an approach that can make these technologies work in an integrated fashion. For education to fully profit from the opportunities, these technologies offer it is eminent to develop a pro-active strategy and a sustainable approach to frame the emerging technologies development.

Keywords: emerging technologies, internet of things, pro-active strategy, virtual reality

Procedia PDF Downloads 164
1029 The Impact of Temperamental Traits of Candidates for Aviation School on Their Strategies for Coping with Stress during Selection Exams in Physical Education

Authors: Robert Jedrys, Zdzislaw Kobos, Justyna Skrzynska, Zbigniew Wochynski

Abstract:

Professions connected to aviation require an assessment of the suitability of health, psychological and psychomotor skills and overall physical fitness of the organism, who applies. Assessment of the physical condition is conducted by the committees consisting of aero-medical specialists in clinical medicine and aviation. In addition, psychological predispositions should be evaluated by specialized psychologists familiar with the specifics of the tasks and requirements for the various positions in aviation. Both, physical abilities and general physical fitness of candidates for aviation shall be assessed during the selection exams, which also test the ability to deal with stress what is very important in aviation. Hence, the mentioned exams in physical education not only help to judge on the ranking in candidates in terms of their efficiency and performance, but also allows to evaluate the functioning under stress measured using psychological tests. Moreover, before-test stress is a predictors of successfulness in the next stages of education and practical training in the aviation. The aim of the study was to evaluate the influence of temperamental traits on strategies used for coping with stress during selection exams in physical education, deciding on admission to aviation school. The study involved 30 candidates for fighter pilot training in aviation school . To evaluate the temperament 'The Formal Characteristics of Behavior-Temperament Inventory' (FCB-TI) by B. Zawadzki and J.Strelau was used. To determine the pattern of coping with stress 'The Coping Inventory for Stressful Situations' (CISS) to N. S. Endler and J. D. A. Parker were engaged. Study of temperament and styles of coping with stress was conducted directly before the exam selection of physical education. The results were analyzed with 'Statistica 9' program. The studies showed that:-There is a negative correlation between such a temperament feature as 'perseverance' and preferred style of coping with stress concentrated on the task (r = -0.590; p < 0.004); -There is a positive correlation between such a feature of temperament as 'emotional reactivity,' and preference to deal with a stressful situation with ‘style centered on emotions’ (r = 0.520; p <0.011); -There is a negative correlation between such a feature of temperament as ‘strength’ and ‘style of coping with stress concentrated on emotions’ (r = -0.580; p < 0.004). Studies indicate that temperament traits determine the perception of stress and preferred coping styles used during the selection, as during the exams in physical education.

Keywords: aviation, physical education, stress, temperamental traits

Procedia PDF Downloads 235
1028 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 248
1027 Solutions to Probabilistic Constrained Optimal Control Problems Using Concentration Inequalities

Authors: Tomoaki Hashimoto

Abstract:

Recently, optimal control problems subject to probabilistic constraints have attracted much attention in many research field. Although probabilistic constraints are generally intractable in optimization problems, several methods haven been proposed to deal with probabilistic constraints. In most methods, probabilistic constraints are transformed to deterministic constraints that are tractable in optimization problems. This paper examines a method for transforming probabilistic constraints into deterministic constraints for a class of probabilistic constrained optimal control problems.

Keywords: optimal control, stochastic systems, discrete-time systems, probabilistic constraints

Procedia PDF Downloads 254
1026 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 376