Search results for: weaknesses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 335

Search results for: weaknesses

275 Planning for Sustainable Tourism in Chabahar Coastal Zone Using Swot Analysis

Authors: R. Karami, A. Gharaei

Abstract:

The aim of this study was to investigate ecotourism status in Chabahar coastal zone using swot analysis and strategic planning. Firstly, the current status of region was studied by literature review, field survey and statistical analysis. Then strengths and weaknesses (internal factors) were identified as well as opportunities and threats (external factors) using Delphi Method. Based on the obtained results, the total score of 2.46 in IFE matrix and 2.33 in the EFE matrix represents poor condition related to the internal and external factors respectively. This condition means both external and internal factors have not been utilized properly and the zone needs defensive plan; thus appropriate planning and organizational management practices are required to deal with these factors. Furthermore strategic goals, objectives and action plans in short, medium and long term schedule were formulated in attention to swot analysis.

Keywords: tourism, SWOT analysis, strategic planning, Chabahar

Procedia PDF Downloads 487
274 Application of Model Tree in the Prediction of TBM Rate of Penetration with Synthetic Minority Oversampling Technique

Authors: Ehsan Mehryaar

Abstract:

The rate of penetration is (RoP) one of the vital factors in the cost and time of tunnel boring projects; therefore, predicting it can lead to a substantial increase in the efficiency of the project. RoP is heavily dependent geological properties of the project site and TBM properties. In this study, 151-point data from Queen’s water tunnel is collected, which includes unconfined compression strength, peak slope index, angle with weak planes, and distance between planes of weaknesses. Since the size of the data is small, it was observed that it is imbalanced. To solve that problem synthetic minority oversampling technique is utilized. The model based on the model tree is proposed, where each leaf consists of a support vector machine model. Proposed model performance is then compared to existing empirical equations in the literature.

Keywords: Model tree, SMOTE, rate of penetration, TBM(tunnel boring machine), SVM

Procedia PDF Downloads 154
273 Human Rights as Part of the Core Values System of International Organisations: A Comparative Study

Authors: Ayyoub Jamali, Jennie Edlund, Alena Kozlová

Abstract:

This paper evaluates the monitoring, prevention, and enforcing mechanisms of the core values of international organisations (IOs) in a comparative human rights perspective. The IOs in focus are the European Union, the Council of Europe, the African Union, and the Organization of American States. The paper will take the founding treaties of these IOs and their relevant protocols as a starting point to identify the values and the mechanisms used for their implementation. It will explore the scope of violations, the procedures in place and evaluate what type of response to those breaches seems to work best in terms of achieving its declared objectives. The study will identify and compare the weaknesses and strengths of each mechanism used by the IOs and recognize common challenges and means, thereby drawing inter-organizational comparisons. Consequently, the findings of this paper can be used among the IOs to improve their system and thus enhance their effectiveness.

Keywords: international organizations, core values, human rights, enforcement mechanism, compliance

Procedia PDF Downloads 153
272 An Algorithm for Removal of Noise from X-Ray Images

Authors: Sajidullah Khan, Najeeb Ullah, Wang Yin Chai, Chai Soo See

Abstract:

In this paper, we propose an approach to remove impulse and Poisson noise from X-ray images. Many filters have been used for impulse noise removal from color and gray scale images with their own strengths and weaknesses but X-ray images contain Poisson noise and unfortunately there is no intelligent filter which can detect impulse and Poisson noise from X-ray images. Our proposed filter uses the upgraded layer discrimination approach to detect both Impulse and Poisson noise corrupted pixels in X-ray images and then restores only those detected pixels with a simple efficient and reliable one line equation. Our Proposed algorithms are very effective and much more efficient than all existing filters used only for Impulse noise removal. The proposed method uses a new powerful and efficient noise detection method to determine whether the pixel under observation is corrupted or noise free. Results from computer simulations are used to demonstrate pleasing performance of our proposed method.

Keywords: X-ray image de-noising, impulse noise, poisson noise, PRWF

Procedia PDF Downloads 357
271 Decoding the Structure of Multi-Agent System Communication: A Comparative Analysis of Protocols and Paradigms

Authors: Gulshad Azatova, Aleksandr Kapitonov, Natig Aminov

Abstract:

Multiagent systems have gained significant attention in various fields, such as robotics, autonomous vehicles, and distributed computing, where multiple agents cooperate and communicate to achieve complex tasks. Efficient communication among agents is a crucial aspect of these systems, as it directly impacts their overall performance and scalability. This scholarly work provides an exploration of essential communication elements and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of these protocols across various scenarios. The research also sheds light on emerging trends within communication protocols for multiagent systems, including the incorporation of machine learning methods and the adoption of blockchain-based solutions to ensure secure communication. These trends provide valuable insights into the evolving landscape of multiagent systems and their communication protocols.

Keywords: communication, multi-agent systems, protocols, consensus

Procedia PDF Downloads 43
270 Comparison of Buyback Contracts and Concession Regimes in the Regime of the Common Law System and the Islamic Legal Regime

Authors: Javid Zarei

Abstract:

International buyback contracts are a type of contract service. These kinds of contracts are the most important instrument for attracting foreign investors in accordance with Iran's laws. These contracts have been the basis of commercial and economic relations between Iran and foreign companies for about 30 years. The legal structure of this type of contract has gradually evolved, so today, an advanced generation of it under the title of Iran Petroleum Contract is being used in the industry of Iran. This article has analytically examined the issue of Iran's commercial contracts in the oil industry and contracting services and allocated sections to examine the strengths and weaknesses of these oil contracts. Also, this research is an attempt to examine and compare the Concession regime with the Buyback contracts, each of which is derived from the common law legal system and the Islamic legal system, respectively.

Keywords: buyback contracts, concession regime, ownership, common law legal system, Islamic legal system of Iran

Procedia PDF Downloads 59
269 Looking Forward, Looking Back: A Critical Reflection on the Impact of the Special Needs Assistant Scheme on Inclusionary Practices for Children with Significant Care Needs in the Irish Education System

Authors: C. P. Griffin

Abstract:

This paper seeks to critically review special educational needs (SEN) policy in the Irish education system since the introduction of the Education Act in 1998. In particular, the author seeks to focus on the impact of SEN policy on inclusionary practices for children with significant care needs in light of the introduction on the Special Needs Assistant (SNA) scheme. Following a systematic review of the literature, the growth of the SNA scheme in Ireland will be critically reviewed. Strengths and weaknesses of the scheme will be forwarded and comparisons drawn between contrasting international models of teaching assistant support. Based on this review, avenues for future research will be forwarded, with the aim of supporting effective inclusionary practices for children with SEN based on evidence-based practice.

Keywords: care needs, inclusion, Ireland, special needs assistants

Procedia PDF Downloads 251
268 The Doctrine of Military Necessity under Customary International Law: A Breach of International Humanitarian Law

Authors: Uche A. Nnawulezi

Abstract:

This paper examines an essential and complex part of International humanitarian law standards of military necessity. Military necessity is an unpredictable phenomenon. The unpredictability of this regulation likewise originates from the fact that is one of the most fundamental, yet most misjudged and distorted standards of international law of armed conflict. This rule has been censured as essentially wrong in light of its non-compliance with the principles of international humanitarian law in recent past. The author noted in this study that military necessity runs counter to humanitarian exigencies. These have generated debate among researchers for them to propose that for international law to be considered more important, it is indispensable that the procedures and substance of custom be illuminated and made accessible to every one of the individuals who may utilize it or be influenced by it. However, a significant number of analysts have attributed particular weaknesses to this doctrine. This study relied on both primary and secondary sources of data collection. Significantly, the recommendation made in this paper, if completely adopted, shall go a long way in guaranteeing a better application of the principles of international humanitarian law.

Keywords: military necessity, international law, international humanitarian law, customary law

Procedia PDF Downloads 187
267 The Impact of Health Tourism on Companies’ Performance: A Cross Country Analysis

Authors: Anna Paola Micheli, Carmelo Intrisano, Anna Maria Calce

Abstract:

This research focused on the capability of health tourism to improve the economic and financial performance of healthcare companies. It is assumed that health tourism companies have better profitability and financial efficiency because they can also count on cross-border demand differently from no health tourism companies. A three-level gap analysis was conducted: the first concerns health tourism companies located in Italy and in the other EU28 states; in the second Italian and EU28, no health tourism companies were compared; the third level is about the Italian system with a comparison between health tourism and no health tourism companies. Findings highlighted that Italian healthcare companies have better profitability performance if compared to European ones, but they present weaknesses in the financial position given the illiquidity and excessive leverage. Furthermore, studying the Italian system, we found that health tourism companies are more profitable than no health tourism companies.

Keywords: financial performance, gap analysis, health tourism, profitability performance, value creation

Procedia PDF Downloads 188
266 Reasons to Live - Positive Psychology and Self Determination Theory in the Prevention of Depression and Suicidal Ideation

Authors: Luiz Carlos Dias Lima De Oliveira

Abstract:

Psychology does not have the task of being confined only to the knowledge of losses, weaknesses or diseases, because it is necessary to give analogous dedication to the investigation of human virtues, efforts and aptitudes. The reasons for living with greater constancy and expressiveness act as a protective condition for risk behaviors, but with less constancy and expressiveness they can be a viable parameter of suicidal ideation or potential suicidal initiatives. In other words, Positive Psychology scientifically studies human strengths and virtues. In the same way, we refer to the basic psychological needs of the human being, according to the Theory of Self-Determination: the need for belonging, competence and autonomy to live the best possible life or the ability to make positive decisions in life. In this sense, following the assumptions of Positive Psychology, we raise the question of what are the reasons for living, seeking a way to draw attention to positive aspects of life.

Keywords: psychology, positive, self-determination, belonging, competence, autonomy, depression, suicide.

Procedia PDF Downloads 43
265 Analysis of Electric Mobility in the European Union: Forecasting 2035

Authors: Domenico Carmelo Mongelli

Abstract:

The context is that of great uncertainty in the 27 countries belonging to the European Union which has adopted an epochal measure: the elimination of internal combustion engines for the traction of road vehicles starting from 2035 with complete replacement with electric vehicles. If on the one hand there is great concern at various levels for the unpreparedness for this change, on the other the Scientific Community is not preparing accurate studies on the problem, as the scientific literature deals with single aspects of the issue, moreover addressing the issue at the level of individual countries, losing sight of the global implications of the issue for the entire EU. The aim of the research is to fill these gaps: the technological, plant engineering, environmental, economic and employment aspects of the energy transition in question are addressed and connected to each other, comparing the current situation with the different scenarios that could exist in 2035 and in the following years until total disposal of the internal combustion engine vehicle fleet for the entire EU. The methodologies adopted by the research consist in the analysis of the entire life cycle of electric vehicles and batteries, through the use of specific databases, and in the dynamic simulation, using specific calculation codes, of the application of the results of this analysis to the entire EU electric vehicle fleet from 2035 onwards. Energy balance sheets will be drawn up (to evaluate the net energy saved), plant balance sheets (to determine the surplus demand for power and electrical energy required and the sizing of new plants from renewable sources to cover electricity needs), economic balance sheets (to determine the investment costs for this transition, the savings during the operation phase and the payback times of the initial investments), the environmental balances (with the different energy mix scenarios in anticipation of 2035, the reductions in CO2eq and the environmental effects are determined resulting from the increase in the production of lithium for batteries), the employment balances (it is estimated how many jobs will be lost and recovered in the reconversion of the automotive industry, related industries and in the refining, distribution and sale of petroleum products and how many will be products for technological innovation, the increase in demand for electricity, the construction and management of street electric columns). New algorithms for forecast optimization are developed, tested and validated. Compared to other published material, the research adds an overall picture of the energy transition, capturing the advantages and disadvantages of the different aspects, evaluating the entities and improvement solutions in an organic overall picture of the topic. The results achieved allow us to identify the strengths and weaknesses of the energy transition, to determine the possible solutions to mitigate these weaknesses and to simulate and then evaluate their effects, establishing the most suitable solutions to make this transition feasible.

Keywords: engines, Europe, mobility, transition

Procedia PDF Downloads 37
264 A Comparative Study of Secondary Education Curriculum of Iran with Some Developed Countries in the World

Authors: Seyyed Abdollah Hojjati

Abstract:

Review in the areas of secondary education; it is a kind of comparative requires very careful scrutiny in educational structure of different countries,In upcoming review of the basic structure of our educational system in Islamic republic of Iran with somedeveloped countries in the world, Analyzing of strengthsand weaknesses in main areas, A simple review of the above methods do not consider this particular community, Modifythe desired result can be expressed in the secondary school curriculum and academic guidance of under graduate students in a skill-driven and creativity growth, It not just improves the health and dynamism of this period and increases the secondary teachers' authority and the relationship between teacher and student in this course will be meaningful and attractive, But with reduced of false prosperity and guaranteed institutes and quizzes, areas will be provided for students to enjoy the feeling ofthe psychological comfort and to have the highest growth of creativity .

Keywords: comparative, curriculum of secondary education, curriculum, Iran, developed countries

Procedia PDF Downloads 473
263 Knowing Where the Learning is a Shift from Summative to Formative Assessment

Authors: Eric Ho

Abstract:

Pedagogical approaches in Asia nowadays are imported from the West. In Confucian Heritage Culture (CHC), however, there is a dichotomy between the perceived benefits of Western pedagogies and the real classroom practices in Chinese societies. The success of Hong Kong students in large-scale international assessments has proved that both the strengths of both Western pedagogies and CHC educational approaches should be integrated for the sake of the students. University students aim to equip themselves with employability skills upon graduation. Formative assessments allow students to receive detailed, positive, and timely feedback and they can identify their strengths and weaknesses before they start working. However, there remains a question of whether university year 1 students who come from an examination-driven secondary education background are ready to respond to more formative assessments. The findings show that year 1 students are less concerned about competition in the university and more open to new teaching approaches that will allow them to improve as professionals in their major study areas.

Keywords: formative assessment, higher education, learning styles, Confucian heritage cultures

Procedia PDF Downloads 310
262 A Comprehensive Study on Quality Assurance in Game Development

Authors: Maria Komal, Zaineb Khalil, Mehreen Sirshar

Abstract:

Due to the recent technological advancements, Games have become one of the most demanding applications. Gaming industry is rapidly growing and the key to success in this industry is the development of good quality games, which is a highly competitive issue. The ultimate goal of game developers is to provide player’s satisfaction by developing high-quality games. This research is the comprehensive survey of techniques followed by game industries to ensure games quality. After analysis of various techniques, it has been found that quality simulation according to ISO standards and play test methods are used to ensure games quality. Because game development requires cross-disciplined team, an increasing trend towards distributed game development has been observed. This paper evaluates the strengths and weaknesses of current methodologies used in game industry and draws a conclusion. We have also proposed quality parameters which can be used as a heuristic framework to identify those attributes which have high testing priorities.

Keywords: game development, computer games, video games, gaming industry, quality assurance, playability, user experience

Procedia PDF Downloads 500
261 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 171
260 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 388
259 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 106
258 An Innovative Poly System Theory for the Go-Out of Chinese Culture

Authors: Jianhua Wang, Ying Zhou, Han Guo

Abstract:

Translation underwent culture turn for more than half a century, which brought translation and its studies beyond intra-texts. Different cultures in recent years have developed towards a translation turn, which made a great contribution to relocate national or local cultures being localized to become regional or global cultures. As China grows quickly economically integrating into the world, it becomes urgent to relate China’s story and disseminate the Chinese culture. Due to the weaknesses and drawbacks of different existing cultural translation theories for Chinese culture to go out, a new perspective on translation turn for the go-out of Chinese culture should be drawn to spread better and disseminate Chinese culture to other countries. Based on the existing cultural translation theories, the equivalence of ideology, style of the translator and agency of the support are proposed to draw a new perspective: an innovative poly-system theory for Chinese culture translation.

Keywords: cultural translation theory, Chinese culture, innovative poly system, global cultures

Procedia PDF Downloads 429
257 Empirical Exploration of Correlations between Software Design Measures: A Replication Study

Authors: Jehad Al Dallal

Abstract:

Software engineers apply different measures to quantify the quality of software design. These measures consider artifacts developed at low or high level software design phases. The results are used to point to design weaknesses and to indicate design points that have to be restructured. Understanding the relationship among the quality measures and among the design quality aspects considered by these measures is important to interpreting the impact of a measure for a quality aspect on other potentially related aspects. In addition, exploring the relationship between quality measures helps to explain the impact of different quality measures on external quality aspects, such as reliability and maintainability. In this paper, we report a replication study that empirically explores the correlation between six well known and commonly applied design quality measures. These measures consider several quality aspects, including complexity, cohesion, coupling, and inheritance. The results indicate that inheritance measures are weakly correlated to other measures, whereas complexity, coupling, and cohesion measures are mostly strongly correlated.  

Keywords: quality attribute, quality measure, software design quality, Spearman correlation

Procedia PDF Downloads 261
256 Low-Cost Reversible Logic Serial Multipliers with Error Detection Capability

Authors: Mojtaba Valinataj

Abstract:

Nowadays reversible logic has received many attentions as one of the new fields for reducing the power consumption. On the other hand, the processing systems have weaknesses against different external effects. In this paper, some error detecting reversible logic serial multipliers are proposed by incorporating the parity-preserving gates. This way, the new designs are presented for signed parity-preserving serial multipliers based on the Booth's algorithm by exploiting the new arrangements of existing gates. The experimental results show that the proposed 4×4 multipliers in this paper reach up to 20%, 35%, and 41% enhancements in the number of constant inputs, quantum cost, and gate count, respectively, as the reversible logic criteria, compared to previous designs. Furthermore, all the proposed designs have been generalized for n×n multipliers with general formulations to estimate the main reversible logic criteria as the functions of the multiplier size.

Keywords: Booth’s algorithm, error detection, multiplication, parity-preserving gates, quantum computers, reversible logic

Procedia PDF Downloads 193
255 Using Lean Six-Sigma in the Improvement of Service Quality at Aviation Industry: Case Study at the Departure Area in KKIA

Authors: Tareq Al Muhareb, Jasper Graham-Jones

Abstract:

The service quality is a significant element in aviation industry especially in the international airports. Through this paper, the researchers built a model based on Lean six sigma methodologies and applied it in the departure area at KKIA (King Khalid International Airport) in order to assess it. This model characterized with many special features that can become over the cultural differences in aviation industry since it is considered the most critical circumstance in this field. Applying the model of this study is depending on following the DMAIC procedure systemized in lean thinking aspects. This model of Lean-six-sigma as a managerial procedure is mostly focused on the change management culture that requires high level of planning, organizing, modifying, and controlling in order to benefit from strengths as well as revoke weaknesses.

Keywords: lean-six-sigma, service quality, aviation industry, KKIA (King Khalid International Airport), SERVQUAL

Procedia PDF Downloads 390
254 A Survey of Feature Selection and Feature Extraction Techniques in Machine Learning

Authors: Samina Khalid, Shamila Nasreen

Abstract:

Dimensionality reduction as a preprocessing step to machine learning is effective in removing irrelevant and redundant data, increasing learning accuracy, and improving result comprehensibility. However, the recent increase of dimensionality of data poses a severe challenge to many existing feature selection and feature extraction methods with respect to efficiency and effectiveness. In the field of machine learning and pattern recognition, dimensionality reduction is important area, where many approaches have been proposed. In this paper, some widely used feature selection and feature extraction techniques have analyzed with the purpose of how effectively these techniques can be used to achieve high performance of learning algorithms that ultimately improves predictive accuracy of classifier. An endeavor to analyze dimensionality reduction techniques briefly with the purpose to investigate strengths and weaknesses of some widely used dimensionality reduction methods is presented.

Keywords: age related macular degeneration, feature selection feature subset selection feature extraction/transformation, FSA’s, relief, correlation based method, PCA, ICA

Procedia PDF Downloads 460
253 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 58
252 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 134
251 The Comparison of Community Home-Based Care for the Aged in Kishiwada, Japan and Hangzhou, China

Authors: Zijiao Chai, Wangming Li

Abstract:

Hangzhou is one of the cities with the most serious aging in China. Community home-based care for the aged is an important solution to old-age care in aging society. In this aspect, Europe, the United States and Japan are on the top in the world. As an East Asian country, Japan has similar cultural traditions in pension with China. So, there is much enlightenment China can get from Japan in the mode of community home-based care for the aged. This paper introduces the mode of community home-based care for the aged in Kishiwada, Japan and Hangzhou, China. Then compare the two modes in the aspects of insurance system for the aged, community service and facilities, support system and so on. Thereby the success experience of Kishiwada and weaknesses of Hangzhou are summarized. At last, the improvement strategy of facility plan and service mode of community home-based care for the aged in China are also proposed.

Keywords: community, comparison, elderly-oriented, home-based care for the aged, support system

Procedia PDF Downloads 483
250 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 208
249 Project Management at University: Towards an Evaluation Process around Cooperative Learning

Authors: J. L. Andrade-Pineda, J.M. León-Blanco, M. Calle, P. L. González-R

Abstract:

The enrollment in current Master's degree programs usually pursues gaining the expertise required in real-life workplaces. The experience we present here concerns the learning process of "Project Management Methodology (PMM)", around a cooperative/collaborative mechanism aimed at affording students measurable learning goals and providing the teacher with the ability of focusing on the weaknesses detected. We have designed a mixed summative/formative evaluation, which assures curriculum engage while enriches the comprehension of PMM key concepts. In this experience we converted the students into active actors in the evaluation process itself and we endowed ourselves as teachers with a flexible process in which along with qualifications (score), other attitudinal feedback arises. Despite the high level of self-affirmation on their discussion within the interactive assessment sessions, they ultimately have exhibited a great ability to review and correct the wrong reasoning when that was the case.

Keywords: cooperative-collaborative learning, educational management, formative-summative assessment, leadership training

Procedia PDF Downloads 144
248 Damages Inflicted on Steel Structures and Metal Buildings due to Insufficient Supervision and Monitoring and Non-Observance of the Rules of the Regulations

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provides appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 104
247 A Review of Methods for Handling Missing Data in the Formof Dropouts in Longitudinal Clinical Trials

Authors: A. Satty, H. Mwambi

Abstract:

Much clinical trials data-based research are characterized by the unavoidable problem of dropout as a result of missing or erroneous values. This paper aims to review some of the various techniques to address the dropout problems in longitudinal clinical trials. The fundamental concepts of the patterns and mechanisms of dropout are discussed. This study presents five general techniques for handling dropout: (1) Deletion methods; (2) Imputation-based methods; (3) Data augmentation methods; (4) Likelihood-based methods; and (5) MNAR-based methods. Under each technique, several methods that are commonly used to deal with dropout are presented, including a review of the existing literature in which we examine the effectiveness of these methods in the analysis of incomplete data. Two application examples are presented to study the potential strengths or weaknesses of some of the methods under certain dropout mechanisms as well as to assess the sensitivity of the modelling assumptions.

Keywords: incomplete longitudinal clinical trials, missing at random (MAR), imputation, weighting methods, sensitivity analysis

Procedia PDF Downloads 388
246 The Differences in Normative Beliefs among Schoolchildren with Reactive, Proactive, Reactive-Proactive Aggression, and without Aggression

Authors: Annis Lai Chu Fung

Abstract:

This study is to fill up a research gap on examining the differences in normative beliefs (namely acceptance of weaknesses, acceptance of provoked aggression, and acceptance of unprovoked aggression) among different subtypes of aggressors and non-aggressors (reactive aggressors, proactive aggressors, reactive-proactive aggressors, and non-aggressors,). 2,236 students (1,372 males and 864 females), aged from 11 to 18, completed a self-reported questionnaire. Results revealed that (a) schoolchildren with reactive-proactive aggression have the highest acceptance of provoked aggression, the highest acceptance of unprovoked aggression, and the lowest acceptance of weakness; (b) schoolchildren with proactive aggression have higher acceptance of unprovoked aggression and lower acceptance of weakness than reactive aggressors; and (c) schoolchildren without aggression have the lowest acceptance of provoked aggression, the lowest acceptance of unprovoked aggression, and the highest acceptance of weakness.

Keywords: normative belief, schoolchildren, reactive, proactive, aggression

Procedia PDF Downloads 258