Search results for: transformation and security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9571

Search results for: transformation and security challenges

8551 Effect of Heating Rate on Microstructural Developments in Cold Heading Quality Steel Used for Automotive Applications

Authors: Shahid Hussain Abro, F. Mufadi, A. Boodi

Abstract:

Microstructural study and phase transformation in steels is a basic and important step during the design of structural steel. There are huge efforts and study has been done so far on phase transformations, due to so many steel grades available commercially the phase development in steel has different consequences. In the present work an effort has been made to study the effect of heating rate on microstructural features of cold heading quality steel. The SEM, optical microscopy, and heat treatment techniques have been applied to observe the microstructural features in the experimental steel. It was observed that heating rate has the strong influence on phase transformation of CHQ steel under investigation. Heating rate increases the austenite formation kinetics with respect to holding time, and this austenite has been transformed to martensite upon cooling. Heating rate also plays a vital role on nucleation sites of austenite formation in the experimental steel.

Keywords: CHQ steel, austenite formation, heating rate, nucleation

Procedia PDF Downloads 410
8550 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 138
8549 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 511
8548 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 298
8547 Educating for Acceptance or Action: Bachelor of Social Work Education in Canada

Authors: Elizabeth Radian

Abstract:

In a challenging era of neoliberalism and managerialism in social services, the status of Canadian social work education at the Bachelor of Social Work level (BSW) was examined to determine how prepared students were to practice in a time of resource cutbacks and insecurity. Curricula in BSW programs was the focus as this generalist degree results in the greatest number of social work graduates in Canada, most of whom work at the front lines in service delivery. The study reviewed the practice frameworks that students in BSW programs were exposed to. Traditionally, schools of social work have embraced two major practice frameworks. The person in environment framework is a well-established practice framework taught in most schools. The framework offers some focus on smaller scale social change, tweaking existing arrangements and is more accepting of the status quo. An alternate practice framework taught in fewer schools has been described as a structural, progressive or anti oppressive framework. This latter framework challenges the status quo, is focused on social justice and social transformation, often incorporating social action strategies to ensure marginalized voices are heard. Using a content analysis methodology of keywords and phrases to delineate framework orientation, practice frameworks articulated in the curricula were determined by reviewing the mission/mandate of schools offering a BSW degree, their core course outlines and core course textbooks. Social action, as one strategy for initiating social change and transformation was considered. Initial research for 28 schools was completed in 2000, with follow up replications of the initial study in 2005 and 2014. These earlier studies displayed that the dominant practice framework taught in BSW programs was the person in environment framework. A lesser number of schools were categorized as primarily offering a structural, progressive or anti oppressive framework. The findings from the current study of 39 Canadian schools of social work are considered to determine how prominent structural, progressive and anti oppressive frameworks exist in current BSW curricula. This study can assist in contemplating the question – are we educating future practitioners for acceptance or action.

Keywords: social work education and pedagogy, social change, social justice, social services

Procedia PDF Downloads 192
8546 Online Formative Assessment Challenges Experienced by Grade 10 Physical Sciences Teachers during Remote Teaching and Learning

Authors: Celeste Labuschagne, Sam Ramaila, Thasmai Dhurumraj

Abstract:

Although formative assessment is acknowledged as crucial for teachers to gauge students’ understanding of subject content, applying formative assessment in an online context is more challenging than in a traditional Physical Sciences classroom. This study examines challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. The empirical investigation adopted a generic qualitative design and involved three purposively selected Grade 10 Physical Sciences teachers from three different schools and quintiles within the Tshwane North District in South Africa. Data were collected through individual and focus group interviews. Technological, pedagogical, and content knowledge (TPACK) was utilised as a theoretical framework underpinning the study. The study identified a myriad of challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. These challenges include the utilisation of Annual Teaching Plans, lack of technological knowledge, and internet connectivity. The Department of Basic Education faces the key imperative to provide continuous teacher professional development and concomitant online learning materials that can facilitate meaningful enactment of online formative assessment in various educational settings.

Keywords: COVID-19, challenges, online formative assessment, physical sciences, TPACK

Procedia PDF Downloads 66
8545 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 184
8544 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 221
8543 Open Innovation Strategy (OIS) Paradigm and an OIS Capabilities Model

Authors: Anastasis D. Petrou

Abstract:

Innovation and strategy discussions do highlight open innovation as a new paradigm in business. Yet, a number of stumbling blocks in the form of closed innovation principles weaved into the fabric of a traditional business model stand in the way of the new paradigm’s momentum to increase value in various business contexts. The paper argues that businesses considering an engagement with the open innovation paradigm would need to take steps to improve their multiplicative, absorptive and relational capabilities, respectively. The needed improvements would amount to a business model evolutionary transformation and eventually bring about a paradigm overhaul in business. The transformation is worth staging over time to ensure that open innovation is developed across interconnected and partnered areas of strategic importance. This article develops an open innovation strategy (OIS) capabilities model, and employs examples from different industries to briefly discuss OIS’s potential to augment business value in a number of suggested areas for future research.

Keywords: close innovation, open innovation paradigm, open innovation strategy (OIS) paradigm, OIS capabilities model, multiplicative capability, absorptive capability, relational capability

Procedia PDF Downloads 520
8542 On the Study of All Waterloo Automaton Semilattices

Authors: Mikhail Abramyan, Boris Melnikov

Abstract:

The aim is to study the set of subsets of grids of the Waterloo automaton and the set of covering automata defined by the grid subsets. The study was carried out using the library for working with nondeterministic finite automata NFALib implemented by one of the authors (M. Abramyan) in C#. The results are regularities obtained when considering semilattices of covering automata for the Waterloo automaton. A complete description of the obtained semilattices from the point of view of equivalence of the covering automata to the original Waterloo automaton is given, the criterion of equivalence of the covering automaton to the Waterloo automaton in terms of properties of the subset of grids defining the covering automaton is formulated. The relevance of the subject area under consideration is due to the need to research a set of regular languages and, in particular, a description of their various subclasses. Also relevant are the problems that may arise in some subclasses. This will give, among other things, the possibility of describing new algorithms for the equivalent transformation of nondeterministic finite automata.

Keywords: nondeterministic finite automata, universal automaton, grid, covering automaton, equivalent transformation algorithms, the Waterloo automaton

Procedia PDF Downloads 87
8541 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 344
8540 Effect of Non-Fat Solid Ratio on Bloom Formation in Untempered Chocolate

Authors: Huanhuan Zhao, Bryony J. James

Abstract:

The relationship between the non-fat solid ratio and bloom formation in untempered chocolate was investigated using two types of chocolate: model chocolate made of varying cocoa powder ratios (46, 49.5 and 53%) and cocoa butter, and commercial Lindt chocolate with varying cocoa content (70, 85 and 90%). X-ray diffraction and colour measurement techniques were used to examine the polymorphism of cocoa butter and the surface whiteness index (WI), respectively. The polymorphic transformation of cocoa butter was highly correlated with the changes of WI during 30 days of storage since it led to the redistribution of fat within the chocolate matrix and resulted in a bloomed surface. The change in WI indicated a similar bloom rate in the chocolates, but the model chocolates with a higher cocoa powder ratio had more pronounced total bloom. This is due to a higher ratio of non-fat solid particles on the surface resulting in microscopic changes in morphology. The ratio of non-fat solids is an important factor in determining the extent of bloom but not the bloom rate.

Keywords: untempered chocolate, microstructure of bloom, polymorphic transformation, surface whiteness

Procedia PDF Downloads 346
8539 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 242
8538 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 497
8537 Continuous Land Cover Change Detection in Subtropical Thicket Ecosystems

Authors: Craig Mahlasi

Abstract:

The Subtropical Thicket Biome has been in peril of transformation. Estimates indicate that as much as 63% of the Subtropical Thicket Biome is severely degraded. Agricultural expansion is the main driver of transformation. While several studies have sought to document and map the long term transformations, there is a lack of information on disturbance events that allow for timely intervention by authorities. Furthermore, tools that seek to perform continuous land cover change detection are often developed for forests and thus tend to perform poorly in thicket ecosystems. This study investigates the utility of Earth Observation data for continuous land cover change detection in Subtropical Thicket ecosystems. Temporal Neural Networks are implemented on a time series of Sentinel-2 observations. The model obtained 0.93 accuracy, a recall score of 0.93, and a precision score of 0.91 in detecting Thicket disturbances. The study demonstrates the potential of continuous land cover change in Subtropical Thicket ecosystems.

Keywords: remote sensing, land cover change detection, subtropical thickets, near-real time

Procedia PDF Downloads 162
8536 Medical and Surgical Nursing Care

Authors: Nassim Salmi

Abstract:

This study aimed to identify the administrative, social, cultural, economic and psychological challenges facing the nursing s ector in the Tebessa Algeria. It also seeks to identify whether there are differences between the opinions of managers in public and private hospitals about these challenges. To achieve the objectives of the study, the descriptive analytical method was adopted. The study also used the questionnaire as a tool for collecting the necessary data and information, which was applied to a sample of directors of public and private hospitals in the Tebessa, which amounted to (114) individuals. The study reached a set of results, including: that there are no statistically significant differences between the opinions of managers in public and private hospitals about the administrative, social, cultural, economic and psychological challenges facing the nursing sector in the Tebessa . The results also showed agreement between the views of managers in private public hospitals that the most important administrative challenges are the lack of training programs that affect the efficiency and performance of nursing work, and that the most important social and cultural challenges are the hospital’s failure to provide suitable nurseries for Saudi female nurses, and that the most important economic challenges are the lack of Availability of medical equipment and devices, and the most important psychological challenge is the tense relationship between the administration and the hospital's nursing staff. The study recommended focusing on the importance of rehabilitation and training together, activating the role of training in the ministry and making it compulsory and a condition of renewal for practicing and continuing the nursing profession, and providing the social and economic needs of the nursing staff.

Keywords: postoperative care, gynecology, nursing documentation, database

Procedia PDF Downloads 88
8535 Design of Two-Channel Quadrature Mirror Filter Banks Using a Transformation Approach

Authors: Ju-Hong Lee, Yi-Lin Shieh

Abstract:

Two-dimensional (2-D) quadrature mirror filter (QMF) banks have been widely considered for high-quality coding of image and video data at low bit rates. Without implementing subband coding, a 2-D QMF bank is required to have an exactly linear-phase response without magnitude distortion, i.e., the perfect reconstruction (PR) characteristics. The design problem of 2-D QMF banks with the PR characteristics has been considered in the literature for many years. This paper presents a transformation approach for designing 2-D two-channel QMF banks. Under a suitable one-dimensional (1-D) to two-dimensional (2-D) transformation with a specified decimation/interpolation matrix, the analysis and synthesis filters of the QMF bank are composed of 1-D causal and stable digital allpass filters (DAFs) and possess the 2-D doubly complementary half-band (DC-HB) property. This facilitates the design problem of the two-channel QMF banks by finding the real coefficients of the 1-D recursive DAFs. The design problem is formulated based on the minimax phase approximation for the 1-D DAFs. A novel objective function is then derived to obtain an optimization for 1-D minimax phase approximation. As a result, the problem of minimizing the objective function can be simply solved by using the well-known weighted least-squares (WLS) algorithm in the minimax (L∞) optimal sense. The novelty of the proposed design method is that the design procedure is very simple and the designed 2-D QMF bank achieves perfect magnitude response and possesses satisfactory phase response. Simulation results show that the proposed design method provides much better design performance and much less design complexity as compared with the existing techniques.

Keywords: Quincunx QMF bank, doubly complementary filter, digital allpass filter, WLS algorithm

Procedia PDF Downloads 225
8534 A Deterministic Large Deviation Model Based on Complex N-Body Systems

Authors: David C. Ni

Abstract:

In the previous efforts, we constructed N-Body Systems by an extended Blaschke product (EBP), which represents a non-temporal and nonlinear extension of Lorentz transformation. In this construction, we rely only on two parameters, nonlinear degree, and relative momentum to characterize the systems. We further explored root computation via iteration with an algorithm extended from Jenkins-Traub method. The solution sets demonstrate a form of σ+ i [-t, t], where σ and t are the real numbers, and the [-t, t] shows various canonical distributions. In this paper, we correlate the convergent sets in the original domain with solution sets, which demonstrating large-deviation distributions in the codomain. We proceed to compare our approach with the formula or principles, such as Donsker-Varadhan and Wentzell-Freidlin theories. The deterministic model based on this construction allows us to explore applications in the areas of finance and statistical mechanics.

Keywords: nonlinear Lorentz transformation, Blaschke equation, iteration solutions, root computation, large deviation distribution, deterministic model

Procedia PDF Downloads 393
8533 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 181
8532 Permeability Prediction Based on Hydraulic Flow Unit Identification and Artificial Neural Networks

Authors: Emad A. Mohammed

Abstract:

The concept of hydraulic flow units (HFU) has been used for decades in the petroleum industry to improve the prediction of permeability. This concept is strongly related to the flow zone indicator (FZI) which is a function of the reservoir rock quality index (RQI). Both indices are based on reservoir porosity and permeability of core samples. It is assumed that core samples with similar FZI values belong to the same HFU. Thus, after dividing the porosity-permeability data based on the HFU, transformations can be done in order to estimate the permeability from the porosity. The conventional practice is to use the power law transformation using conventional HFU where percentage of error is considerably high. In this paper, neural network technique is employed as a soft computing transformation method to predict permeability instead of power law method to avoid higher percentage of error. This technique is based on HFU identification where Amaefule et al. (1993) method is utilized. In this regard, Kozeny and Carman (K–C) model, and modified K–C model by Hasan and Hossain (2011) are employed. A comparison is made between the two transformation techniques for the two porosity-permeability models. Results show that the modified K-C model helps in getting better results with lower percentage of error in predicting permeability. The results also show that the use of artificial intelligence techniques give more accurate prediction than power law method. This study was conducted on a heterogeneous complex carbonate reservoir in Oman. Data were collected from seven wells to obtain the permeability correlations for the whole field. The findings of this study will help in getting better estimation of permeability of a complex reservoir.

Keywords: permeability, hydraulic flow units, artificial intelligence, correlation

Procedia PDF Downloads 136
8531 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State

Authors: Godiya Pius Atsiya

Abstract:

One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.

Keywords: changing democratic state, policy measures, terrorism, women

Procedia PDF Downloads 233
8530 Universality as Opportunity Domain behind the Threats and Challenges of Natural Disasters

Authors: Kunto Wibowo Agung Prodjonoto

Abstract:

Occasionally, opportunities occur not due to chances but threats. This, however, is often not realized because a greater threat is perceived to be anything that threatens, endangers, or harms, resulting in bad impacts that are also part of the risk and consequence. As a result, more focus tends to direct towards the bad impacts. Risk, in this case, shall be seen rather as something challenging, which can turn to be an opportunity to tackle an obstacle. Therefore, it does not seem exaggerating if later, risk can be considered as a challenge that presents an opportunity. So as in the context of the threat of natural disasters which gives an idea that opportunities exist. Nature referred to in a fashion as 'natural disasters' captured an expression to picture the 'threats' aspect, which instructively implying a chance of opportunity. This is quite logical, as SWOT (strengths, weaknesses, opportunities, threats) analysis can evaluate the situation at hand related to the analysis of various factors in formulating strategies to deal with natural disaster situations. The analytical method created by Albert Humphrey is indeed not an analytical tool to provide solutions, but certainly 'opportunities and challenges' are discussed therein on a vertical line, where opportunities are posited on the positive axis, and threats are posed on the negative axis. Observing this dynamism, the challenges and threats of disasters are having opportunity relevance to moralizing opportunities, that by quality poses universalism populist characteristics, universalism characteristics, and regional characteristics. Here, universalism appears as an opportunity domain underneath the threats and challenges of natural disasters.

Keywords: universality, opportunities, threats, challenges of natural disasters

Procedia PDF Downloads 151
8529 Design Transformation to Reduce Cost in Irrigation Using Value Engineering

Authors: F. S. Al-Anzi, M. Sarfraz, A. Elmi, A. R. Khan

Abstract:

Researchers are responding to the environmental challenges of Kuwait in localized, innovative, effective and economic ways. One of the vital and significant examples of the natural challenges is lack or water and desertification. In this research, the project team focuses on redesigning a prototype, using Value Engineering Methodology, which would provide similar functionalities to the well-known technology of Waterboxx kits while reducing the capital and operational costs and simplifying the process of manufacturing and usability by regular farmers. The design employs used tires and recycled plastic sheets as raw materials. Hence, this approach is going to help not just fighting desertification but also helping in getting rid of ever growing huge tire dumpsters in Kuwait, as well as helping in avoiding hazards of tire fires yielding in a safer and friendlier environment. Several alternatives for implementing the prototype have been considered. The best alternative in terms of value has been selected after thorough Function Analysis System Technique (FAST) exercise has been developed. A prototype has been fabricated and tested in a controlled simulated lab environment that is being followed by real environment field testing. Water and soil analysis conducted on the site of the experiment to cross compare between the composition of the soil before and after the experiment to insure that the prototype being tested is actually going to be environment safe. Experimentation shows that the design was equally as effective as, and may exceed, the original design with significant savings in cost. An estimated total cost reduction using the VE approach of 43.84% over the original design. This cost reduction does not consider the intangible costs of environmental issue of waste recycling which many further intensify the total savings of using the alternative VE design. This case study shows that Value Engineering Methodology can be an important tool in innovating new designs for reducing costs.

Keywords: desertification, functional analysis, scrap tires, value engineering, waste recycling, water irrigation rationing

Procedia PDF Downloads 200
8528 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 154
8527 Urban Agriculture in a Scandinavian Context as a Tool for Climate Adaption and for Empowering Communities through Food Production

Authors: Signe Voltelen, Kristin Astrup Aas

Abstract:

In the Scandinavian cities, there is a raised focus on the potential of using urban agriculture in city development, both as a tool for handling challenges provoked by climate change and to develop new, and stronger social communities. During the last couple of years, Copenhagen has experienced an increase in extreme weather resulting in dramatical floods with huge humanitarian and economic consequences. As an approach for climate adaption and mitigation the government has made a strategy for changing a significant amount of the cities hard surfaces into green and absorbing surfaces. Including urban farms and gardens. In close collaboration with the municipality, it has been possible to implement citizen-run gardens under the different concepts climate adaption and food literacy. Like other European cities, Copenhagen has a historical tradition of small-scale farming for food security inside the city, and in the outskirts of the urban area. Lately, this tradition has gotten new relevance, and new initiatives are popping up. In addition to providing local food, the urban farm becomes a semi-public, semi-private room that invites to community and integration across ethnicity, social background, and age. The direct interaction in the process of farming creates a connection between the urban and the rural and are educational for people growing up and living their whole life in the dense city. In the paper, three local example models of urban agriculture are presented, and the experiences of their potential as tools for developing social and environmental sustainable cities is examined.

Keywords: city development, climate mitigation, community building, urban agriculture, urban- rural transition, food security

Procedia PDF Downloads 285
8526 Integrating Technology into Foreign Language Teaching: A Closer Look at Arabic Language Instruction at the Australian National University

Authors: Kinda Alsamara

Abstract:

Foreign language education is a complex endeavor that often presents educators with a range of challenges and difficulties. This study shed light on the specific challenges encountered in the context of teaching Arabic as a foreign language at the Australian National University (ANU). Drawing from real-world experiences and insights, we explore the multifaceted nature of these challenges and discuss strategies that educators have employed to address them. The challenges in teaching the Arabic language encompass various dimensions, including linguistic intricacies, cultural nuances, and diverse learner backgrounds. The complex Arabic script, grammatical structures, and pronunciation patterns pose unique obstacles for learners. Moreover, the cultural context embedded within the language demands a nuanced understanding of cultural norms and practices. The diverse backgrounds of learners further contribute to the challenge of tailoring instruction to meet individual needs and proficiency levels. This study also underscores the importance of technology in tackling these challenges. Technological tools and platforms offer innovative solutions to enhance language acquisition and engagement. Online resources, interactive applications, and multimedia content can provide learners with immersive experiences, aiding in overcoming barriers posed by traditional teaching methods. Furthermore, this study addresses the role of instructors in mitigating challenges. Educators often find themselves adapting teaching approaches to accommodate different learning styles, abilities, and motivations. Establishing a supportive learning environment and fostering a sense of community can contribute significantly to overcoming challenges related to learner diversity. In conclusion, this study provides a comprehensive overview of the challenges faced in teaching Arabic as a foreign language at ANU. By recognizing these challenges and embracing technological and pedagogical advancements, educators can create more effective and engaging learning experiences for students pursuing Arabic language proficiency.

Keywords: Arabic, Arabic online, blended learning, teaching and learning, Arabic language, educational aids, technology

Procedia PDF Downloads 63
8525 English as a Medium of Instruction in Tunisian Higher Education Institutions: Exploring Attitudes, Challenges, and Opportunities

Authors: Karim Karmi

Abstract:

To keep pace with the requirements of globalization, a lot of universities across the globe have started teaching various academic subjects in English. In Tunisia, two higher education institutions have embarked on the experience of teaching in English instead of French. The aim of the present study was threefold. First, it sought to explore the stakeholders’ attitudes toward this shift. By stakeholders, we mean students and teachers. Second, it aimed at probing the challenges that might arise in the classroom. By challenges, we mean the linguistic and pedagogical difficulties that students and teachers might face. Third, the study investigated the reasons that led teachers and students to opt for English as a medium of instruction instead of French. The participants were 335 students and 14 teachers selected from two Tunisian universities teaching in English. Data was collected by means of questionnaires, interviews, and classroom observations. The findings showed that there is a positive attitude towards English, in contrast to French. In other words, both students and teachers are enjoying the experience, and they hope that English will officially become the medium of instruction in Tunisia. Students and teachers reported a number of linguistic and pedagogical challenges, and they mainly ascribed them to the abrupt transition from French to English. The vast majority of the respondents, be they students or teachers, opted for English as a medium of instruction to maximise their chances of getting a job abroad. It is also worth noting that most teachers stated that teaching through English helps them when it comes to publishing academic articles.

Keywords: attitudes, challenges, English as a medium of instruction, opportunities

Procedia PDF Downloads 46
8524 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 261
8523 Examination of the South African Fire Legislative Framework

Authors: Mokgadi Julia Ngoepe-Ntsoane

Abstract:

The article aims to make a case for a legislative framework for the fire sector in South Africa. Robust legislative framework is essential for empowering those with obligatory mandate within the sector. This article contributes to the body of knowledge in the field of policy reviews particularly with regards to the legal framework. It has been observed overtime that the scholarly contributions in this field are limited. Document analysis was the methodology selected for the investigation of the various legal frameworks existing in the country. It has been established that indeed the national legislation on the fire industry does not exist in South Africa. From the documents analysed, it was revealed that the sector is dominated by cartels who are exploiting the new entrants to the market particularly SMEs. It is evident that these cartels are monopolising the system as they have long been operating in the system turning it into self- owned entities. Commitment to addressing the challenges faced by fire services and creating a framework for the evolving role that fire brigade services are expected to execute in building safer and sustainable communities is vital. Legislation for the fire sector ought to be concluded with immediate effect. The outdated national fire legislation has necessitated the monopolisation and manipulation of the system by dominating organisations which cause a painful discrimination and exploitation of smaller service providers to enter the market for trading in that occupation. The barrier to entry bears long term negative effects on national priority areas such as employment creation, poverty, and others. This monopolisation and marginalisation practices by cartels in the sector calls for urgent attention by government because if left attended, it will leave a lot of people particularly women and youth being disadvantaged and frustrated. The downcast syndrome exercised within the fire sector has wreaked havoc and is devastating. This is caused by cartels that have been within the sector for some time, who know the strengths and weaknesses of processes, shortcuts, advantages and consequences of various actions. These people take advantage of new entrants to the sector who in turn find it difficult to manoeuvre, find the market dissonant and end up giving up their good ideas and intentions. There are many pieces of legislation which are industry specific such as housing, forestry, agriculture, health, security, environmental which are used to regulate systems within the institutions involved. Other regulations exist as bi-laws for guiding the management within the municipalities.

Keywords: sustainable job creation, growth and development, transformation, risk management

Procedia PDF Downloads 175
8522 Digital Transformation, Financing Microstructures, and Impact on Well-Being and Income Inequality

Authors: Koffi Sodokin

Abstract:

Financing microstructures are increasingly seen as a means of financial inclusion and improving overall well-being in developing countries. In practice, digital transformation in finance can accelerate the optimal functioning of financing microstructures, such as access by households to microfinance and microinsurance. Large households' access to finance can lead to a reduction in income inequality and an overall improvement in well-being. This paper explores the impact of access to digital finance and financing microstructures on household well-being and the reduction of income inequality. To this end, we use the propensity score matching, the double difference, and the smooth instrumental quantile regression as estimation methods with two periods of survey data. The paper uses the FinScope consumer data (2016) and the Harmonized Living Standards Measurement Study (2018) from Togo in a comparative perspective. The results indicate that access to digital finance, as a cultural game changer, and to financing microstructures improves overall household well-being and contributes significantly to reducing income inequality.

Keywords: financing microstructure, microinsurance, microfinance, digital finance, well-being, income inequality

Procedia PDF Downloads 89