Search results for: national security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10150

Search results for: national security strategy

9040 Unearthing Air Traffic Control Officers Decision Instructional Patterns From Simulator Data for Application in Human Machine Teams

Authors: Zainuddin Zakaria, Sun Woh Lye

Abstract:

Despite the continuous advancements in automated conflict resolution tools, there is still a low rate of adoption of automation from Air Traffic Control Officers (ATCOs). Trust or acceptance in these tools and conformance to the individual ATCO preferences in strategy execution for conflict resolution are two key factors that impact their use. This paper proposes a methodology to unearth and classify ATCO conflict resolution strategies from simulator data of trained and qualified ATCOs. The methodology involves the extraction of ATCO executive control actions and the establishment of a system of strategy resolution classification based on ATCO radar commands and prevailing flight parameters in deconflicting a pair of aircraft. Six main strategies used to handle various categories of conflict were identified and discussed. It was found that ATCOs were about twice more likely to choose only vertical maneuvers in conflict resolution compared to horizontal maneuvers or a combination of both vertical and horizontal maneuvers.

Keywords: air traffic control strategies, conflict resolution, simulator data, strategy classification system

Procedia PDF Downloads 148
9039 Clean Technology: Hype or Need to Have

Authors: Dirk V. H. K. Franco

Abstract:

For many of us a lot of phenomena are considered a risk. Examples are: climate change, decrease of biodiversity, amount of available, clean water and the decreasing variety of living organism in the oceans. On the other hand a lot of people perceive the following trends as catastrophic: the sea level, the melting of the pole ice, the numbers of tornado’s, floods and forest fires, the national security and the potential of 192 million climate migrants in 2060. The interest for climate, health and the possible solutions is large and common. The 5th IPCC states that the last decades especially human activities (and in second order natural emissions) have caused large, mainly negative impacts on our ecological environments. Chris Stringer stated that we represent, nowadays after evolution, the only one version of the possible humanity. At this very moment we are faced with an (over) crowded planet together with global climate changes and a strong demand for energy and material resources. Let us hope that we can counter these difficulties either with better application of existing technologies or by inventing new (applications of) clean technologies together with new business models.

Keywords: clean technologies, catastrophic, climate, possible solutions

Procedia PDF Downloads 499
9038 A Refinement Strategy Coupling Event-B and Planning Domain Definition Language (PDDL) for Planning Problems

Authors: Sabrine Ammar, Mohamed Tahar Bhiri

Abstract:

Automatic planning has a de facto standard language called Planning Domain Definition Language (PDDL) for describing planning problems. It aims to formalize the planning problems described by the concept of state space. PDDL-related dynamic analysis tools, namely planners and validators, are insufficient for verifying and validating PDDL descriptions. Indeed, these tools made it possible to detect errors a posteriori by means of test activity. In this paper, we recommend a formal approach coupling the two languages Event-B and PDDL, for automatic planning. Event-B is used for formal modeling by stepwise refinement with mathematical proofs of planning problems. Thus, this paper proposes a refinement strategy allowing to obtain reliable PDDL descriptions from an ultimate Event-B model correct by construction. The ultimate Event-B model, correct by construction which is supposed to be translatable into PDDL, is automatically translated into PDDL using our MDE Event-B2PDDL tool.

Keywords: code generation, event-b, PDDL, refinement strategy, translation rules

Procedia PDF Downloads 196
9037 The Quality of Fishery Product on the Moldovan Market, Regulations, National Institutions, Controls and Non-Compliant Products

Authors: Mihaela Munteanu (Pila), Silvius Stanciu

Abstract:

This paper presents the aspects of the official control of fishery in the Republic of Moldova. Currently, the regulations and the activity of national institutions with responsibilities in the field of food quality are in a process of harmonization with the European rules, aiming at European integration, quality improvement and providing a higher level of food safety. The National Agency for Food Safety is the main national body with responsibilities in the field of food safety. In the field of fishery products, the Agency carries out an intensive activity of informing the citizen and controlling the products marketed. The paper presents the dangers related to the consumption of fish and fishery products traded on the national market, the sanitary-veterinary inspections conducted by the profile institution and the improper situations identified. The national market of fishery products depends largely on imports, mainly focused on ocean fish. The research carried out has shown that during the period 2011-2018, following the inspections carried out on fishery products traded on the national market, a number of inconsistencies have been identified. Thus, indigenous products were frequently detected with sensory characteristics unfit for consumption, and being commercialized in inappropriate locations or contaminated with chemical pollutants. On import products controlled, the most frequent inconsistent situations have been represented by inconsistent sensory aspects and by parasite contamination. Taking into account the specific aspects of aquatic products, including the high level of alterability, special conditions of growth, marketing, culinary preparation and consumption are necessary in order to decrease the risk of disease over the population. Certificates, attestations and other documents certifying the quality of batches, completed by additional laboratory examinations, are necessary in order to increase the level of confidence on the quality of products marketed in the Republic. The implementation of various control procedures and mechanisms at national level, correlated with the focused activity of the specialized institutions, can decrease the risk of contamination and avoid cases of disease on the population due to the consumption of fishery products.

Keywords: fishery products, food safety, quality control, Republic of Moldova

Procedia PDF Downloads 152
9036 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 107
9035 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 334
9034 The Effect of Tool Path Strategy on Surface and Dimension in High Speed Milling

Authors: A. Razavykia, A. Esmaeilzadeh, S. Iranmanesh

Abstract:

Many orthopedic implants like proximal humerus cases require lower surface roughness and almost immediate/short lead time surgery. Thus, rapid response from the manufacturer is very crucial. Tool path strategy of milling process has a direct influence on the surface roughness and lead time of medical implant. High-speed milling as promised process would improve the machined surface quality, but conventional or super-abrasive grinding still required which imposes some drawbacks such as additional costs and time. Currently, many CAD/CAM software offers some different tool path strategies to milling free form surfaces. Nevertheless, the users must identify how to choose the strategies according to cutting tool geometry, geometry complexity, and their effects on the machined surface. This study investigates the effect of different tool path strategies for milling a proximal humerus head during finishing operation on stainless steel 316L. Experiments have been performed using MAHO MH700 S vertical milling machine and four machining strategies, namely, spiral outward, spiral inward, and radial as well as zig-zag. In all cases, the obtained surfaces were analyzed in terms of roughness and dimension accuracy compared with those obtained by simulation. The findings provide evidence that surface roughness, dimensional accuracy, and machining time have been affected by the considered tool path strategy.

Keywords: CAD/CAM software, milling, orthopedic implants, tool path strategy

Procedia PDF Downloads 213
9033 A Resource Optimization Strategy for CPU (Central Processing Unit) Intensive Applications

Authors: Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu

Abstract:

On the basis of traditional resource allocation strategies, the usage of resources on physical servers in cloud data center is great uncertain. It will cause waste of resources if the assignment of tasks is not enough. On the contrary, it will cause overload if the assignment of tasks is too much. This is especially obvious when the applications are the same type because of its resource preferences. Considering CPU intensive application is one of the most common types of application in the cloud, we studied the optimization strategy for CPU intensive applications on the same server. We used resource preferences to analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can predict the execution time for CPU intensive applications which run simultaneously. Based on the prediction model, we proposed the method to select the appropriate number of applications for a machine. Experiments show that the model can predict the execution time accurately for CPU intensive applications. To improve the execution efficiency of applications, we propose a scheduling model based on priority for CPU intensive applications. Extensive experiments verify the validity of the scheduling model.

Keywords: cloud computing, CPU intensive applications, resource optimization, strategy

Procedia PDF Downloads 278
9032 A Geospatial Consumer Marketing Campaign Optimization Strategy: Case of Fuzzy Approach in Nigeria Mobile Market

Authors: Adeolu O. Dairo

Abstract:

Getting the consumer marketing strategy right is a crucial and complex task for firms with a large customer base such as mobile operators in a competitive mobile market. While empirical studies have made efforts to identify key constructs, no geospatial model has been developed to comprehensively assess the viability and interdependency of ground realities regarding the customer, competition, channel and the network quality of mobile operators. With this research, a geo-analytic framework is proposed for strategy formulation and allocation for mobile operators. Firstly, a fuzzy analytic network using a self-organizing feature map clustering technique based on inputs from managers and literature, which depicts the interrelationships amongst ground realities is developed. The model is tested with a mobile operator in the Nigeria mobile market. As a result, a customer-centric geospatial and visualization solution is developed. This provides a consolidated and integrated insight that serves as a transparent, logical and practical guide for strategic, tactical and operational decision making.

Keywords: geospatial, geo-analytics, self-organizing map, customer-centric

Procedia PDF Downloads 183
9031 Strategic Fit between Higher Education Funding and the National Development Goals in Kazakhstan

Authors: Ali Ait Si Mhamed, Rita Kasa, Hans Vossensteyn

Abstract:

Kazakhstan is the eight largest country on the globe, in terms of the territory, it is rich in natural resources and is developing dynamically. Kazakhstan strives to become one of the top 30 global economies by 2050. This goal preconditions intensive reforms in all sectors of economy, including higher education. This paper focuses on the higher education funding reforms that take place in Kazakhstan and their alignment with the strategic goals of national development. Currently, the government funds higher education costs for only a limited number of students while the majority of students pay full cost covering tuition fees. Only students with high examination scores at the end of the secondary education are eligible to be admitted to publically funded study places in higher education. While this merit-based higher education funding model is overall well-received in the country, there is also a discourse calling to change the existing approach of higher education funding. This paper draws on interviews with national policy makers and leadership at institutions of higher education in Kazakhstan collected during 2016. It seeks to answer a question about how well the current higher education funding mechanism is aligned with the strategic development goals in higher education. The paper discusses how stakeholders see the fit between the current higher education funding mechanism and the ability of higher education institutions to achieve the aims of national strategic development.

Keywords: higher education reform, higher education funding, higher education policy, Kazakhstan

Procedia PDF Downloads 288
9030 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana

Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.

Abstract:

Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.

Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security

Procedia PDF Downloads 106
9029 Cross Coupling Sliding Mode Synchronization Control of Dual-Driving Feed System

Authors: Hong Lu, Wei Fan, Yongquan Zhang, Junbo Zhang

Abstract:

A cross coupling sliding synchronization control strategy is proposed for the dual-driving feed system. This technology will minimize the position error oscillation and achieve the precise synchronization performance in the high speed and high precision drive system, especially some high speed and high precision machine. Moreover, a cross coupling compensation matrix is provided to offset the mismatched disturbance and the disturbance observer is established to eliminate the chattering phenomenon. Performance comparisons of proposed dual-driving cross coupling sliding mode control (CCSMC), normal cross coupling control (CCC) strategy with PID control, and electronic virtual main shaft control (EVMSC) strategy with SMC control are investigated by simulation and a dual-driving control system; the results show the effectiveness of the proposed control scheme.

Keywords: cross coupling matrix, dual motors, synchronization control, sliding mode control

Procedia PDF Downloads 365
9028 Laboratory-Based Monitoring of Hepatitis B Virus Vaccination Status in North Central Nigeria

Authors: Nwadioha Samuel Iheanacho, Abah Paul, Odimayo Simidele Michael

Abstract:

Background: The World Health Assembly through the Global Health Sector Strategy on viral hepatitis calls for the elimination of viral hepatitis as a public health threat by 2030. All hands are on deck to actualize this goal through an effective and active vaccination and monitoring tool. Aim: To combine the Epidemiologic with Laboratory Hepatitis B Virus vaccination monitoring tools. Method: Laboratory results analysis of subjects recruited during the World Hepatitis week from July 2020 to July 2021 was done after obtaining their epidemiologic data on Hepatitis B virus risk factors, in the Medical Microbiology Laboratory of Benue State University Teaching Hospital, Nigeria. Result: A total of 500 subjects comprising males 60.0%(n=300/500) and females 40.0%(n=200/500) were recruited. A fifty-three percent majority was of the age range of 26 to 36 years. Serologic profiles were as follows, 15.0%(n=75/500) HBsAg; 7.0% (n=35/500) HBeAg; 8.0% (n=40/500) Anti-Hbe; 20.0% (n=100/500) Anti-HBc and 38.0% (n=190/500) Anti-HBs. Immune responses to vaccination were as follows, 47.0%(n=235/500) Immune naïve {no serologic marker + normal ALT}; 33%(n=165/500) Immunity by vaccination {Anti-HBs + normal ALT}; 5%(n=25/500) Immunity to previous infection {Anti-HBs, Anti-HBc, +/- Anti-HBe + normal ALT}; 8%(n=40/500) Carriers {HBsAg, Anti-HBc, Anti-HBe +normal ALT} and 7% (35/500) Anti-HBe serum- negative infections {HBsAg, HBeAg, Anti-HBc +elevated ALT}. Conclusion: The present 33.0% immunity by vaccination coverage in Central Nigeria was much lower than the 41.0% national peak in 2013, and a far cry from the global expectation of attainment of a Global Health Sector Strategy on the elimination of viral hepatitis as a public health threat by 2030. Therefore, more creative ideas and collective effort are needed to attain this goal of the World Health Assembly.

Keywords: Hepatitis B, vaccination status, laboratory tools, resource-limited settings

Procedia PDF Downloads 75
9027 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 328
9026 Factors Impacting Shopping Behavior for Luxury Fashion Brands: A Case of National Capital Region in India

Authors: Manoj Kumar, Preeti Goel

Abstract:

National Capital Region of India is one of the most populous urban agglomerations in the world. This region has residents from all the parts of India, and their shopping behaviors are quite different. The region also has the substantial population of people from other countries. Due to high purchasing power of a large number of people, NCR is one the major markets for luxury fashion brands. Marketers of luxury fashion brands keep on adding innovative features to their products to attract the buyers. This research is an attempt to understand the major factors which impact the brand selection for these brands and other buying decisions like purchasing time and location. The research is based on primary data collected from potential buyers of luxury fashion brands and the people involved in the marketing of these brands in various roles. The research has tried to identify the relative strength of various factors on the shopping behavior for these brands.

Keywords: luxury brands, fashion, shopping, National Capital Region (NCR)

Procedia PDF Downloads 408
9025 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 547
9024 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 645
9023 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 357
9022 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 163
9021 A Review of Teaching and Learning of Mother Tongues in Nigerian Schools; Yoruba as a Case Study

Authors: Alonge Isaac Olusola

Abstract:

Taking a cue from countries such as China and Japan, there is no doubt that the teaching and learning of Mother Tongue ( MT) or Language of Immediate Environment (LIE) is a potential source of development in every country. The engine of economic, scientific, technological and political advancement would be more functional when the language of instruction for teaching and learning in schools is in the child’s mother tongue. The purpose of this paper therefore, is to delve into the genesis of the official recognition given to the teaching and learning of Nigerian languages at national level with special focus on Yoruba language. Yoruba language and other Nigerian languages were placed on a national pedestal by a Nigerian Educational Minister, Late Professor Babatunde Fafunwa, who served under the government of General Ibrahim Babangida (1985 – 1993). Through his laudable effort, the teaching and learning of Nigerian languages in schools all over the nation was incorporated officially in the national policy of education. Among all the Nigerian languages, Hausa, Igbo and Yoruba were given foremost priorities because of the large population of their speakers. Since the Fafunwa era, Yoruba language has become a national subject taught in primary, secondary and tertiary institutions in Nigeria. However, like every new policy, its implementation has suffered several forms of criticisms and impediments from governments, policy makers, curriculum developers, school administrators, teachers and learners. This paper has been able to arrive at certain findings through oral interviews, questionnaires and evaluation of pupils/students enrolment and performances in Yoruba language with special focus on the South-west and North central regions of Nigeria. From the research carried out, some factors have been found to be responsible for the successful implementation or otherwise of Yoruba language instruction policy in some schools, colleges and higher institutions in Nigeria. In conclusion, the paper made recommendations on how the National Policy of Education would be implemented to enhance the teaching and learning of Yoruba language in all Nigerian schools.

Keywords: language of immediate environment, mother tongue, national policy of education, yoruba language

Procedia PDF Downloads 535
9020 Resource Orchestration Based on Two-Sides Scheduling in Computing Network Control Sytems

Authors: Li Guo, Jianhong Wang, Dian Huang, Shengzhong Feng

Abstract:

Computing networks as a new network architecture has shown great promise in boosting the utilization of different resources, such as computing, caching, and communications. To maximise the efficiency of resource orchestration in computing network control systems (CNCSs), this work proposes a dynamic orchestration strategy of a different resource based on task requirements from computing power requestors (CPRs). Specifically, computing power providers (CPPs) in CNCSs could share information with each other through communication channels on the basis of blockchain technology, especially their current idle resources. This dynamic process is modeled as a cooperative game in which CPPs have the same target of maximising long-term rewards by improving the resource utilization ratio. Meanwhile, the task requirements from CPRs, including size, deadline, and calculation, are simultaneously considered in this paper. According to task requirements, the proposed orchestration strategy could schedule the best-fitting resource in CNCSs, achieving the maximum long-term rewards of CPPs and the best quality of experience (QoE) of CRRs at the same time. Based on the EdgeCloudSim simulation platform, the efficiency of the proposed strategy is achieved from both sides of CPRs and CPPs. Besides, experimental results show that the proposed strategy outperforms the other comparisons in all cases.

Keywords: computing network control systems, resource orchestration, dynamic scheduling, blockchain, cooperative game

Procedia PDF Downloads 114
9019 Economical Dependency Evolution and Complexity

Authors: Allé Dieng, Mamadou Bousso, Latif Dramani

Abstract:

The purpose of this work is to show the complexity behind economical interrelations in a country and provide a linear dynamic model of economical dependency evolution in a country. The model is based on National Transfer Account which is one of the most robust methodology developed in order to measure a level of demographic dividend captured in a country. It is built upon three major factors: demography, economical dependency and migration. The established mathematical model has been simulated using Netlogo software. The innovation of this study is in describing economical dependency as a complex system and simulating using mathematical equation the evolution of the two populations: the economical dependent and the non-economical dependent as defined in the National Transfer Account methodology. It also allows us to see the interactions and behaviors of both populations. The model can track individual characteristics and look at the effect of birth and death rates on the evolution of these two populations. The developed model is useful to understand how demographic and economic phenomenon are related

Keywords: ABM, demographic dividend, National Transfer Accounts (NTA), ODE

Procedia PDF Downloads 205
9018 Causes, Consequences, and Alternative Strategies of Illegal Migration in Ethiopia: The Case of Tigray Region

Authors: Muuz Abraha Meshesha

Abstract:

Illegal Migration, specifically Trafficking in person is one of the primary issues of the day affecting all states of the world with variation on the extent of the root causes and consequences that led people to migrate irregularly and the consequences it is costing on humanity. This paper intends to investigate the root causes and consequences of illegal migration in Ethiopia’s Tigray Regional state and come up with alternative intervening strategy. To come up with pertinent and robust research finding, this study employed mixed research approach involving qualitative and quantitative data in line with purposive and snow ball sampling selection technique. The study revealed that, though poverty is the most commonly sensed pushing factor for people to illegally migrate, the issue of psycho-social orientation and attitudinal immersion of the local community for illegal migration, both in thinking and action is the most pressing problem that urges serious intervention. Trafficking in persons and Illegal migration in general, is becoming the norm of the day in the study area that overtly reveal illegal migration is an issue beyond livelihood securing demand in practice. Basically, parties engaged in illegal migration and the accomplice with human traffickers these days in the study area are found to be more than urgency for food security and a need to escape from livelihood impoverishment. Therefore, this study come up with a new paradigm insight indicating that illegal migration is believed by the local community members as an optional path way of doing business in illegal way while the attitude of the community and officials authorized to regulate is being part of the channel or to the least tolerant of this grave global danger. The study also found that the effect of illegal migration is significantly manifested in long run than in short term periods. Therefore, a need for critical consideration on attitudinal based intervention and youth oriented and enforceable legal and policy framework accountability framework is required to face and control illegal migration by international, national, local stakeholders. Besides this, economy based development interventions that could engage and reorient the youth, as primary victims of trafficking, and expansion of large scale projects that can employ large number of youths at a time.

Keywords: human traficking, illegal migration, migration, tigray region

Procedia PDF Downloads 65
9017 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 108
9016 Perceptions on Development of the Deaf in Higher Education Level: The Case of Special Education Students in Tiaong, Quezon, Philippines

Authors: Ashley Venerable, Rosario Tatlonghari

Abstract:

This study identified how college deaf students of Bartimaeus Center for Alternative Learning in Tiaong, Quezon, Philippines view development using visual communication techniques and generating themes from responses. Complete enumeration was employed. Guided by Constructivist Theory of Perception, past experiences and stored information influenced perception. These themes of development emerged: social development; pleasant environment; interpersonal relationships; availability of resources; employment; infrastructure development; values; and peace and security. Using the National Economic and Development Authority development indicators, findings showed the deaf students’ views on development were similar from the mainstream views. Responses also became more meaningful through visual communication techniques.

Keywords: deaf, development, perception, development indicators, visual communication

Procedia PDF Downloads 431
9015 Safety and Maternal Anxiety in Mother's and Baby's Sleep: Cross-sectional Study

Authors: Rayanne Branco Dos Santos Lima, Lorena Pinheiro Barbosa, Kamila Ferreira Lima, Victor Manuel Tegoma Ruiz, Monyka Brito Lima Dos Santos, Maria Wendiane Gueiros Gaspar, Luzia Camila Coelho Ferreira, Leandro Cardozo Dos Santos Brito, Deyse Maria Alves Rocha

Abstract:

Introduction: The lack of regulation of the baby's sleep-wake pattern in the first years of life affects the health of thousands of women. Maternal sleep deprivation can trigger or aggravate psychosomatic problems such as depression, anxiety and stress that can directly influence maternal safety, with consequences for the baby's and mother's sleep. Such conditions can affect the family's quality of life and child development. Objective: To correlate maternal security with maternal state anxiety scores and the mother's and baby's total sleep time. Method: Cross-sectional study carried out with 96 mothers of babies aged 10 to 24 months, accompanied by nursing professionals linked to a Federal University in Northeast Brazil. Study variables were maternal security, maternal state anxiety scores, infant latency and sleep time, and total nocturnal sleep time of mother and infant. Maternal safety was calculated using a four-point Likert scale (1=not at all safe, 2=somewhat safe, 3=very safe, 4=completely safe). Maternal anxiety was measured by State-Trait Anxiety Inventory, state-anxiety subscale whose scores vary from 20 to 80 points, and the higher the score, the higher the anxiety levels. Scores below 33 are considered mild; from 33 to 49, moderate and above 49, high. As for the total nocturnal sleep time, values between 7-9 hours of sleep were considered adequate for mothers, and values between 9-12 hours for the baby, according to the guidelines of the National Sleep Foundation. For the sleep latency time, a time equal to or less than 20 min was considered adequate. It is noteworthy that the latency time and the time of night sleep of the mother and the baby were obtained by the mother's subjective report. To correlate the data, Spearman's correlation was used in the statistical package R version 3.6.3. Results: 96 women and babies participated, aged 22 to 38 years (mean 30.8) and 10 to 24 months (mean 14.7), respectively. The average of maternal security was 2.89 (unsafe); Mean maternal state anxiety scores were 43.75 (moderate anxiety). The babies' average sleep latency time was 39.6 min (>20 min). The mean sleep times of the mother and baby were, respectively, 6h and 42min and 8h and 19min, both less than the recommended nocturnal sleep time. Maternal security was positively correlated with maternal state anxiety scores (rh=266, p=0.009) and negatively correlated with infant sleep latency (rh= -0.30. P=0.003). Baby sleep time was positively correlated with maternal sleep time. (rh 0.46, p<0.001). Conclusion: The more secure the mothers considered themselves, the higher the anxiety scores and the shorter the baby's sleep latency. Also, the longer the baby sleeps, the longer the mother sleeps. Thus, interventions are needed to promote the quality and efficiency of sleep for both mother and baby.

Keywords: sleep, anxiety, infant, mother-child relations

Procedia PDF Downloads 102
9014 Bioremediation Potential in Recalcitrant Areas of PCE in Alluvial Fan Deposits

Authors: J. Herrero, D. Puigserver, I. Nijenhuis, K. Kuntze, J. M. Carmona

Abstract:

In the transition zone between aquifers and basal aquitards, the perchloroethene (PCE)-pools are more recalcitrant than those elsewhere in the aquifer. Although biodegradation of chloroethenes occur in this zone, it is a slow process and a remediation strategy is needed. The aim of this study is to demonstrate that combined strategy of biostimulation and in situ chemical reduction (ISCR) is more efficient than the two separated strategies. Four different microcosm experiments with sediment and groundwater of a selected field site where an aged pool exists at the bottom of a transition zone were designed under i) natural conditions, ii) biostimulation with lactic acid, iii) ISCR with zero-value iron (ZVI) and under iv) a combined strategy with lactic acid and ZVI. Biotic and abiotic dehalogenation, terminal electron acceptor processes and evolution of microbial communities were determined for each experiment. The main results were: i) reductive dehalogenation of PCE-pools occurs under sulfate-reducing conditions; ii) biostimulation with lactic acid supports more pronounced reductive dehalogenation of PCE and trichloroethene (TCE), but results in an accumulation of 1,2-cis-dichloroethene (cDCE); iii) ISCR with ZVI produces a sustained dehalogenation of PCE and its metabolites iv) combined strategy of biostimulation and ISCR results in a fast dehalogenation of PCE and TCE and a sustained dehalogenation of cisDCE. These findings suggest that biostimulation and ISCR with ZVI are the most suitable strategies for a complete reductive dehalogenation of PCE-pools in the transition zone and further to enable the dissolution of dense non-aqueous phase liquids.

Keywords: aged PCE-pool, anaerobic microcosm experiment, biostimulation, in situ chemical reduction, natural attenuation

Procedia PDF Downloads 200
9013 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017

Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez

Abstract:

Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.

Keywords: water access, agriculture, livestock, FIES

Procedia PDF Downloads 150
9012 Solar Pond: Some Issues in Their Management and Mathematical Description

Authors: A. A. Abdullah, K. A. Lindsay

Abstract:

The management of a salt-gradient is investigated with respect to the interaction between the solar pond and its associated evaporation pond. Issues considered are the impact of precipitation and the operation of the flushing system with particular reference to the case in which the flushing fluid is pure water. Results suggest that a management strategy based on a flushing system that simply replaces evaporation losses of water from the solar pond and evaporation pond will be optimally efficient. Such a management strategy will maintain the operational viability of a salt-gradient solar pond as a reservoir of cheap heat while simultaneously ensuring that the associated evaporation pond can feed the storage zone of the solar pond with sufficient saturated brine to balance the effect of salt diffusion. Other findings are, first, that once near saturation is achieved in the evaporation pond, the efficacy of the proposed management strategy is relatively insensitive to both the size of the evaporation pond or its depth, and second, small changes in the extraction of heat from the storage zone of a salt-gradient solar pond have an amplified effect on the temperature of that zone. The possibility of boiling of the storage zone cannot be ignored in a well-configured salt-gradient solar pond.

Keywords: aqueous sodium chloride, constitutive expression, solar pond, salt-gradient

Procedia PDF Downloads 327
9011 Developing Islamic Module Project for Preschool Teachers Using Modified Delphi Technique

Authors: Mazeni Ismail, Nurul Aliah, Hasmadi Hassan

Abstract:

The purpose of this study is to gather the consensus of experts regarding the use of moral guidance amongst preschool teachers vis-a-vis the Islamic Project module (I-Project Module). This I-Project Module seeks to provide pertinent data on the assimilation of noble values in subject-matter teaching. To obtain consensus for the various components of the module, the Modified Delphi technique was used to develop the module. 12 subject experts from various educational fields of Islamic education, early childhood education, counselling and language fully participated in the development of this module. The Modified Delphi technique was administered in two mean cycles. The standard deviation value derived from questionnaires completed by the participating panel of experts provided the value of expert consensus reached. This was subsequently analyzed using SPSS version 22. Findings revealed that the panel of experts reached a discernible degree of agreement on five topics outlined in the module, viz; content (mean value 3.36), teaching strategy (mean value 3.28), programme duration (mean value 3.0), staff involved and attention-grabbing strategy of target group participating in the value program (mean value 3.5), and strategy to attract attention of target group to utilize i-project (mean value 3.0). With regard to the strategy to attract the attention of the target group, the experts proposed for creative activities to be added in order to enhance teachers’ creativity.

Keywords: Modified Delphi Technique, Islamic project, noble values, teacher moral guidance

Procedia PDF Downloads 183