Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7120

Search results for: national security exception

5620 Carl Schmitt in the Age of Immanence: A Critical Reading

Authors: Manuel Iretzberger

Abstract:

This paper aims to uncover the ideological aspects in the political thought of Carl Schmitt, who is enjoying an ever-increasing popularity in various academic fields, following in the wake of rising interest in questions of sovereignty and legitimacy. Given Schmitt’s biography, i.e. his role as the ‘Crown Jurist of the Third Reich’ (Gurian), an extraordinarily thorough examination is necessary; however, instead of merely ‘deconstructing’ his works, certain ontological truths he might have attained, shall be taken seriously. To this end, his notions of politics and the state of exception are scrutinized, which are indeed considered intriguing, yet prove to be enigmatic and impalpable at the core when read closely. In order to explain this conjuncture, both Schmitt’s philosophy of history and his ‘secret discussion’ (Agamben) with Walter Benjamin are depicted. As it turns out – it is argued – his concept of the Political has to be conceived of as embedded in a much broader context: In a post-transcendental, immanent age, he regards traditional modes of representation as no longer feasible and clings to authoritarianism as a surrogate – his Catholicism plays a decisive role here, forcing him to inject normatively biased assumptions into his political writings. Seeing Schmitt perform ‘rearguard action’ not only serves to disarm his work of most of its menacing aura, it also allows drawing conclusions about ways of legitimatizing democratic rule in modern times, as the paper tries to outline in its last section.

Keywords: Benjamin, history, immanence, Schmitt, sovereignty

Procedia PDF Downloads 294
5619 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security

Authors: Lynndee Kemmet

Abstract:

The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.

Keywords: food security, food system model, political stability, US Military

Procedia PDF Downloads 195
5618 Processes of Identities Formation and Transformation among Professional Skilled Mexican Migrants in the United States

Authors: M. Laura Vazquez Maggio, Lilia Dominguez Villalobos, Jan Luka Frey

Abstract:

This paper contributes to the understanding of the dynamic and the relational nature of identities formation among skilled middle-class migrants. Following the idea that identities are never singular, multifaceted and have a necessarily processual character, the authors specifically analyze three dimensions of the identity of qualified Mexican migrants in the US and the interplay between them. Drawing on semi-structured interviews with skilled Mexican middle-class migrants in the US, the paper explores how skilled Mexican migrants preserve their ethno-national identity (their ‘Mexicanness’) in reaction to a hostile socio-political reception context in the US. It further shows how these migrants recreate their class identity and show tendencies to distance themselves from what they perceive as lower-class Mexican migrants and the dominant popular Mexican and Latin-American cultural expressions. In a final step, it examines how the lived experience of migration itself impacts the migrants’ identities, their concept of self and feelings/modes of being and belonging.

Keywords: ethno-national identity, middle class identity, middle-class migration, migrants’ identity, skilled migration

Procedia PDF Downloads 143
5617 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 275
5616 Law, Resistance, and Development in Georgia: A Case of Namakhvani HPP

Authors: Konstantine Eristavi

Abstract:

The paper will contribute to the discussion on the pitfalls, limits, and possibilities of legal and rights discourse in opposing large infrastructural projects in the context of neoliberal globalisation. To this end, the paper will analyse the struggle against the Namakhvani HPP project in Georgia. The latter has been hailed by the government as one of the largest energy projects in the history of the country, with an enormous potential impact on energy security, energy independence, economic growth, and development. This takes place against the backdrop of decades of market-led -or neoliberal- model of development in Georgia, characterised by structural adjustments, deregulation, privatisation, and Laissez-Fair approach to foreign investment. In this context, the Georgian state vies with other low and middle-income countries for foreign capital by offering to potential investors, on the one hand, exemptions from social and environmental regulations and, on the other hand, huge legal concessions and safeguards, thereby participating in what is often called a “race to the bottom.” The Namakhvani project is a good example of this. At every stage, the project has been marred with violations of laws and regulations concerning transparency, participation, social and environmental regulations, and so on. Moreover, the leaked contract between the state and the developer reveals the contractual safeguards which effectively insulate the investment throughout the duration of the contract from the changes in the national law that might adversely affect investors’ rights and returns. These clauses, aimed at preserving investors' economic position, place the contract above national law in many respects and even conflict with fundamental constitutional rights. In response to the perceived deficiencies of the project, one of the largest and most diverse social movements in the history of post-soviet Georgia has been assembled, consisting of the local population, conservative and leftist groups, human rights and environmental NGOs, etc. Crucially, the resistance movement is actively using legal tools. In order to analyse both the limitations and possibilities of legal discourse, the paper will distinguish between internal and immanent critiques. Law as internal critique, in the context of the struggles around the Namakhvani project, while potentially fruitful in hindering the project, risks neglecting and reproducing those factors -e.g., the particular model of development- that made such contractual concessions and safeguards and concomitant rights violations possible in the first place. On the other hand, the use of rights and law as part of immanent critique articulates a certain incapacity on the part of the addressee government to uphold existing laws and rights due to structural factors, hence, pointing to a need for a fundamental change. This 'ruptural' form of legal discourse that the movement employs makes it possible to go beyond the discussion around the breaches of law and enables a critical deliberation on the development model within which these violations and extraordinary contractual safeguards become necessary. It will be argued that it is this form of immanent critique that expresses the emancipatory potential of legal discourse.

Keywords: law, resistance, development, rights

Procedia PDF Downloads 80
5615 Geothermal Resources to Ensure Energy Security During Climate Change

Authors: Debasmita Misra, Arthur Nash

Abstract:

Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.

Keywords: exploration, geothermal, renewable energy, sustainable

Procedia PDF Downloads 154
5614 Fashion and Soft War: Analysis of Iran's Regulatory Measures for Fashion Industry

Authors: Leili Nekounazar

Abstract:

Since 2009, when the Green movement, Iran’s most significant political uprising in post-Islamic revolution materialized, the term 'soft war' has become an integral part of the Iranian regime’s lexicon when addressing the media propaganda waged by the west and the regime’s so-called 'enemies'. Iran’s authorities describe soft war as a western campaign aiming at undermining the revolutionary values by covert activities, deploying cultural tools and purposeful dissemination of information. With this respect, Internet and in particular, the social media networks, and oppositional radio-television broadcasts have been considered as the west’s soft war conduits. With the rising of the underground fashion industry in the past couple of years that does not conform to the compulsory dress codes prescribed by the state, the Islamic regime expands the soft war narrative to include any undesired fashion-related activities and frames the rising fashion industry as a cultural war intoxicating the Iranian-Islamic identity. Accordingly, fashion products created by the Iranian fashion intermediators have been attributed to the westerners and outsiders and are regarded as the matter of national security. This study examines the reactive and proactive measures deployed by the Iranian regime to control the rise of fashion industry. It further puts under the scrutiny how the state as a part of its proactive measure shapes the narrative of 'soft war' in relation to fashion in Iran and explores how the notion of soft war has been articulated in relation to the modeling and fashion in the state’s political rhetoric. Through conducting a content analysis of the authorities’ statements, it describes how the narrative of soft war assists the state policing the fashion industry.

Keywords: censorship, fashion, Iran, soft war

Procedia PDF Downloads 344
5613 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda

Authors: Sofia Sutera

Abstract:

Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.

Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda

Procedia PDF Downloads 135
5612 A Sociological Study of the Potential Role of Retired Soldiers in the Post War Development and Reconstruction in Sri Lanka

Authors: Amunupura Kiriwandeiye Gedara, Asintha Saminda Gnanaratne

Abstract:

The security forces can be described as a workforce that goes beyond the role of ensuring the national security and contributes to the development process of the country. Soldiers are following combatant training courses during their tenure, they are equipped with a variety of vocational training courses to satisfy the needs of the army, to equip them with vocational training capabilities to achieve the development and reconstruction goals of the country as well as for the betterment of society in the event of emergencies. But with retirement, their relationship with the military is severed, and they are responsible for the future of their lives. The main purpose of this study was to examine how such professional capabilities can contribute to the development of the country, the current socio-economic status of the retired soldiers, and the current application of the vocational training skills they have mastered in the army to develop and rebuild the country in an effective manner. After analyzing the available research literature related to this field, a conceptual framework was developed and according to qualitative research methodology, and data obtained from Case studies and interviews are analyzed by using thematic analysis. Factors influencing early retirement include a lack of understanding of benefits, delays in promotions, not being properly evaluated for work, getting married on hasty decisions, and not having enough time to spend on family and household chores. Most of the soldiers are not aware about various programs and benefits available to retirees. They do not have a satisfactory attitude towards the retirement guidance they receive from the army at the time of retirement. Also, due to the lack of understanding about how to use their vocational capabilities successfully pursue their retirement life, the majority of people are employed in temporary jobs, and some are successful in post-retirement life due to their successful use of training received. Some live on pensions without engaging in any income-generating activities, and those who retire after 12 years of service are facing severe economic hardships as they do not get pensions. Although they have received training in various fields, they do not use them for their benefit due to lack of proper guidance. Although the government implements programs, they are not clearly aware of them. Barriers to utilization of training include an absence of a system to identify the professional skills of retired soldiers, interest in civil society affairs, exploration of opportunities in the civil and private sectors, and politicization of services. If they are given the opportunity, they will be able to contribute to the development and reconstruction process. The findings of the study further show that it has many social, economic, political, and psychological benefits not only for individuals but also for a country. Entrepreneurship training for all retired soldiers, improving officers' understanding, streamlining existing mechanisms, creating new mechanisms, setting up a separate unit for retirees, and adapting them to civil society, private and non-governmental contributions, and training courses can be identified as potential means to improve the current situation.

Keywords: development, reconstruction, retired soldiers, vocational capabilities

Procedia PDF Downloads 133
5611 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions

Authors: Abdulrahman Yarali, Machica McClain

Abstract:

In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.

Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare

Procedia PDF Downloads 21
5610 The Potential Role of University Libraries in the Fight against Terrorism in Upper Egypt

Authors: Essam Mansour

Abstract:

The purpose of this study is to explore the potential role of South Valley University (SVU) libraries’ manpower, collections and services in the fight against terrorism in the Upper Egypt. A quantitative research methodology was used in the form of a survey sent to 127 library staff at the SVU. The survey was undertaken from June to July 2015 with a response rate 73.2%. Printed materials were the most adequate collections in the SVU libraries. Other materials, such as CDs/DVDs, audiovisual materials, microfilm and microfiche, online resources and electronic materials respectively were inadequate at SVU libraries. Few of the services provided by SVU libraries were characterized as adequate services, some are inadequate and other services do not exist. The average of the facilities provided by SVU libraries was somewhat adequate. Activities, such as holding social field trips, holding training workshops and holding academic field trip were, at least, somewhat adequate to SVU libraries. SVU libraries had no a significant role in fighting terrorism in the Upper Egypt. There is no a relationship between the SVU library staff’s professional characteristics and the potential role that their libraries may play in the fight against this phenomenon. As a result of the lack of SVU libraries’ collections, services, facilities and activities, this study concluded that that such role could not be achieved. Almost all the library staff admitted that this severe lack has affected the provision of library patrons and members of the library community to these collections and services, which help in countering the threat of terrorism. Despite the significance of all these problems faced by SVU libraries in the fight against terrorism, it was found that the inadequacy of the library opening hours is significantly correlated with the professional characteristics of the library staff, particularly their job title and work experience.

Keywords: terrorism, national security, university libraries, south valley university, Egypt, survey

Procedia PDF Downloads 250
5609 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 107
5608 Concepts of Creation and Destruction as Cognitive Instruments in World View Study

Authors: Perizat Balkhimbekova

Abstract:

Evolutionary changes in cognitive world view taking place in the last decades are followed by changes in perception of the key concepts which are related to the certain lingua-cultural sphere. Also, such concepts reflect the person’s attitude to essential processes in the sphere of concepts, e.g. the opposite operations like creation and destruction. These changes in people’s life and thinking are displayed in a language world view. In order to open the maintenance of mental structures and concepts we should use language means as observable results of people’s cognitive activity. Semantics of words, free phrases and idioms should be considered as an authoritative source of information concerning concepts. The regularized set of concepts in people consciousness forms the sphere of concepts. Cognitive linguistics widely discusses the sphere of concepts as its crucial category defining it as the field of knowledge which is made of concepts. It is considered that a sphere of concepts comprises the various types of association and forms conceptual fields. As a material for the given research, the data from Russian National Corpus and British National Corpus were used. In is necessary to point out that data provided by computational studies, are intrinsic and verifiable; so that we have used them in order to get the reliable results. The procedure of study was based on such techniques as extracting of the context containing concepts of creation|destruction from the Russian National Corpus (RNC), and British National Corpus (BNC); analyzing and interpreting of those context on the basis of cognitive approach; finding of correspondence between the given concepts in the Russian and English world view. The key problem of our study is to find the correspondence between the elements of world view represented by opposite concepts such as creation and destruction. Findings: The concept of "destruction" indicates a process which leads to full or partial destruction of an object. In other words, it is a loss of the object primary essence: structures, properties, distinctive signs and its initial integrity. The concept of "creation", on the contrary, comprises positive characteristics, represents the activity aimed at improvement of the certain object, at the creation of ideal models of the world. On the other hand, destruction is represented much more widely in RNC than creation (1254 cases of the first concept by comparison to 192 cases for the second one). Our hypothesis consists in the antinomy represented by the aforementioned concepts. Being opposite both in respect of semantics and pragmatics, and from the point of view of axiology, they are at the same time complementary and interrelated concepts.

Keywords: creation, destruction, concept, world view

Procedia PDF Downloads 346
5607 CSR: Corporate Social Responsibility Performance of Indian Automobiles Companies

Authors: Jagbir Singh Kadyan

Abstract:

This research paper critically analyse the performance of those Indian Automobile Companies which are listed and traded on the National Stock Exchange (NSE) of India and which are also included in the NSE nifty auto Index. In India, CSR–Corporate Social Responsibility is mandatory for certain qualifying companies under the Indian Companies Act 2013, which replaces the erstwhile Companies Act 1956. There has been a significant shift in the focus and approaches of the Indian Corporates towards their CSR obligations with the insertion of section 135, revision of section 198 and introduction of schedule VII of the Indian Companies Act 2013. Every such qualifying companies are required to mandatorily spend at least 2% of their annual average net profit of the immediately preceding three financial years on such CSR activities as specified under schedule VII of the Companies act 2013. This research paper analyzes the CSR performance of such Indian companies. This research work is originally based on the secondary data. The annual reports of the selected Indian automobile companies have been extensively used and considered for this research work.

Keywords: board of directors, corporate social responsibility, CSR committees, Indian automobile companies, Indian companies act 2013, national stock exchange

Procedia PDF Downloads 538
5606 The Environmental and Economic Analysis of Extended Input-Output Table for Thailand’s Biomass Pellet Industry

Authors: Prangvalai Buasan, Boonrod Sajjakulnukit, Thongchart Bowonthumrongchai

Abstract:

The demand for biomass pellets in the industrial sector has significantly increased since 2020. The revised version of Thailand’s power development plan as well as the Alternative Energy Development Plan, aims to promote biomass fuel consumption by around 485 MW by 2030. The replacement of solid fossil fuel with biomass pellets will affect medium-term and long-term national benefits for all industries throughout the supply chain. Therefore, the evaluation of environmental and economic impacts throughout the biomass pellet supply chain needs to be performed to provide better insight into the goods and financial flow of this activity. This study extended the national input-output table for the biomass pellet industry and applied the input-output analysis (IOA) method, a sort of macroeconomic analysis, to interpret the result of transactions between industries in the monetary unit when the revised national power development plan was adopted and enforced. Greenhouse gas emissions from consuming energy and raw material through the supply chain are also evaluated. The total intermediate transactions of all economic sectors, which included the biomass pellets sector (CASE 2), increased by 0.02% when compared with the conservative case (CASE 1). The control total, which is the sum of total intermediate transactions and value-added, the control total of CASE 2 is increased by 0.07% when compared with CASE 1. The pellet production process emitted 432.26 MtCO2e per year. The major sharing of the GHG is from the plantation process of raw biomass.

Keywords: input-output analysis, environmental extended input-output analysis, macroeconomic planning, biomass pellets, renewable energy

Procedia PDF Downloads 101
5605 Allelopathic Effects of Eucalyptus camaldulensis and E. gomphocephala on Seed Germination and Seedling Growth of Barley

Authors: Sallah S. El-Ammari, Mona. S. Hasan

Abstract:

This research is aimed to study allelopathic effects of two wind breakers Eucalyptus camaldulensis and E.gomphocephala on germination and growth of barley using aqueous extracts of leaves at 0.5, 1, 5, and 10% concentrations for treatment of barley caryopsis in petri dishes incubated in growth chamber. Distilled water was used in the experiment as a control. Seed germination was recorded on daily basis for five days. After ten days measurements of root length, shoot length, fresh and dry weight of root and shoot were taken. With the exception of 0.5% E. gomphocephala extract effect on length and dry weight of barley root, all the tested extract concentrations for both eucalyptus species significantly decreased the percent and speed of germination, root and shoot length, fresh and dry weight of root and shoot of barley compared to the control. For both species the allelopathic effect was significantly increasing with the increase of the extract concentration. Although, higher allelopathic effect was shown by E. camaldulensis, the results indicating that both eucalyptus species should not be recommended as wind breakers for barley fields.

Keywords: allelopathy, eucalyptus, barley, Libya

Procedia PDF Downloads 348
5604 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 60
5603 The Effect of Corporate Social Responsibility in the National Commercial Bank in Saudi Arabia

Authors: Nada Azhar

Abstract:

The aim of the paper is to investigate the effect of corporate social responsibility (CSR) CSR on the National Commercial Bank (NCB) in Saudi Arabia. In order to achieve this, a case study was made of the CSR activities of this bank from the perspective of its branch managers. The NCB was chosen as it was one of the first Saudi banks to engage in CSR and currently has a wide range of CSR initiatives. A qualitative research method was used. Open-ended questionnaires were administered to eighty branch managers of the NCB, with fifty-five usable questionnaires returned and twenty managers were interviewed as part of the primary research. Data from both questionnaires and interviews were analysed using qualitative content analysis. Six themes emerged from the questionnaire findings were used to develop the interview questions. These themes are the following: Awareness of employees about CSR in the NCB; CSR activities as a type of investment; Government and media support; Increased employee loyalty in the NCB; Prestige and profit to the NCB; and View of CSR in Islam. This paper makes a theoretical contribution in that it investigates and increases understanding of the effect of CSR on the NCB in Saudi Arabia. In addition, it makes a practical contribution by making recommendations which can support the development of CSR in the NCB. A limitation of the paper is that it is a case study of only one bank. It is therefore recommended that future research could be conducted with other banks in Saudi Arabia, or indeed, with a range of other types of firm within the financial services area in Saudi Arabia. In this way, the same issues could be explored but with a greater potential generalisability of findings of CSR within the Saudi Arabian financial services industry. In addition, this paper takes a qualitative approach and it is suggested that future research be carried out using mixed methods, which could provide a greater depth of analysis.

Keywords: branch managers, corporate social responsibility, national commercial bank, Saudi Arabia

Procedia PDF Downloads 256
5602 Interethnic Communication in Multicultural Areas: A Case Study of Intercultural Sensitivity Between Baloch and Persians in Iran

Authors: Mehraveh Taghizadeh

Abstract:

Iran is home to a diverse range of ethnic groups such as Baloch, Kurds, Persians, Lors, Arabs, and Turks. The Persian ethnicity is the largest group, while Baloch people are considered a minority residing on the southeastern border of the country with different language and religion. As a consequence, Political discussions have often prioritized national identity and national security over Baloch ethnic identity. However, to improve intercultural understanding and reduce cultural schemas, it's crucial to decrease ethnocentrism and increase intercultural communication. In the meantime, Kerman, a multicultural province that borders Sistan and Baluchistan, has become a destination for Baloch immigrants. By recognizing the current status of intercultural competence, we can develop effective policies for expanding intercultural communication and creating a more inclusive and peaceful society. As a result, this research aims to study the domain of intercultural sensitivity between Persians and Baloch in Kerman. Therefore, the question is how do Persians and Baloch ethnicities perceive each other? This study represents the first exploration of communication dynamics between Persians and Baloch individuals. Utilizing a qualitative approach, this study employs thematic analysis in conjunction with Bennett's intercultural sensitivities model. The model comprises two components: ethnocentrism, which spans from denial and defense to minimization, and ethno-relativism, which ranges from acceptance and adaptation to integration. To attain this objective, 30 individuals from Persian and Baloch ethnicities were interviewed using a semi-structured format. it analysis suggests that the Baluch and Persians exhibit a range of intercultural sensitivities characterized by defensive and minimizing attitudes in the ethnocentrism domain, and accepting attitudes in the ethno-relativism domain. The concept of minimization involves recognizing the shared humanity and positive schemas of both groups. Furthermore, in the adaptation domain, Persians' efforts to assimilate into Baloch culture at an acceptance level are primarily focused on the civilizational dimension, including using traditional Balochi clothing designs on their clothes. The Persians hold intercultural schemas about the Baloch people, including notions of religious fanaticism, tribalism, poverty, smuggling, and a nomadic way of life. Conversely, the Baloch people have intercultural schemas about Persians including religious fanaticism, disdain towards the Baloch, and ethnocentrism. Both groups tend to tie ethnicity to religion and judge each other accordingly. Also, the origin of these schemas is in the representation of the media and the encounter without interaction between the two ethnic groups. These findings indicate that they have not received adaptation and integration levels in ethno-relativism. Furthermore, the results indicate that developing personal communication in multicultural environments reduces intercultural sensitivity, and increases positive interactions and civilizational dialogues. People can understand each other better and perform better in their daily lives.

Keywords: intercultural communication, intercultural sensitivity, interethnic communication, Iran, Baloch, Persians

Procedia PDF Downloads 51
5601 Adopting a New Policy in Maritime Law for Protecting Ship Mortgagees Against Maritime Liens

Authors: Mojtaba Eshraghi Arani

Abstract:

Ship financing is the vital element in the development of shipping industry because while the ship constitutes the owners’ main asset, she is considered a reliable security in the financiers’ viewpoint as well. However, it is most probable that a financier who has accepted a ship as security will face many creditors who are privileged and rank before him for collecting, out of the ship, the money that they are owed. In fact, according to the current rule of maritime law, which was established by “Convention Internationale pour l’Unification de Certaines Règles Relatives aux Privilèges et Hypothèques Maritimes, Brussels, 10 April 1926”, the mortgages, hypotheques, and other charges on vessels rank after several secured claims referred to as “maritime liens”. Such maritime liens are an exhaustive list of claims including but not limited to “expenses incurred in the common interest of the creditors to preserve the vessel or to procure its sale and the distribution of the proceeds of sale”, “tonnage dues, light or harbour dues, and other public taxes and charges of the same character”, “claims arising out of the contract of engagement of the master, crew and other persons hired on board”, “remuneration for assistance and salvage”, “the contribution of the vessel in general average”, “indemnities for collision or other damage caused to works forming part of harbours, docks, etc,” “indemnities for personal injury to passengers or crew or for loss of or damage to cargo”, “claims resulting form contracts entered into or acts done by the master”. The same rule survived with only some minor change in the categories of maritime liens in the substitute conventions 1967 and 1993. The status que in maritime law have always been considered as a major obstacle to the development of shipping market and has inevitably led to increase in the interest rates and other related costs of ship financing. It seems that the national and international policy makers have yet to change their mind being worried about the deviation from the old marine traditions. However, it is crystal clear that the continuation of status que will harm, to a great extent, the shipowners and, consequently, the international merchants as a whole. It is argued in this article that the raison d'être for many categories of maritime liens cease to exist anymore, in view of which, the international community has to recognize only a minimum category of maritime liens which are created in the common interests of all creditors; to this effect, only two category of “compensation due for the salvage of ship” and “extraordinary expenses indispensable for the preservation of the ship” can be declared as taking priority over the mortgagee rights, in anology with the Geneva Convention on the International Recognition of Rights in Aircrafts (1948). A qualitative method with the concept of interpretation of data collection has been used in this manuscript. The source of the data is the analysis of international conventions and domestic laws.

Keywords: ship finance, mortgage, maritime liens, brussels convenion, geneva convention 1948

Procedia PDF Downloads 72
5600 Spatial Variation of Trace Elements in Suspended Sediments from Urban River

Authors: Daniel Macedo Neto, Sandro Froehner, Juan Sanez

Abstract:

Suspended sediments (SS) are an environmental constituent able to represent the effects of land use changes on watersheds. One important consideration of land use change is its implication on trace element loading. Water bodies have the capacity to retain trace elements. Spatial variation in trace elements concentrations can be associated with land occupation and sources of pollution. In this work, the spatial variation of trace elements in suspended sediments from an urban river was assessed. Time-integrated fluvial suspended sediment samples were installed in three different sites of Barigui River. The suspend solids were collected every 30 days, from May 2015 to August 2015 (total samples 12). Site P1 covers 44 km2 drainage area and has low land occupation, whilst P2 cover an area of 87 km2 and it is totally urban as P3, which area is higher than 130 km2. Trace elements (As, Cd, Cr, P, Pb and Zn) were analysed by ICP-ES. All elements analyzed showed a similar pattern, i.e., the concentration raise with the urbanization, exception for As (P1=7.75; P2=5.75; P3=5.60mg/kg). There was increase in concentration for Cd (P1=0.75; P2=0.78; P3=1.45mg/kg), Cr (P1=59.50; P2=101.75; P3=102.00 mg/kg), Zn (P1=142.25; P2=152.50; P3=223.00mg/kg), P (P1=937.50; P2=1,545.00; P3=2,355.00 mg/kg) and for Pb (P1=31.25; P2=32.75; P3=39.17±2.56 mg/kg). The variation in concentrations were as follow -27.74% (As), +93.33% (Cd), +71.43% (Cr), +151.20% (P), +25.33% (Pb) e +56.77% (Zn). Cd, Cr, P, Pb and Zn presented a clear trend of increasing the concentration from upstream to downstream. Such variation is more notorious for P, Cd and Cr, possibly due the urbanization.

Keywords: trace elements, erosion, urbanization, suspended sediments

Procedia PDF Downloads 314
5599 The Transition from National Policy to Institutional Practice of Vietnamese English Language Teacher Education

Authors: Thi Phuong Lan Nguyen

Abstract:

The English Language Teacher Education (ELTE) in Vietnam is rapidly changing to address the new requirements of the globalization and socialization era. Although there has been a range of investments and innovation in policy and curriculum, tertiary educators and learners do not engage in the enactment. It is vital to understand the practices at the tertiary education level. The study is to understand the higher education curriculum development policy, both in theory and in practice across four representatives of ELTE institutions in the North of Vietnam. The lecturers’ perceptions about the extent to which the enacted curriculum is aligned with national standards will be explored. Nineteen policy documents, seventy surveys, and twelve interviews with lecturers and instructional leaders across these four Vietnamese Northern ELTE institutions have been analyzed to investigate how the policy shape the practice. The two most significant findings are (i) a low level of alignment between curriculum and soft-skills standards of the graduates required by the Vietnamese Ministry of Education and Training (MOET) and (ii) incoherence between current national policy and these institutions’ implementation. In order to address these gaps, it is strongly recommended that curriculum needs to be further developed, focusing more on the institutional outcomes, MOET’s standards, and the social demands in times of globalization. More importantly, professional development in ELTE is vital for a range of curriculum and educational policy stakeholders. The study helps to develop the English teaching profession in Vietnam in a systematic way, from policymakers to implementers, and from instructors to learners. Its significance lies in its relevance to English teaching careers, particularly within the researcher’s specific context, yet also remains relevant to ELTE in other parts of Vietnam and in other EFL (English as a Foreign Language) countries.

Keywords: curriculum, English language teaching education, policy implementation, standard, teaching practice

Procedia PDF Downloads 239
5598 English as a Foreign Language Students’ Perceptions towards the British Culture: The Case of Batna 2 University, Algeria

Authors: Djelloul Nedjai

Abstract:

The issue of cultural awareness triggers many controversies, especially in a context where individuals do not share the same cultural backgrounds and characteristics. The Algerian context is no exception. It has been widely documented by the literature that culture remains essential in many domains. In higher education, for instance, culture plays a pivotal role in shaping individuals’ perceptions and attitudes. Henceforth, the current paper attempts to look at the perceptions of the British culture held by students engaged in learning English as a Foreign Language (EFL) at the department of English at Banta 2 University, Algeria. It also inquires into EFL students’ perceptions of British culture. To address the aforementioned research queries, a descriptive study has been carried out wherein a questionnaire of fifteen (15) items has been deployed to collect students’ attitudes and perceptions toward British culture. Results showcase that, indeed, EFL students of the department of English at Banta 2 University hold both positive and negative perceptions towards British culture at different levels. The explanation could relate to the student's lack of acquaintance with and awareness of British culture. Consequently, this paper is an attempt to address the issue of cultural awareness from the perspective of EFL students.

Keywords: British culture, cultural awareness, EFL students’ perceptions, higher education

Procedia PDF Downloads 90
5597 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 162
5596 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 96
5595 Orchids of Coastal Karnataka, India: Diversity, Trends in Population, Threats and Conservation Strategies

Authors: Sankaran Potti Narasimhan

Abstract:

Costal Karnataka is sandwiched between Arabian Sea and the biodiversity hotspot of Western Ghats. This has provided a rich vegetation, canopy and humidity for the sustainable growth and evolution of many orchid populations. Similar to many other biodiversity hostpot regions of India and the world, this region also faces threat from anthropogenic activities and climate change. Hence, there is a need to study the current orchid diversity and trends in population as well as an effective conservation strategy. Costal belt of Karnataka state of India extends over 325 kilometers and an area of 18,000 km2. The region encompasses two national parks such as the Anshi National Park and the Kudremukh National Park. The study regions also include two Wild Life Sanctuaries such as the Someshwara Wildlife Sanctuary and Mookambika Wildlife Sanctuary. The estimated number of orchids in the region includes 30 genera and 45 species. Both terrestrial and epiphytic orchids are found in this region. The region contains many red listed orchids such as Trias stocksii (Critically endangered), Eriad alzellii (Lower risk vulnerable) and Dendrobnium ovatum (Vulnerable). The important terrestrial orchids of the region are Geodorum, Habenaria, Lipparis, Malaxis, Nervilia, Pachystoma, Pectelis, Peristylus, Tropidia and Zeuxine. The epiphytic forms includes Acampe, Aerides, Bulbophyllum, Cleisostoma, Conchidum, Cottonia, Cymbidium, Dendronium, Eria, Flickingeria, Gastrochilus, Kingidium, Luisia, Oberonia, Phalaenopsis, Pholidota, Porpax, Rhynchostylis, Sirhookera and Trias. The current paper discusses the population strength and changes in the population structure of these orchids along with proposed conservation strategies.

Keywords: orchid diversity, bulbophyllum, dendrobium, orchid conservation

Procedia PDF Downloads 394
5594 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 367
5593 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security

Authors: Abel Edeowede Abhulimen

Abstract:

Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.

Keywords: performance, power industry, industrialization, security, energy

Procedia PDF Downloads 72
5592 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 430
5591 The International Constitutional Order and Elements of Human Rights

Authors: Girma Y. Iyassu Menelik

Abstract:

“The world is now like a global village!” so goes the saying that shows that due to development and technology the countries of the world are now closely linked. In the field of Human rights there is a close relationship in the way that rights are recognised and enforced. This paper will show that human rights have evolved from ancient times through important landmarks such as the Magna Carta, the French Declaration of Rights of Man and of the Citizen and the American Bill of Rights. The formation of the United Nations after the Second World War resulted in the need to codify and protect human rights. There are some rights which are so fundamental that they are found in international and continental instruments, national constitutions and domestic legislation. In the civil and political sphere they include the right to vote, to freedom of association, speech and assembly, right to life, privacy and fair trial. In the economic and social sphere you have the right to work, protection of the family, social security and rights to education, health and shelter. In some instance some rights can be suspended in times of public emergency but such derogations shall be circumscribed by the law and in most constitutions such limitations are subject to judicial review. However, some rights are so crucial that they cannot be derogated from under any circumstances and these include the right to life, recognition before the law, freedom from torture and slavery and of thought, conscience and religion. International jurisprudence has been developed to protect fundamental rights and avoid discrimination on the grounds of race, colour, sex, language or social origin. The elaborate protection system go to show that these rights have become part of the international order and they have universal application. We have now got to a stage where UDHR, ICCPR and ICESCR and have come to be regarded as part of an international bill of rights with horizontal and vertical enforcement mechanisms involving state parties, NGO’s , international bodies and other organs.

Keywords: rights, international, constitutional, state, judiciary

Procedia PDF Downloads 452