Search results for: global terrorism database
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6844

Search results for: global terrorism database

6694 Terrorism in German and Italian Press Headlines: A Cognitive Linguistic Analysis of Conceptual Metaphors

Authors: Silvia Sommella

Abstract:

Islamic terrorism has gained a lot of media attention in the last years also because of the striking increase of terror attacks since 2014. The main aim of this paper is to illustrate the phenomenon of Islamic terrorism by applying frame semantics and metaphor analysis to German and Italian press headlines of the two online weekly publications Der Spiegel and L’Espresso between 2014 and 2019. This study focuses on how media discourse – through the use of conceptual metaphors – let arise in people a particular reception of the phenomenon of Islamic terrorism and accept governmental strategies and policies, perceiving terrorists as evildoers, as the members of an uncivilised group ‘other’ opposed to the civilised group ‘we’: two groups that are perceived as opposed. The press headlines are analyzed on the basis of the cognitive linguistics, namely Lakoff and Johnson’s conceptualization of metaphor to distinguish between abstract conceptual metaphors and specific metaphorical expressions. The study focuses on the contexts, frames, and metaphors. The method adopted in this study is Konerding’s frame semantics (1993). Konerding carried out on the basis of dictionaries – in particular of the Duden Deutsches Universalwörterbuch (Duden Universal German Dictionary) – in a pilot study of a lexicological work hyperonym reduction of substantives, working exclusively with nouns because hyperonyms usually occur in the dictionary meaning explanations as for the main elements of nominal phrases. The results of Konerding’s hyperonym type reduction is a small set of German nouns and they correspond to the highest hyperonyms, the so-called categories, matrix frames: ‘object’, ‘organism’, ‘person/actant’, ‘event’, ‘action/interaction/communication’, ‘institution/social group’, ‘surroundings’, ‘part/piece’, ‘totality/whole’, ‘state/property’. The second step of Konerding’s pilot study consists in determining the potential reference points of each category so that conventionally expectable routinized predications arise as predictors. Konerding found out which predicators the ascertained noun types can be linked to. For the purpose of this study, metaphorical expressions will be listed and categorized in conceptual metaphors and under the matrix frames that correspond to the particular conceptual metaphor. All of the corpus analyses are carried out using Ant Conc corpus software. The research will verify some previously analyzed metaphors such as TERRORISM AS WAR, A CRIME, A NATURAL EVENT, A DISEASE and will identify new conceptualizations and metaphors about Islamic terrorism, especially in the Italian language like TERRORISM AS A GAME, WARES, A DRAMATIC PLAY. Through the identification of particular frames and their construction, the research seeks to understand the public reception and the way to handle the discourse about Islamic terrorism in the above mentioned online weekly publications under a contrastive analysis in the German and in the Italian language.

Keywords: cognitive linguistics, frame semantics, Islamic terrorism, media

Procedia PDF Downloads 169
6693 Relationship Between Health Coverage and Emergency Disease Burden

Authors: Karim Hajjar, Luis Lillo, Diego Martinez, Manuel Hermosilla, Nicholas Risko

Abstract:

Objectives: This study examines the relationship between universal health coverage (UCH) and the burden of emergency diseases at a global level. Methods: Data on Disability-Adjusted Life Years (DALYs) from emergency conditions were extracted from the Institute for Health Metrics and Evaluation (IHME) database for the years 2015 and 2019. Data on UHC, measured using two variables, 1) coverage of essential health services and 2) proportion of population spending more than 10% of household income on out-of-pocket health care expenditure, was extracted from the World Bank Database for years preceding our outcome of interest. Linear regression was performed, analyzing the effect of the UHC variables on the DALYs of emergency diseases, controlling for other variables. Results: A total of 133 countries were included. 44.4% of the analyzed countries had coverage of essential health services index of at least 70/100, and 35.3% had at least 10% of their population spend greater than 10% of their household income on healthcare. For every point increase in the coverage of essential health services index, there was a 13-point reduction in DALYs of emergency medical diseases (95% CI -16, -11). Conversely, for every percent decrease in the population with large household expenditure on healthcare, there was a 0.48 increase in DALYs of emergency medical diseases (95% CI -5.6, 4.7). Conclusions: After adjusting for multiple variables, an increase in coverage of essential health services was significantly associated with improvement in DALYs for emergency conditions. There was, however, no association between catastrophic health expenditure and DALYs.

Keywords: emergency medicine, universal healthcare, global health, health economics

Procedia PDF Downloads 89
6692 Materialized View Effect on Query Performance

Authors: Yusuf Ziya Ayık, Ferhat Kahveci

Abstract:

Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.

Keywords: cost of query, database management systems, materialized view, query performance

Procedia PDF Downloads 271
6691 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects

Authors: Karen Fang

Abstract:

Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.

Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest

Procedia PDF Downloads 145
6690 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 425
6689 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 453
6688 Global Communication: Trends and Impact of Unbalanced Information in Nigerian Society

Authors: Uchenna Patricia Ekwugha, Cornelius Aghadiegwu Ukwueze

Abstract:

Global communication has changed life at the international scene affecting on the whole social, cultural and political life of individuals in a global community. It has brought about a changing trend in the field of communication and allowed people to learn, create and process information through mainline media and new media technologies. The paper debates that music is an integral form of global communication that cannot be overlooked because it is a beautiful and powerful tool in relating information to the people which they gladly imbibe. It is worrisome that through global communication there has been consistent clash of values on information’s disseminated to the global community of which the developing countries like Nigerians are the sufferers. Particularly involved in this vicious social dogma are the Nigerian youths, who learn defiant behaviour through global communication and lose touch of African cultural values.

Keywords: global communication, trends, impact, unbalanced information

Procedia PDF Downloads 496
6687 A Review on Web-Based Attendance Management System

Authors: Arvind Lal, Chumphila Bhutia, Bidhan Pradhan, Retika Sharma, Monisha Limboo

Abstract:

There have been many proposals to optimize the students’ management system in higher education. Managing student attendance during lecture periods have become a difficult challenge. Manual calculation of attendance produces errors and wastes a lot of time. This proposed system manages the student’s attendance in a web portal and the records of the attendance will be stored in a database. The attendance of the students will be further forwarded to their HOD (Head OF Department), class teacher and their parents/guardians. This system will use MySQL for the database. The template of the website will be built using HTML and CSS (Cascading StyleSheet) code. JavaScript will be added to improve the use of the system. Student’s details will be stored in the database. Also, it will contain the details of the teachers according to their subjects and the classes they teach. The system will be responsive which can be used in mobile phones. Also, the development of this project will be user-friendly by facilitating with clear and understandable tabs. Hence, this website will be beneficial to institutes.

Keywords: website, student's attendance, MySQL database, HTML, CSS, PHP, JavaScript

Procedia PDF Downloads 173
6686 The New Media and Their Economic and Socio-Political Imperatives for Africa: A Study of Nigeria

Authors: Chukwukelue Uzodinma Umenyilorah

Abstract:

The advent of the New Media as enabled by information and communication technology from the 19th through the 21st century has no doubt taken its toll on all fronts of human existence; especially in Africa. Apart from shortening the distance between all parts of the world, technology and the new media has also succeeded in making the world a global village. Hence, it is now easy to relay live audio and visual signals across the length and breadth of the world in real time. People now contract and execute businesses across countries, conferences are held and ideas are shared with a simple push of a button. Likewise, political leaders and diplomats are now just a click away from reaching those important decisions that take their country’s fortunes to the next level. On the flip side, ICT and the New Media have also contributed in no small measure in aiding global terrorism and general insecurity around the world. More interesting is the fact that as developing economies, African countries have massively embraced the information technology and this has helped them in keeping up with the trends in the polity of other model democracies around the world. This paper is therefore designed to determine the how much effect ICT and the New Media has exerted on the economic, social and political lives of African. Nigeria shall be used as a case in point for the purpose of this paper.

Keywords: Africa, ICT, new media, Nigeria

Procedia PDF Downloads 246
6685 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.

Keywords: Belgium, counterterrorism strategies, human rights, immigration law

Procedia PDF Downloads 104
6684 Robustified Asymmetric Logistic Regression Model for Global Fish Stock Assessment

Authors: Osamu Komori, Shinto Eguchi, Hiroshi Okamura, Momoko Ichinokawa

Abstract:

The long time-series data on population assessments are essential for global ecosystem assessment because the temporal change of biomass in such a database reflects the status of global ecosystem properly. However, the available assessment data usually have limited sample sizes and the ratio of populations with low abundance of biomass (collapsed) to those with high abundance (non-collapsed) is highly imbalanced. To allow for the imbalance and uncertainty involved in the ecological data, we propose a binary regression model with mixed effects for inferring ecosystem status through an asymmetric logistic model. In the estimation equation, we observe that the weights for the non-collapsed populations are relatively reduced, which in turn puts more importance on the small number of observations of collapsed populations. Moreover, we extend the asymmetric logistic regression model using propensity score to allow for the sample biases observed in the labeled and unlabeled datasets. It robustified the estimation procedure and improved the model fitting.

Keywords: double robust estimation, ecological binary data, mixed effect logistic regression model, propensity score

Procedia PDF Downloads 260
6683 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 521
6682 Global Collaboration During Global Crisis a Response to Rigorous Field Education in Social Work

Authors: Ruth Gerritsen-McKane, Mimi Sodhi, Lisa Gray, Donette Considine, Henry Kronner, Tameca Harris-Jackson

Abstract:

During these extraordinary times amid a global pandemic, political/civil unrest, and natural disasters, the need for appropriately trained professional social workers has never been stronger. Needs do not diminish but are heightened during such remarkable times. All too often, “developed” countries see the crisis in developing countries as uniquely theirs; 2020 has shown, there are no “others”; there is only us. Consequently, engaging in meaningful collaboration worldwide is essential! This presentation speaks to the fundamentals of global collaboration and, more importantly, how an in these trying times, the development of strong international partnerships can create opportunities for social work students across the planet to engage in meaningful field education opportunities. Accomplished by multiple modalities, a deeper understanding and response to social work students becoming formidable global citizens can be achieved.

Keywords: global citizens, global crisis, global collaboration, modalities

Procedia PDF Downloads 214
6681 Strengthening Deradicalizing Islamist Extremism in Indonesia: A Victim-Centred Approach

Authors: Milda Istiqomah

Abstract:

Deradicalization program has long been the subject of investigation. There is a steadily growing interest in examining the results on how Islamist terrorists agree to abandon violence and leave radicalism; however, it is argued that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article aims to provide an overview of the deradicalization program specifically related to the victim-centred approach conducted by the Indonesian government and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This research employs several case studies of a victim-centred approach conducted by the Indonesian Witness and Victim Protection Agency as well as the Indonesian Counter-terrorism Agency. This paper argues that the victim-centred approach to de-radicalize former terrorist prisoners faces several implemental challenges; however, the initiative may offer promise for future successful de-radicalization program. Furthermore, until more data surrounding the efficacy of this initiative available, the victim-centred approach may also constitute a significant and essential component of disengagement, de-radicalisation, and reintegration of terrorist prisoners. In conclusion, this paper suggests that further empirical research concerning prevention policies and disengagement interventions related to victim-centred approach need to be explored to give more inputs to the Indonesian government to achieve the effectiveness of de-radicalization program.

Keywords: terrorism, victim-centred approach, de-radicalization, Islamist extremism

Procedia PDF Downloads 304
6680 Research of Database Curriculum Construction under the Environment of Massive Open Online Courses

Authors: Wang Zhanquan, Yang Zeping, Gu Chunhua, Zhu Fazhi, Guo Weibin

Abstract:

Recently, Massive Open Online Courses (MOOCs) are becoming the new trend of education. There are many problems under the environment of Database Principle curriculum teaching process in MOOCs, such as teaching ideas and theories which are out of touch with the reality, how to carry out the technical teaching and interactive practice in the MOOCs environment, thus the methods of database course under the environment of MOOCs are proposed. There are three processes to deal with problem solving in the research, which are problems proposed, problems solved, and inductive analysis. The present research includes the design of teaching contents, teaching methods in classroom, flipped classroom teaching mode under the environment of MOOCs, learning flow method and large practice homework. The database designing ability is systematically improved based on the researching methods.

Keywords: problem solving-driven, MOOCs, teaching art, learning flow;

Procedia PDF Downloads 360
6679 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 134
6678 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 189
6677 Preventing Violent Extremism through Augmenting Community Resilience and Empowering Community Members in Swat

Authors: Dr. Muhammad Idris Idris, Dr. Said Saeed Saeed

Abstract:

Terrorism is the chronic issue of the hour. It is the disciplined practice of vicious activities like assassinating, slaughtering, mutilating, and frightening of the innocents to attain religious, fiscal, and political goals and to question the authority of the government. Leaders of the world promised to transform the planet by empowering community members and building community resilience (CR) against terrorism. This study concentrates to explore building community resilience against terrorism and empowering community members and implement strategies for strengthening community resilience. For data collection a mixed methods methodology will be used. Means, STD deviation, Pearson correlation, and thematic analysis will be employed to analyze the gathered data. The findings of the study will be interpreted and recommendations will be furnished accordingly. Study results will be disseminated to all concerned through conferences and seminar sessions. It is predicted that after the completion, the project team will be in a robust position to start writing the report that concentrates on strengthening community resilience, which is the crucial goal of this project. The publication will contribute effectively to all stakeholders and society, particularly to the lower rungs of social order. Moreover, it is expected that this project will contribute to future research in the domain of community resilience. This project will also reveal the remarkable potential of archival research on community resilience.

Keywords: Violent Extremism, community Role, community resilience, community empowerment, Leadership role

Procedia PDF Downloads 137
6676 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 121
6675 Evaluation of a Surrogate Based Method for Global Optimization

Authors: David Lindström

Abstract:

We evaluate the performance of a numerical method for global optimization of expensive functions. The method is using a response surface to guide the search for the global optimum. This metamodel could be based on radial basis functions, kriging, or a combination of different models. We discuss how to set the cycling parameters of the optimization method to get a balance between local and global search. We also discuss the eventual problem with Runge oscillations in the response surface.

Keywords: expensive function, infill sampling criterion, kriging, global optimization, response surface, Runge phenomenon

Procedia PDF Downloads 570
6674 Design of Traffic Counting Android Application with Database Management System and Its Comparative Analysis with Traditional Counting Methods

Authors: Muhammad Nouman, Fahad Tiwana, Muhammad Irfan, Mohsin Tiwana

Abstract:

Traffic congestion has been increasing significantly in major metropolitan areas as a result of increased motorization, urbanization, population growth and changes in the urban density. Traffic congestion compromises efficiency of transport infrastructure and causes multiple traffic concerns; including but not limited to increase of travel time, safety hazards, air pollution, and fuel consumption. Traffic management has become a serious challenge for federal and provincial governments, as well as exasperated commuters. Effective, flexible, efficient and user-friendly traffic information/database management systems characterize traffic conditions by making use of traffic counts for storage, processing, and visualization. While, the emerging data collection technologies continue to proliferate, its accuracy can be guaranteed through the comparison of observed data with the manual handheld counters. This paper presents the design of tablet based manual traffic counting application and framework for development of traffic database management system for Pakistan. The database management system comprises of three components including traffic counting android application; establishing online database and its visualization using Google maps. Oracle relational database was chosen to develop the data structure whereas structured query language (SQL) was adopted to program the system architecture. The GIS application links the data from the database and projects it onto a dynamic map for traffic conditions visualization. The traffic counting device and example of a database application in the real-world problem provided a creative outlet to visualize the uses and advantages of a database management system in real time. Also, traffic data counts by means of handheld tablet/ mobile application can be used for transportation planning and forecasting.

Keywords: manual count, emerging data sources, traffic information quality, traffic surveillance, traffic counting device, android; data visualization, traffic management

Procedia PDF Downloads 187
6673 The Effect of Global Value Chain Participation on Environment

Authors: Piyaphan Changwatchai

Abstract:

Global value chain is important for current world economy through foreign direct investment. Multinational enterprises' efficient location seeking for each stage of production lead to global production network and more global value chain participation of several countries. Global value chain participation has several effects on participating countries in several aspects including the environment. The effect of global value chain participation on the environment is ambiguous. As a result, this research aims to study the effect of global value chain participation on countries' CO₂ emission and methane emission by using quantitative analysis with secondary panel data of sixty countries. The analysis is divided into two types of global value chain participation, which are forward global value chain participation and backward global value chain participation. The results show that, for forward global value chain participation, GDP per capita affects two types of pollutants in downward bell curve shape. Forward global value chain participation negatively affects CO₂ emission and methane emission. As for backward global value chain participation, GDP per capita affects two types of pollutants in downward bell curve shape. Backward global value chain participation negatively affects methane emission only. However, when considering Asian countries, forward global value chain participation positively affects CO₂ emission. The recommendations of this research are that countries participating in global value chain should promote production with effective environmental management in each stage of value chain. The examples of policies are providing incentives to private sectors, including domestic producers and MNEs, for green production technology and efficient environment management and engaging in international agreements in terms of green production. Furthermore, government should regulate each stage of production in value chain toward green production, especially for Asia countries.

Keywords: CO₂ emission, environment, global value chain participation, methane emission

Procedia PDF Downloads 185
6672 Contemporary Global Urban Scenarios: An Essay on Urban Insurgencies

Authors: Clovis Ultramari, Lidia Floriani, Debora Cicioli

Abstract:

This paper is a preliminary discussion on the constituency of contemporary global urban scenarios. It is based on secondary sources, mostly from the topics mostly currently discussed by global studies institutes, academic material on the possible components of this phenomenon, and a list of possible scenarios preliminarily proposed by these authors. It also discusses one of these possible scenarios (urban insurgencies) through the lens of a global perspective. Main objective of the research presented in this paper is to produce insights for international aid and development agencies as well as to respond to an increasing interest in the urban studies field in discussing global topics. This paper also results from discussions held in seminars offered by the authors in the graduate program of Urban Management along 2021 and 2022. It is part of a research project that puts together an international team of researches, mostly from the Global South. Results so far obtained refer to conceptual aspects for the determination of global urban scenarios and the presentation of urban insurgencies as worldwide trending urban phenomenon. Presentation in the seminar is part of an ongoing discussion.

Keywords: urban global scenarios, contemporary cities, global south, urban insurgencies

Procedia PDF Downloads 102
6671 Utilization of CD-ROM Database as a Storage and Retrieval System by Students of Nasarawa State University Keffi

Authors: Suleiman Musa

Abstract:

The utilization of CD-ROM as a storage and retrieval system by Nasarawa State University Keffi (NSUK) Library is crucial in preserving and dissemination of information to students and staff. This study investigated the utilization of CD-ROM Database storage and retrieval system by students of NUSK. Data was generated using structure questionnaire. One thousand and fifty two (1052) respondents were randomly selected among post-graduate and under-graduate students. Eight hundred and ten (810) questionnaires were returned, but only five hundred and ninety three (593) questionnaires were well completed and useful. The study found that post-graduate students use CD-ROM Databases more often than the under-graduate students in NSUK. The result of the study revealed that knowledge about CD-ROM Database 33.22% got it through library staff. 29.69% use CD-ROM once a month. Large number of users 45.70% purposely uses CD-ROM Databases for study and research. In fact, lack of users’ orientation amount to 58.35% of problems faced, while 31.20% lack of trained staff make it more difficult for utilization of CD-ROM Database. Major numbers of users 38.28% are neither satisfied nor dissatisfied, while a good number of them 27.99% are satisfied. Then 1.52% is highly dissatisfied but could not give reasons why. However, to ensure effective utilization of CD-ROM Database storage and retrieval system by students of NSUK, the following recommendations are made: effort should be made to encourage under-graduate in using CD-ROM Database. The institution should conduct orientation/induction course for students on CD-ROM Databases in the library. There is need for NSUK to produce in house databases on their CD-ROM for easy access by users.

Keywords: utilization, CD-ROM databases, storage, retrieval, students

Procedia PDF Downloads 437
6670 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 106
6669 2D Fingerprint Performance for PubChem Chemical Database

Authors: Fatimah Zawani Abdullah, Shereena Mohd Arif, Nurul Malim

Abstract:

The study of molecular similarity search in chemical database is increasingly widespread, especially in the area of drug discovery. Similarity search is an application in the field of Chemoinformatics to measure the similarity between the molecular structure which is known as the query and the structure of chemical compounds in the database. Similarity search is also one of the approaches in virtual screening which involves computational techniques and scoring the probabilities of activity. The main objective of this work is to determine the best fingerprint when compared to the other five fingerprints selected in this study using PubChem chemical dataset. This paper will discuss the similarity searching process conducted using 6 types of descriptors, which are ECFP4, ECFC4, FCFP4, FCFC4, SRECFC4 and SRFCFC4 on 15 activity classes of PubChem dataset using Tanimoto coefficient to calculate the similarity between the query structures and each of the database structure. The results suggest that ECFP4 performs the best to be used with Tanimoto coefficient in the PubChem dataset.

Keywords: 2D fingerprints, Tanimoto, PubChem, similarity searching, chemoinformatics

Procedia PDF Downloads 287
6668 Role of Obama's Administration Counter-Terrorism Strategies towards Pakistan

Authors: Ahmed Bux Jamali

Abstract:

The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run.

Keywords: counterterrorism cooperation, national security strategy, Obama administration, Pakistan-US relations

Procedia PDF Downloads 172
6667 A Saudi Herbal Database: An Approach for Organizing the Rich Herbal Resource of the Kingdom of Saudi Arabia

Authors: Syed Asif Hassan, Tabrej Khan

Abstract:

The use of traditional medicines for the treatment of various diseases as well as maintaining a healthy lifestyle has gained a significant acceptance across the globe. The increasing popularity of Herbal Medicine can be owed to the fact that is relatively inexpensive and has lesser side effects as compared to general medicines. The Kingdom of Saudi Arabia has a rich heritage of herbal medicine for overages. However, the information about essential traditional herbs of Arabian origin and their implication in the treatment of various diseases are not well documented in an organized manner. Therefore, the requirement of a local platform (database system) for herbal medicines of Arab origin is the need of the day. In this context, various questionnaire and surveys were conducted over a period of 6 months. The surveys were targeted to identify a range of herbal remedies used by the communities of Saudi Arabia e.g., pharmacists and local people. The survey leads us to identify many of the mysterious local medicinal herbs used for the treatment of various ailments and thus reveals a unique insight into the natural herbal resource of Saudi Arabia. The information of the herbal medicines will be further used to develop a Saudi herbal database system using the principles of waterfall method. An interactive dynamic electronic web portal of the herbal database system will be built using MySQL and PHP for accessing the information available in the Saudi herbal database system. The web portal will be a step forward in creating awareness among the Arab nationals of their rich herbal heritage.

Keywords: Saudi herbal medicine, community survey, database system and design, MySQL, PHP

Procedia PDF Downloads 416
6666 Planning Sustainable Urban Communities through Nature-Based Solutions: Perspectives from the Global South

Authors: Nike Jacobs, Elizelle Juanee Cilliers

Abstract:

In recent decades there has been an increasing strive towards broader sustainable planning practices. A wide range of literature suggests that nature-based solutions (including Green Infrastructure planning) may lead towards socio-economically and environmentally sustainable urban communities. Such research is however mainly based on practices from the Global North with very little reference to the Global South. This study argues that there is a need for Global North knowledge to be translated to Global South context, and interpreted within this unique environment, acknowledging historical and cultural differences between Global North and Global South, and ultimately providing unique solutions for the unique urban reality. This research primarily focuses on nature-based solutions for sustainable urban communities and considers a broad literature review on Global North knowledge regarding such, substantiated by an analysis of purposefully selected case studies. The investigation identifies best practices which could be translated and place such in the context of current Global South perspectives.

Keywords: global south, green infrastructure planning, nature-based solutions, sustainable urbanism, urban sustainability

Procedia PDF Downloads 250
6665 Multimodal Database of Emotional Speech, Video and Gestures

Authors: Tomasz Sapiński, Dorota Kamińska, Adam Pelikant, Egils Avots, Cagri Ozcinar, Gholamreza Anbarjafari

Abstract:

People express emotions through different modalities. Integration of verbal and non-verbal communication channels creates a system in which the message is easier to understand. Expanding the focus to several expression forms can facilitate research on emotion recognition as well as human-machine interaction. In this article, the authors present a Polish emotional database composed of three modalities: facial expressions, body movement and gestures, and speech. The corpora contains recordings registered in studio conditions, acted out by 16 professional actors (8 male and 8 female). The data is labeled with six basic emotions categories, according to Ekman’s emotion categories. To check the quality of performance, all recordings are evaluated by experts and volunteers. The database is available to academic community and might be useful in the study on audio-visual emotion recognition.

Keywords: body movement, emotion recognition, emotional corpus, facial expressions, gestures, multimodal database, speech

Procedia PDF Downloads 346