Search results for: architecture department in Islamic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4151

Search results for: architecture department in Islamic

2261 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 87
2260 Queer Social Realism and Architecture in British Cinema: Tenement Housing, Unions and the Affective Body

Authors: Christopher Pullen

Abstract:

This paper explores the significance of British cinema in the late 1950s and early 1960s as offering a renaissance of realist discourse, in the representation of everyday social issues. Offering a rejection of Hollywood cinema and the superficially of the middle classes, these ‘kitchen sink dramas’ often set within modest and sometimes squalid domestic and social environments, focused on the political struggle of the disenfranchised examining poverty, the oppressed and the outsider. While films like Look Back in Anger and Room at the Top looked primarily at male heterosexual subjectivity, films like A Taste of Honey and Victim focused on female and queer male narratives. Framing the urban landscape as a discursive architectural arena, representing basic living conditions and threatening social worlds, these iconic films established new storytelling processes for the outsider. This paper examines this historical context foregrounding the contemporary films Beautiful Thing (Hettie Macdonald, 1996), Weekend (Andrew Haigh, 2011) and Pride (Marcus Warchus, 2014), while employing the process of textual analysis in relation to theories of affect, defined by writers such as Lisa U. Marks and Sara Ahmed. Considering both romance narratives and public demonstrations of unity, where the queer ‘affective’ body is placed within architectural and social space, Beautiful Thing tells the story of gay male teenagers falling in love despite oppression from family and school, Weekend examines a one-night stand between young gay men and the unlikeliness of commitment, but the drive for sensitivity, and Pride foregrounds an historical relationship between queer youth activists and the miner’s union, who were on strike between 1984-5. These films frame the queer ‘affective’ body within politicized public space, evident in lower class men’s working clubs, tenement housing and brutal modernist tower blocks, focusing on architectural features such as windows, doorways and staircases, relating temporality, desire and change. Through such an examination a hidden history of gay male performativity is revealed, framing the potential of contemporary cinema to focus on the context of the outsider in encouraging social change.

Keywords: queer, affect, cinema, architecture, life chances

Procedia PDF Downloads 358
2259 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 633
2258 The Experience of the Prosthetics Program in Palestine Arab American University as Model

Authors: Ahmad Dawabsheh

Abstract:

The prosthetics program is an international program, found in honorable respectable universities. This program like other programs was found to serve several reasons, The most important reason is humanity, humanity free of conflict, religion, race, or war, but rather focuses on the humanitarian issue. This is what encouraged me to study this topic to help people, especially the poor in the world. The researcher will distribute a questionnaire to the faculty members and students of the department to measure the knowledge and importance of this program from the practical and theoretical sides of the local community. The researcher used the analytical method to study the subject. The research will attempt to answer the questions: What is the student's knowledge of this program? How important is this program to society?. The research aims to know the Palestinian society's need for this program. The research also aims to know the extent of students' knowledge of recent developments and new innovations in prosthetics around the world. What does the university offer to students in addition to theoretical courses?

Keywords: prosthetics, Arab American University, analytical method, questionnair

Procedia PDF Downloads 163
2257 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 530
2256 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 167
2255 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
2254 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting

Authors: Seedwell Sithole

Abstract:

One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.

Keywords: accounting, cognitive load, education, instructional preferences, students

Procedia PDF Downloads 151
2253 The Search for an Alternative to Tabarru` in Takaful Models

Authors: Abu Umar Faruq Ahmad, Muhammad Ayub

Abstract:

Tabarru` (unilateral gratuitous contribution) is thought to be the basic concept that distinguishes Takaful from conventional non-Sharīʿah compliant insurance. The Sharīʿah compliance of its current practice has been questioned in the premise that, a) it is a form of commutative contract; b) it is akin to the commercial corporate structure of insurance companies due to following the same marketing strategies, allocation to reserves, sharing of underwriting surplus by the companies one way or the other, providing loans to the Takaful funds, and resultantly absorbing the underwriting losses. The Sharīʿah scholars are of the view that the relationship between participants in Takaful should be in the form of commitment to donate, under which a contributor makes commitments himself to donate a sum of money for mutual help and cooperation on the condition that the balance, if any, should be returned to him. With the aim of finding solutions to the above mentioned concerns and other Sharīʿah related issues the study seeks to investigate whether the Takaful companies are functioning in accordance with the Islamic principles of brotherhood, solidarity, and cooperative risk sharing. Given that it discusses the cooperative model of Takaful to address the current and future Sharīʿah related and legal concerns. The study proposed an alternative model and considers it to best serve the objectives of Takaful which operates on the basis of ta`awun or mutual co-operation.

Keywords: hibah, musharakah ta`awuniyyah, Tabarru`, Takaful

Procedia PDF Downloads 445
2252 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 127
2251 Heuristic Evaluation of Children’s Authoring Tool for Game Making

Authors: Laili Farhana Md Ibharim, Maizatul Hayati Mohamad Yatim

Abstract:

The main purpose of this study is to evaluate the heuristic inspection of children’s authoring tools to develop games. The researcher has selected 15 authoring tools for making games specifically for educational purposes. Nine students from Diploma of Game Design and Development course and four lecturers from the computing department involved in this evaluation. A set of usability heuristic checklist used as a guideline for the students and lecturers to observe and test the authoring tools selected. The study found that there are just a few authoring tools that fulfill most of the heuristic requirement and suitable to apply to children. In this evaluation, only six out of fifteen authoring tools have passed above than five elements in the heuristic inspection checklist. The researcher identified that in order to develop a usable authoring tool developer has to emphasis children acceptance and interaction of the authoring tool. Furthermore, the authoring tool can be a tool to enhance their mental development especially in creativity and skill.

Keywords: authoring tool, children, game making, heuristic

Procedia PDF Downloads 348
2250 The Use of Indicators to Evaluate Minor Heritage Areas in a City

Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz

Abstract:

This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).

Keywords: heritage cities, indicators, spatial analysis, historic sites

Procedia PDF Downloads 243
2249 Excluded: The Sense of Non-Belonging and Violent Radicalisation in the Case of the United Kingdom

Authors: Lorand Bodo

Abstract:

There are many stories of young British citizens who have left their country and families to join Islamist militant groups. So, what drives these young people to abandon their families and countries to join terrorist groups such as the so-called Islamic State? Much has been written to explain the phenomenon of violent radicalisation, whereby the concepts of identity and belonging are identified as one of the most significant drivers for violent radicalisation. In this respect, this paper explores the connection between the sense of belonging and violent radicalisation. That is necessary to gain a more nuanced understanding of the process of violent radicalisation in order to create and implement more effective counter-measures for tackling violent radicalisation. By using an inductive approach, this dissertation attempts to answer the question to what extent does the sense of non-belonging lead to the violent radicalisation of a few individuals. Therefore, alongside an expert interview, a survey, and qualitative content analysis of secondary sources, an exclusive semi-structured interview was conducted with a former violently radicalised Jihadi and recruiter. Overall, the sense of non-belonging significantly affects the process of violent radicalisation of a few individuals. Nevertheless, being religiously fundamental is not the problem of becoming violently radicalised in the first place, but belonging to the wrong group that is strongly determined by ideology, constitutes the main problem.

Keywords: identity, sense of non-belonging, social identity theory, violent radicalisation

Procedia PDF Downloads 199
2248 Epidemiology of Healthcare-Associated Infections among Hematology/Oncology Patients: Results of a Prospective Incidence Survey in a Tunisian University Hospital

Authors: Ezzi Olfa, Bouafia Nabiha, Ammar Asma, Ben Cheikh Asma, Mahjoub Mohamed, Bannour Wadiaa, Achour Bechir, Khelif Abderrahim, Njah Mansour

Abstract:

Background: In hematology/oncology, health care improvement has allowed increasingly aggressive management in diagnostic and therapeutic procedures. Nevertheless, these intensified procedures have been associated with higher risk of healthcare associated infections (HAIs). We undertook this study to estimate the burden of HAIs in the cancer patients in an onco -hematology unit in a Tunisian university hospital. Materials/Methods: A prospective, observational study, based on active surveillance for a period of 06 months from Mars through September 2016, was undertaken in the department of onco-hematology in a university hospital in Tunisia. Patients, who stayed in the unit for ≥ 48 h, were followed until hospital discharge. The Centers for Disease Control and Prevention criteria (CDC) for site-specific infections were used as standard definitions for HAIs. Results: One hundred fifty patients were included in the study. The gender distribution was 33.3% for girls and 66.6% boys. They have a mean age of 23.12 years (SD = 18.36 years). The main patient’s diagnosis is: Acute Lymphoblastic Leukemia (ALL): 48.7 %( n=73). The mean length of stay was 21 days +/- 18 days. Almost 8% of patients had an implantable port (n= 12), 34.9 % (n=52) had a lumber puncture and 42.7 % (n= 64) had a medullary puncture. Chemotherapy was instituted in 88% of patients (n=132). Eighty (53.3%) patients had neutropenia at admission. The incidence rate of HAIs was 32.66 % per patient; the incidence density was 15.73 per 1000 patient-days in the unit. Mortality rate was 9.3% (n= 14), and 50% of cases of death were caused by HAIs. The most frequent episodes of infection were: infection of skin and superficial mucosa (5.3%), pulmonary aspergillosis (4.6%), Healthcare associated pneumonia (HAP) (4%), Central venous catheter associated infection (4%), digestive infection (5%), and primary bloodstream infection (2.6%). Finally, fever of unknown origin (FUO) incidence rate was 14%. In case of skin and superficial infection (n= 8), 4 episodes were documented, and organisms implicated were Escherichia.coli, Geotricum capitatum and Proteus mirabilis. For pulmonary aspergillosis, 6 cases were diagnosed clinically and radiologically, and one was proved by positive aspergillus antigen in bronchial aspiration. Only one patient died due this infection. In HAP (6 cases), four episodes were diagnosed clinically and radiologically. No bacterial etiology was established in these cases. Two patients died due to HAP. For primary bloodstream infection (4 cases), implicated germs were Enterobacter cloacae, Geotricum capitatum, klebsiella pneumoniae, and Streptococcus pneumoniae. Conclusion: This type of prospective study is an indispensable tool for internal quality control. It is necessary to evaluate preventive measures and design control guides and strategies aimed to reduce the HAI’s rate and the morbidity and mortality associated with infection in a hematology/oncology unit.

Keywords: cohort prospective studies, healthcare associated infections, hematology oncology department, incidence

Procedia PDF Downloads 390
2247 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 499
2246 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020

Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis

Abstract:

The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.

Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition

Procedia PDF Downloads 44
2245 Research on the Evolution of Public Space in Tourism-Oriented Traditional Rural Settlements

Authors: Yu Zhang, Mingxue Lang, Li Dong

Abstract:

The hundreds of years of slow succession of living environment in rural area is a crucial carrier of China’s long history of culture and national wisdom. In recent years, the space evolution of traditional rural settlements has been promoted by the intervention of tourism development, among which the public architecture and outdoor activity areas together served as the major places for villagers, and tourists’ social activities are an important characterization for settlement spatial evolution. Traditional public space upgrade and layout study of new public space can effectively promote the tourism industry development of traditional rural settlements. This article takes Qi County, one China Traditional Culture Village as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and Space Syntax, studies the evolution features of public space of tourism-oriented traditional rural settlements in four steps. First, acquire the 2003 and 2016 image data of Qi County, using the remote sensing application EDRAS8.6. Second, vectorize the basic maps of Qi County including its land use map with the application of ArcGIS 9.3 meanwhile, associating with architectural and site information concluded from field research. Third, analyze the accessibility and connectivity of the inner space of settlements using space syntax; run cross-correlation with the public space data of 2003 and 2016. Finally, summarize the evolution law of the public space of settlements; study the upgrade pattern of traditional public space and location plan for new public space. Major findings of this paper including: first, location layout of traditional public space has a larger association with the calculation results of space syntax and further confirmed the objective value of space syntax in expressing the space and social relations. Second, the intervention of tourism development generates remarkable impact on public space location of tradition rural settlements. Third, traditional public space produces the symbols of both strengthening and decline and forms a diversified upgrade pattern for the purpose of meeting the different tourism functional needs. Finally, space syntax provides an objective basis for location plan of new public space that meets the needs of tourism service. Tourism development has a significant impact on the evolution of public space of traditional rural settlements. Two types of public space, architecture, and site are both with changes seen from the perspective of quantity, location, dimension and function after the intervention of tourism development. Function upgrade of traditional public space and scientific layout of new public space are two important ways in achieving the goal of sustainable development of tourism-oriented traditional rural settlements.

Keywords: public space evolution, Qi county, space syntax, tourism oriented, traditional rural settlements

Procedia PDF Downloads 341
2244 Application of Transportation Linear Programming Algorithms to Cost Reduction in Nigeria Soft Drinks Industry

Authors: Salami Akeem Olanrewaju

Abstract:

The transportation models or problems are primarily concerned with the optimal (best possible) way in which a product produced at different factories or plants (called supply origins) can be transported to a number of warehouses or customers (called demand destinations). The objective in a transportation problem is to fully satisfy the destination requirements within the operating production capacity constraints at the minimum possible cost. The objective of this study is to determine ways of minimizing transport cost in order to maximum profit. Data were gathered from the records of the Distribution Department of 7-Up Bottling Company Plc. Ilorin, Kwara State, Nigeria. The data were analyzed using SPSS (Statistical Package for Social Sciences) while applying the three methods of solving a transportation problem. The three methods produced the same results; therefore, any of the method can be adopted by the company in transporting its final products to the wholesale dealers in order to minimize total production cost.

Keywords: cost minimization, resources utilization, distribution system, allocation problem

Procedia PDF Downloads 257
2243 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures

Authors: Yiwei Li, Mingyu Gao

Abstract:

Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.

Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units

Procedia PDF Downloads 96
2242 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit

Authors: Ararat Khachatryan, Davit Mirzoyan

Abstract:

In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.

Keywords: aging effect, HCI, NBTI, nanoscale

Procedia PDF Downloads 359
2241 Identifying Characteristics of Slum in Palembang Riverbanks Area, Indonesia

Authors: Rhaptyalyani Herno Della, Nyimas Septi Rika Putri, Rika Nabila

Abstract:

The growth of population and economic activities in urban areas needs support economic development, needs to be balanced with adequate environmental infrastructure development. Settlement can avoid from rundown condition and uninhabitable if the development of urban area accordance with healthy development. Identifying database of slum in this study reference to the Review of the Spatial Plan Development of Palembang City, Laws of Public Works Department about Technical Guidelines on the Quality Improvement Housing and Slum and Urban Spatial Global Report on Human Settlements 2003. A case study for identifying in Palembang riverbanks area are located in two districts; Ilir Timur I and Ilir Timur II. This study do the identification of slum areas based on several variables about physical and non physical aspect, then the result of identification are used to define a policy that can be used to improve the area.

Keywords: slum, riverbanks area, urban area, infrastructure

Procedia PDF Downloads 347
2240 The Relationship between Conceptual Organizational Culture and the Level of Tolerance in Employees

Authors: M. Sadoughi, R. Ehsani

Abstract:

The aim of the present study is examining the relationship between conceptual organizational culture and the level of tolerance in employees of Islamic Azad University of Shahre Ghods. This research is a correlational and analytic-descriptive one. The samples included 144 individuals. A 24-item standard questionnaire of organizational culture by Cameron and Queen was used in this study. This questionnaire has six criteria and each criterion includes four items that each item indicates one cultural dimension. Reliability coefficient of this questionnaire was normed using Cronbach's alpha of 0.91. Also, the 25-item questionnaire of tolerance by Conor and Davidson was used. This questionnaire is in a five-degree Likert scale form. It has seven criteria and is designed to measure the power of coping with pressure and threat. It has the needed content reliability and its reliability coefficient is normed using Cronbach's alpha of 0.87. Data were analyzed using Pearson correlation coefficient and multivariable regression. The results showed among various dimensions of organizational culture, there is a positive significant relationship between three dimensions (family, adhocracy, bureaucracy) and tolerance, there is a negative significant relationship between dimension of market and tolerance and components of organizational culture have the power of prediction and explaining the tolerance. In this explanation, the component of family is the most effective and the best predictor of tolerance.

Keywords: adhocracy, bureaucracy, organizational culture, tolerance

Procedia PDF Downloads 449
2239 Management of Religious Endowment Properties for Sustainable Development: A Case Study of Region of Kinniya, Sri Lanka

Authors: Muhammed Buhary Muhammed Thabith, Nor Asiah Mohamad

Abstract:

Religious Endowment (RE) (Waqf) has played an essential role in Islamic history and made a significant impact on the society, particularly in terms of socioeconomics. This has been made possible by having appropriate management of the RE propertiesin order to achieve the Sustainable Development Goals (SDGs), and the region of Kinniya, Sri Lanka, is not an exception. However, since the last Religious Endowment Act of 1982, a considerable deterioration has taken place, and cases of dormant properties have increased. This study proposes a conceptual model based on the SDGs initiatives to fill in the gaps. It analyses the application of the current RE properties management and identifies the issues as well as the challenges in the implementation of the RE Act. It adopts a doctrinal analysis involving the primary and secondary data, including statutes, practices, case law, and reports. The findings show that there are various management modes adopted by the stakeholders of RE. Some approaches are in tandem with the rules and practices of the SDGs with emphasis on support and cooperation from the community, private sector, and the government. Several initiatives such as awareness on RE, legal enforcements without fears and favours, as well as accounting and auditing, are recommended to minimize problems in managing the RE towards attaining the SDGs.

Keywords: sustainable development goals (SDGs), management, endowment, Sri Lanka

Procedia PDF Downloads 104
2238 Malaria Vulnerability Mapping from the Space: A Case Study of Damaturu Town-Nigeria

Authors: Isa Muhammad Zumo

Abstract:

Malaria is one of the worst illnesses that may affect humans. It is typically transmitted by the bite of a female Anopheles mosquito and is caused by parasitic protozoans from the Plasmodium parasite. Government and non-governmental organizations made numerous initiatives to combat the threat of malaria in communities. Nevertheless, the necessary attention was not paid to accurate and current information regarding the size and location of these favourable locations for mosquito development. Because mosquitoes can only reproduce in specific habitats with surface water, this study will locate and map those favourable sites that act as mosquito breeding grounds. Spatial and attribute data relating to favourable mosquito breeding places will be collected and analysed using Geographic Information Systems (GIS). The major findings will be in five classes, showing the vulnerable and risky areas for malaria cases. These risk categories are very high, high, moderate, low, and extremely low vulnerable areas. The maps produced by this study will be of great use to the health department in combating the malaria pandemic.

Keywords: Malaria, vulnerability, mapping, space, Damaturu

Procedia PDF Downloads 59
2237 Evaluation of Groundwater Suitability for Irrigation Purposes: A Case Study for an Arid Region

Authors: Mustafa M. Bob, Norhan Rahman, Abdalla Elamin, Saud Taher

Abstract:

The objective of this study was to assess the suitability of Madinah city groundwater for irrigation purposes. Of the twenty three wells that were drilled in different locations in the city for the purposes of this study, twenty wells were sampled for water quality analyses. The United States Department of Agriculture (USDA) classification of irrigation water that is based on Sodium hazard (SAR) and salinity hazard was used for suitability assessment. In addition, the residual sodium carbonate (RSC) was calculated for all samples and also used for irrigation suitability assessment. Results showed that all groundwater samples are in the acceptable quality range for irrigation based on RSC values. When SAR and salinity hazard were assessed, results showed that while all groundwater samples (except one) fell in the acceptable range of SAR, they were either in the high or very high salinity zone which indicates that care should be taken regarding the type of soil and crops in the study area.

Keywords: irrigation suitability, TDS, salinity, SAR

Procedia PDF Downloads 372
2236 A Preliminary Study Examining the Effect of Tourism as Perceived by Locals: From Perspective of Conservative of Research Theory

Authors: Ali Ahmad AlGassim

Abstract:

The objective of this study is to explore the local community perceptions toward the impact of tourism from the COR theory perspective. The current study used qualitative methods and purposive sampling to engage informants. Data was collected using an online survey with closed-ended and open-ended questions from 57 informants living in Al-Jufa Village, and then data was analysed using content analysis. The findings showed that COR theory help explains the residents’ perception of the threat and stress of losing resources. The findings showed the residents feel stressed about losing resources, such as lands, houses, heritage, sociocultural and Islamic values, as well as job and investment opportunities if the village is developed for tourism. Findings also present that one group of residents declared rejections and aiming to resist the development if it takes place, and they will not allowing foreigners to come and live in the village. The findings also show that this stress and strain can be alleviated by allowing residents to participate in the development. Finally, the residents of Al-Juhfa showed a high level of feeling of ownership towards their resources.

Keywords: perception of threat, effect of tourism, COR theory, local community, impact of tourism, Saudi Arabia

Procedia PDF Downloads 265
2235 The Voyage of Adolfo Caminha to the USA: The Discourse about Americanism in Brazil in the Late Nineteenth Century

Authors: Maxwel F. Silva, José Geraldo Pedrosa

Abstract:

This paper is a study about the voyage of Adolfo Caminha to the USA in the late nineteenth century described in “No país dos ianques”. The hypothesis is that the USA constitutes a civilizing reference that moves away from Europe. The Americanism expression it means that the Yankees have invented a new repertoire through which built a new idea of civilization. The base is European, but your architecture is new. This paper is not concerned with the meanings and uses of the Americanism expression among the Yankees, but with the ways in which the America were understood by otherness, especially in the late nineteenth and early twentieth century. In this way, this study discusses the concept of Americanism in the thought of Adolfo Caminha and it is relation with the Brazil in the late nineteenth century, especially in questions about democracy, liberty and progress.

Keywords: Adolfo Caminha, Americanism, discourse, voyage

Procedia PDF Downloads 552
2234 Meteorological Effect on Exergetic and Exergoeconomics Parameters of a Wind Turbine

Authors: Muhammad Abid

Abstract:

In this study, we performed the comparative exergetic and exergoeconomic analyses of a wind turbine over a period of twelve months from 1st January to 30th December 2011. The turbine is part of a wind-PV hybrid system with hydrogen storage, located on the roof of Mechanical Engineering Department, King Saud University, Riyadh, Saudi Arabia. The rated power output from this turbine is 1.7 W with a rated wind speed of 12 m/s and cut-in/cut-out wind speeds of 3/14 m/s. We utilize a wide range of experimental data in the analysis and assessment. We determine exergy efficiencies and their relation with meteorological variables, such as temperature and density. We also calculate exergoeconomic parameter R ̇_ex and its dependence on the temperature, using the average values for twelve months of the year considered for comparison purposes. The exergy efficiency changes from 0.12 to 0.31 while the density varies between 1.31 and 1.2 kg/m3 for different temperature values. The R ̇_ex has minimum and maximum values of 0.02 and 0.81, respectively, while the temperature is in the range of 8-24°C for various wind velocity values.

Keywords: exergy, efficiency, renewable energy, wind energy, meteorological variables

Procedia PDF Downloads 240
2233 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
2232 The Quantitative Analysis of the Traditional Rural Settlement Plane Boundary

Authors: Yifan Dong, Xincheng Pu

Abstract:

Rural settlements originate from the accumulation of residential building elements, and their agglomeration forms the settlement pattern and defines the relationship between the settlement and the inside and outside. The settlement boundary is an important part of the settlement pattern. Compared with the simplification of the urban settlement boundary, the settlement of the country is more complex, fuzzy and uncertain, and then presents a rich and diverse boundary morphological phenomenon. In this paper, China traditional rural settlements plane boundary as the research object, using fractal theory and fractal dimension method, quantitative analysis of planar shape boundary settlement, and expounds the research for the architectural design, ancient architecture protection and renewal and development and the significance of the protection of settlements.

Keywords: rural settlement, border, fractal, quantification

Procedia PDF Downloads 249