Search results for: national security strategy
8020 Optimization and Energy Management of Hybrid Standalone Energy System
Authors: T. M. Tawfik, M. A. Badr, E. Y. El-Kady, O. E. Abdellatif
Abstract:
Electric power shortage is a serious problem in remote rural communities in Egypt. Over the past few years, electrification of remote communities including efficient on-site energy resources utilization has achieved high progress. Remote communities usually fed from diesel generator (DG) networks because they need reliable energy and cheap fresh water. The main objective of this paper is to design an optimal economic power supply from hybrid standalone energy system (HSES) as alternative energy source. It covers energy requirements for reverse osmosis desalination unit (DU) located in National Research Centre farm in Noubarya, Egypt. The proposed system consists of PV panels, Wind Turbines (WT), Batteries, and DG as a backup for supplying DU load of 105.6 KWh/day rated power with 6.6 kW peak load operating 16 hours a day. Optimization of HSES objective is selecting the suitable size of each of the system components and control strategy that provide reliable, efficient, and cost-effective system using net present cost (NPC) as a criterion. The harmonization of different energy sources, energy storage, and load requirements are a difficult and challenging task. Thus, the performance of various available configurations is investigated economically and technically using iHOGA software that is based on genetic algorithm (GA). The achieved optimum configuration is further modified through optimizing the energy extracted from renewable sources. Effective minimization of energy charging the battery ensures that most of the generated energy directly supplies the demand, increasing the utilization of the generated energy.Keywords: energy management, hybrid system, renewable energy, remote area, optimization
Procedia PDF Downloads 1998019 Productivity of Construction Companies Using the Management of Threats and Opportunities in Construction Projects of Iran
Authors: Nima Amani, Ali Salehi Dastjerdi, Fatemeh Ahmadi, Ardalan Sabamehr
Abstract:
The cost overrun of the construction projects has always been one of the main problems of the construction companies caused by the risky nature of the construction projects. Therefore, today, the application of risk management is inevitable. Although in theory, the issue of risk management is divided into the opportunities and threats management, in practice, most of the projects have been focused on the threats management. However, considering the opportunities management and applying the opportunities-response strategies can lead to the improved profitability of the construction projects of the companies. In this paper, a new technique is developed to identify the opportunities in the construction projects using an improved protocol and propose the appropriate opportunities-response strategies to the construction companies to provide them with higher profitability. To evaluate the effectiveness of the protocol for selecting the most appropriate strategies in response to the opportunities and threats, two projects from a construction company in Iran were studied. Both projects selected were in mid-range in terms of size and similar in terms of time, run time and costs. Finally, the output indicates that using the proposed opportunities-response strategies show that the company's profitability in the future can be increased approximately for similar projects.Keywords: opportunities management, risk-response strategy, opportunity-response strategy, productivity, risk management
Procedia PDF Downloads 2288018 Mellowing the Mélange: Ancient Southeast Asian Kingdoms in the Asian Civilizations Museum
Authors: Rin Li Si Samantha
Abstract:
The Asian Civilisations Museum in Singapore contains artifacts spanning thousands of years of history and possibly hundreds of communities and nations. Based in Singapore, its collections history and curation are deeply rooted in Singapore’s national and international agendas: to be a cultural center within Southeast Asia and a global hub representing Asia to the world. As such, the position of Southeast Asian histories, particularly Southeast Asian ancient kingdoms, is a carefully negotiated one; its presence contingent on the territorialization and depoliticization of Southeast Asian ancient kingdoms, such that they remain palatable to modern nation-states and governments; its absence noted, strategically overlooked in favour of ‘grander’ cultural and global — oftentimes a misnomer for Western — narratives. This study undertakes a close reading of several key permanent exhibitions at the Asian Civilisations Museum in pursuit of how ancient Southeast Asian kingdoms are framed and forgotten to reveal a conscious mellowing of the mélange such that Singapore may be positioned as inheritor of Asia’s cultural wealth.Keywords: museum, Southeast Asia, art history, pre-colonial, national narratives
Procedia PDF Downloads 778017 Land Use Planning Tool to Achieve Land Degradation Neutrality: Tunisia Case Study
Authors: Rafla Attia, Claudio Zucca, Bao Quang Le, Sana Dridi, Thouraya Sahli, Taoufik Hermassi
Abstract:
In Tunisia, landscape change and land degradation are critical issues for landscape conservation, management, and planning. Landscapes are undergoing crucial environmental problems made evident by soil degradation and desertification. Human improper uses of land resources (e.g., unsuitable land uses, unsustainable crop intensification, and poor rangeland management) and climate change are the main factors leading to the landscape transformation and desertification affecting high proportions of the Tunisian lands. Land use planning (LUP) to achieve Land Degradation Neutrality (LDN) must be supported by methodologies and technologies that help identify best solutions and practices and design context-specific sustainable land management (SLM) strategies. Such strategies must include restoration or rehabilitation efforts in areas with high land degradation, as well as prevention of degradation that could be caused by improper land use (LU) and land management (LM). The geoinformatics Land Use Planning for LDN (LUP4LDN) tool has been designed for this purpose. Its aim is to support national and sub-national planners in i) mapping geographic patterns of current land degradation; ii) anticipating further future land degradation expected in areas that are unsustainably managed; and iii) providing an interactive procedure for developing participatory LU-LM transitional scenarios over selected regions of interest and timeframes, visualizing the related expected levels of impacts on ecosystem services via maps and graphs. The tool has been co-developed and piloted with national stakeholders in Tunisia. The piloting implementation assessed how the LUP4LDN tool fits with existing LUP processes and the benefits achieved by using the tool to support land use planning for LDN.Keywords: land use system, land cover, sustainable land management, land use planning for land degradation neutrality
Procedia PDF Downloads 778016 The Renewal Strategy for Ancient Residential Area in Small and Medium-Sized Cities Based on Field Research of Changshu City in China
Abstract:
Renewing ancient residential areas is an integral part of the sustainable development of modern cities. Compared with a metropolis, the old areas of small and medium-sized cities is more complicated to update, as the spatial form is more fragmented. In this context, the author takes as the research object, the ancient town of Changshu City, which is a small city representative in China with a history of more than 1,200 years. Through the analysis of urban research and update projects, the spatial evolution characteristics and renewal strategies of small ancient urban settlements are studied. On this basis, it is proposed to protect the residential area from the perspective of integrity and sustainability, strengthen the core public part, control the district building, and reshape the important interface. Renewing small and medium-sized urban areas should respect the rhythm of their own urban development and gradually complete the update, not blindly copying the experience of large cities.Keywords: ancient residential area, Changshu, city renewal strategy, small and medium-sized cities
Procedia PDF Downloads 1178015 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 2688014 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2418013 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security
Authors: Lynndee Kemmet
Abstract:
The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.Keywords: food security, food system model, political stability, US Military
Procedia PDF Downloads 1958012 Consumer Market for Mineral Water and Development Policy in Georgia
Authors: Gulnaz Erkomaishvili
Abstract:
The paper discusses mineral water consumer market and development policy in Georgia, the tools and measures, which will contribute to the production of mineral waters and increase its export. The paper studies and analyses current situation in mineral water production sector as well as the factors affecting increase and reduction of its export. It’s noted that in order to gain and maintain competitive advantage, it’s necessary to provide continuous supply of high-quality goods with modern design, open new distribution channels to enter new markets, carry out broad promotional activities, organize e-commerce. Economic policy plays an important role in protecting markets from counterfeit goods. The state also plays an important role in attracting foreign direct investments. Stable business environment and export-oriented strategy is the basis for the country’s economic growth. Based on the research, the paper suggests the strategy for improving the competitiveness of Georgian mineral waters, relevant conclusions and recommendations are provided.Keywords: mineral waters, consumer market for mineral waters, export of mineral waters, mineral water development policy in Georgia
Procedia PDF Downloads 4298011 Designing an Online Case-Based Library for Technology Integration in Teacher Education
Authors: Mustafa Tevfik Hebebci, Sirin Kucuk, Ismail Celik, A. Oguz Akturk, Ismail Sahin, Fetah Eren
Abstract:
The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for interactive case-based library. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology into education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.Keywords: ADDIE, case-based library, design, technology integration
Procedia PDF Downloads 4458010 A Theoretical Framework of Patient Autonomy in a High-Tech Care Context
Authors: Catharina Lindberg, Cecilia Fagerstrom, Ania Willman
Abstract:
Patients in high-tech care environments are usually dependent on both formal/informal caregivers and technology, highlighting their vulnerability and challenging their autonomy. Autonomy presumes that a person has education, experience, self-discipline and decision-making capacity. Reference to autonomy in relation to patients in high-tech care environments could, therefore, be considered paradoxical, as in most cases these persons have impaired physical and/or metacognitive capacity. Therefore, to understand the prerequisites for patients to experience autonomy in high-tech care environments and to support them, there is a need to enhance knowledge and understanding of the concept of patient autonomy in this care context. The development of concepts and theories in a practice discipline such as nursing helps to improve both nursing care and nursing education. Theoretical development is important when clarifying a discipline, hence, a theoretical framework could be of use to nurses in high-tech care environments to support and defend the patient’s autonomy. A meta-synthesis was performed with the intention to be interpretative and not aggregative in nature. An amalgamation was made of the results from three previous studies, carried out by members of the same research group, focusing on the phenomenon of patient autonomy from a patient perspective within a caring context. Three basic approaches to theory development: derivation, synthesis, and analysis provided an operational structure that permitted the researchers to move back and forth between these approaches during their work in developing a theoretical framework. The results from the synthesis delineated that patient autonomy in a high-tech care context is: To be in control though trust, co-determination, and transition in everyday life. The theoretical framework contains several components creating the prerequisites for patient autonomy. Assumptions and propositional statements that guide theory development was also outlined, as were guiding principles for use in day-to-day nursing care. Four strategies used by patients to remain or obtain patient autonomy in high-tech care environments were revealed: the strategy of control, the strategy of partnership, the strategy of trust, and the strategy of transition. This study suggests an extended knowledge base founded on theoretical reasoning about patient autonomy, providing an understanding of the strategies used by patients to achieve autonomy in the role of patient, in high-tech care environments. When possessing knowledge about the patient perspective of autonomy, the nurse/carer can avoid adopting a paternalistic or maternalistic approach. Instead, the patient can be considered to be a partner in care, allowing care to be provided that supports him/her in remaining/becoming an autonomous person in the role of patient.Keywords: autonomy, caring, concept development, high-tech care, theory development
Procedia PDF Downloads 2078009 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 2758008 Processes of Identities Formation and Transformation among Professional Skilled Mexican Migrants in the United States
Authors: M. Laura Vazquez Maggio, Lilia Dominguez Villalobos, Jan Luka Frey
Abstract:
This paper contributes to the understanding of the dynamic and the relational nature of identities formation among skilled middle-class migrants. Following the idea that identities are never singular, multifaceted and have a necessarily processual character, the authors specifically analyze three dimensions of the identity of qualified Mexican migrants in the US and the interplay between them. Drawing on semi-structured interviews with skilled Mexican middle-class migrants in the US, the paper explores how skilled Mexican migrants preserve their ethno-national identity (their ‘Mexicanness’) in reaction to a hostile socio-political reception context in the US. It further shows how these migrants recreate their class identity and show tendencies to distance themselves from what they perceive as lower-class Mexican migrants and the dominant popular Mexican and Latin-American cultural expressions. In a final step, it examines how the lived experience of migration itself impacts the migrants’ identities, their concept of self and feelings/modes of being and belonging.Keywords: ethno-national identity, middle class identity, middle-class migration, migrants’ identity, skilled migration
Procedia PDF Downloads 1438007 Geothermal Resources to Ensure Energy Security During Climate Change
Authors: Debasmita Misra, Arthur Nash
Abstract:
Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.Keywords: exploration, geothermal, renewable energy, sustainable
Procedia PDF Downloads 1548006 Law, Resistance, and Development in Georgia: A Case of Namakhvani HPP
Authors: Konstantine Eristavi
Abstract:
The paper will contribute to the discussion on the pitfalls, limits, and possibilities of legal and rights discourse in opposing large infrastructural projects in the context of neoliberal globalisation. To this end, the paper will analyse the struggle against the Namakhvani HPP project in Georgia. The latter has been hailed by the government as one of the largest energy projects in the history of the country, with an enormous potential impact on energy security, energy independence, economic growth, and development. This takes place against the backdrop of decades of market-led -or neoliberal- model of development in Georgia, characterised by structural adjustments, deregulation, privatisation, and Laissez-Fair approach to foreign investment. In this context, the Georgian state vies with other low and middle-income countries for foreign capital by offering to potential investors, on the one hand, exemptions from social and environmental regulations and, on the other hand, huge legal concessions and safeguards, thereby participating in what is often called a “race to the bottom.” The Namakhvani project is a good example of this. At every stage, the project has been marred with violations of laws and regulations concerning transparency, participation, social and environmental regulations, and so on. Moreover, the leaked contract between the state and the developer reveals the contractual safeguards which effectively insulate the investment throughout the duration of the contract from the changes in the national law that might adversely affect investors’ rights and returns. These clauses, aimed at preserving investors' economic position, place the contract above national law in many respects and even conflict with fundamental constitutional rights. In response to the perceived deficiencies of the project, one of the largest and most diverse social movements in the history of post-soviet Georgia has been assembled, consisting of the local population, conservative and leftist groups, human rights and environmental NGOs, etc. Crucially, the resistance movement is actively using legal tools. In order to analyse both the limitations and possibilities of legal discourse, the paper will distinguish between internal and immanent critiques. Law as internal critique, in the context of the struggles around the Namakhvani project, while potentially fruitful in hindering the project, risks neglecting and reproducing those factors -e.g., the particular model of development- that made such contractual concessions and safeguards and concomitant rights violations possible in the first place. On the other hand, the use of rights and law as part of immanent critique articulates a certain incapacity on the part of the addressee government to uphold existing laws and rights due to structural factors, hence, pointing to a need for a fundamental change. This 'ruptural' form of legal discourse that the movement employs makes it possible to go beyond the discussion around the breaches of law and enables a critical deliberation on the development model within which these violations and extraordinary contractual safeguards become necessary. It will be argued that it is this form of immanent critique that expresses the emancipatory potential of legal discourse.Keywords: law, resistance, development, rights
Procedia PDF Downloads 808005 Portuguese City Reconstructed from Public Space: The Example of the Requalification of Cacém Central Area
Authors: Rodrigo Coelho
Abstract:
As several authors have pointed out (such as Jordi Borja, or Oriol Bohigas), the necessity to “make center” presents itself not only as a imperative response to deal with the processes of dissolution of peripheral urbanization, as it should be assumed, from the point of view its symbolic and functional meaning, as a key concept to think and act on the enlarged city. The notion of re-centralization (successfully applied in urban periphery recompositions, such as in Barcelona or Lyon), understood from the redefinition of mobility, the strengthening of core functions, and from the creation or consolidation of urban fabrics (always articulated with policies of creation and redevelopment of public spaces), seems to become one of the key strategies over the challenge of making the city on the “city periphery”. The question we want to address in this paper concerns, essentially, the importance of public space in the (re) construction of the contemporary "shapeless city” sectors (which, in general, we associate to urban peripheries). We will seek demonstrate, from the analysis of a Portuguese case study–The Cacém Central Area requalification, integrated in Polis Program (National Program for Urban Rehabilitation and Environmental Improvement of Cities, released in 1999 by the Portuguese government), the conditions under which the public space project can act, subsequently, in the urban areas of recent formation, where, in many situations, the public space did not have a structuring role in its urbanization, seeing its presence reduced to a residual character. More specifically, we intend to demonstrate with this example the methodological and urban design aspects that led to the regeneration of a disqualified and degraded urban area, by intervening consistently and profoundly in public space (with well defined objectives and criteria, and framed in a more comprehensive strategy, attentive to the various scales of urban design).Keywords: public space, urban design, urban regeneration, urban and regional studies
Procedia PDF Downloads 5788004 Fashion and Soft War: Analysis of Iran's Regulatory Measures for Fashion Industry
Authors: Leili Nekounazar
Abstract:
Since 2009, when the Green movement, Iran’s most significant political uprising in post-Islamic revolution materialized, the term 'soft war' has become an integral part of the Iranian regime’s lexicon when addressing the media propaganda waged by the west and the regime’s so-called 'enemies'. Iran’s authorities describe soft war as a western campaign aiming at undermining the revolutionary values by covert activities, deploying cultural tools and purposeful dissemination of information. With this respect, Internet and in particular, the social media networks, and oppositional radio-television broadcasts have been considered as the west’s soft war conduits. With the rising of the underground fashion industry in the past couple of years that does not conform to the compulsory dress codes prescribed by the state, the Islamic regime expands the soft war narrative to include any undesired fashion-related activities and frames the rising fashion industry as a cultural war intoxicating the Iranian-Islamic identity. Accordingly, fashion products created by the Iranian fashion intermediators have been attributed to the westerners and outsiders and are regarded as the matter of national security. This study examines the reactive and proactive measures deployed by the Iranian regime to control the rise of fashion industry. It further puts under the scrutiny how the state as a part of its proactive measure shapes the narrative of 'soft war' in relation to fashion in Iran and explores how the notion of soft war has been articulated in relation to the modeling and fashion in the state’s political rhetoric. Through conducting a content analysis of the authorities’ statements, it describes how the narrative of soft war assists the state policing the fashion industry.Keywords: censorship, fashion, Iran, soft war
Procedia PDF Downloads 3448003 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda
Authors: Sofia Sutera
Abstract:
Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda
Procedia PDF Downloads 1358002 A Sociological Study of the Potential Role of Retired Soldiers in the Post War Development and Reconstruction in Sri Lanka
Authors: Amunupura Kiriwandeiye Gedara, Asintha Saminda Gnanaratne
Abstract:
The security forces can be described as a workforce that goes beyond the role of ensuring the national security and contributes to the development process of the country. Soldiers are following combatant training courses during their tenure, they are equipped with a variety of vocational training courses to satisfy the needs of the army, to equip them with vocational training capabilities to achieve the development and reconstruction goals of the country as well as for the betterment of society in the event of emergencies. But with retirement, their relationship with the military is severed, and they are responsible for the future of their lives. The main purpose of this study was to examine how such professional capabilities can contribute to the development of the country, the current socio-economic status of the retired soldiers, and the current application of the vocational training skills they have mastered in the army to develop and rebuild the country in an effective manner. After analyzing the available research literature related to this field, a conceptual framework was developed and according to qualitative research methodology, and data obtained from Case studies and interviews are analyzed by using thematic analysis. Factors influencing early retirement include a lack of understanding of benefits, delays in promotions, not being properly evaluated for work, getting married on hasty decisions, and not having enough time to spend on family and household chores. Most of the soldiers are not aware about various programs and benefits available to retirees. They do not have a satisfactory attitude towards the retirement guidance they receive from the army at the time of retirement. Also, due to the lack of understanding about how to use their vocational capabilities successfully pursue their retirement life, the majority of people are employed in temporary jobs, and some are successful in post-retirement life due to their successful use of training received. Some live on pensions without engaging in any income-generating activities, and those who retire after 12 years of service are facing severe economic hardships as they do not get pensions. Although they have received training in various fields, they do not use them for their benefit due to lack of proper guidance. Although the government implements programs, they are not clearly aware of them. Barriers to utilization of training include an absence of a system to identify the professional skills of retired soldiers, interest in civil society affairs, exploration of opportunities in the civil and private sectors, and politicization of services. If they are given the opportunity, they will be able to contribute to the development and reconstruction process. The findings of the study further show that it has many social, economic, political, and psychological benefits not only for individuals but also for a country. Entrepreneurship training for all retired soldiers, improving officers' understanding, streamlining existing mechanisms, creating new mechanisms, setting up a separate unit for retirees, and adapting them to civil society, private and non-governmental contributions, and training courses can be identified as potential means to improve the current situation.Keywords: development, reconstruction, retired soldiers, vocational capabilities
Procedia PDF Downloads 1338001 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions
Authors: Abdulrahman Yarali, Machica McClain
Abstract:
In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare
Procedia PDF Downloads 218000 Determinants of Service Quality on Thai Passengers’ Repeated Purchase of Domestic Flight Service with Thai Airways International
Authors: Nattapong Techarattanased
Abstract:
This research paper aimed to identify determinants of airline service quality on passengers’ repeated purchase of service. The population of this study was Thai passengers flying domestic flights with Thai Airways, making a total of 300 samples. These 300 samples participated in this research by answering a collection of questions by means of a questionnaire. An analysis of means score and multiple regression revealed that perceived service quality for tangible elements, reliability, responsiveness, assurance and empathy had determined repeated purchase of flight service of the passengers at a high level. Moreover, reliability and responsiveness factors could predict the passengers’ repeated purchase of flight service at the percentage of 30.6. The findings gave a signal that Thai Airways may consider a development of route network and fleet strategy as well as an establishment of aircraft and seat qualification to meet passengers’ needs and requirements. Passengers’ level of satisfaction could also be maximized by offering service value through various kinds of special deals and programs, whereas value- added pricing strategy should be considered in order to differentiate from and beat other leading airline competitors.Keywords: repeated purchase, service quality, domestic flight, Thai Airways
Procedia PDF Downloads 2837999 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 1077998 The Potential Role of University Libraries in the Fight against Terrorism in Upper Egypt
Authors: Essam Mansour
Abstract:
The purpose of this study is to explore the potential role of South Valley University (SVU) libraries’ manpower, collections and services in the fight against terrorism in the Upper Egypt. A quantitative research methodology was used in the form of a survey sent to 127 library staff at the SVU. The survey was undertaken from June to July 2015 with a response rate 73.2%. Printed materials were the most adequate collections in the SVU libraries. Other materials, such as CDs/DVDs, audiovisual materials, microfilm and microfiche, online resources and electronic materials respectively were inadequate at SVU libraries. Few of the services provided by SVU libraries were characterized as adequate services, some are inadequate and other services do not exist. The average of the facilities provided by SVU libraries was somewhat adequate. Activities, such as holding social field trips, holding training workshops and holding academic field trip were, at least, somewhat adequate to SVU libraries. SVU libraries had no a significant role in fighting terrorism in the Upper Egypt. There is no a relationship between the SVU library staff’s professional characteristics and the potential role that their libraries may play in the fight against this phenomenon. As a result of the lack of SVU libraries’ collections, services, facilities and activities, this study concluded that that such role could not be achieved. Almost all the library staff admitted that this severe lack has affected the provision of library patrons and members of the library community to these collections and services, which help in countering the threat of terrorism. Despite the significance of all these problems faced by SVU libraries in the fight against terrorism, it was found that the inadequacy of the library opening hours is significantly correlated with the professional characteristics of the library staff, particularly their job title and work experience.Keywords: terrorism, national security, university libraries, south valley university, Egypt, survey
Procedia PDF Downloads 2507997 An Application of Content Analysis, SWOT Analysis, and the TOPSIS Method: A Case Study of the 'Tourism Ambassador' Program in Indonesia
Authors: Gilang Maulana Majid
Abstract:
If a government program remains scientifically uncontested for a long time, it is likely that its effects will be far from expected as there is no concrete evaluation of the steps being taken. This article identifies how such a theory aptly describes the case of the 'tourism ambassador' program in Indonesia. Being set out as one of the tourism promotional means of many regional governments in Indonesia, this program is heavily criticized for being ineffective despite a large number of budgets being spent on an annual basis. Taking the program as a case study, this article applies content analysis, SWOT analysis, and TOPSIS as data analysis methods, with a total of 56 tourism ambassadors invited to become coders, respondents, and/or interviewees in this research. The study reveals the SWOT of the program, recognizes four strategies that can be taken to optimize the program's effects and prioritizes a strategy based on the preferences of the involved tourism ambassadors using TOPSIS. It is found that incorporation of technology such as the creation of an online platform is, among others, the most expected approach to be taken to solve the problems concerning tourism ambassador program. However, based on the costs and benefits of each strategy presented in the current study, each alternative appears to have trade-offs between one and another.Keywords: Indonesia, optimization strategies, 'Tourism Ambassador' program, SWOT-TOPSIS
Procedia PDF Downloads 1667996 Concepts of Creation and Destruction as Cognitive Instruments in World View Study
Authors: Perizat Balkhimbekova
Abstract:
Evolutionary changes in cognitive world view taking place in the last decades are followed by changes in perception of the key concepts which are related to the certain lingua-cultural sphere. Also, such concepts reflect the person’s attitude to essential processes in the sphere of concepts, e.g. the opposite operations like creation and destruction. These changes in people’s life and thinking are displayed in a language world view. In order to open the maintenance of mental structures and concepts we should use language means as observable results of people’s cognitive activity. Semantics of words, free phrases and idioms should be considered as an authoritative source of information concerning concepts. The regularized set of concepts in people consciousness forms the sphere of concepts. Cognitive linguistics widely discusses the sphere of concepts as its crucial category defining it as the field of knowledge which is made of concepts. It is considered that a sphere of concepts comprises the various types of association and forms conceptual fields. As a material for the given research, the data from Russian National Corpus and British National Corpus were used. In is necessary to point out that data provided by computational studies, are intrinsic and verifiable; so that we have used them in order to get the reliable results. The procedure of study was based on such techniques as extracting of the context containing concepts of creation|destruction from the Russian National Corpus (RNC), and British National Corpus (BNC); analyzing and interpreting of those context on the basis of cognitive approach; finding of correspondence between the given concepts in the Russian and English world view. The key problem of our study is to find the correspondence between the elements of world view represented by opposite concepts such as creation and destruction. Findings: The concept of "destruction" indicates a process which leads to full or partial destruction of an object. In other words, it is a loss of the object primary essence: structures, properties, distinctive signs and its initial integrity. The concept of "creation", on the contrary, comprises positive characteristics, represents the activity aimed at improvement of the certain object, at the creation of ideal models of the world. On the other hand, destruction is represented much more widely in RNC than creation (1254 cases of the first concept by comparison to 192 cases for the second one). Our hypothesis consists in the antinomy represented by the aforementioned concepts. Being opposite both in respect of semantics and pragmatics, and from the point of view of axiology, they are at the same time complementary and interrelated concepts.Keywords: creation, destruction, concept, world view
Procedia PDF Downloads 3467995 Development of a Drive Cycle Based Control Strategy for the KIIRA-EV SMACK Hybrid
Authors: Richard Madanda, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Doreen Orishaba, Victor Tumwine
Abstract:
New vehicle concepts targeting specific geographical markets are designed to satisfy a unique set of road and load requirements. The KIIRA-EV SMACK (KES) hybrid vehicle is designed in Uganda for the East African market. The engine and generator added to the KES electric power train serve both as the range extender and the power assist. In this paper, the design consideration taken to achieve the proper management of the on-board power from the batteries and engine-generator based on the specific drive cycle are presented. To harness the fuel- efficiency benefits of the power train, a specific control philosophy operating the engine and generator at the most efficient speed- torque and speed-power regions is presented. By using a suitable model developed in MATLAB using Simulink and Stateflow, preliminary results show that the steady-state response of the vehicle for a particular hypothetical drive cycle mimicking the expected drive conditions in the city and highway traffic is sufficient.Keywords: control strategy, drive cycle, hybrid vehicle, simulation
Procedia PDF Downloads 3807994 Community Based Local Economic Development Strategy Using Strategic Asumption Surfacing and Testing and Expoential Rank Method
Authors: Kholil Kholil, Soecahyadi Soecahyadi
Abstract:
Geographically, Padang Panjang Regency which located in the heart of Western Sumatra has great potentials for the tourism industry. However, these potentials have not been strategically developed for increasing local economic development and people's welfare. The purpose of this research is to design the strategy of sustainable tourism area development using Strategic Assumption Surfacing and Testing (SAST) and Exponential Rank Method (ERM). Result study showed, there are four aspects which importance and certainly for developing tourism area destination in Padang Panjang Regency; (1) tourist information center and promotion, (2) regional cooperation development; (3) minangese center as a center of excellence; and (4) building the center of the public market. To build an attractive tourist area required action plan includes the construction of an information center, center of excellence of minangese, and tourist infrastructure; and public participation is a key success factor for ensuring sustainability of tourism development in Padang Panjang Regency.Keywords: local economic development, tourism attraction, SAST, ERM
Procedia PDF Downloads 3407993 CSR: Corporate Social Responsibility Performance of Indian Automobiles Companies
Authors: Jagbir Singh Kadyan
Abstract:
This research paper critically analyse the performance of those Indian Automobile Companies which are listed and traded on the National Stock Exchange (NSE) of India and which are also included in the NSE nifty auto Index. In India, CSR–Corporate Social Responsibility is mandatory for certain qualifying companies under the Indian Companies Act 2013, which replaces the erstwhile Companies Act 1956. There has been a significant shift in the focus and approaches of the Indian Corporates towards their CSR obligations with the insertion of section 135, revision of section 198 and introduction of schedule VII of the Indian Companies Act 2013. Every such qualifying companies are required to mandatorily spend at least 2% of their annual average net profit of the immediately preceding three financial years on such CSR activities as specified under schedule VII of the Companies act 2013. This research paper analyzes the CSR performance of such Indian companies. This research work is originally based on the secondary data. The annual reports of the selected Indian automobile companies have been extensively used and considered for this research work.Keywords: board of directors, corporate social responsibility, CSR committees, Indian automobile companies, Indian companies act 2013, national stock exchange
Procedia PDF Downloads 5387992 The Strategy of Teaching Digital Art in Classroom as a Way of Enhancing Pupils’ Artistic Creativity
Authors: Aber Salem Aboalgasm, Rupert Ward
Abstract:
Teaching art by digital means is a big challenge for the majority of teachers of art and artistic design courses in primary education schools. These courses can clearly identify relationships between art, technology and creativity in the classroom .The aim of this article is to present a modern way of teaching art, using digital tools in the art classroom in order to improve creative ability in pupils aged between 9 and 11 years; it also presents a conceptual model for creativity based on digital art. The model could be useful for pupils interested in learning drawing and using an e-drawing package, and for teachers who are interested in teaching their students modern digital art, and improving children’s creativity. This model is designed to show the strategy of teaching art through technology, in order for children to learn how to be creative. This will also help education providers to make suitable choices about which technological approaches they should choose to teach students and enhance their creative ability. To define the digital art tools that can benefit children develop their technical skills. It is also expected that use of this model will help to develop social interactive qualities that may improve intellectual ability.Keywords: digital tools, motivation, creative activity, technical skill
Procedia PDF Downloads 4637991 Managing Company's Reputation during Crisis: An Analysis of Croatia Airlines' Crisis Response Strategy to the Labor Unions' Strike Announcement
Authors: M. Polic, N. Cesarec Salopek
Abstract:
When it comes to crisis, no company, notwithstanding its financial success, power or reputation is immune to the new environment and circumstances emerging from it. The main challenge company faces with during a crisis is to protect its most valuable intangible asset reputation. Crisis has the serious potential to disrupt company’s everyday operations and damage its reputation extremely fast, especially if the company did not anticipate threats that may cause a crisis. Therefore, when a crisis happens, company must directly respond to it, whilst an effective crisis communication can limit consequences arising from the crisis, protect and repair the reputational damage caused to the company. Since every crisis is unique, each one of it requires different crisis response strategy. In July 2018, airline labor unions threatened Croatia Airlines, the state owned flag carrier of Croatia, to hold a strike that would be called into question regular flights and affect more than 7.600 passengers per day. This study explores the differences between crisis response strategies that Croatia Airlines, the state owned flag carrier of Croatia and airline labor unions used during the crisis period within the Situational Crisis Communication Theory (SCCT) by analyzing the content of formal communication tools used by Croatia Airlines and airline labor unions. Moreover, this study shows how Croatia Airlines successfully managed to communicate to the general public the threat that airline labor unions imposed on it and how was it received by the Croatian media. By using the qualitative and quantitative content analysis, the study will reveal the frames that dominated in the media articles during the crisis period. The greatest significance of this study is that it will provide the deeper insight into how transparent and consistent communication, the one that Croatia Airlines used before and during the crisis period, contributed to the decision of the competent court (Zagreb County Court) which prohibited labor unions strike in August 2018.Keywords: crisis communication, crisis response strategy, Croatia Airlines, labor union, reputation management, situational crisis communication theory, strike
Procedia PDF Downloads 135