Search results for: social networks security issues
14972 A Further Study on the 4-Ordered Property of Some Chordal Ring Networks
Authors: Shin-Shin Kao, Hsiu-Chunj Pan
Abstract:
Given a graph G. A cycle of G is a sequence of vertices of G such that the first and the last vertices are the same. A hamiltonian cycle of G is a cycle containing all vertices of G. The graph G is k-ordered (resp. k-ordered hamiltonian) if for any sequence of k distinct vertices of G, there exists a cycle (resp. hamiltonian cycle) in G containing these k vertices in the specified order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-ordered. Thus the study of any graph being k-ordered (resp. k-ordered hamiltonian) always starts with k = 4. Most studies about this topic work on graphs with no real applications. To our knowledge, the chordal ring families were the first one utilized as the underlying topology in interconnection networks and shown to be 4-ordered [1]. Furthermore, based on computer experimental results in [1], it was conjectured that some of them are 4-ordered hamiltonian. In this paper, we intend to give some possible directions in proving the conjecture.Keywords: Hamiltonian cycle, 4-ordered, Chordal rings, 3-regular
Procedia PDF Downloads 43414971 Fuzzy Rules Based Improved BEENISH Protocol for Wireless Sensor Networks
Authors: Rishabh Sharma
Abstract:
The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.Keywords: wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system
Procedia PDF Downloads 10614970 Study on Evaluating the Utilization of Social Media Tools (SMT) in Collaborative Learning Case Study: Faculty of Medicine, King Khalid University
Authors: Vasanthi Muniasamy, Intisar Magboul Ejalani, M.Anandhavalli, K. Gauthaman
Abstract:
Social Media (SM) are websites increasingly popular and built to allow people to express themselves and to interact socially with others. Most SMT are dominated by youth particularly college students. The proliferation of popular social media tools, which can accessed from any communication devices has become pervasive in the lives of today’s student life. Connecting traditional education to social media tools are a relatively new era and any collaborative tool could be used for learning activities. This study focuses (i) how the social media tools are useful for the learning activities of the students of faculty of medicine in King Khalid University (ii) whether the social media affects the collaborative learning with interaction among students, among course instructor, their engagement, perceived ease of use and perceived ease of usefulness (TAM) (iii) overall, the students satisfy with this collaborative learning through Social media.Keywords: social media, Web 2.0, perceived ease of use, perceived usefulness, collaborative Learning
Procedia PDF Downloads 50814969 Characteristics and Guiding Strategies of College Students' Online Discourse: Based on the Analysis of One Student Forum
Authors: Hanwei Cheng, Chengbei Xu, Yijie Wang
Abstract:
More and more college students are accustomed to surfing the Internet everyday. As community members, college students have ability to express opinions and participate in social affairs, they not only accept information passively, but also voice their concerns on the Internet. We interpret the online discourses featured with anonymization, so it helps us more effectively and conveniently understand the behaviors and thoughts of college students, and educators can thus grasp the scales and directions in guiding online language. We analyzed online comments in both content and form aspects in one student forum (named Dandan, the BNU’s campus forum), and through methods of literature review and interview, we found that in term of content, college students pay attention to practical information online, emphasize on personal development and pursue hot issues; in term of form, college students' online language displays cross-border quality sometimes under the general feature of normative, and they often explore a certain topic in the form of question or discussion, and they like to show feelings in ironic and stream-of-consciousness ways. It is argued that college students intend to establish a community to facilitate personal development and meet emotional needs through the student forum, and by making comments at the forum they are also able to get involved in public affairs. We should pay attention to problems of college students' online discourse, such as boundary issues (like informal advertisement and information authenticity), emotional issues and the spread of gossip. Some possible solutions to solving online discourse problems can be applied, like we can improve access systems of student forum, clarify principles of Internet langue use, change oversimplified management approaches and use some other tactics, in order to form a mechanism of student self-regulation, also deepen the trust and cooperation between school administrators and students.Keywords: online language, youth discourse, content and form, implication and strategy
Procedia PDF Downloads 14114968 Motivations, Perceptions, and Aspirations concerning Teaching as a Career for High School Students from Racially/Ethnically Diverse Backgrounds
Authors: Mi Ok Kang
Abstract:
This study explores the factors that motivate urban high school students from racially/ethnically diverse backgrounds to choose teaching as a future career. It draws on in-depth interviews with high school students of color living in an urban downtown located in an intermountain area in the U.S. Using the factors influencing teaching choice (FIT-Choice) model, this study examines the motivations, mobility experiences, and aspirations of participating high school students who self-identified as Latino/a, Tongan, and Chinese. The study identifies influential factors -both challenges and strengthening effects- that high school students of color experience in their career decision making. The study concludes that self-perceptions of teaching abilities, parental support, social connections, job security, and prior work with children during the internship in K-12 classroom motivated them to be a teacher. Limitations such as financial struggles of parents, the low social status of teaching career, and the low salary and benefit packages in the U.S. are among the factors that cause students to waver in or doubt their career choice.Keywords: career development, diversifying teaching force, FIT-Choice, high school students of color
Procedia PDF Downloads 28414967 Opportunities and Challenges of Digital Diplomacy in the Public Diplomacy of the Islamic Republic of Iran
Authors: Somayeh Pashaee
Abstract:
The ever-increasing growth of the Internet and the development of information and communication technology have prompted the politicians of different countries to use virtual networks as an efficient tool for their foreign policy. The communication of governments and countries, even in the farthest places from each other, through electronic networks, has caused vast changes in the way of statecraft and governance. Importantly, in the meantime, diplomacy, which is always based on information and communication, has been affected by the new prevailing conditions and new technologies more than other areas and has faced greater changes. The emergence of virtual space and the formation of new communication tools in the field of public diplomacy has led to the redefinition of the framework of diplomacy and politics in the international arena and the appearance of a new aspect of diplomacy called digital diplomacy. Digital diplomacy is in the concept of changing relations from a face-to-face and traditional way to a non-face-to-face and new way, and its purpose is to solve foreign policy issues using virtual space. Digital diplomacy, by affecting diplomatic procedures and its change, explains the role of technology in the visualization and implementation of diplomacy in different ways. The purpose of this paper is to investigate the position of digital diplomacy in the public diplomacy of the Islamic Republic of Iran. The paper tries to answer these two questions in a descriptive-analytical way, considering the progress of communication and the role of virtual space in the service of diplomacy, what is the approach of the Islamic Republic of Iran towards digital diplomacy and the use of a new way of establishing foreign relations in public diplomacy? What capacities and damages are facing the country after the use of this type of new diplomacy? In this paper, various theoretical concepts in the field of public diplomacy and modern diplomacy, including Geoff Berridge, Charles Kegley, Hans Tuch and Ronald Peter Barston, as well as the theoretical framework of Marcus Holmes on digital diplomacy, will be used as a conceptual basis to support the analysis. As a result, in order to better achieve the political goals of the country, especially in foreign policy, the approach of the Islamic Republic of Iran to public diplomacy with a focus on digital diplomacy should be strengthened and revised. Today, only emphasizing on advancing diplomacy through traditional methods may weaken Iran's position in the public opinion level from other countries.Keywords: digital diplomacy, public diplomacy, islamic republic of Iran, foreign policy, opportunities and challenges
Procedia PDF Downloads 11314966 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks
Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram
Abstract:
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.Keywords: backoff, contention window, CWMIDB, MANET
Procedia PDF Downloads 27714965 Microseismicity of the Tehran Region Based on Three Seismic Networks
Authors: Jamileh Vasheghani Farahani
Abstract:
The main purpose of this research is to show the current active faults and active tectonic of the area by three seismic networks in Tehran region: 1-Tehran Disaster Mitigation and Management Organization (TDMMO), 2-Broadband Iranian National Seismic Network Center (BIN), 3-Iranian Seismological Center (IRSC). In this study, we analyzed microearthquakes happened in Tehran city and its surroundings using the Tehran networks from 1996 to 2015. We found some active faults and trends in the region. There is a 200-year history of historical earthquakes in Tehran. Historical and instrumental seismicity show that the east of Tehran is more active than the west. The Mosha fault in the North of Tehran is one of the active faults of the central Alborz. Moreover, other major faults in the region are Kahrizak, Eyvanakey, Parchin and North Tehran faults. An important seismicity region is an intersection of the Mosha and North Tehran fault systems (Kalan village in Lavasan). This region shows a cluster of microearthquakes. According to the historical and microseismic events analyzed in this research, there is a seismic gap in SE of Tehran. The empirical relationship is used to assess the Mmax based on the rupture length. There is a probability of occurrence of a strong motion of 7.0 to 7.5 magnitudes in the region (based on the assessed capability of the major faults such as Parchin and Eyvanekey faults and historical earthquakes).Keywords: Iran, major faults, microseismicity, Tehran
Procedia PDF Downloads 36514964 Dietary Diversification and Nutritional Education: A Strategy to Improve Child Food Security Status in the Rural Mozambique
Authors: Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis
Abstract:
Nutrient deficiencies due to a diet low in quantitative and qualitative terms, are prevalent throughout the developing world, especially in sub-Saharan Africa. Children and women of childbearing age are especially vulnerable. Limited availability, access and intake of animal foods at home and lack of knowledge about their value in the diet and the role they play in health, contribute to poor diet quality. Poor bioavailability of micronutrients in diets based on foods high in fiber and phytates, the low content of some micronutrients in these foods are further factors to consider. Goats are deeply embedded in almost every Sub-Saharan African rural culture, generally kept for their milk, meat, hair or leather. Goats have played an important role in African social life, especially in food security. Goat meat has good properties for human wellbeing, with a special role in lower income households. It has a high-quality protein (20 protein g/100 meat g) including all essential amino acids, good unsaturated/satured fatty acids relationship, and it is an important B-vitamin source with high micronutrients bioavailability. Mozambique has major food security problems, with poor food access and utilization, undiversified diets, chronic poverty and child malnutrition. Our objective was to design a nutritional intervention based on a dietary diversification, nutritional education, cultural beliefs and local resources, aimed to strengthen food security of children at Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. Two surveys were conducted first of socio-productive local databases and then to 100 rural households about livelihoods, food diversity and anthropometric measurements in children under 5 years. Our results indicate that the main economic activity is goat production, based on a native breed with two deliveries per year in the absence of any management. Adult goats weighted 27.2±10.5 kg and raised a height of 63.5±3.8 cm. Data showed high levels of poverty, with a food diversity score of 2.3 (0-12 points), where only 30% of households consume protein and 13% iron, zinc, and B12 vitamin. The main constraints to food security were poor access to water and low income to buy food. Our dietary intervention was based on improving diet quality by increasing the access to dried goat meat, fresh vegetables, and legumes, and its utilization by a nutritional education program. This proposal was based on local culture and living conditions characterized by the absence of electricity power and drinkable water. The drying process proposed would secure the food maintenance under local conditions guaranteeing food safety for a longer period. Additionally, an ancient local drying technique was rescued and used. Moreover, this kind of dietary intervention would be the most efficient way to improve the infant nutrition by delivering macro and micronutrients on time to these vulnerable populations.Keywords: child malnutrition, dietary diversification, food security, goat meat
Procedia PDF Downloads 30214963 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS
Authors: Sumaya Ismail, Aijaz Ahmad Reshi
Abstract:
The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway
Procedia PDF Downloads 10414962 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis
Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh
Abstract:
WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication
Procedia PDF Downloads 52414961 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations
Authors: Chastiti Mediafira Wulolo
Abstract:
Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism
Procedia PDF Downloads 18514960 Extended Literature Review on Sustainable Energy by Using Multi-Criteria Decision Making Techniques
Authors: Koray Altintas, Ozalp Vayvay
Abstract:
Increased global issues such as depletion of sources, environmental problems and social inequality triggered public awareness towards finding sustainable solutions in order to ensure the well-being of the current as well as future generations. Since energy plays a significant role in improved social and economic well-being and is imperative on both industrial and commercial wealth creation, it is a must to develop a standardized set of metrics which makes it possible to indicate the present condition relative to conditions in the past and to develop any perspective which is required to frame actions for the future. This is not an easy task by considering the complexity of the issue which requires integrating economic, environmental and social aspects of sustainable energy. Multi-criteria decision making (MCDM) can be considered as a form of integrated sustainability evaluation and a decision support approach that can be used to solve complex problems featuring; conflicting objectives, different forms of data and information, multi-interests and perspectives. On that matter, MCDM methods are useful for providing solutions to complex energy management problems. The aim of this study is to review MCDM approaches that can be used for examining sustainable energy management. This study presents an insight into MCDM techniques and methods that can be useful for engineers, researchers and policy makers working in the energy sector.Keywords: sustainable energy, sustainability criteria, multi-criteria decision making, sustainability dimensions
Procedia PDF Downloads 33014959 The Risks of 'Techtopia': Reviewing the Negative Lessons of Smart City Development
Authors: Amanda Grace Ahl, Matthew Brummer
Abstract:
‘Smart cities’ are not always as ‘smart’ as the term suggests, which is not often covered in the associated academic and public policy literatures. In what has become known as the smart city approach to urban planning, governments around the world are seeking to harness the power of information and communications technology with increasingly advanced data analytics to address major social, economic, and environmental issues reshaping the ways people live. The definitional and theoretical boundaries of the smart city framework are broad and at times ambiguous, as is empirical treatment of the topic. However, and for all the disparity, in investigating any number of institutional and policy prescriptions to the challenges faced by current and emerging metropoles, scholarly thought has hinged overwhelmingly on value-positive conceptions of informatics-centered design. From enhanced quality of services, to increased efficiency of resources, to improved communication between societal stakeholders, the smart city design is championed as a technological wellspring capable of providing answers to the systemic issues stymying a utopian image of the city. However, it is argued that this ‘techtopia’, has resulted in myopia within the discipline as to value-negative implications of such planning, such as weaknesses in practicality, scalability, social equity and affordability of solutions. In order to more carefully examine this observation - that ‘stupid’ represents an omitted variable bias in the study of ‘smart’ - this paper reviews critical cases of unsuccessful smart city developments. It is argued that also understanding the negative factors affiliated with the development processes is imperative for the advancement of theoretical foundations, policies, and strategies to further the smart city as an equitable, holistic urban innovation. What emerges from the process-tracing carried out in this study are distinctly negative lessons of smart city projects, the significance of which are vital for understanding how best to conceive smart urban planning in the 21st century.Keywords: case study, city management, innovation system, negative lessons, smart city development
Procedia PDF Downloads 41514958 Representation of “Gezi Parkı Actions” in Media and Resistance
Authors: Sibel Özkan
Abstract:
This study aims to set forth the perception of young people in Turkey about “Gezi Parkı Actions” which has been represented by different views on social and traditional media. In-depth interview method was carried out with all of the participants who consisted of high school students. All interviews has been conducted in areas where the actions take place and the numbers of participants who are using and not using social media were equal. There are minor differences between young people who are using and not using social media. Participants who are not using social media had an opinion only about saving nature aspect of Gezi Parkı Actions. On the other hand, people who are using social media had another reasons such as freedom of expression, respect to the lifestyles etc. to join Gezi Parkı Actions. It was found that young people do not completely trust traditional media anymore.Keywords: Gezi Parkı, resistance, social media, hegemony
Procedia PDF Downloads 43714957 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22714956 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 58114955 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs
Procedia PDF Downloads 9714954 Human Rights and Fundamental Freedoms in Crisis as Viewed during Bangladesh Parliamentary Election-2018 and Afterwards: A Contestant's Perspective on Social Measures
Authors: Mohammad S. Islam
Abstract:
Elections in Bangladesh are always controversial, and sometimes it becomes a violent affair when state power is combined with politics. Despite the commitment of the ruling party- the polling government to ensure free, fair, and credible elections, the participants of opposition parties and the general voters became very disappointed, terribly frustrated, and severely shocked. It happened when numerous claims of serious irregularities of vote rigging and violence came out in broad daylight during the election. This paper addresses the issues of how the ruling party created frightening and a horror situation to make people silent over electoral fraud and violent incidents, including gang rape. It also seeks to demonstrate that election-2018 was simply the deceptive action of the ruling party to legitimate their power, but not to provide a minimum opportunity for voters to exercise their fundamental right to vote. The fundamental freedom and the rule of law seemed to be ignored completely in this election process and afterwards. With the help of state machinery, the government of the ruling party violated human rights, restricted fundamental freedoms, and humiliated social protection & dignity. The contestant’s views as witnessed and relevant literatures are cited first for conceptual understanding. Then, the paper will examine how a new dimension of circumstantial social measures related to sustained protection can reduce all kinds of violence against humanity towards establishing a peaceful democratic society. Finally, this paper interprets the key findings and considers wider implications.Keywords: electoral fraud, human rights, sustained protection, social measures, vote rigging
Procedia PDF Downloads 18814953 Exploring Deep Neural Network Compression: An Overview
Authors: Ghorab Sara, Meziani Lila, Rubin Harvey Stuart
Abstract:
The rapid growth of deep learning has led to intricate and resource-intensive deep neural networks widely used in computer vision tasks. However, their complexity results in high computational demands and memory usage, hindering real-time application. To address this, research focuses on model compression techniques. The paper provides an overview of recent advancements in compressing neural networks and categorizes the various methods into four main approaches: network pruning, quantization, network decomposition, and knowledge distillation. This paper aims to provide a comprehensive outline of both the advantages and limitations of each method.Keywords: model compression, deep neural network, pruning, knowledge distillation, quantization, low-rank decomposition
Procedia PDF Downloads 4314952 Gender: Schooling and Social Condition’s Women in Brazil
Authors: Simone Tamires Vieira
Abstract:
This paper aims to investigate the history of women's schooling in Brazil and to reflect on the condition and social space of women today. Therefore, the following question arises as a research problem: how does the history of the school in/exclusion of women in Brazil relate to the occupations occupied today? As for the objectives, we seek to collect data on the education of women and girls in Brazil, analyze some institutionalized educational legislation and policies, reflect on issues of opportunity and deprivation in order to problematize the female condition through the review of qualitative literature. The results showed that gender and symbolic violence are powerful categories to analyze this theme since the trajectories, choices, and opportunities given to women are permeated by veiled mechanisms perpetuated by a structurally patriarchal society, focused on the interests of the elite, which denies diversity to maintain its status. The aim of this research is to contribute to reflections on the potential of dialogical action, as it highlights the forces that act and permeate the trajectories of women to empower current and future generations.Keywords: gender, school in/exclusion symbolic violence, women, symbolic violence, women
Procedia PDF Downloads 15614951 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 33614950 A Study of the Attitude Towards Marriage among Young Adults in Indian and Tibetan Society Which Impacted in Social Learning and Cross-Cultural Behavior
Authors: Meenakshi Chaubey
Abstract:
A principle proposed in the cross-cultural adaption of behavior among Indian and Tibetan societies in which there are not any great variations between their young adults on the mindset of day-to-day marriage, Marriage plays a dominant position in constructing the society, which in large part comprises underneath the domain of lifestyle. Way of life is a social behavior and norm located in human societies where an extensive range of phenomena can be transmitted thru social studying. It acts characteristic of the individual has been the diploma day-to-day which they have got cultivated a specific stage of class in arts, science, architecture. The existing studies preliminarily on young adults of each community, wherein we carried out a comparative observe of the mindset of daily marriage among Indian and Tibetan teens. Further, we studied statistics comprehensively on the mindset closer day by day the marriage between Indian adult males and Tibetan younger males. With the extension of a complete look, we considered the mindset of an everyday marriage of Indian girls and Tibetan young ladies. Studies 1 showed that there might be no sizable distinction within the attitude of the day-to-day marriage of Indian and Tibetan teenagers. It, in addition, showed that they followed each different marriage beliefs and customs. Studies 2 showed that there might be no important difference in the attitude toward the everyday marriage of Indian and Tibetan young males. It similarly showcased that day-to-day secular schooling gadget in Tibetan society complements their clinical approach and changes their point of view on distinct social issues along with marriage. Research three confirmed that there is no substantial difference in the mindset of the daily marriage of Indian and Tibetan younger females. It similarly spread out the strict authorities' recommendations that they may no longer be allowed day-to-day comply with their marriage practices, including polygamy and polyandry. Thus, the information showed that there's a shift of lifestyle from one network every day to some other community because of social every day, which affects the conduct and results of daily past cultural adaptation.Keywords: culture, marriage, attitude, society, young adults, Indian, Tibetan
Procedia PDF Downloads 8514949 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia
Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro
Abstract:
Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.Keywords: border security, defense, energy, national interest, threat
Procedia PDF Downloads 48214948 Coding of RMAC and Its Theoretical and Simulation-Based Performance Comparison with SMAC
Authors: Hamida Qumber Ali, Waseem Muhammad Arain, Shama Siddiqui, Sayeed Ghani
Abstract:
We present an implementing of RMAC in TinyOS 1.x. RMAC is a cross layer and Duty-cycle MAC protocols that was proposed to provide energy efficient transmission services for wireless sensor networks. The protocol has a unique and efficient packet transmission scheduling mechanism that enables it to overcome delivery latency and overcome traffic congestion. Design details and implementation challenges are divulged. Experiments are conducted to show the correctness of our implementation with numerous assumptions. Simulations are performed to compare the performance of RMAC and SMAC. Our results show that RMAC outperforms SMAC in energy efficiency and delay.Keywords: MAC protocol, performance, RMAC, wireless sensor networks
Procedia PDF Downloads 32514947 Identity of Indian Migrants and Muslim Refugee Women in Sydney, Australia
Authors: Sheikh, R. Author, Bhardwaj S. Author, Jr.
Abstract:
The emphasis of this paper is to investigate the identity shifts experienced within the Indian community and among Muslim refugee women in Sydney. Using Goffman’s paradigm of everyday interactions, attention is paid to how migrants navigate and perform their multiple identities in their daily life. By focusing on narratives of the migrant- migration is understood as processual instead of a one time decision of re-location. The paper aims to highlight how individuals choose and re-adapt their cultural and social practices within the context of Australia. Migrant narratives are rooted in specific socio-cultural settings of one’s own community as well as the nature of migration to a specific country. Differences and similarities will be observed within the Indian community, and among Muslim refugee women in terms of how identity is negotiated, social networks are re-established in Australia. Some attention will also be paid to difficulties that are being faced by migrants-especially in terms of Muslim identity for Refugee women, particularly in terms of assimilation, building on Ghassan Hage’s use of appraisal theory and how a diversity of language and religion is accommodated within the Indian community. By using two diverse groups, it would be able to identify and contrast migrant experiences.Keywords: identity, migrant, refugee, women, assimilation, narratives
Procedia PDF Downloads 19514946 Social and Psychological Contexts of Male-Perpetrators of Violence against Women
Authors: Mythri Kukkaje
Abstract:
Information about the social and psychological contexts that operate as a breeding ground for perpetrators of violence against women in India is scarce. To understand the social and psychological contexts that form the bases of violent behaviour in male-perpetrators against women, interviews were conducted with 13 men above the age of 18 years, who were convicted for their crimes against women. Using thematic analysis, the nurturance and the social background of the perpetrators, determined by their social relationships, the socio-economic status, the extent of substance abuse, the history of experiencing and witnessing violence and their cultural context, were found to define the social context. The nature and the psychological background of the perpetrators determined by the thoughts and beliefs regarding gender and violence, the motivation behind their violent behaviour and a few specific personality traits were found to define the psychological context. These factors on their own, as well as an interaction between them, could be responsible for varying degrees of violence against women.Keywords: perpetrator, psychological, social, violence against women
Procedia PDF Downloads 22714945 Social Network Impact on Self Learning in Teaching and Learning in UPSI (Universiti Pendidikan Sultan Idris)
Authors: Azli Bin Ariffin, Noor Amy Afiza Binti Mohd Yusof
Abstract:
This study aims to identify effect of social network usage on the self-learning method in teaching and learning at Sultan Idris Education University. The study involved 270 respondents consisting of students in the pre-graduate and post-graduate levels from nine fields of study offered. Assessment instrument used is questionnaire which measures respondent’s background includes level of study, years of study and field of study. Also measured the extent to which social pages used for self-learning and effect received when using social network for self-learning in learning process. The results of the study showed that students always visit Facebook more than other social sites. But, it is not for the purpose of self-learning. Analyzed data showed that 45.5% students not sure about using social sites for self-learning. But they realize the positive effect that they will received when use social sites for self-learning to improve teaching and learning process when 72.7% respondent agreed with all the statements provided.Keywords: facebook, self-learning, social network, teaching, learning
Procedia PDF Downloads 53714944 Economic Value Added of Green Marketing for Urban Commerical Center
Authors: Kuo-Wei Hsu, Yen-Ting, Wu
Abstract:
Recently, green marketing issues have emerged as the developing direction for local governments and social enterprises. At the same time, many social enterprises have considered how to effectively create a low-carbon and sustainable environment. Local government has a role to play in promoting low-carbon life styles and creating a green sustainable environment within this green marketing trend. Therefore, urban commercial centers have implemented relevant plans such as: Green Store, Green Action Shops, Green Restaurants and Green Hotels. The purpose of these plans to select the commercial center organizations have potential energy saving demonstration and environmental greenification. These organizations are willing to provide assistance counseling and become a green demonstration district, thereby promoting the major shopping district to take the initiative to enhance its green competitiveness. Finally, they create a new landscape for the commercial center. Studies on green marketing in commercial centers are seen as less attractive and only a few studies for commercial centers have focused on green marketing strategies. There is no empirical evidence for how commercial center managers evaluate a commercial center green marketing strategy. This research investigated the major commercial centers in Taichung City and found green marketing helps to enhance the connection between the urban commercial center value and society value, shape corporate image with social responsibility and create brand value, and therefore impact the increase of economic value.Keywords: economic value added, green marketing, sustainable environment, urban commercial center.
Procedia PDF Downloads 36914943 The Continuing Saga of Poverty Reduction and Food Security in the Philippines
Authors: Shienna Marie Esteban
Abstract:
The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.Keywords: agriculture, food security, policy, poverty
Procedia PDF Downloads 311