Search results for: European security
2069 Using Authentic and Instructional Materials to Support Intercultural Communicative Competence in ELT
Authors: Jana Beresova
Abstract:
The paper presents a study carried out in 2015-2016 within the national scheme of research - VEGA 1/0106/15 based on theoretical research and empirical verification of the concept of intercultural communicative competence. It focuses on the current conception concerning target languages teaching compatible with the Common European Framework of Reference for Languages: Learning, teaching, assessment. Our research had revealed how the concept of intercultural communicative competence had been perceived by secondary-school teachers of English in Slovakia before they were intensively trained. Intensive workshops were based on the use of both authentic and instructional materials with the goal to support interculturally oriented language teaching aimed at challenging thinking. The former concept that supported the development of the students´ linguistic knowledge and the use of a target language to obtain information about the culture of the country whose language learners were learning was expanded by the meaning-making framework which views language as a typical means by which culture is mediated. The goal of the workshop was to influence English teachers to better understand the concept of intercultural communicative competence, combining theory and practice optimally. The results of the study will be presented and analysed, providing particular recommendations for language teachers and suggesting some changes in the National Educational Programme from which English learners should benefit in their future studies or professional careers.Keywords: authentic materials, English language teaching, instructional materials, intercultural communicative competence
Procedia PDF Downloads 2732068 Interpreting Chopin’s Music Today: Mythologization of Art: Kitsch
Authors: Ilona Bala
Abstract:
The subject of this abstract is related to the notion of 'popular music', a notion that should be treated with extreme care, particularly when applied to Frederic Chopin, one of the greatest composers of Romanticism. By ‘popular music’, we mean a category of everyday music, set against the more intellectual kind, referred to as ‘classical’. We only need to look back to the culture of the nineteenth century to realize that this ‘popular music’ refers to the ‘music of the low’. It can be studied from a sociological viewpoint, or as sociological aesthetics. However, we cannot ignore the fact that, very quickly, this music spread to the wealthiest strata of the European society of the nineteenth century, while likewise the lowest classes often listen to the intellectual classical music, so pleasant to listen to. Further, we can observe that a sort of ‘sacralisation of kitsch’ occurs at the intersection between the classical and popular music. This process is the topic of this contribution. We will start by investigating the notion of kitsch through the study of Chopin’s popular compositions. However, before considering the popularisation of this music in today’s culture, we will have to focus on the use of the word kitsch in Chopin’s times, through his own musical aesthetics. Finally, the objective here will be to negate the theory that art is simply the intellectual definition of aesthetics. A kitsch can, obviously, only work on the emotivity of the masses, as it represents one of the features of culture-language (the words which the masses identify with). All art is transformed, becoming something outdated or even outmoded. Here, we are truly within a process of mythologization of art, through the study of the aesthetic reception of the musical work.Keywords: F. Chopin, kitsch, musical work, mythologization of art, popular music, romantic music
Procedia PDF Downloads 4162067 Forensic Challenges in Source Device Identification for Digital Videos
Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan
Abstract:
Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.Keywords: video forgery, source camcorder, device identification, forgery detection
Procedia PDF Downloads 6342066 Armed Forces Special Powers Act and Human Rights in Nagaland
Authors: Khrukulu Khusoh
Abstract:
The strategies and tactics used by governments throughout the world to counter terrorism and insurgency over the past few decades include the declaration of states of siege or martial law, enactment of anti-terrorist legislation and strengthening of judicial powers. Some of these measures taken have been more successful than the other, but some have proved counterproductive, alienating the public from the authorities and further polarizing an already fractured political environment. Such cases of alienation and polarization can be seen in the northeastern states of India. The Armed Forces (Special Powers) Act which was introduced to curb insurgency in the remote jungles of the far-flung areas has remained a telling tale of agony in the north east India. Grievous trauma to humans through encounter killings, custodial deaths, unwarranted torture, exploitation of women and children in several ways have been reported in Nagaland, Manipur and other northeastern states where the Indian army has been exercising powers under the Armed Forces (Special Powers) Act. While terrorism and the insurgency are destructive of human rights, counter-terrorism does not necessarily restore and safeguard human rights. This special law has not proven effective particularly in dealing with terrorism and insurgency. The insurgency has persisted in the state of Nagaland even after sixty years notwithstanding the presence of a good number of special laws. There is a need to fight elements that threaten the security of a nation, but the methods chosen should be measured, otherwise the fight is lost. There has been no review on the effectiveness or failure of the act to realize its intended purpose. Nor was there any attempt on the part of the state to critically look at the violation of rights of innocent citizens by the state agencies. The Indian state keeps enacting laws, but none of these could be effectively applied as there was the absence of clarity of purpose. Therefore, every new law which has been enacted time and again to deal with security threats failed to bring any solution for the last six decades. The Indian state resorts to measures which are actually not giving anything in terms of strategic benefits but are short-term victories that might result in long-term tragedies. Therefore, right thinking citizens and human rights activists across the country feel that introduction of Armed Forces (Special Powers) Act was as much violation of human rights and its continuation is undesirable. What worried everyone is the arbitrary use, or rather misuse of power by the Indian armed forces particularly against the weaker sections of the society, including women. After having being subjected to indiscriminate abuse of that law, people of the north-east India have been demanding its revocation for a long time. The present paper attempts to critically examine the violation of human rights under Armed Forces (Special Powers) Act. It also attempts to bring out the impact of Armed Forces (Special Powers) Act on the Naga people.Keywords: armed forces, insurgency, special laws, violence
Procedia PDF Downloads 5002065 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography
Authors: Mohammed Salem Atoum
Abstract:
The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.Keywords: XLSB, scrambling, audio steganography, security
Procedia PDF Downloads 3672064 The Evaluation and Assessment of Modernism
Authors: Mohammad Mirzaei
Abstract:
The term "modernism" is at the heart of debates about 20th-century literature and critical theory. Astradur Eysteinsson argues here that the notion of modernity does not emerge directly from the literature it encompasses but is actually a product of critical practices related to non-traditional literature. By intervening in and relating them to modernist works and contemporary literary theories, Esteinsson takes a comprehensive look at the idea of modernity. Eysteinsson critically examines various expressions of modernism in the rich spectrum of American, British, and European literature, criticism, and theory. He first explored a number of modernist paradigms and found a conflict between modernism's potential for cultural subversion and its relatively conservative status as a formalist project. In turn, he sees these paradigms as interpretations and inventions of literary history. Seen in this way, modernism presents both a historical change in the literary scene and the context of this change. Imbued with the connotations of tradition and modernity, modernity fulfills its primary function. Highlights and defines the complex relationship between history and post-realist literature. Eysteinsson focuses on how concepts of modernism guide our understanding of literature and literary history and how they influence the evaluation of experimental and 3post realist works in literature and art. He discusses in detail the relationship between modernism and the key terms postmodernism, avant-garde, and realism. In staging a crisis of subject and reference, modernity is not a form of discourse but its subversion, the "other" that may reveal important aspects of our social and linguistic experience in Western culture.Keywords: literature, modernism, western cultures, postmodernism
Procedia PDF Downloads 732063 Development and Validation of HPLC Method on Determination of Acesulfame-K in Jelly Drink Product
Authors: Candra Irawan, David Yudianto, Ahsanu Nadiyya, Dewi Anna Br Sitepu, Hanafi, Erna Styani
Abstract:
Jelly drink was produced from a combination of both natural and synthetic materials, such as acesulfame potassium (acesulfame-K) as synthetic sweetener material. Acesulfame-K content in jelly drink could be determined by High-Performance Liquid Chromatography (HPLC), but this method needed validation due to having a change on the reagent addition step which skips the carrez addition and comparison of mix mobile phase (potassium dihydrogen phosphate and acetonitrile) with ratio from 75:25 to 90:10 to be more efficient and cheap. This study was conducted to evaluate the performance of determination method for acesulfame-K content in the jelly drink by HPLC. The method referred to Deutsches Institut fur Normung European Standard International Organization for Standardization (DIN EN ISO):12856 (1999) about Foodstuffs, Determination of acesulfame-K, aspartame and saccharin. The result of the correlation coefficient value (r) on the linearity test was 0.9987 at concentration range 5-100 mg/L. Detection limit value was 0.9153 ppm, while the quantitation limit value was 1.1932 ppm. The recovery (%) value on accuracy test for sample concentration by spiking 100 mg/L was 102-105%. Relative Standard Deviation (RSD) value for precision and homogenization tests were 2.815% and 4.978%, respectively. Meanwhile, the comparative and stability tests were tstat (0.136) < ttable (2.101) and |µ1-µ2| (1.502) ≤ 0.3×CV Horwitz. Obstinacy test value was tstat < ttable. It can be concluded that the HPLC method for the determination of acesulfame-K in jelly drink product by HPLC has been valid and can be used for analysis with good performance.Keywords: acesulfame-K, jelly drink, HPLC, validation
Procedia PDF Downloads 1312062 Role of Religion in Educational System of Iran
Authors: Peyman Soltani, Mohammad Sadegh Amin Din
Abstract:
The relation between religion and education has been considered for a long time. Approaching education through religion and sovereignty has been a kind of idealism in past centuries` educational systems and no opposition between religion and education has been felt. The doctrine of human education and training is mentioned in the Qur’an, as the most important reason of Prophet Mohammad ` first revelation, Verse 129 of Chapter Baqara, Verse 164 of Chapter Aali-ʻimraan and verse 2 of Chapter Jumʻah have addressed this issue. During Middle age, temples and mosques were engaged in children education. Religious materials have played an important role in the content of educational courses. In this era, the main goal of education was to study the religious books and behaving in society accordingly. Also in this training period, the European countries were considerably influenced by religion. Children in these countries were trained in churches and monasteries. Training and religion are closely connected with each other. It should be noted that experience and religious knowledge is a heart and emotional issue with no-imposition, therefore, the educational space should be designed in such a way that students, themselves, shift to experiencing some religious feelings. The important factors in Islamic Educational system are as follow: - Religious-based - Strengthening national identity - Authenticity of learner role 4- Importance of teacher` authority role. These factors are explained in Conceptual and intertwined network and in practical process, training each of them, proportional to student needs and conditions, can be the beginning of a course of religious education for students, and can strengthen other elements.Keywords: education and training, Islamic educational system, the Qur'an, religious knowledge
Procedia PDF Downloads 3932061 The Uniting Control Lyapunov Functions in Permanent Magnet Synchronous Linear Motor
Authors: Yi-Fei Yang, Nai-Bao He, Shao-Bang Xing
Abstract:
This study investigates the permanent magnet synchronous linear motor (PMSLM) chaotic motion under the specific physical parameters, the stability and the security of motor-driven system will be unavoidably influenced. Therefore, it is really necessary to investigate the methods of controlling or suppressing chaos in PMSLM. Firstly, we derive a chaotic model of PMSLM in the closed-loop system. Secondly, in order to realize the local asymptotic stabilization of the mechanical subsystem and the global stabilization of the motor-driven system including electrical subsystem, we propose an improved uniting control lyapunov functions by introducing backstepping approach. Finally, an illustrated example is also given to show the electiveness of the obtained results.Keywords: linear motor, lyapunov functions, chao control, hybrid controller
Procedia PDF Downloads 3412060 Performance of Environmental Efficiency of Energy Consumption in OPEC Countries
Authors: Bahram Fathi, Mahdi Khodaparast Mashhadi, Masuod Homayounifar
Abstract:
Global awareness on energy security and climate change has created much interest in assessing energy efficiency performance. A number of previous studies have contributed to evaluate energy efficiency performance using different analytical techniques among which data envelopment analysis (DEA) has recently received increasing attention. Most of DEA-related energy efficiency studies do not consider undesirable outputs such as CO2 emissions in their modeling framework, which may lead to biased energy efficiency values. Within a joint production frame work of desirable and undesirable outputs, in this paper we construct energy efficiency performance index for measuring energy efficiency performance by using environmental DEA model with CO2 emissions. We finally apply the index proposed to assess the energy efficiency performance in OPEC over time.Keywords: energy efficiency, environmental, OPEC, data envelopment analysis
Procedia PDF Downloads 3892059 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.Keywords: proxy signature, fault tolerance, rsa, key agreement protocol
Procedia PDF Downloads 2882058 An Exemption for Vertical Restraint Regarding Intellectual Property Licensing: Case Study of Thailand
Authors: Sanpetchuda Krutkrua, Suphawatchara Malanond
Abstract:
Throughout the history of Antitrust regimes in Thailand, Thailand has been trying to prevent collusive practices in the market through the amendments of the Trade Competition Act, and Thailand just passed the current Trade Competition Act of B.E. 2560 in 2017 of which several aspects of the law were amended in order to enhance the prevention of collusive outcome through both vertical trade restraints and horizontal trade restraints. An agreement is vertical when it involves arrangements that are in a complementary relationship. In Section 55 of the Act, any agreements to reduce the price, quantity, or quality of the goods, agreements to assign a sole retailer for the goods, and the agreement to impose conditions on the retailers are not allowed. However, Section 56 provides exemptions for the vertical relationship between the business operators, the franchise agreement, and the licensing agreement as long as such agreements do not surpass the necessity to do so, create monopolization, or affect the consumers in terms of price, quality, quantity, or options. The paper aims to explore the extent of the exemption under Section 56 and sequential regulations in terms of the vertical trade restraints regarding intellectual property licensing, and, at the same time, compare with the exemptions under the European Union competition law, and Singapore competition law. Comparative legal analysis with leading jurisdiction will illustrate the application of the newly enacted Thai Competition Act in terms of its enforcement in the global impact of IP rights, which, by nature are de jure or de facto international protection.Keywords: antitrust, competition law, vertical restraint, intellectual property, IP licensing
Procedia PDF Downloads 1602057 Fertilizer Procurement and Distribution in Nigeria: Assessing Policy against Implementation
Authors: Jacob Msughter Gwa, Rhys Williams
Abstract:
It is widely known that food security is a major concern in Sub-Saharan Africa. In many regions, including Nigeria, this is due to an agriculture-old problem of soil erosion beyond replacement levels. It seems that the use of fertilizer would be an immediate solution as it can boost agricultural productivity, and low agricultural productivity is attributed to the low use of fertilizers in Nigeria. The Government of Nigeria has been addressing the challenges of food shortage but with limited success. The utilisation of a practical and efficient subsidy programme in addressing this issue seems to be needed. However, the problem of procurement and distribution changes from one stage of subsidy to another. This paper looks at the difference between the ideal and the actual implementation of agricultural fertilizer policies in Nigeria, as it currently runs the risk of meeting required standards on paper but missing the desired real outcomes, and recognises the need to close the gap between the paper work and the realities on the ground.Keywords: agricultural productivity, fertilizer distribution, fertilizer procurement, Nigeria
Procedia PDF Downloads 3712056 Impact of Team-Based Learning Approach in English Language Learning Process: A Case Study of Universidad Federico Santa Maria
Authors: Yessica A. Aguilera
Abstract:
English is currently the only foreign language included in the national educational curriculum in Chile. The English curriculum establishes that once completed secondary education, students are expected to reach B1 level according to the Common European Reference Framework (CEFR) scale. However, the objective has not been achieved, and to the author’s best knowledge, there is still a severe lack of English language skills among students who have completed their secondary education studies. In order to deal with the fact that students do not manage English as expected, team-based learning (TBL) was introduced in English language lessons at the Universidad Federico Santa María (USM). TBL is a collaborative teaching-learning method which enhances active learning by combining individual and team work. This approach seeks to help students achieve course objectives while learning how to function in teams. The purpose of the research was to assess the implementation and effectiveness of TBL in English language classes at USM technical training education. Quantitative and qualitative data were collected from teachers and students about their experience through TBL. Research findings show that both teachers and students are satisfied with the method and that students’ engagement and participation in class is higher. Additionally, students score higher on examinations improving academic outcomes. The findings of the research have the potential to guide how TBL could be included in future English language courses.Keywords: collaborative learning, college education, English language learning, team-based learning
Procedia PDF Downloads 1942055 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net
Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie
Abstract:
A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.Keywords: reliability, colored Petri net, assessment, payment models, m-commerce
Procedia PDF Downloads 5402054 Synthesis of CeF3:Sm3+ Nanophosphor for Biological Applications
Authors: Mayuri Gandhi, Nayan Agrawal, Harshita Bhatia
Abstract:
In the present work, cerium fluoride (CeF3) was selected as the host material because of its high density, fast response and high radiation resistance, efficient absorption and energy transfer by host (to activator). For the synthesis of CeF3 nanoparticles doped with Sm3+ ion, co-precipitation route was employed. Thus for optimum results, concentration dependent studies of the fluorescence of Sm3+ was carried out. The photoluminescence gave emissions in both visible as well as the NIR region and therefore it can have its application in solar cells, where it can absorb a large spectrum of energy. CeF3:Sm3+ nanoparticles were carefully incorporated in a suitable polymer matrix in order to demonstrate a variety of applications to improve the performance of the polymer materials and use it to develop high grade optoelectronic devices such as LEDs, security labelling, lasers, displays, biological imaging, etc.Keywords: bioimaging, cerium fluoride, NIR emission, samarium
Procedia PDF Downloads 4282053 Daily Variations of Particulate Matter (PM10) in Industrial Sites in an Suburban Area of Sour El Ghozlane, Algeria
Authors: Sidali Khedidji, Riad Ladji, Noureddine Yassaa
Abstract:
In this study, particulate matter (PM10) which are hazardous for environment and human health were investigated in Sour El Ghozlane suburban atmosphere at a sampling point from March 2013 to April 2013. Ambient concentration measurements of polycyclic aromatic hydrocarbons were carried out at a regional study of the cement industry in Sour El Ghozlane. During sampling, the airborne particulate matter was enriched onto PTFE filters by using a two medium volume samplers with or without a size-selective inlet for PM10 and TSP were used and each sampling period lasted approximately 24 h. The organic compounds were characterized using gas chromatography coupled with mass spectrometric detection (GC-MSD). Total concentrations for PAHs recorded in sour el ghozlane suburban ranged from 101 to 204 ng m-3. Gravimeter method was applied to the black smoke concentration data for Springer seasons. The 24 h average concentrations of PM10 and TSP of Sour El Ghozlane suburban atmosphere were found in the range 4.76–165.76 μg/m3 and 28.63–800.14 μg/m3, respectively, in the sampling period. Meteorological factors, such as (relative humidity and temperature) were typically found to be affecting PMs, especially PM10. Air temperature did not seem to be significantly affecting TSP and PM10 mass concentrations.The guide value fixed by the European Community «40 μg/m3» not to exceed 35 days, were exceeded in some samples. However, it should be noted that the value limit fixed by the Algerian regulations «80 μg/m3» has been exceeded in 3 samplers during the period study.Keywords: PAHs, PM10, TSP, particulate matter, cement industry
Procedia PDF Downloads 3792052 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists
Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat
Abstract:
This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing
Procedia PDF Downloads 1292051 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation
Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud
Abstract:
Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing
Procedia PDF Downloads 1022050 The School-to-Work Transition: The Case of NEET Youths from Rural Areas
Authors: Anđelka Stojanović, Ivan Mihajlović, Ivica Nikolić
Abstract:
In the past years, due to the financial crisis and the tightening of conditions on the labor market, young people are facing great challenges in achieving financial independence and finding their place in society. Higher unemployment rates, poorer living conditions, separation from the labor market, and longer school-to-work transitions particularly affect rural youth and make significant differences between youth groups in rural and urban areas. Improving employability skills and development of instruments for further learning among young people “Not in Education, Employment, or Training” (NEET) should not be only the concerns of these people, already adequately be directed and supported by the institutions. According to the World Bank data, the share of youth not in education, employment or training (NEET), in the European Union in the past few years decreases but still shows a significant share in the total percentage of the youth population. In 2017 rate was 10.96% while in 2018 that value was 10.38%. When observing individual countries in Europe, especially those with lower incomes, this rate is much higher. It was concluded that this topic was not sufficiently elaborated and presented in the social and scientific environment. Therefore, the aim of this paper is to identify and systematize the problems of school-to-work transition among young NEETs living in rural areas as well as the initiatives for addressing their problems.Keywords: NEET youth, risks and initiatives, rural youth, school-to-work transition
Procedia PDF Downloads 1172049 US-India Strategic Bargaining and Power Balancing in South Asia
Authors: Anila Syed, Manzoor Ahmad
Abstract:
The relationship between United States and India has transformed from estrangement to wider engagement since 2004. With the convergence of interests and shared values both the US and India came close towards each other and evolved strategic partnership through civil nuclear cooperation. This paper analyze the cost and benefit of strategic partnership with India for US, the impact of India’s emergence as regional power on South Asian balance of power and its impact on Pak-US relationship. It also focuses on security structure of the region and challenges for the US to maintain strategic partnership with two rival states (India and Pakistan). The work also gives some recommendations for balancing power in the region in order to ensure durable peace not only between India and Pakistan but also in south Asia.Keywords: US-India strategic partnership, civil-nuclear cooperation, balance of power, impacts on Pak-US relationship
Procedia PDF Downloads 4162048 Improved Thermal Comfort in Cabin Aircraft with in-Seat Microclimate Conditioning Module
Authors: Mathieu Le Cam, Tejaswinee Darure, Mateusz Pawlucki
Abstract:
Climate control of cabin aircraft is traditionally conditioned as a single unit by the environmental control system. Cabin temperature is controlled by the crew while passengers of the aircraft have control on the gaspers providing fresh air from the above head area. The small nozzles are difficult to reach and adjust to meet the passenger’s needs in terms of flow and direction. More dedicated control over the near environment of each passenger can be beneficial in many situations. The European project COCOON, funded under Clean Sky 2, aims at developing and demonstrating a microclimate conditioning module (MCM) integrated into a standard economy 3-seat row. The system developed will lead to improved passenger comfort with more control on their personal thermal area. This study focuses on the assessment of thermal comfort of passengers in the cabin aircraft through simulation on the TAITherm modelling platform. A first analysis investigates thermal comfort and sensation of passengers in varying cabin environmental conditions: from cold to very hot scenarios, with and without MCM installed in the seats. The modelling platform is also used to evaluate the impact of different physiologies of passengers on their thermal comfort as well as different seat locations. Under the current cabin conditions, a passenger of a 50th percentile body size is feeling uncomfortably cool due to the high velocity cabin air ventilation. The simulation shows that the in-seat MCM developed in COCOON project improves the thermal comfort of the passenger.Keywords: cabin aircraft, in-seat HVAC, microclimate conditioning module, thermal comfort
Procedia PDF Downloads 2052047 The Use of Drones in Measuring Environmental Impacts of the Forest Garden Approach
Authors: Andrew J. Zacharias
Abstract:
The forest garden approach (FGA) was established by Trees for the Future (TREES) over the organization’s 30 years of agroforestry projects in Sub-Saharan Africa. This method transforms traditional agricultural systems into highly managed gardens that produce food and marketable products year-round. The effects of the FGA on food security, dietary diversity, and economic resilience have been measured closely, and TREES has begun to closely monitor the environmental impacts through the use of sensors mounted on unmanned aerial vehicles, commonly known as 'drones'. These drones collect thousands of pictures to create 3-D models in both the visible and the near-infrared wavelengths. Analysis of these models provides TREES with quantitative and qualitative evidence of improvements to the annual above-ground biomass and leaf area indices, as measured in-situ using NDVI calculations.Keywords: agroforestry, biomass, drones, NDVI
Procedia PDF Downloads 1612046 ATC in Competitive Electricity Market Using TCSC
Authors: S. K. Gupta, Richa Bansal
Abstract:
In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric
Procedia PDF Downloads 5002045 Modelling Public Knowledge and Attitude towards Genetically Modified Maize in Kenya
Authors: Ezrah Kipkirui Tonui, George Otieno Orwa
Abstract:
A survey of 138 farmers was conducted in Rift valley, Kenya, in November and December 2013 in three counties (Uasin-gishu, Elgeyo-marakwet, and Tranzoia) to determine public knowledge and attitude towards genetically modified (GM) maize. Above two third (70%) of the respondents had knowledge of GM maize, mostly those educated and male. Female was found to be having low knowledge on GM maize. Public acknowledged the technology’s potential positive impacts, with more than 90% willing to adopt and more than 98% willing to buy GM seedlings at any given price. A small percentage less than 3% were of a negative opinion about willing to buy and adopt GM seeds. We conclude that GM technology has a role to play in food security in Kenya. However, the public needs more information about the technology, which can be provided through established sources of information and training. Finally, public knowledge and attitude on GM maize should be studied on a regular basis, and the survey population broadened to 47 counties.Keywords: public, knowledge, attitudes, GM maize, Kenya
Procedia PDF Downloads 3132044 Application of Biometrics in Patient Identification Card: Case Study of Saudi Arabia
Authors: Sarah Aldhalaan, Tanzila Saba
Abstract:
Healthcare sectors are increasing rapidly to fulfill patient’s needs across the world. A patient identification is considered as the main aspect for a patient to be served in healthcare institutes. Nowadays, people are presenting their insurance card along with their identification card in order to get the needed treatment in hospitals however, this process lack security preferences. The aim of this research paper is to reveal a solution to introduce and use biometrics in healthcare hospitals. The findings show that the people know biometrics since they are interacting with them through different channels and that the need for biometrics techniques to identify patients is essential. Also, the survey relevant questions are used to analyze and add insights on what is are the suitable biometrics to be used in such cases. Moreover, results are presented to exhibit the effectiveness of the used methodology and in analyzing usage of biometrics in hospitals in an enhancing way. Finally, an interesting conclusion of overall work is presented at the end of paper.Keywords: biometrics, healthcare, fingerprint, Saudi Arabia
Procedia PDF Downloads 2512043 Techno Economic Analysis for Solar PV and Hydro Power for Kafue Gorge Power Station
Authors: Elvis Nyirenda
Abstract:
This research study work was done to evaluate and propose an optimum measure to enhance the uptake of clean energy technologies such as solar photovoltaics, the study also aims at enhancing the country’s energy mix from the overdependence on hydro power which is susceptible to droughts and climate change challenges The country in the years 2015 - 2016 and 2018 - 2019 had received rainfall below average due to climate change and a shift in the weather pattern; this resulted in prolonged power outages and load shedding for more than 10 hours per day. ZESCO Limited, the utility company that owns infrastructure in the generation, transmission, and distribution of electricity (state-owned), is seeking alternative sources of energy in order to reduce the over-dependence on hydropower stations. One of the alternative sources of energy is Solar Energy from the sun. However, solar power is intermittent in nature and to smoothen the load curve, investment in robust energy storage facilities is of great importance to enhance security and reliability of electricity supply in the country. The methodology of the study looked at the historical performance of the Kafue gorge upper power station and utilised the hourly generation figures as input data for generation modelling in Homer software. The average yearly demand was derived from the available data on the system SCADA. The two dams were modelled as natural battery with the absolute state of charging and discharging determined by the available water resource and the peak electricity demand. The software Homer Energy System is used to simulate the scheme incorporating a pumped storage facility and Solar photovoltaic systems. The pumped hydro scheme works like a natural battery for the conservation of water, with the only losses being evaporation and water leakages from the dams and the turbines. To address the problem of intermittency on the solar resource and the non-availability of water for hydropower generation, the study concluded that utilising the existing Hydro power stations, Kafue Gorge upper and Kafue Gorge Lower to work conjunctively with Solar energy will reduce power deficits and increase the security of supply for the country. An optimum capacity of 350MW of solar PV can be integrated while operating Kafue Gorge power station in both generating and pumping mode to enable efficient utilisation of water at Kafue Gorge upper Dam and Kafue Gorge Lower dam.Keywords: hydropower, solar power systems, energy storage, photovoltaics, solar irradiation, pumped hydro storage system, supervisory control and data acquisition, Homer energy
Procedia PDF Downloads 1192042 The Culture of Extrajudicial Executions: An Investigative Study of the Philippines’ Fifth Republic
Authors: Nathalie Quinto, Danielle Solancho
Abstract:
In 1986, after Marcos’ Martial Law of 1972, the Philippines revised its constitution for the fifth time, under the Aquino Administration. Extrajudicial violence was expected to be lessened, if not completely eradicated after this was passed. However, state-sponsored executions continued to persist even in the present time. There are currently identified policy gaps when it comes to extrajudicial cases, as there is no generally accepted definition of the term in the Philippines. In this paper, a triangulation method of historically published papers, key informant interviews, and focus group discussions of academics, scholars, and people who are involved in various cases found, was utilized for the methodology. This paper explores the establishment of a normalized system of state-sponsored executions in the country and why the state resorts to this kind of action. It found that due to a weak political, and social institution, a culture of extrajudicial executions was established.Keywords: extrajudicial execution, human rights, justice, security
Procedia PDF Downloads 2672041 Singularization: A Technique for Protecting Neural Networks
Authors: Robert Poenaru, Mihail Pleşa
Abstract:
In this work, a solution that addresses the protection of pre-trained neural networks is developed: Singularization. This method involves applying permutations to the weight matrices of a pre-trained model, introducing a form of structured noise that obscures the original model’s architecture. These permutations make it difficult for an attacker to reconstruct the original model, even if the permuted weights are obtained. Experimental benchmarks indicate that the application of singularization has a profound impact on model performance, often degrading it to the point where retraining from scratch becomes necessary to recover functionality, which is particularly effective for securing intellectual property in neural networks. Moreover, unlike other approaches, singularization is lightweight and computationally efficient, which makes it well suited for resource-constrained environments. Our experiments also demonstrate that this technique performs efficiently in various image classification tasks, highlighting its broad applicability and practicality in real-world scenarios.Keywords: machine learning, ANE, CNN, security
Procedia PDF Downloads 202040 Windstorm Risk Assessment for Offshore Wind Farms in the North Sea
Authors: Paul Buchana, Patrick E. Mc Sharry
Abstract:
In 2017 there will be about 38 wind farms in the North Sea belonging to 5 different countries. The North Sea is ideal for offshore wind power generation and is thus attractive to offshore wind energy developers and investors. With concerns about the potential for offshore wind turbines to sustain substantial damage as a result of extreme weather conditions, particularly windstorms, this poses a unique challenge to insurers and reinsurers as to adequately quantify the risk and offer appropriate insurance cover for these assets. The need to manage this risk also concerns regulators, who provide the oversight needed to ensure that if a windstorm or a series of storms occur in this area over a one-year time frame, the insurers of these assets in the EU remain solvent even after meeting consequent damage costs. In this paper, using available European windstorm data for the past 33 years and actual wind farm locations together with information pertaining to each of the wind farms (number of turbines, total capacity and financial value), we present a Monte Carlo simulation approach to assess the number of turbines that would be buckled in each of the wind farms using maximum wind speeds reaching each of them. These wind speeds are drawn from historical windstorm data. From the number of turbines buckled, associated financial loss and output capacity can be deduced. The results presented in this paper are targeted towards offshore wind energy developers, insurance and reinsurance companies and regulators.Keywords: catastrophe modeling, North Sea wind farms, offshore wind power, risk analysis
Procedia PDF Downloads 300