Search results for: Coulter counter
271 Real Estate Rigidities: The Effect of Cash Transactions and the Impact of Demonetisation on Them
Authors: Dishant Shahi, Aradhya Shandilya, Nand Kumar
Abstract:
We study here the impact of the black component referred to as X component in the text on Real estate transactions. The X component involved not only acts as friction in transaction but also leads to dysfunctionality in the capital market of real estate. The effect of the component is presented by using a model of economy which seeks resemblance with that of India involving property deals. The rigidities which hinder smooth transactions in property or land deals are depicted and their impact on the economy as a whole has been modelled. The effect of subprime crisis (2007) on Indian housing capital market and the role which the X component played during it, is also included in one of the sections. In the entire text, we have utilised 4 Quadrant graphs to study supply and demand causalities involved in commercial real estate. At the end we have included the impact of demonetisation as a move to counter the problem of overvaluation in the property assets arising due to the X component. The case of Demonetisation which has been the latest move by the Indian Government to control huge amount of black money in circulation has been included along with its impact on the housing and rent as well as the capital market.Keywords: X-component, 4Q graph, real estate, capital markets, demonetisation, consumer sentiments
Procedia PDF Downloads 365270 Excluded: The Sense of Non-Belonging and Violent Radicalisation in the Case of the United Kingdom
Authors: Lorand Bodo
Abstract:
There are many stories of young British citizens who have left their country and families to join Islamist militant groups. So, what drives these young people to abandon their families and countries to join terrorist groups such as the so-called Islamic State? Much has been written to explain the phenomenon of violent radicalisation, whereby the concepts of identity and belonging are identified as one of the most significant drivers for violent radicalisation. In this respect, this paper explores the connection between the sense of belonging and violent radicalisation. That is necessary to gain a more nuanced understanding of the process of violent radicalisation in order to create and implement more effective counter-measures for tackling violent radicalisation. By using an inductive approach, this dissertation attempts to answer the question to what extent does the sense of non-belonging lead to the violent radicalisation of a few individuals. Therefore, alongside an expert interview, a survey, and qualitative content analysis of secondary sources, an exclusive semi-structured interview was conducted with a former violently radicalised Jihadi and recruiter. Overall, the sense of non-belonging significantly affects the process of violent radicalisation of a few individuals. Nevertheless, being religiously fundamental is not the problem of becoming violently radicalised in the first place, but belonging to the wrong group that is strongly determined by ideology, constitutes the main problem.Keywords: identity, sense of non-belonging, social identity theory, violent radicalisation
Procedia PDF Downloads 201269 Development of K-Factor for Road Geometric Design: A Case Study of North Coast Road in Java
Authors: Edwin Hidayat, Redi Yulianto, Disi Hanafiah
Abstract:
On the one hand, parameters which are used for determining the number of lane on the new road construction are average annual average daily traffic (AADT) and peak hour factor (K-factor). On the other hand, the value of K-factor listed in the guidelines and manual for road planning in Indonesia is a value of adoption or adaptation from foreign guidelines or manuals. Thus, the value is less suitable for Indonesian condition due to differences in road conditions, vehicle type, and driving behavior. The purpose of this study is to provide an example on how to determine k-factor values at a road segment with particular conditions in north coast road, West Java. The methodology is started with collecting traffic volume data for 24 hours over 365 days using PLATO (Automated Traffic Counter) with the approach of video image processing. Then, the traffic volume data is divided into per hour and analyzed by comparing the peak traffic volume in the 30th hour (or other) with the AADT in the same year. The analysis has resulted that for the 30th peak hour the K-factor is 0.97. This value can be used for planning road geometry or evaluating the road capacity performance for the 4/2D interurban road.Keywords: road geometry, K-factor, annual average daily traffic, north coast road
Procedia PDF Downloads 161268 Displacement Situation in Federally Administered Tribal Areas of Pakistan: Issues and Challenges
Authors: Sohail Ahmad, Inayat Kaleem
Abstract:
Federally Administered Tribal Area(FATA) of Pakistan is one of the most neglected regions in the world as far as development is concerned. It has been the hub of all sorts of illegal activities including militancy and export of terrorism. Therefore, it became inevitable for the government of Pakistan to take action against militants through military operations. Small and large scale military operations are being taken against the non-state actors in FATA with continuity. Over the years, hundreds of thousands have been displaced from the tribal areas of the country. Moreover, military operation Zarb-e-Azb has been launched in North Waziristan Agency in June 2014 to counter militancy across the Af-Pak border region. Though successful in curbing militancy, the operation has displaced around 0.5 million people from the area. Most of them opt to take shelter in the government installed shelter camps, some of them take refuge outside tent villages in the country while some of them prefer to cross into Afghanistan rather their own country Pakistan. This paper will evaluate how the influx of these internally displaced persons in the country is influencing the socio-economic situation of not only the displaced but of the hosting areas as well. Secondly, attention would be given to gauge the impact of such a huge number of displaced population on the law and order and security situation in the host areas.Keywords: Af-Pak, federally administered tribal area, IDPs, internal displacement, Pakistan
Procedia PDF Downloads 314267 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 197266 The Art and Science of Trauma-Informed Psychotherapy: Guidelines for Inter-Disciplinary Clinicians
Authors: Daphne Alroy-Thiberge
Abstract:
Trauma-impacted individuals present unique treatment challenges that include high reactivity, hyper-and hypo-arousal, poor adherence to therapy, as well as powerful transference and counter-transference experiences in therapy. This work provides an overview of the clinical tenets most often encountered in trauma-impacted individuals. Further, it provides readily applicable clinical techniques to optimize therapeutic rapport and facilitate accelerated positive mental health outcomes. Finally, integrated neuroscience and clinical evidence-based data are discussed to shed new light on crisis states in trauma-impacted individuals. This knowledge is utilized to provide effective and concrete interventions towards rapid and successful de-escalation of the impacted individual. A highly interactive, adult-learning-principles-based modality is utilized to provide an organic learning experience for participants. The information and techniques learned aim to increase clinical effectiveness, reduce staff injuries and burnout, and significantly enhance positive mental health outcomes and self-determination for the trauma-impacted individuals treated.Keywords: clinical competencies, crisis interventions, psychotherapy techniques, trauma informed care
Procedia PDF Downloads 111265 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 474264 A Witty Relief Ailment Based on the Integration of IoT and Cloud
Authors: Sai Shruthi Sridhar, A. Madhumidha, Kreethika Guru, Priyanka Sekar, Ananthi Malayappan
Abstract:
Numerous changes in technology and its recent development are structuring long withstanding effect to our world, one among them is the emergence of “Internet of Things” (IoT). Similar to Technology world, one industry stands out in everyday life–healthcare. Attention to “quality of health care” is an increasingly important issue in a global economy and for every individual. As per WHO (World Health Organization) it is estimated to be less than 50% adhere to the medication provided and only about 20% get their medicine on time. Medication adherence is one of the top problems in healthcare which is fixable by use of technology. In recent past, there were minor provisions for elderly and specially-skilled to get motivated and to adhere medicines prescribed. This paper proposes a novel solution that uses IOT based RFID Medication Reminder Solution to provide personal health care services. This employs real time tracking which offer quick counter measures. The proposed solution builds on the recent digital advances in sensor technologies, smart phones and cloud services. This novel solution is easily adoptable and can benefit millions of people with a direct impact on the nation’s health care expenditure with innovative scenarios and pervasive connectivity.Keywords: cloud services, IoT, RFID, sensors
Procedia PDF Downloads 348263 Exploring the Impact of Corruption on Human Rights in Cameroon: The Quest for Sustainable Solutions
Authors: Eugene Muambeh Muntoh
Abstract:
Corruption has a destructive effect on State institutions and on the capacity of States to respect, protect and fulfil human rights, particularly of those persons and groups in situation of vulnerability and marginalization. In Cameroon, corruption pose a major challenge as it divert public revenues and cripple public budgets that should provide healthcare, housing, education, and other essential services. Corruption has undermined the States’ ability to meet the minimum core obligations and pre-existing legal obligations to maximize all available resources to respect, protect and fulfil Economic, Social and Cultural Rights. This study therefore makes use of the qualitative research design, ranging from interviews, observations and content analysis of vital documents to provide evidence and associations between corruption and human rights concerns in Cameroon. The study made use of research material from both primary and secondary sources. Findings from the study reveals that the impact of corruption in Cameroon is especially pronounced regarding economic, social and cultural rights. In most cases, the right to be treated equally is violated, for example, when someone is requested to pay a bribe to obtain a public service. There is an urgent need for sustainable measures to counter corruption in order to protect and promote human rights.Keywords: corruption, governance, human rights, law
Procedia PDF Downloads 90262 Countercyclical Capital Buffer in the Polish Banking System
Authors: Mateusz Mokrogulski, Piotr Śliwka
Abstract:
The aim of this paper is the identification of periods of excessive credit growth in the Polish banking sector in years 2007-2014 using different methodologies. Due to the lack of precise guidance in CRD IV regarding methods of calculating the credit gap and related deviations from the long-term trends, a few filtering methods are applied, e.g. Hodrick-Prescott and Baxter-King. The solutions based on the switching model are also proposed. The next step represent computations of both the credit gap, and the counter cyclical capital buffer (CCB) rates on a quarterly basis. The calculations are carried out for the entire banking sector in Poland, as well as for its components (commercial and co-operative banks), and different types of loans. The calculations show vividly that in the analysed period there were the times of excessive credit growth. However, the results are different for the above mentioned sub-sectors. Of paramount importance here are mortgage loans, where the outcomes are distorted by high exchange rate fluctuations. The research on the CCB is now going to gain popularity as the buffer will soon become one of the tools of the macro prudential policy under CRD IV. Although the presented method is focused on the Polish banking sector, it can also be applied to other member states. Especially to the Central and Eastern European countries, that are usually characterized by smaller banking sectors compared to EU-15.Keywords: countercyclical capital buffer, CRD IV, filtering methods, mortgage loans
Procedia PDF Downloads 322261 Effects of Extract from Lactuca sativa on Sleep in Pentobarbital-Induced Sleep and Caffeine-Induced Sleep Disturbance in Mice
Authors: Hae Dun Kim, Joo Hyun Jang, Geu Rim Seo, Kyung Soo Ra, Hyung Joo Suh
Abstract:
Lactuca sativa (lettuce) has been known for its medical property to relieve anxiety and nervous. This study was implemented to investigate sleep-promoting effects of the lettuce alcohol extract (LAE). Caffeine is widely used psychoactive substance known to induced wakefulness and insomnia to its consumers. In the present study, the sedative-hypnotic activity of the LAE was studied using the method of pentobarbital-induced sleep in the mouse model. The LAE was administrated to mice 30 min before the pentobarbital injection. The LAE prolonged the pentobarbital-induced sleep duration and decreased sleep latency. The effects of LAE were comparable to those of induced by diazepam. Another study was performed to examine whether LAE ameliorates caffeine-induced sleep disturbance in mice. Additionally, caffeine (10 mg/kg, p.o) delayed sleep onset and reduced sleep duration of mice. Conversely, LAE treatment (80 or 160 mg/kg, p.o), especially at 160 mg/kg, normalized the sleep disturbance induced by caffeine. LAE supplementation can counter the sleep disturbance induced by caffeine. These results suggest that LAE possess significant sedative-hypnotic activity, which supports the popular use of lettuce for treatment of insomnia and provide the basis for new drug discovery. Furthermore, these results demonstrate that the lettuce extract may be preferable for the treatment of insomnia.Keywords: caffeine, Lactuca sativa, sleep duration, sleep latency
Procedia PDF Downloads 308260 Heat Transfer Enhancement Due to the Optimal Porosity in Plate Heat Exchangers with Sinusoidal Plates
Authors: Hossein Shokouhmand, Seyyed Mostafa Saadat
Abstract:
In this paper, the effect of thermal dispersion on the performance of plate heat exchangers (PHEs) with sinusoidal plates is investigated. In this regard, the PHE is considered as a porous medium. The important property of a porous medium is porosity that is defined as the total fluid volume divided by the total volume occupied by the solid and fluid. A 2D array of parallel sinusoidal plates with laminar periodically developed forced convection and single-phase constant property flows and conduction in a homogenous solid phase in two directions is considered. The array of flows is counter and the flows heat capacities are equal. Numerical study of conjugate heat transfer and axial conduction in the solid phase with different plate thicknesses showed that there is an optimal porosity in which the efficiency of heat transfer is up to 4% more than the time when the porosity is near one. It is shown that the optimal porosity at zero angle of inclination depends both on Reynolds number and the aspect ratio. The optimal porosity increased while either the Reynolds number or waviness of plates increased.Keywords: plate heat exchanger, optimal porosity, efficiency, aspect ratio
Procedia PDF Downloads 405259 Domestic Violence and Wives’ Depressive Symptoms in China: The Moderating Role of Gender Ideology
Authors: Xiangmei Li
Abstract:
Domestic violence (DV) victims are at a greater risk of suffering mental health problems; however, not all victims experience the same degree of depression. Women respond differently to gender inequalities based on their gender ideologies. This study explored the moderating role of gender ideology in the relation between exposure to DV and depression. Data were drawn from a sub-sample of women aged 18-60 from the Third WaveSurvey on the Social Status of Women in China (N = 10,701). The survey adopted astratified three-stage sampling design to select a representative sample of respondents from the country. Regression models were used to examine the moderating effects of gender ideology on the relation between DV and depression. Women who reported DV experience had more severe depressive symptoms after controlling for confounding social–demographic factors (β = 0.592, 95% CI: 0.489 – 0.695). Women's gender ideology moderated the association between DV severity and depression (β = -0.049, 95% CI: -0.085 – -0.013), despite being subjected to the same levels of victimization. The experience of domestic violence is a useful indicator for routine screening for depression in clinic and community settings. Interventions that aim to decrease depression caused by DV are more likely to be effective if they promote more egalitarian gender ideology to counter the mindset that a woman's role is confined to the home and a family suffers if the wife participates in the labor force.Keywords: domestic violence against wives, depression, gender ideology, moderation
Procedia PDF Downloads 130258 Focalization Used as a Narrative Strategy Mirroring Fadia Faqir’s Ideology in Pillars of Salt 1996
Authors: Malika Hammouche
Abstract:
The novel Pillars of Salt, written by Fadia Faqir in 1996, is a good example where storytelling is utilized as a traditional material to underline the author’s womanist ideology. A study of narrative could be fruitfully combined with that of ideology in this case. This combination could be demonstrated through the narrative technique used by Fadia Faqir in Pillars of Salt (1996), reflecting her anti-colonial ideology. The first step of this work will highlight the storyteller’s narrative in the novel representing, on the one hand, the imperial voice, and on the other exoticism and orientalism. The second step will demonstrate how Faqir’s narrative technique uses focalization as a narratological tool to negotiate her space. Faqir gives a voice to the female protagonist of the novel within the androcentric bias of Arab narrative theory to point to and amend the orientalist discourse typical to colonial literature. The orientalist discourse is represented through the voice of the storyteller in the novel. The juxtaposition of the storyteller’s and the female protagonist narratives is borrowed from the Arab literary background. It is a postcolonial counter-discursive strategy used by the author as a traditional material to underline her Arabo Islamic Womanist ideology in this novel.Keywords: Arabo Islamic womanism, focalization, ideology, narrative technique, orientalist
Procedia PDF Downloads 241257 Community Resilience to Violent Extremism: A Case Study of Swat in the Wake of Operation Rah-E-Raast
Authors: Khushboo Ejaz
Abstract:
Community Resilience to Violent Extremism gain importance in the post 9/11 scenario. Resilience is a word that came from the engineering domain. Prior to 9/11, this word community resilience has been used in disasters and natural hazards. The literature on Community Resilience has been published in different multiethnic and multi-religious communities. There is less data and research done on Pakistan’s Community resilience experience. This research is a case study; how local community showed resilience against violent extremism of Tehrik-e-Taliban Swat in the wake of Operation Rah-e- Raast. Qualitative research based on interviews and focus group discussions from male and female groups of different Tehsils of Swat has been carried out to highlight the Community Resilience to Violent Extremism of Tehrik- e- Taliban and Tehrik- e- Nifaz- e -Shariat- e-Muhamadi (TNSM) .NVivo software has been used for data analysis and highlighting all factors of Community Resilience to Violent extremism (CRVE) in Swat . Recommendations has been made in the end to suggest Civil Society Organizations, NGOs and government departments in order to facilitate and enhance community resilience of tribal and rural areas affected by violent elements in Pakistan. This study will fill the gap in literature related to CRVE policies in Pakistani context.Keywords: community resilience, operation Rah -e Raast, counter extremism, swat, Pakistan
Procedia PDF Downloads 142256 A High Time Resolution Digital Pulse Width Modulator Based on Field Programmable Gate Array’s Phase Locked Loop Megafunction
Authors: Jun Wang, Tingcun Wei
Abstract:
The digital pulse width modulator (DPWM) is the crucial building block for digitally-controlled DC-DC switching converter, which converts the digital duty ratio signal into its analog counterpart to control the power MOSFET transistors on or off. With the increase of switching frequency of digitally-controlled DC-DC converter, the DPWM with higher time resolution is required. In this paper, a 15-bits DPWM with three-level hybrid structure is presented; the first level is composed of a7-bits counter and a comparator, the second one is a 5-bits delay line, and the third one is a 3-bits digital dither. The presented DPWM is designed and implemented using the PLL megafunction of FPGA (Field Programmable Gate Arrays), and the required frequency of clock signal is 128 times of switching frequency. The simulation results show that, for the switching frequency of 2 MHz, a DPWM which has the time resolution of 15 ps is achieved using a maximum clock frequency of 256MHz. The designed DPWM in this paper is especially useful for high-frequency digitally-controlled DC-DC switching converters.Keywords: DPWM, digitally-controlled DC-DC switching converter, FPGA, PLL megafunction, time resolution
Procedia PDF Downloads 480255 The Extraction and Stripping of Hg(II) from Produced Water via Hollow Fiber Contactor
Authors: Dolapop Sribudda, Ura Pancharoen
Abstract:
The separation of Hg(II) from produced water by hollow fiber contactors (HFC) was investigation. This system included of two hollow fiber modules in the series connecting. The first module used for the extraction reaction and the second module for stripping reaction. Aliquat336 extractant was fed from the organic reservoirs into the shell side of the first hollow fiber module and continuous to the shell side of the second module. The organic liquid was continuously feed recirculate and back to the reservoirs. The feed solution was pumped into the lumen (tube side) of the first hollow fiber module. Simultaneously, the stripping solution was pumped in the same way in tube side of the second module. The feed and stripping solution was fed which had a counter current flow. Samples were kept in the outlet of feed and stripping solution for 1 hour and characterized concentration of Hg(II) by Inductively Couple Plasma Atomic Emission Spectroscopy (ICP-AES). Feed solution was produced water from natural gulf of Thailand. The extractant was Aliquat336 dissolved in kerosene diluent. Stripping solution used was nitric acid (HNO3) and thiourea (NH2CSNH2). The effect of carrier concentration and type of stripping solution were investigated. Results showed that the best condition were 10 % (v/v) Aliquat336 and 1.0 M NH2CSNH2. At the optimum condition, the extraction and stripping of Hg(II) were 98% and 44.2%, respectively.Keywords: Hg(II), hollow fiber contactor, produced water, wastewater treatment
Procedia PDF Downloads 404254 Deciding Graph Non-Hamiltonicity via a Closure Algorithm
Authors: E. R. Swart, S. J. Gismondi, N. R. Swart, C. E. Bell
Abstract:
We present an heuristic algorithm that decides graph non-Hamiltonicity. All graphs are directed, each undirected edge regarded as a pair of counter directed arcs. Each of the n! Hamilton cycles in a complete graph on n+1 vertices is mapped to an n-permutation matrix P where p(u,i)=1 if and only if the ith arc in a cycle enters vertex u, starting and ending at vertex n+1. We first create exclusion set E by noting all arcs (u, v) not in G, sufficient to code precisely all cycles excluded from G i.e. cycles not in G use at least one arc not in G. Members are pairs of components of P, {p(u,i),p(v,i+1)}, i=1, n-1. A doubly stochastic-like relaxed LP formulation of the Hamilton cycle decision problem is constructed. Each {p(u,i),p(v,i+1)} in E is coded as variable q(u,i,v,i+1)=0 i.e. shrinks the feasible region. We then implement the Weak Closure Algorithm (WCA) that tests necessary conditions of a matching, together with Boolean closure to decide 0/1 variable assignments. Each {p(u,i),p(v,j)} not in E is tested for membership in E, and if possible, added to E (q(u,i,v,j)=0) to iteratively maximize |E|. If the WCA constructs E to be maximal, the set of all {p(u,i),p(v,j)}, then G is decided non-Hamiltonian. Only non-Hamiltonian G share this maximal property. Ten non-Hamiltonian graphs (10 through 104 vertices) and 2000 randomized 31 vertex non-Hamiltonian graphs are tested and correctly decided non-Hamiltonian. For Hamiltonian G, the complement of E covers a matching, perhaps useful in searching for cycles. We also present an example where the WCA fails.Keywords: Hamilton cycle decision problem, computational complexity theory, graph theory, theoretical computer science
Procedia PDF Downloads 374253 Ghana’s Human Sexual Rights and Family Values Bill, 2021, and the Experiences of the LGBTQ+ Community
Authors: Michael Augustus Akagbor
Abstract:
Same-sex relationships have always existed in Ghana. In coastal towns such as James Town in the heart of the country’s capital, persons who were sexually different and attracted to members of their own sex were able to live their lives openly as queer persons without any fear for their lives. Since 2006, this idyllic existence has been under attack, with LGBTQ+ communities suffering violence and discrimination. This paper highlights the lived experiences of the LGBTIQ+ community in Ghana against the backdrop of the anti-gay bill - The Promotion of Proper Human Sexual Rights and Ghanaian Family Values Bill, 2021 (now renamed the Human Sexual Rights and Family Values Bill, 2021), currently before Parliament, introduced by eight members of Parliament as a Private Members’ Bill, and its implications for the LGBTQ+ community. The paper makes recommendations to key stakeholders on strategies to counter the cultural and religious arguments/strategies and activism of the anti-LGBTQ+ movement in Ghana. It relied on secondary data from a variety of sources, including the Bill before Parliament, media reports, and baseline surveys and studies conducted by LGBTQ organizations and other Civil Society Organizations (CSOs) in Ghana and elsewhere.Keywords: sexual rights, promotion, family values, lgbtq+, ghana, discrimination
Procedia PDF Downloads 89252 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 407251 A Predictive Analytics Approach to Project Management: Reducing Project Failures in Web and Software Development Projects
Authors: Tazeen Fatima
Abstract:
Use of project management in web & software development projects is very significant. It has been observed that even with the application of effective project management, projects usually do not complete their lifecycle and fail. To minimize these failures, key performance indicators have been introduced in previous studies to counter project failures. However, there are always gaps and problems in the KPIs identified. Despite of incessant efforts at technical and managerial levels, projects still fail. There is no substantial approach to identify and avoid these failures in the very beginning of the project lifecycle. In this study, we aim to answer these research problems by analyzing the concept of predictive analytics which is a specialized technology and is very easy to use in this era of computation. Project organizations can use data gathering, compute power, and modern tools to render efficient Predictions. The research aims to identify such a predictive analytics approach. The core objective of the study was to reduce failures and introduce effective implementation of project management principles. Existing predictive analytics methodologies, tools and solution providers were also analyzed. Relevant data was gathered from projects and was analyzed via predictive techniques to make predictions well advance in time to render effective project management in web & software development industry.Keywords: project management, predictive analytics, predictive analytics methodology, project failures
Procedia PDF Downloads 350250 Regulation of Transfer of 137cs by Polymeric Sorbents for Grow Ecologically Sound Biomass
Authors: A. H. Tadevosyan, S. K. Mayrapetyan, N. B. Tavakalyan, K. I. Pyuskyulyan, A. H. Hovsepyan, S. N. Sergeeva
Abstract:
Soil contamination with radiocesium has a long-term radiological impact due to its long physical half-life (30.1 years for 137Cs and 2 years for 134Cs) and its high biological availability. 137Cs causes the largest concerns because of its deleterious effect on agriculture and stock farming, and, thus, human life for decades. One of the important aspects of the problem of contaminated soils remediation is understand of protective actions aimed at the reduction of biological migration of radionuclides in soil-plant system. The most effective way to bind radionuclides is the use of selective sorbents. The proposed research mainly aims to achieve control on transfer of 137Cs in a system growing media–plant due to counter ions variation in the polymeric sorbents. As the research object, Japanese basil-Perilla frutescens was chosen. Productivity of plants depending on the presence (control-without presence of polymer) and type of polymer material, as well as content of 137Cs in plant material has been determined. The character of different polymers influences on the 137Cs migration in growing media–plant system as well as accumulation in the plants has been cleared up.Keywords: radioceaseum, Japanese basil, polymer, soil-plant system
Procedia PDF Downloads 183249 Pressure Drop Study in Moving and Stationary Beds with Lateral Gas Injection
Authors: Vinci Mojamdar, Govind S. Gupta
Abstract:
Moving beds in the presence of gas flow are widely used in metallurgical and chemical industries like blast furnaces, catalyst reforming, drying, etc. Pressure drop studies in co- and counter – current conditions have been done by a few researchers. However, to the best of authours knowledge, proper pressure drop study with lateral gas injection lacks especially in the presence of cavity and nozzle protrusion inside the packed bed. The latter study is more useful for metallurgical industries for the processes such as blast furnaces, shaft reduction and, COREX. In this experimental work, a two dimensional cold model with slot type nozzle for lateral gas injection along with the plastic beads as packing material and dry air as gas have been used. The variation of pressure drop is recorded at various horizontal and vertical directions in the presence of cavity and nozzle protrusion. The study has been performed in both moving and stationary beds. Also, the experiments have been carried out in both increasing as well as decreasing gas flow conditions. Experiments have been performed at various gas flow rates and packed bed heights. Some interesting results have been reported such as there is no pressure variation in the moving bed for both the increasing and decreasing gas flow condition that is different from the stationary bed. Pressure hysteresis loop has been observed in a stationary bed.Keywords: lateral gas injection, moving bed, pressure drop, pressure hysteresis, stationary bed
Procedia PDF Downloads 315248 Effective Sexual Assault Treatment as Viewed by Survivors and Expert Therapists
Authors: Avigail Moor
Abstract:
Rape and sexual assault have been widely linked to severe psychological sequelae, the recovery from which often requires professional help. Thanks to the current shift in societal attitudes towards sexual violence, the victim's perspective is increasingly being heard. The present study is yet another step in that direction. Through the investigation of what recovered survivors of sexual assault identify as the therapeutic interventions that most assisted them in overcoming their trauma, guidelines for optimal sexual assault treatment are established. These receive further support from a comparison with expert therapists as to what they view as being most conducive to recovery from rape. In-depth semi-structured interviews were conducted with 15 survivors who have experienced a successful course of therapy and 15 therapists with extensive expertise in the field. The results document considerable agreement between the two perspectives, which share much in common. First, irrespective of the specific techniques involved, both survivors and therapists placed the greatest importance on a respectful and validating therapeutic relationship, that operates to counter the dehumanization and degradation entailed in the assault. In addition, specific interventions were identified, which include the reprocessing of all rape-specific peri-traumatic reactions coupled with the intentional countering of their consequences within the therapeutic relationship. Together, these reports provide a detailed account of post-rape treatment needs and the interventions required for their effective resolution.Keywords: sexual assault, rape, treatment efficacy, survivors
Procedia PDF Downloads 144247 Identification of Effective Factors on Marketing Performance Management in Iran’s Airports and Air Navigation Companies
Authors: Morteza Hamidpour, Kambeez Shahroudi
Abstract:
The aim of this research was to identify the factors affecting the measurement and management of marketing performance in Iran's airports and air navigation companies (Economics in Air and Airport Transport). This study was exploratory and used a qualitative content analysis technique. The study population consisted of university professors in the field of air transportation and senior airport managers, with 15 individuals selected as samples using snowball technique. Based on the results, 15 main indicators were identified for measuring the marketing performance of Iran's airports and air navigation companies. These indicators include airport staff, general and operational expenses, annual passenger reception capacity, number of counter receptions and passenger dispatches, airport runway length, airline companies' loyalty to using airport space and facilities, regional market share of transit and departure flights, claims and net profit (aviation and non-aviation). By keeping the input indicators constant, the output indicators can be improved, enhancing performance efficiency and consequently increasing the economic situation in air transportation.Keywords: air transport economics, marketing performance management, marketing performance input factors, marketing performance intermediary factors, marketing performance output factors, content analysis
Procedia PDF Downloads 67246 Counter-Current Extraction of Fish Oil and Toxic Elements from Fish Waste Using Supercritical Carbon Dioxide
Authors: Parvaneh Hajeb, Shahram Shakibazadeh, Md. Zaidul Islam Sarker
Abstract:
High-quality fish oil for human consumption requires low levels of toxic elements. The aim of this study was to develop a method to extract oil from fish wastes with the least toxic elements contamination. Supercritical fluid extraction (SFE) was applied to detoxify fish oils from toxic elements. The SFE unit used consisted of an intelligent HPLC pump equipped with a cooling jacket to deliver CO2. The freeze-dried fish waste sample was extracted by heating in a column oven. Under supercritical conditions, the oil dissolved in CO2 was separated from the supercritical phase using pressure reduction. The SFE parameters (pressure, temperature, CO2 flow rate, and extraction time) were optimized using response surface methodology (RSM) to extract the highest levels of toxic elements. The results showed that toxic elements in fish oil can be reduced using supercritical CO2 at optimum pressure 40 MPa, temperature 61 ºC, CO2 flow rate 3.8 MPa, and extraction time 4.25 hr. There were significant reductions in the mercury (98.2%), cadmium (98.9%), arsenic (96%), and lead contents (99.2%) of the fish oil. The fish oil extracted using this method contained elements at levels that were much lower than the accepted limits of 0.1 μg/g. The reduction of toxic elements using the SFE method was more efficient than that of the conventional methods due to the high selectivity of supercritical CO2 for non-polar compounds.Keywords: food safety, toxic elements, fish oil, supercritical carbon dioxide
Procedia PDF Downloads 423245 Trichoderma spp Consortium and Its Efficacy as Biological Control Agent of Ganoderma Disease of Oil Palm (Elaies guineensis Jacquin)
Authors: Habu Musa, Nusaibah Binti Syd Ali
Abstract:
Oil palm industries particularly in Malaysia and Indonesia are being devastated by Ganoderma disease caused by Ganoderma spp. To date, this disease has been causing serious oil palm yield losses and collapse of oil palm trees, thus affecting its contribution to the producer’s economy. Research on sustainable and eco-friendly remedy to counter Ganoderma disease is on the upsurge to avoid the current control measures via synthetic fungicides. Trichoderma species have been the most studied and valued microbes as biological control agents in an effort to combat a wide range of plant diseases sustainably. Therefore, in this current study, the potential of Trichoderma spp. (Trichoderma asperellum, Trichoderma harzianum, and Trichoderma virens) as a consortium approach was evaluated as biological control agents against Ganoderma disease on oil palm. The consortium of Trichoderma spp. applied found to be the most effective treatment in suppressing Ganoderma disease with 83.03% and 89.16% from the foliar and bole symptoms respectively. Besides, it exhibited tremendous enhancement in the oil palm seedling vegetative growth parameters. Also, it had highly induced significant activity of peroxidase, polyphenol oxidase and total phenolic content was recorded in the consortium treatment compared to the control treatment. Disease development was slower in the seedlings treated with consortium of Trichoderma spp. compared to the positive control, which exhibited with the highest percentage of disease severity.Keywords: biological control, ganoderma disease, trichoderma, disease severity
Procedia PDF Downloads 277244 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 27243 Up-Scaling of Highly Transparent Quasi-Solid State Dye-Sensitized Solar Devices Composed of Nanocomposite Materials
Authors: Dimitra Sygkridou, Andreas Rapsomanikis, Elias Stathatos, Polycarpos Falaras, Evangelos Vitoratos
Abstract:
At the present work highly transparent strip type quasi-solid state dye-sensitized solar cells (DSSCs) were fabricated through inkjet printing using nanocomposite TiO2 inks as raw materials and tested under outdoor illumination conditions. The cells, which can be considered as the structural units of large area modules, were fully characterized electrically and electrochemically and after the evaluation of the received results a large area DSSC module was manufactured. The module design was a sandwich Z-interconnection where the working electrode is deposited on one conductive glass and the counter electrode on a second glass. Silver current collective fingers were printed on the conductive glasses to make the internal electrical connections and the adjacent cells were connected in series and finally insulated using a UV curing resin to protect them from the corrosive (I-/I3-) redox couple of the electrolyte. Finally, outdoor tests were carried out to the fabricated dye-sensitized solar module and its performance data were collected and assessed.Keywords: dye-sensitized solar devices, inkjet printing, quasi-solid state electrolyte, transparency, up-scaling
Procedia PDF Downloads 339242 A Numerical Study on Electrophoresis of a Soft Particle with Charged Core Coated with Polyelectrolyte Layer
Authors: Partha Sarathi Majee, S. Bhattacharyya
Abstract:
Migration of a core-shell soft particle under the influence of an external electric field in an electrolyte solution is studied numerically. The soft particle is coated with a positively charged polyelectrolyte layer (PEL) and the rigid core is having a uniform surface charge density. The Darcy-Brinkman extended Navier-Stokes equations are solved for the motion of the ionized fluid, the non-linear Nernst-Planck equations for the ion transport and the Poisson equation for the electric potential. A pressure correction based iterative algorithm is adopted for numerical computations. The effects of convection on double layer polarization (DLP) and diffusion dominated counter ions penetration are investigated for a wide range of Debye layer thickness, PEL fixed surface charge density, and permeability of the PEL. Our results show that when the Debye layer is in order of the particle size, the DLP effect is significant and produces a reduction in electrophoretic mobility. However, the double layer polarization effect is negligible for a thin Debye layer or low permeable cases. The point of zero mobility and the existence of mobility reversal depending on the electrolyte concentration are also presented.Keywords: debye length, double layer polarization, electrophoresis, mobility reversal, soft particle
Procedia PDF Downloads 346