Search results for: proactive coordination (CPA)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 957

Search results for: proactive coordination (CPA)

747 Incident Management System: An Essential Tool for Oil Spill Response

Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming

Abstract:

An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.

Keywords: command and control, incident management system, oil spill response, response organisation

Procedia PDF Downloads 156
746 Towards Development of a Framework for Saudi Education Software Ecosystem

Authors: Fazal-e-Amin, Abdullah S. Alghamdi, Iftikhar Ahmad

Abstract:

Software ecosystems’ concept is an inspiration from the natural ecosystem. Software ecosystems refer to large systems developed on top of a platform composed of different components developed by different entities of that ecosystem. Ecosystems improve information access, dissemination and coordination considerably. The ability to evolve and accommodate new subsystems gives a boost to the software ecosystems. In this paper, Saudi education software ecosystem is discussed and its need and potential benefits are highlighted. This work will provide a basis for further research in this area and foundation in development of Saudi education ecosystem.

Keywords: software ecosystem, education software, framework, software engineering

Procedia PDF Downloads 531
745 Healthcare Data Mining Innovations

Authors: Eugenia Jilinguirian

Abstract:

In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.

Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database

Procedia PDF Downloads 66
744 The Using of Smart Power Concepts in Military Targeting Process

Authors: Serdal AKYUZ

Abstract:

The smart power is the use of soft and hard power together in consideration of existing circumstances. Soft power can be defined as the capability of changing perception of any target mass by employing policies based on legality. The hard power, generally, uses military and economic instruments which are the concrete indicator of general power comprehension. More than providing a balance between soft and hard power, smart power creates a proactive combination by assessing existing resources. Military targeting process (MTP), as stated in smart power methodology, benefits from a wide scope of lethal and non-lethal weapons to reach intended end state. The Smart powers components can be used in military targeting process similar to using of lethal or non-lethal weapons. This paper investigates the current use of Smart power concept, MTP and presents a new approach to MTP from smart power concept point of view.

Keywords: future security environment, hard power, military targeting process, soft power, smart power

Procedia PDF Downloads 476
743 Marketing in Post-Pandemic Environment

Authors: Mohammad Mehdizadeh

Abstract:

COVID-19 forced marketers to change their marketing strategies, focusing less on reactive approaches and more on proactive approaches, primarily social media. The next few years will be dominated by employee engagement and customer experience, leading to businesses focusing more on "long-term customer relationships." A large number of marketing strategies need to be employed in an ever-evolving online environment, which is both filled with opportunities and dangers, as well as being an intimidating platform to use, incorporating new and exciting opportunities for businesses and organizations as it constantly evolves. In this article, we examine the effect of social networks on marketing in post-pandemic environments. A descriptive survey is used as the research method. The results show that social networks have a positive and significant impact on marketing in a post-pandemic environment. Among the social networks studied, Instagram, Facebook, and Twitter have the most positive effect on marketing advancement.

Keywords: COVID-19, customers, marketing, post-pandemic

Procedia PDF Downloads 86
742 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 333
741 The Sustained Utility of Japan's Human Security Policy

Authors: Maria Thaemar Tana

Abstract:

The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.

Keywords: human security, foreign policy, neoclassical realism, peace-building

Procedia PDF Downloads 133
740 Harnessing the Power of Mixed Ligand Complexes: Enhancing Antimicrobial Activities with Thiosemicarbazones

Authors: Sakshi Gupta, Seema Joshi

Abstract:

Thiosemicarbazones (TSCs) have garnered significant attention in coordination chemistry due to their versatile coordination modes and pharmacological properties. Mixed ligand complexes of TSCs represent a promising area of research, offering enhanced antimicrobial activities compared to their parent compounds. This review provides an overview of the synthesis, characterization, and antimicrobial properties of mixed ligand complexes incorporating thiosemicarbazones. The synthesis of mixed ligand complexes typically involves the reaction of a metal salt with TSC ligands and additional ligands, such as nitrogen- or oxygen-based ligands. Various transition metals, including copper, nickel, and cobalt, have been employed to form mixed ligand complexes with TSCs. Characterization techniques such as spectroscopy, X-ray crystallography, and elemental analysis are commonly utilized to confirm the structures of these complexes. One of the key advantages of mixed ligand complexes is their enhanced antimicrobial activity compared to pure TSC compounds. The synergistic effect between the TSC ligands and additional ligands contributes to increased efficacy, possibly through improved metal-ligand interactions or enhanced membrane permeability. Furthermore, mixed ligand complexes offer the potential for selective targeting of microbial species while minimizing toxicity to mammalian cells. This selectivity arises from the specific interactions between the metal center, TSC ligands, and biological targets within microbial cells. Such targeted antimicrobial activity is crucial for developing effective treatments with minimal side effects. Moreover, the versatility of mixed ligand complexes allows for the design of tailored antimicrobial agents with optimized properties. By varying the metal ion, TSC ligands, and additional ligands, researchers can fine-tune the physicochemical properties and biological activities of these complexes. This tunability opens avenues for the development of novel antimicrobial agents with improved efficacy and reduced resistance. In conclusion, mixed ligand complexes of thiosemicarbazones represent a promising class of compounds with potent antimicrobial activities. Further research in this field holds great potential for the development of novel therapeutic agents to combat microbial infections effectively.

Keywords: metal complex, thiosemicarbazones, mixed ligand, selective targeting, antimicrobial activity

Procedia PDF Downloads 60
739 Harnessing Artificial Intelligence for Early Detection and Management of Infectious Disease Outbreaks

Authors: Amarachukwu B. Isiaka, Vivian N. Anakwenze, Chinyere C. Ezemba, Chiamaka R. Ilodinso, Chikodili G. Anaukwu, Chukwuebuka M. Ezeokoli, Ugonna H. Uzoka

Abstract:

Infectious diseases continue to pose significant threats to global public health, necessitating advanced and timely detection methods for effective outbreak management. This study explores the integration of artificial intelligence (AI) in the early detection and management of infectious disease outbreaks. Leveraging vast datasets from diverse sources, including electronic health records, social media, and environmental monitoring, AI-driven algorithms are employed to analyze patterns and anomalies indicative of potential outbreaks. Machine learning models, trained on historical data and continuously updated with real-time information, contribute to the identification of emerging threats. The implementation of AI extends beyond detection, encompassing predictive analytics for disease spread and severity assessment. Furthermore, the paper discusses the role of AI in predictive modeling, enabling public health officials to anticipate the spread of infectious diseases and allocate resources proactively. Machine learning algorithms can analyze historical data, climatic conditions, and human mobility patterns to predict potential hotspots and optimize intervention strategies. The study evaluates the current landscape of AI applications in infectious disease surveillance and proposes a comprehensive framework for their integration into existing public health infrastructures. The implementation of an AI-driven early detection system requires collaboration between public health agencies, healthcare providers, and technology experts. Ethical considerations, privacy protection, and data security are paramount in developing a framework that balances the benefits of AI with the protection of individual rights. The synergistic collaboration between AI technologies and traditional epidemiological methods is emphasized, highlighting the potential to enhance a nation's ability to detect, respond to, and manage infectious disease outbreaks in a proactive and data-driven manner. The findings of this research underscore the transformative impact of harnessing AI for early detection and management, offering a promising avenue for strengthening the resilience of public health systems in the face of evolving infectious disease challenges. This paper advocates for the integration of artificial intelligence into the existing public health infrastructure for early detection and management of infectious disease outbreaks. The proposed AI-driven system has the potential to revolutionize the way we approach infectious disease surveillance, providing a more proactive and effective response to safeguard public health.

Keywords: artificial intelligence, early detection, disease surveillance, infectious diseases, outbreak management

Procedia PDF Downloads 66
738 Development of Ferric Citrate Complex Draw Solute and Its Application for Liquid Product Enrichment through Forward Osmosis

Authors: H. Li, L. Ji, J. Su

Abstract:

Forward osmosis is an emerging technology for separation and has great potential in the concentration of liquid products such as protein, pharmaceutical, and natural products. In pharmacy industry, one of the very tough talks is to concentrate the product in a gentle way since some of the key components may lose bioactivity when exposed to heating or pressurization. Therefore, forward osmosis (FO), which uses inherently existed osmosis pressure instead of externally applied hydraulic pressure, is attractive for pharmaceutical enrichments in a much efficient and energy-saving way. Recently, coordination complexes have been explored as the new class of draw solutes in FO processes due to their bulky configuration and excellent performance in terms of high water flux and low reverse solute flux. Among these coordination complexes, ferric citrate complex with lots of hydrophilic groups and ionic species which make them good solubility and high osmotic pressure in aqueous solution, as well as its low toxicity, has received much attention. However, the chemistry of ferric complexation by citrate is complicated, and disagreement prevails in the literature, especially for the structure of the ferric citrate. In this study, we investigated the chemical reaction with various molar ratio of iron and citrate. It was observed that the ferric citrate complex (Fe-CA2) with molar ratio of 1:1 for iron and citrate formed at the beginning of the reaction, then Fecit would convert to ferric citrate complex at the molar ratio of 1:2 with the proper excess of citrate in the base solution. The structures of the ferric citrate complexes synthesized were systematically characterized by X-ray diffraction (XRD), UV-vis spectroscopy, X-ray photoelectron spectroscopy (XPS), Fourier transform infrared spectroscopy (FT-IR) and Thermogravimetric analysis (TGA). Fe-CA2 solutions exhibit osmotic pressures more than twice of that for NaCl solutions at the same concentrations. Higher osmotic pressure means higher driving force, and this is preferable for the FO process. Fe-CA2 and NaCl draw solutions were prepared with the same osmotic pressure and used in FO process for BSA protein concentration. Within 180 min, BSA concentration was enriched from 0.2 to 0.27 L using Fe-CA draw solutions. However, it was only increased from 0.20 to 0.22 g/L using NaCl draw solutions. A reverse flux of 11 g/m²h was observed for NaCl draw solutes while it was only 0.1 g/m²h for Fe-CA2 draw solutes. It is safe to conclude that Fe-CA2 is much better than NaCl as draw solute and it is suitable for the enrichment of liquid product.

Keywords: draw solutes, ferric citrate complex, forward osmosis, protein enrichment

Procedia PDF Downloads 153
737 Usage of Military Continuity Management System for Flooding Solution

Authors: Jiri Palecek, Radmila Hajkova, Alena Oulehlova, Hana Malachova

Abstract:

The increase of emergency incidents and crisis situations requires proactive crisis management of authorities and for its solution. Application business continuity management systems help the crisis management authorities quickly and responsibly react to events and to plan more effectively and efficiently powers and resources. The main goal of this article is describing Military Continuity Management System (MCMS) based on the principles of Business Continuity Management System (BCMS) for dealing with floods in the territory of the selected municipalities. There are explained steps of loading, running and evaluating activities in the software application MCMS. Software MCMS provides complete control over the tasks, contribute a comprehensive and responsible approach solutions to solution floods in the municipality.

Keywords: business continuity management, floods plan, flood activity, level of flood activity

Procedia PDF Downloads 282
736 Machine Learning Approaches Based on Recency, Frequency, Monetary (RFM) and K-Means for Predicting Electrical Failures and Voltage Reliability in Smart Cities

Authors: Panaya Sudta, Wanchalerm Patanacharoenwong, Prachya Bumrungkun

Abstract:

As With the evolution of smart grids, ensuring the reliability and efficiency of electrical systems in smart cities has become crucial. This paper proposes a distinct approach that combines advanced machine learning techniques to accurately predict electrical failures and address voltage reliability issues. This approach aims to improve the accuracy and efficiency of reliability evaluations in smart cities. The aim of this research is to develop a comprehensive predictive model that accurately predicts electrical failures and voltage reliability in smart cities. This model integrates RFM analysis, K-means clustering, and LSTM networks to achieve this objective. The research utilizes RFM analysis, traditionally used in customer value assessment, to categorize and analyze electrical components based on their failure recency, frequency, and monetary impact. K-means clustering is employed to segment electrical components into distinct groups with similar characteristics and failure patterns. LSTM networks are used to capture the temporal dependencies and patterns in customer data. This integration of RFM, K-means, and LSTM results in a robust predictive tool for electrical failures and voltage reliability. The proposed model has been tested and validated on diverse electrical utility datasets. The results show a significant improvement in prediction accuracy and reliability compared to traditional methods, achieving an accuracy of 92.78% and an F1-score of 0.83. This research contributes to the proactive maintenance and optimization of electrical infrastructures in smart cities. It also enhances overall energy management and sustainability. The integration of advanced machine learning techniques in the predictive model demonstrates the potential for transforming the landscape of electrical system management within smart cities. The research utilizes diverse electrical utility datasets to develop and validate the predictive model. RFM analysis, K-means clustering, and LSTM networks are applied to these datasets to analyze and predict electrical failures and voltage reliability. The research addresses the question of how accurately electrical failures and voltage reliability can be predicted in smart cities. It also investigates the effectiveness of integrating RFM analysis, K-means clustering, and LSTM networks in achieving this goal. The proposed approach presents a distinct, efficient, and effective solution for predicting and mitigating electrical failures and voltage issues in smart cities. It significantly improves prediction accuracy and reliability compared to traditional methods. This advancement contributes to the proactive maintenance and optimization of electrical infrastructures, overall energy management, and sustainability in smart cities.

Keywords: electrical state prediction, smart grids, data-driven method, long short-term memory, RFM, k-means, machine learning

Procedia PDF Downloads 56
735 Human Errors in IT Services, HFACS Model in Root Cause Categorization

Authors: Kari Saarelainen, Marko Jantti

Abstract:

IT service trending of root causes of service incidents and problems is an important part of proactive problem management and service improvement. Human error related root causes are an important root cause category also in IT service management, although it’s proportion among root causes is smaller than in the other industries. The research problem in this study is: How root causes of incidents related to human errors should be categorized in an ITSM organization to effectively support service improvement. Categorization based on IT service management processes and based on Human Factors Analysis and Classification System (HFACS) taxonomy was studied in a case study. HFACS is widely used in human error root cause categorization across many industries. Combining these two categorization models in a two dimensional matrix was found effective, yet impractical for daily work.

Keywords: IT service management, ITIL, incident, problem, HFACS, swiss cheese model

Procedia PDF Downloads 488
734 Inappropriate Effects Which the Use of Computer and Playing Video Games Have on Young People

Authors: Maja Ruzic-Baf, Mirjana Radetic-Paic

Abstract:

The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games. The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games.

Keywords: addiction to video games, behaviour, ICT, young people

Procedia PDF Downloads 545
733 Analysis of the Evolution of Social and Economic Indicators of the Mercosur´s Members: 1980-2012

Authors: L. Aparecida Bastos, J. Leige Lopes, J. Crepaldi, R. Monteiro da Silva

Abstract:

The objective of this study is to analyze the evolution of some social and economic indicators of Mercosur´s economies from 1980 to 2012, based on the statistics of the Latin American Integration Association (LAIA). The objective is to observe if after the accession of these economies to Mercosur (the first accessions occurred in 1994) these indicators showed better performance, in order to demonstrate if economic integration contributed to improved trade, macroeconomic performance, and level of social and economic development of member countries. To this end, the methodologies used will be a literature review and descriptive statistics. The theoretical framework that guides the work are the theories of Integration: Classical Liberal, Marxist and structural-proactive. The results reveal that most social and economic indicators showed better performance in those economies that joined Mercosur after 1994. This work is the result of an investigation already completed.

Keywords: economic integration, Mercosur, social indicators, economic indicators

Procedia PDF Downloads 298
732 Cooperation of Unmanned Vehicles for Accomplishing Missions

Authors: Ahmet Ozcan, Onder Alparslan, Anil Sezgin, Omer Cetin

Abstract:

The use of unmanned systems for different purposes has become very popular over the past decade. Expectations from these systems have also shown an incredible increase in this parallel. But meeting the demands of the tasks are often not possible with the usage of a single unmanned vehicle in a mission, so it is necessary to use multiple autonomous vehicles with different abilities together in coordination. Therefore the usage of the same type of vehicles together as a swarm is helped especially to satisfy the time constraints of the missions effectively. In other words, it allows sharing the workload by the various numbers of homogenous platforms together. Besides, it is possible to say there are many kinds of problems that require the usage of the different capabilities of the heterogeneous platforms together cooperatively to achieve successful results. In this case, cooperative working brings additional problems beyond the homogeneous clusters. In the scenario presented as an example problem, it is expected that an autonomous ground vehicle, which is lack of its position information, manage to perform point-to-point navigation without losing its way in a previously unknown labyrinth. Furthermore, the ground vehicle is equipped with very limited sensors such as ultrasonic sensors that can detect obstacles. It is very hard to plan or complete the mission for the ground vehicle by self without lost its way in the unknown labyrinth. Thus, in order to assist the ground vehicle, the autonomous air drone is also used to solve the problem cooperatively. The autonomous drone also has limited sensors like downward looking camera and IMU, and it also lacks computing its global position. In this context, it is aimed to solve the problem effectively without taking additional support or input from the outside, just benefiting capabilities of two autonomous vehicles. To manage the point-to-point navigation in a previously unknown labyrinth, the platforms have to work together coordinated. In this paper, cooperative work of heterogeneous unmanned systems is handled in an applied sample scenario, and it is mentioned that how to work together with an autonomous ground vehicle and the autonomous flying platform together in a harmony to take advantage of different platform-specific capabilities. The difficulties of using heterogeneous multiple autonomous platforms in a mission are put forward, and the successful solutions are defined and implemented against the problems like spatially distributed tasks planning, simultaneous coordinated motion, effective communication, and sensor fusion.

Keywords: unmanned systems, heterogeneous autonomous vehicles, coordination, task planning

Procedia PDF Downloads 128
731 Analyzing Social and Political Constraints in Development Aid Projects in Post Conflict Region of SWAT, Pakistan

Authors: Faizan Sultan

Abstract:

Non-government organizations (NGOs) in Pakistan have the potential to deliver services such as health, education, and rural development through targeting the most vulnerable communities of society. Having this significant importance, NGOs are facing numerous challenges in service delivery. So, there is a need to identify the challenges NGOs face in community development, particularly post-conflict development. The current study has analyzed the social and political constraints in development projects in the post-conflict region of the Swat district of Khyber Pakhtunkhwa. The objectives of this study are “What are the social and political constraints faced by the nongovernmental organizations in the implementation of development aid Projects in post-conflict development of Swat and to examine the challenges in coordination mechanism between government departments, NGOs, and community in reconstruction activities”. This research is based upon both the quantitative and qualitative data that is being gathered from the NGO representatives, government officials, and community members who were involved in post-conflict development interventions in the Swat region. A purposive sampling technique was used to select respondents from the community members/activists (25 in number) and government and NGO officials (10 in number). Based on analysis against our objectives, NGOs have faced numerous constraints such as Insecurity, Negative Perceptions about NGOs, restrictions on women's mobility, government policies and regulations, lack of coordination and networking, trust deficit, and political interference while implementing their project interventions. These findings concluded that constraints have affected project implementation to a greater extent, including women's participation, involvement of marginalized populations, and equal distribution of resources. In the Swat region, NGOs cannot openly discuss sensitive projects such as human rights, gender-based projects, or women empowerment as these issues are very sensitive to the local community due to their cultural values. The community may not allow their females to go outside their homes as this region is a male-dominated society. Similarly, lack of communication and poor networking for the arrangements of the project meetings were also the major constraints.

Keywords: national disaster management authority, millennium development goals, provincial disaster management authority, provincial reconstruction, rehabilitation and settlement authority

Procedia PDF Downloads 59
730 Impact of Node Density and Transmission Range on the Performance of OLSR and DSDV Routing Protocols in VANET City Scenarios

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) used to establish communications and exchange information among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET is seen as a promising technology used to provide safety, efficiency, assistance and comfort to the road users. Routing is an important issue in Vehicular Ad Hoc Network to find and maintain communication between vehicles due to the highly dynamic topology, frequently disconnected network and mobility constraints. This paper evaluates the performance of two most popular proactive routing protocols OLSR and DSDV in real city traffic scenario on the basis of three metrics namely Packet delivery ratio, throughput and average end to end delay by varying vehicles density and transmission range.

Keywords: DSDV, OLSR, quality of service, routing protocols, VANET

Procedia PDF Downloads 470
729 Diplomacy in Times of Disaster: Management through Reputational Capital

Authors: Liza Ireni-Saban

Abstract:

The 6.6 magnitude quake event that occurred in 2003 (Bam, Iran) made it impossible for the Iranian government to handle disaster relief efforts domestically. In this extreme event, the Iranian government reached out to the international community, and this created a momentum that had to be carried out by trust-building efforts on all sides, often termed ‘Disaster Diplomacy’. Indeed, the circumstances were even more critical when one considers the increasing political and economic isolation of Iran within the international community. The potential for transformative political space to be opened by disaster has been recognized by dominant international political actors. Despite the fact that Bam 2003 post-disaster relief efforts did not catalyze any diplomatic activities on all sides, it is suggested that few international aid agencies have successfully used disaster recovery to enhance their popular legitimacy and reputation among the international community. In terms of disaster diplomacy, an actor’s reputational capital may affect his ability to build coalitions and alliances to achieve international political ends, to negotiate and build understanding and trust with foreign publics. This study suggests that the post-disaster setting may benefit from using the ecology of games framework to evaluate the role of bridging actors and mediators in facilitating collaborative governance networks. Recent developments in network theory and analysis provide means of structural embeddedness to explore how reputational capital can be built through brokerage roles of actors engaged in a disaster management network. This paper then aims to structure the relations among actors that participated in the post-disaster relief efforts in the 2003 Bam earthquake (Iran) in order to assess under which conditions actors may be strategically utilized to serve as mediating organizations for future disaster events experienced by isolated nations or nations in conflict. The results indicate the strategic use of reputational capital by the Iranian Ministry of Foreign Affairs as key broker to build a successful coordinative system for reducing disaster vulnerabilities. International aid agencies rarely played brokerage roles to coordinate peripheral actors. U.S. foreign assistance (USAID), despite coordination capacities, was prevented from serving brokerage roles in the system.

Keywords: coordination, disaster diplomacy, international aid organizations, Iran

Procedia PDF Downloads 154
728 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 185
727 A Coordination of Supply Chain Disruption in Different Types of Manufacturing Environments: A Case Study of Sugar Manufacturing Company

Authors: Max Moleke, Gilbert Mbonde

Abstract:

Coordinating supply chain process within a manufacturing environment is a very critical aspect of any organization. Nowadays, most manufacturing industries turn to look at only the financial indicator which in real life situation on the shop floor, there are a number of supply chain disruptions that are been ignored. In this work, we had to look at different types of supply chain disruption and their various impact within the organization. A number of Industrial engineering tools are employed which includes, Multifactor productivity, activity on arrow and rescheduling plans. The final result shows that supply chain disruption various with different geographical area where the production plant is operating.

Keywords: supply chain, disruptions, flow shop scheduling, uncertainty

Procedia PDF Downloads 429
726 Using Cooperation without Communication in a Multi-Agent Unpredictable Dynamic Real-Time Environment

Authors: Abbas Khosravi

Abstract:

This paper discusses the use of cooperation without communication in a multi-agent, unpredictable, dynamic real-time environment. The architecture of the Persian Gulf agent consists of three layers: fixed rule, low level, and high level layers, allowing for cooperation without direct communication. A scenario is presented to each agent in the form of a file, specifying each player's role and actions in the game. The scenario helps in cases of miscommunication, improving team performance. Cooperation without communication enhances reliability and coordination among agents, leading to better results in challenging situations.

Keywords: multi-agent systems, communication, Robocop, software engineering

Procedia PDF Downloads 34
725 Appraisal of Parents' Views and Supervision of Their Children's Use of Information Communication Technology

Authors: Olabisi Adedigba

Abstract:

It is a fundamental truth that Information Communication Technology (ICT) lies at the very heart of our today’s society and determines its development. The use of ICT has given a boost to the educational and mental development of an average pupil of this age far above their counterparts who lived centuries ago. Nevertheless, the present age children stand the risk of the scourge of this technology if proactive measures are not taken urgently to arrest the damages of its negative use on them. One of the measures that can be taken is supervision of children’s use of ICT. This research therefore investigated parents’ views and supervision of their children’s use of Information Communication Technology. Descriptive design was adopted for this study. 300 parents were randomly selected. “Parents’ Views and Supervision of Children’s Use of ICT” was used to collect data for the study. Data collected were analyzed using percentage, mean, standard deviation and t-test. The result revealed that parents’ view of their children’s use of ICT is negative while supervision of their children’s use of ICT is low. Recommendations were thus offered that schools and other stakeholders should educate parents on children’s proper utilization of ICT and parents are urged to maintain adequate supervision on their children use of ICT.

Keywords: appraisal of parents’ views and supervision, children’s use, information communication technology, t-test

Procedia PDF Downloads 510
724 Fish Is Back but Fishers Are Out: The Dilemma of the Education Methods Adapted for Co-management of the Fishery Resource

Authors: Namubiru Zula, Janice Desire Busingue

Abstract:

Pro-active educational approaches have lately been adapted Globally in the Conservation of Natural Resources. This led to the introduction of the co-management system, which worked for some European Countries on the conservation of sharks and other Natural resources. However, this approach has drastically failed in the Fishery sector on Lake Victoria; and the punitive education approach has been re-instated. Literature is readily available about the punitive educational approaches and scanty with the pro-active one. This article analyses the pro-active approach adopted by the Department of Fisheries for the orientation of BMU leaders in a co-management system. The study is interpreted using the social constructivist lens for co-management of the fishery resource to ensure that fishers are also back to fishing sustainably. It highlights some of the education methods used, methodological challenges that included the power and skills gap of the facilitators and program designers, and some implications to practice.

Keywords: beach management units, fishers, education methods, proactive approach, punitive approach

Procedia PDF Downloads 123
723 Solving SPDEs by Least Squares Method

Authors: Hassan Manouzi

Abstract:

We present in this paper a useful strategy to solve stochastic partial differential equations (SPDEs) involving stochastic coefficients. Using the Wick-product of higher order and the Wiener-Itˆo chaos expansion, the SPDEs is reformulated as a large system of deterministic partial differential equations. To reduce the computational complexity of this system, we shall use a decomposition-coordination method. To obtain the chaos coefficients in the corresponding deterministic equations, we use a least square formulation. Once this approximation is performed, the statistics of the numerical solution can be easily evaluated.

Keywords: least squares, wick product, SPDEs, finite element, wiener chaos expansion, gradient method

Procedia PDF Downloads 419
722 Deviations and Defects of the Sub-Task’s Requirements in Construction Projects

Authors: Abdullah Almusharraf, Andrew Whyte

Abstract:

The sub-task pattern in terms of the deviations and defects should be identified and understand in order to improve the quality practices in construction projects. Therefore, the sub-task susceptibility to exposure to deviations and defects have been evaluated and classified via six classifications that have proposed in this study. 34 case studies on specific sub-task (from compression member in construction concrete structure) have been collected from seven construction projects in order to examined study’s classifications. The study revealed that the sub-task has high sensitive to deviation where (91%) of the cases recorded as deviations, however, only (19%) of cases recorded as defects. Another findings were that the actual work during the execution process has high source of deviation for this sub-task (74%) while only (26%) of the deviation source was due to both design documentations with the actual work. These findings significantly imply that it could be used the study’s classifications to determine the pattern of each sub-task and develop the proactive actions to overcome issues of the sub-task deviations and defects.

Keywords: sub-tasks, deviations, defects, quality, construction projects

Procedia PDF Downloads 444
721 Pomegranates Attenuates Cognitive and Behavioural Deficts and reduces inflammation in a Transgenic Mice Model of Alzheimer's Disease

Authors: M. M. Essa, S. Subash, M. Akbar, S. Al-Adawi, A. Al-Asmi, G. J. Guillemein

Abstract:

Objective: Transgenic (tg) mice which contain an amyloid precursor protein (APP) gene mutation, develop extracellular amyloid beta (Aβ) deposition in the brain, and severe memory and behavioural deficits with age. These mice serve as an important animal model for testing the efficacy of novel drug candidates for the treatment and management of symptoms of Alzheimer's disease (AD). Several reports have suggested that oxidative stress is the underlying cause of Aβ neurotoxicity in AD. Pomegranates contain very high levels of antioxidants and several medicinal properties that may be useful for improving the quality of life in AD patients. In this study, we investigated the effect of dietary supplementation of Omani pomegranate extract on the memory, anxiety and learning skills along with inflammation in an AD mouse model containing the double Swedish APP mutation (APPsw/Tg2576). Methods: The experimental groups of APP-transgenic mice from the age of 4 months were fed custom-mix diets (pellets) containing 4% pomegranate. We assessed spatial memory and learning ability, psychomotor coordination, and anxiety-related behavior in Tg and wild-type mice at the age of 4-5 months and 18-19 months using the Morris water maze test, rota rod test, elevated plus maze test, and open field test. Further, inflammatory parameters also analysed. Results: APPsw/Tg2576 mice that were fed a standard chow diet without pomegranates showed significant memory deficits, increased anxiety-related behavior, and severe impairment in spatial learning ability, position discrimination learning ability and motor coordination along with increased inflammation compared to the wild type mice on the same diet, at the age of 18-19 months In contrast, APPsw/Tg2576 mice that were fed a diet containing 4% pomegranates showed a significant improvements in memory, learning, locomotor function, and anxiety with reduced inflammatory markers compared to APPsw/Tg2576 mice fed the standard chow diet. Conclusion: Our results suggest that dietary supplementation with pomegranates may slow the progression of cognitive and behavioural impairments in AD. The exact mechanism is still unclear and further extensive research needed.

Keywords: Alzheimer's disease, pomegranates, oman, cognitive decline, memory loss, anxiety, inflammation

Procedia PDF Downloads 528
720 The Strategic Management Affect to Firm Performance: An Empirical Investigation of Businesses in Thailand

Authors: Kawinphat Lertpongmanee

Abstract:

The purpose of this research is to examine the relationships among business collaboration effectiveness, modern management excellence, proactive operational management, and firm performance to bring competitive advantage to the firm. Furthermore, the population and sample selected are exporters on textile businesses in Thailand in total of 566 companies. The data were collected by questionnaire survey and sent direct to the directors or managerial managers of each company which is appropriate as the key informant of this research. Moreover, the statistic to test hypothesis uses the hierarchical multiple regression analysis and provides those five hypotheses to testing. The results show direct effect that the business collaboration effectiveness has a significantly positive influence on firm performance, meaning that, the collaboration is an important factor in global business both internal and external of firms that reflect the linkage of business to create competitive advantage and gain benefits simultaneously of the firms efficiently also.

Keywords: business collaboration effectiveness, firm performance, modern management excellence, strategic management

Procedia PDF Downloads 280
719 Pro-BluCRM: A Proactive Customer Relationship Management System Using Bluetooth

Authors: Mohammad Alawairdhi

Abstract:

Customer Relationship Management (CRM) started gaining attention as late as the 1990s, and since then efforts are ongoing to define the domain’s precise specifications. There is yet no single agreed upon definition. However, a predominant majority perceives CRM as a mechanism for enhancing interaction with customers, thereby strengthening the relationship between a business and its clients. From the perspective of Information Technology (IT) companies, CRM systems can be viewed as facilitating software products or services to automate the marketing, selling and servicing functions of an organization. In this paper, we have proposed a Bluetooth enabled CRM system for small- and medium-scale organizations. In the proposed system, Bluetooth technology works as an automatic identification token in addition to its common use as a communication channel. The system comprises a server side accompanied by a user-interface support for both client and server sides. The system has been tested in two environments and users have expressed ease of use, convenience and understandability as major advantages of the proposed solution.

Keywords: customer relationship management, CRM, bluetooth, automatic identification token

Procedia PDF Downloads 342
718 The Nature and Impact of Trojan Horses in Cybersecurity

Authors: Mehrab Faraghti

Abstract:

Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.

Keywords: Trojan horses, cybersecurity, malware, data breach

Procedia PDF Downloads 9