Search results for: situational crisis communication theory
7099 Automatic Aggregation and Embedding of Microservices for Optimized Deployments
Authors: Pablo Chico De Guzman, Cesar Sanchez
Abstract:
Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.Keywords: aggregation, deployment, embedding, resource allocation
Procedia PDF Downloads 2067098 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks
Authors: Laurent Maurin, Mervi Toivanen
Abstract:
This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.Keywords: Euro area, capital ratios, credit supply, partial adjustment model
Procedia PDF Downloads 4507097 The Development of Clinical Nursing Practice Guidelines for Preventing of Infection during Intubation in Patients with Suspected or Confirmed COVID-19
Authors: Sarinra Thongmee, Krittaporn Prakobsaeng, Adithep Mingsuan, Chanyapak Polkhet, Supattra Wongsuk
Abstract:
The purposes of this research and developmentwasto develop and evaluation of the clinical nursingpractice guideline (CNPG) for the prevention infection during intubation in patient with suspected or confirmedCOVID-19 patient. This study was developed by using the evidencebased practice model of Soukup (2000) asa conceptual framework. The study consisted of 4 steps: 1) situational analysis of intubation service in patientswith confirmed COVID-19; 2) development of the CNPG; 3) apply the NPG to trial; and 4) evaluation of the CNPG. The sample consisted of 52 nurse anesthetists and 25 infected or suspected COVID-19 patients. The research instrument consisted of 1) the CNPG, which was developed by the researchers; 2) the nurses anesthetist opinion questionnaire to the guideline; 3) the evaluation practice form; and 4) the nurse anesthetist knowledge test on nursing care of patients infected with COVID-19. Data were analyzed by using descriptive statistics, and Wilcoxon matched-pairs signed rank test. The results revealed this developed CNPG consists of 4 sections: 1)the CNPG for airborne precautions2) the preparation of anesthetic and intubation equipments3) the roles and duties of the intubation team, 4) the guidelines for intubation in suspected or confirmed COVID-19 patients. The results of CNPG use found that 1)the provider: using NPG in providers revealed that nurse anesthetist had a higher mean of knowledge scores than before using CNPG statistically significant at the 0.05 level (p<0.01) and able to follow the NPG 100% inall activities. The anesthetic team was not infected with COVID-19 from intubation outside the operating room. 2)the client: the patient was safe, with no complications from intubation. Summary CNPG to prevent infection during reintubation of suspected or confirmedCOVID-19patient was appropriate and applicable to practice.Keywords: clinical nursing practice guideline, prevention of infection, endotracheal intubation, COVID-19
Procedia PDF Downloads 1607096 Part of Geomatics Technology in the Capability to Implement an on Demand Transport in Oran Wilaya (the Northwestern of Algeria)
Authors: N. Brahmia
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transport systems (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria. As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems such as Geographic Information System (GIS), Road Database Management System (RDBMS)… so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: geomatics, GIS, ODT, transport systems
Procedia PDF Downloads 6097095 Neurostatistics of Cognitive Functions
Authors: Ajay Panchal
Abstract:
This research introduces the Law of Activity Dominancy (LAD), a foundational theory in neuroscience postulating that simultaneous brain-regulated activities cannot share identical brain wave frequencies. The study explores the LAD through comprehensive observational and statistical analyses, illustrating its applicability across all cognitive functions. Utilizing brain wave frequency data across diverse scenarios, the research derives probabilistic models to predict the likelihood of concurrent cognitive activities. The LAD theory's predictive power extends to all neurological conditions, offering insights into Alzheimer's disease, major depressive disorder, epilepsy, schizophrenia, anxiety disorders, OCD, ASD, ADHD etc... By analyzing EEG patterns, the research demonstrates how overlapping brain wave frequencies disrupt specific cognitive and motor functions, aligning with clinical observations. This study also outlines the statistical properties of the LAD, presenting equations to calculate activity probabilities and emphasizing its utility in personalizing cognitive assessments, early disease detection, tailored therapies, optimizing cognitive performance etc... By bridging theoretical neuroscience with practical applications, the research establishes the LAD as a pivotal framework for understanding and enhancing human cognitive functions.Keywords: Ajay Panchal, cognitive neuroscience, computational neuroscience, theoretical neuroscience
Procedia PDF Downloads 127094 Social and Cognitive Stress Impact on Neuroscience and PTSD
Authors: Sadra Abbasi
Abstract:
The complex connection between psychological stress and the onset of different diseases has been an ongoing issue in the mental health field for a long time. Multiple studies have demonstrated that long-term stress can greatly heighten the likelihood of developing health issues like heart disease, cancer, arthritis, and severe depression. Recent research in cognitive science has provided insight into the intricate processes involved in posttraumatic stress disorder (PTSD), suggesting that distinct memory systems are accountable for both vivid reliving and normal autobiographical memories of traumatic incidents, as proposed by dual representation theory. This theory has important consequences for our comprehension of the neural mechanisms involved in fear and behavior related to threats, highlighting the amygdala-hippocampus-medial prefrontal cortex circuit as a crucial component in this process. This particular circuit, extensively researched in behavioral neuroscience, is essential for regulating the body's reactions to stress and trauma. This review will examine how incorporating a modern neuroscience viewpoint into an integrative case formulation offers a current way to comprehend the intricate connections among psychological stress, trauma, and disease.Keywords: social, cognitive, stress, neuroscience, behavior, PTSD
Procedia PDF Downloads 407093 Investigating University Language Teacher’s Perception of Their Identities in the Algerian Multilingual Context
Authors: Yousra Drissi
Abstract:
This research explores language teacher identity in a multilingual context where both teachers and students come from different linguistic backgrounds. It seeks to understand how teachers perceive themselves as language teachers in this context in relation to different influencing factors, both internal and external. This study is being conducted due to the importance of language teacher identity (LTI) in the university context, which is being neglected in the present literature (in an attempt to address the gap in the present literature). The broader aim of this study is to bring attention to language teacher identity along with the different influencing elements which can either promote or hinder its development. In this research, we are using the sociocultural theory and post-structural theory. This research uses the mixed methods approach to collect and analyse relevant data. A structured survey was distributed to language teachers from different universities around Algeria, followed by in-depth interviews. Results are supposed to show the different points in self-perception that these teachers share or differ in. they will also help us identify the different internal and external factors that can be of influence. However, the results of this research can be used by institutions as well as decision-makers to better understand university teachers and help them improve their teaching practices by empowering their language teacher identity, starting from teacher education programs to continuous teacher development programs.Keywords: identity, language teacher identity, multilingualism, university teacher
Procedia PDF Downloads 807092 Evaluating Imitation Behavior of Children with Autism Spectrum Disorder Using Humanoid Robot NAO
Authors: Masud Karim, Md. Solaiman Mia, Saifuddin Md. Tareeq, Md. Hasanuzzaman
Abstract:
Autism Spectrum Disorder (ASD) is a neurodevelopment disorder. Such disorder is found in childhood life. Children with ASD have less capabilities in communication and social skills. Therapies are used to develop communication and social skills. Recently researchers have been trying to use robots in such therapies. In this paper, we have presented social skill learning test cases for children with ASD. Autism conditions are measured in 30 children in a special school. Among them, twelve children are selected who have equal ASD conditions. Then six children participated in training with humans, and another six children participated in training with robots. The learning session continued for one week and three hours each day. We have taken an assessment test before the learning sessions. After completing the learning sessions, we have taken another assessment test. We have found better performances from children who have participated in robotic sessions rather than the children who have participated in human sessions.Keywords: children with ASD, NAO robot, human-robot interaction, social skills
Procedia PDF Downloads 947091 Resilience and Renewal: Sustainable Tourism Development in Post-Earthquake Marrakech-El Haouz
Authors: Oumayma Hilal
Abstract:
The devastating earthquake in Marrakech-El Haouz in September 2023 underscores the critical need for sustainable tourism practices. This study proposes innovative approaches to territory tourism, prioritizing resilient and sustainable development to aid recovery and empower local communities. Using a mixed-methods approach, the research evaluates post-earthquake tourism impacts, gathers local perspectives, and benchmarks global models for disaster recovery through tourism. The paper aims to offer practical, community-centric tourism initiatives, integrated with strategic communication strategies, to enhance socio-economic welfare and ensure long-term resilience. The findings are expected to contribute significantly to sustainable tourism literature in post-disaster contexts and provide actionable strategies for the revitalization of the Marrakech-El Haouz region.Keywords: sustainable tourism, community development, Marrakech El Haouz, communication strategies, territory tourism, sustainable tourism, community development
Procedia PDF Downloads 597090 Management Pattern for Service Sector in Samut Songkram by Sufficient Economy Approach
Authors: Krisada Sungkhamanee
Abstract:
The objectives of this research are to search the management pattern of one district lodging entrepreneurs by sufficient economy ways, to know the constrains that affects this sector and design fit arrangement shape to sustain their business with Samut Songkram style. What will happen if they do not use this approach? Will they have a monetary crisis? The data and information are collected by informal discussions with 8 managers and 400 questionnaires. A mixed methods of both qualitative research and quantitative research are used and Bent Flyvbjerg’s phronesis is utilized for this analysis. Our paper will prove that sufficient economy can help small business firms to solve their problems. We think that the results of our research will be a financial pattern to solve many problems of the entrepreneurs and this way will can be a super model for other provinces of Thailand.Keywords: Samut Songkram, service sector, sufficient economy, management pattern
Procedia PDF Downloads 3677089 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management
Authors: Jiří Barta
Abstract:
The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances
Procedia PDF Downloads 3037088 A Paradigm Shift in Energy Policy and Use: Exergy and Hybrid Renewable Energy Technologies
Authors: Adavbiele Airewe Stephen
Abstract:
Sustainable energy use is exploiting energy resources within acceptable levels of global resource depletion without destroying the ecological balance of an area. In the context of sustainability, the rush to quell the energy crisis of the fossil fuels of the 1970's by embarking on nuclear energy technology has now been seen as a disaster. In the circumstance, action (policy) suggested in this study to avoid future occurrence is exergy maximization/entropy generation minimization and the use is renewable energy technologies that are hybrid based. Thirty-two (32) selected hybrid renewable energy technologies were assessed with respect to their energetic efficiencies and entropy generation. The results indicated that determining which of the hybrid technologies is the most efficient process and sustainable is a matter of defining efficiency and knowing which of them possesses the minimum entropy generation.Keywords: entropy, exergy, hybrid renewable energy technologies, sustainability
Procedia PDF Downloads 4487087 National Agency for Control of HIV/AIDS and International Response to its Scourge in Nigeria, 2000-2010
Authors: Ugwu Blessing Nkiruka
Abstract:
This paper seeks to examine Nigerian National Agency for the control of AIDS (NACA) and international response to the control of HIV/AIDS in Nigeria. The paper adopted the Functionalist theory alongside Liberalism and Idealism, but anchored extensively on functionalism. On the response of HIV/AIDS, Functionalist theory advocated for international corporation of both intergovernmental and non-governmental organisations as the basis for the reduction of the virus. the study adopted secondary source of data i.e journals, articles, newspapers and policy briefs to discuss the reduction of the pandemic (HIV/AIDS).This paper discovered that although HIV/AIDS is a global threat, especially to developing countries where the prevalence rate is still very high, yet international governmental and non-governmental organisation have been able to collaborate with National agencies like NACA in Nigeria and respond speedily through diverse initiatives and action plans to curb the spread of the virus. The study therefore recommends greater awareness on testing and early introduction of antiretroviral therapy, proper screening of blood before transfusion, absolute faithfulness among partners. Similarly, sharing of sharp objects like needles, knives and syringes should be avoided at all cost.Keywords: HIV/AIDS, developing countries, Nigeria, international organizations, NACA
Procedia PDF Downloads 1937086 A Critical Review and Bibliometric Analysis on Measures of Achievement Motivation
Authors: Kanupriya Rawat, Aleksandra Błachnio, Paweł Izdebski
Abstract:
Achievement motivation, which drives a person to strive for success, is an important construct in sports psychology. This systematic review aims to analyze the methods of measuring achievement motivation used in previous studies published over the past four decades and to find out which method of measuring achievement motivation is the most prevalent and the most effective by thoroughly examining measures of achievement motivation used in each study and by evaluating most highly cited achievement motivation measures in sport. In order to understand this latent construct, thorough measurement is necessary, hence a critical evaluation of measurement tools is required. The literature search was conducted in the following databases: EBSCO, MEDLINE, APA PsychARTICLES, Academic Search Ultimate, Open Dissertations, ERIC, Science direct, Web of Science, as well as Wiley Online Library. A total of 26 articles met the inclusion criteria and were selected. From this review, it was found that the Achievement Goal Questionnaire- Sport (AGQ-Sport) and the Task and Ego Orientation in Sport Questionnaire (TEOSQ) were used in most of the research, however, the average weighted impact factor of the Achievement Goal Questionnaire- Sport (AGQ-Sport) is the second highest and most relevant in terms of research articles related to the sport psychology discipline. Task and Ego Orientation in Sport Questionnaire (TEOSQ) is highly popular in cross-cultural adaptation but has the second last average IF among other scales due to the less impact factor of most of the publishing journals. All measures of achievement motivation have Cronbach’s alpha value of more than .70, which is acceptable. The advantages and limitations of each measurement tool are discussed, and the distinction between using implicit and explicit measures of achievement motivation is explained. Overall, both implicit and explicit measures of achievement motivation have different conceptualizations of achievement motivation and are applicable at either the contextual or situational level. The conceptualization and degree of applicability are perhaps the most crucial factors for researchers choosing a questionnaire, even though they differ in their development, reliability, and use.Keywords: achievement motivation, task and ego orientation, sports psychology, measures of achievement motivation
Procedia PDF Downloads 1007085 Optimizing the Passenger Throughput at an Airport Security Checkpoint
Authors: Kun Li, Yuzheng Liu, Xiuqi Fan
Abstract:
High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.Keywords: queue theory, security check, stochatic process, Monte Carlo simulation
Procedia PDF Downloads 2027084 Are Values Reflected in Online Skincare Advertisements from the Philippines and Taiwan the Same?
Authors: Chih-Ping Chen
Abstract:
In recent years, some scholars established the reflection of cultural values in advertisements. However, despite the Internet’s rapid development, few studies have focused on observing cross-cultural differences of values reflected in online advertisements. As mirrors of culture, advertisements are believed to reflect values relevant to consumers. Therefore, this research aims to examine the cultural values reflected on online skincare advertisements between countries with different cultural influences. We argue that culture affects the values presented in the slogans, endorsers, brand prominence, and product prominence of online advertisements; a concept that challenges the standardized manner of communication utilized by most multinational brands. Results highlight that the Philippines and Taiwan are neither located on extreme low-context nor extreme high-context cultures. Moreover, although advertisements reflect culture, it may be affected by potential value shifting caused by globalization, standardized communication, and the advertisers’ marketing priorities.Keywords: cross-culture, cultural values, online advertising, prominence, beauty
Procedia PDF Downloads 4767083 Self-Education, Recognition and Well-Being Insights into Qualitative-Reconstructive Educational Research on the Value of Non-formal Education in the Adolescence
Authors: Sandra Biewers Grimm
Abstract:
International studies such as Pisa have shown an increasing social inequality in the education system, which is determined in particular by social origin and migration status. This is especially the case in the Luxembourg school system, which creates challenges for many young people due to the multilingualism in the country. While the international and also the national debate on education in the immediate aftermath of the publications of the Pisa results mainly focused on the further development of school-based learning venues and formal educational processes, it initially remained largely unclear what role exactly out-of-school learning venues and non-formal and informal learning processes could play in this further development. This has changed in the meantime. Both in the political discourses and in the scientific disciplines, those voices have become louder that draw attention to the important educational function and the enormous educational potential of out-of-school learning places as a response to the crisis of the formal education system and more than this. Youth work as an actor and approach of non-formal education is particularly in demand here. Due to its principles of self-education, participation and openness, it is considered to have a special potential in supporting the acquisition of important key competencies. In this context, the study "Educational experiences in non-formal settings" at CCY takes a differentiated look behind the scenes of education-oriented youth work and describes on the basis of empirical data what and how young people learn in youth centers and which significance they attach to these educational experiences for their subjective life situation. In this sense, the aim of the study is to reconstruct the subjective educational experiences of young people in Open Youth Work as well as to explore the value that these experiences have for young people. In doing so, it enables scientifically founded conclusions about the educational potential of youth work from the user's perspective. Initially, the study focuses on defining the concept of education in the context of non-formal education and thus sets a theoretical framework for the empirical analysis. This socio-educational term of education differs from the relevant conception of education in curricular, formal education as the acquisition of knowledge. It also differs from the operationalization of education as competence, or the differentiation into cultural, social and personal or into factual, social or methodological competence, which is often used in the European context and which has long been interpreted as a "social science reading of the question of education" (XX). Now the aim is to define a "broader" concept of education that goes beyond the normative and educational policy dimensions of a "non-formal education" and includes the classical socio-educational dimensions. Furthermore, the study works with different methods of empirical social research: In addition to ethnographic observation and an online survey, group discussions were conducted with the young people. The presentation gives an insight into the context, the methodology and the results of this study.Keywords: non-formal education, youth research, qualitative research, educational theory
Procedia PDF Downloads 1677082 Managerial Risk-Taking: Evidences from the Tourism Industry
Authors: Min-Ming Wen
Abstract:
Applying the U.S. lodging and tourism industry as a research sample, we examine the relation between the corporate governance structure and managerial risk-taking behavior. In light of the global financial crisis, the importance of effective governance structures is essential in protecting claimholder interests. We propose a governance structure consisting of shareholder governance measured by anti-takeover provisions to examine whether the governance structure has a significant impact on managerial risk-taking behaviors in terms of the investment policy. We will use capital expenditure and R&D investment to measure managerial risk-taking and the firm’s investment policy. In addition, we will examine whether the effects of governance on investment policy differ significantly between speculative and investment-grade firms.Keywords: corporate governance, risk-taking, firm value, lodging industry
Procedia PDF Downloads 6217081 Challenging Heteronormativity and Mononormativity in Academia: Incorporating Consensual Non-Monogamy into Psychological Romantic Relationship Research
Authors: Jessica Wood, Serge Desmarais
Abstract:
There has been recent resurgence in the popular and academic interest of consensual non-monogamous (CNM) relationships- an umbrella term that defines relationships in which each partner has openly agreed to engage in additional romantic and/or sexual relationships outside of their primary partnership. Despite an increase in the academic study of CNM, little psychological attention has been paid to the study of CNM, with the consideration of these relationships commonly occurring within related social science disciplines such as sociology or anthropology. As a discipline, psychology has a history of conducting research in the area of intimate relationships, and psychologists have amassed a wealth of theoretical knowledge in this field. However, historically individuals who engage in "alternative" sexual and romantic behaviours, such as non-heterosexual sex or sex with multiple partners have been pathologized within psychological research. Individuals in CNM relationships or individuals identifying as lesbian, gay, bisexual, trans or queer have often been excluded from research or “othered” in psychological interpretations of what healthy relationships entail. Thus, our current theoretical understandings of romantic relationships are limited to heterosexual, monogamous relationships. The goal of this presentation is to examine commonly cited components of relationship satisfaction (e.g., commitment, communication) and to critically assess how CNM experiences are presented in, or missing from, the psychological literature on romantic relationships. Additionally, the presentation will also consider how CNM relationships may add to our understanding or enhancement of traditional psychological theories and address issues related to heteronormativity and mononormativity within the discipline. Finally, we will close with a consideration of additional theoretical perspectives that may aid in our understanding of CNM relationships and suggest directions for future research.Keywords: heteronormativity, mononormativity, psychological research, diverse relationships, gender, sexuality, feminism, queer theory
Procedia PDF Downloads 3857080 Speed-Up Data Transmission by Using Bluetooth Module on Gas Sensor Node of Arduino Board
Authors: Hiesik Kim, YongBeum Kim
Abstract:
Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to speed up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group(SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as Open source hardware, Gas sensor, and Bluetooth Module and algorithm controlling transmission speed is demonstrated. Experiment controlling transmission speed also is progressed by developing Android Application receiving measured data, and controlling this speed is available at the experiment result. it is important that in the future, improvement for communication algorithm be needed because few error occurs when data is transferred or received.Keywords: Arduino, Bluetooth, gas sensor, internet of things, transmission Speed
Procedia PDF Downloads 4857079 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection
Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor
Abstract:
Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing
Procedia PDF Downloads 2097078 A Multivariate 4/2 Stochastic Covariance Model: Properties and Applications to Portfolio Decisions
Authors: Yuyang Cheng, Marcos Escobar-Anel
Abstract:
This paper introduces a multivariate 4/2 stochastic covariance process generalizing the one-dimensional counterparts presented in Grasselli (2017). Our construction permits stochastic correlation not only among stocks but also among volatilities, also known as co-volatility movements, both driven by more convenient 4/2 stochastic structures. The parametrization is flexible enough to separate these types of correlation, permitting their individual study. Conditions for proper changes of measure and closed-form characteristic functions under risk-neutral and historical measures are provided, allowing for applications of the model to risk management and derivative pricing. We apply the model to an expected utility theory problem in incomplete markets. Our analysis leads to closed-form solutions for the optimal allocation and value function. Conditions are provided for well-defined solutions together with a verification theorem. Our numerical analysis highlights and separates the impact of key statistics on equity portfolio decisions, in particular, volatility, correlation, and co-volatility movements, with the latter being the least important in an incomplete market.Keywords: stochastic covariance process, 4/2 stochastic volatility model, stochastic co-volatility movements, characteristic function, expected utility theory, verication theorem
Procedia PDF Downloads 1597077 A Discourse Analysis of Syrian Refugee Representations in Canadian News Media
Authors: Pamela Aimee Rigor
Abstract:
This study aims to examine the representation of Syrian refugees resettled in Vancouver and the Lower Mainland in local community and major newspapers. While there is strong support for immigration in Canada, public opinion towards refugees and asylum seekers is a bit more varied. Concerns about the legitimacy of refugee claims are among the common concerns of Canadians, and hateful or negative narratives are still present in Canadian media discourse which affects how people view refugees. To counter the narratives, these Syrian refugees must publicly declare how grateful they are because they are resettled in Canada. The dominant media discourse is that these refugees should be grateful as they have been graciously accepted by Canada and Canadians, once again upholding the image of Canada being a generous and humanitarian nation. The study examined the representation of Syrian refugees and the Syrian refugee resettlement in Canadian newspapers from September 2015 to October 2017 – around the time Prime Minister Trudeau came into power up until the present. Using a combination of content and discourse analysis, it aimed to uncover how local community and major newspapers in Vancouver covered the Syrian refugee ‘crisis’ – more particularly, the arrival and resettlement of the refugees in the country. Using the qualitative data analysis software Nvivo 12, the newspapers were analyzed and sorted into themes. Based on the initial findings, the discourse of Canada being a humanitarian country and Canadians being generous, as well as the idea of Syrian refugees having to publicly announce how grateful they are, is still present in the local community newspapers. This seems to be done to counter the hateful narratives of citizens who might view them as people who are abusing help provided by the community or the services provided by the government. However, compared to the major and national newspapers in Canada, many these local community newspapers are very inclusive of Syrian refugee voices. Most of the News and Community articles interview Syrian refugees and ask them their personal stories of plight, survival, resettlement and starting a ‘new life’ in Canada. They are not seen as potential threats nor are they dismissed – the refugees were named and were allowed to share their personal experiences in these news articles. These community newspapers, even though their representations are far from perfect, actually address some aspects of the refugee resettlement issue and respond to their community’s needs. There are quite a number of news articles that announce community meetings and orientations about the Syrian refugee crisis, ways to help in the resettlement process, as well as community fundraising activities to help sponsor refugees or resettle newly arrived refugees. This study aims to promote awareness of how these individuals are socially constructed so we can, in turn, be aware of the certain biases and stereotypes present, and its implications on refugee laws and public response to the issue.Keywords: forced migration and conflict, media representations, race and multiculturalism, refugee studies
Procedia PDF Downloads 2557076 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 957075 Explanation of the Electron Transfer Mechanism from β-Carotene to N-Pentyl Peroxyl Radical by Density Functional Theory Method
Authors: E. Esra Kasapbaşı, Büşra Yıldırım
Abstract:
Weak oxidizing radicals, such as alkyl peroxyl derivatives, react with carotenoids through hydrogen atom transfer to form neutral carotenoid radicals. Using the DFT method, it has been observed that s-cis-β-carotene is more stable than all-transforms. In the context of this study, an attempt is made to explain the reaction mechanism of the isomers of β-carotene, which exhibits antioxidant properties, with n-pentyl peroxide, one of the alkyl peroxyl molecules, using the Density Functional Theory (DFT) method. The cis and transforms of β-carotene are used in the study to determine which form is more reactive. For this purpose, Natural Bond Orbital (NBO) charges of all optimized structures are calculated, and electron transfer is determined by examining electron transitions between Highest Occupied Molecular Orbital (HOMO) and Lowest Unoccupied Molecular Orbital (LUMO). Additionally, the radical character and reaction mechanism of β-carotene in a radical environment are attempted to be explained based on the calculations. The theoretical inclination of whether β-carotene in cis or transforms is more active in reaction is also discussed. All these calculations are performed in the gas phase using the Integral Equation Formalism Polarizable Continuum Model IEFPCM method with dichloromethane as the solvent.Keywords: β-carotene, n-pentyl peroxyl radical, DFT, TD-DFT
Procedia PDF Downloads 827074 The Smart Record and Replay Mechanism for Android
Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu, Hsiao-Han Huang
Abstract:
The number of Android applications (Apps) has increased rapidly in recent years. In order to get better programmatic control over Apps, we designed a record-and-replay mechanism to record Android input events and accessibility service events then make shortcuts. The shortcut is useful for complicated routine works and to Android beginners. We also generated graphical user interface (GUI) API by these shortcuts. GUI API helps developers make integrated Apps which can control other third-party Apps even if the official API is not offered by their providers. We demonstrated the usage of GUI API with two integrated Apps: Universal Bank App and Universal Communication App. Universal Bank App integrates three accounts from different banks and Universal Communication App integrates Line with WhatsApp. Both of them show the advantage of extendable GUI API. Furthermore, using our mechanism, shortcuts could replay almost all of the Top-100 Apps on Google Play correctly. In sum, the approach we present can help both Android developers and general users.Keywords: graphical user interface, GUI API, record-and-replay, third-party apps
Procedia PDF Downloads 4107073 Nigcomsat-1r and Planned HTS Communication Satellite Critical Pillars for Nigeria’s National Digital Economy Policy and Strategy
Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Moshood Kareem, Samson Olufunmilayo Abodunrin, Muhammad Dokko Zubairu
Abstract:
The National Digital Economy Policy and Strategy, NDEPS document developed by Nigeria’s Federal Ministry of Communications & Digital Economy (FMoCDE) is anchored on 8 pillars for the acceleration of the National Digital Economy for a Digital Nigeria. NIGCOMSAT-1R and the planned HTS communication Satellite are critical assets for supporting the pillars in the drive for sustainable growth and development. This paper discusses on the gains and contribution of the strategy as a solid infrastructure. The paper also highlights these assets’ contribution as platform for Indigenous Content Development & Adoption, Digital Literacy & Skills, and Digital Services Development & Promotion.Keywords: FMoCDE, HTS, NDEPS, nigcomsat!R, pillars
Procedia PDF Downloads 1197072 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy
Authors: Abdullah Al Mamun, Talal Alkharobi
Abstract:
As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.Keywords: big data, cloud computing, cryptography, hadoop, public key
Procedia PDF Downloads 3247071 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3067070 The Re-Emergence of Russia Foreign Policy (Case Study: Middle East)
Authors: Maryam Azish
Abstract:
Russia, as an emerging global player in recent years, has projected a special place in the Middle East. Despite all the challenges it has faced over the years, it has always considered its presence in various fields with a strategy that has defined its maneuvering power as a level of competition and even confrontation with the United States. Therefore, its current approach is considered important as an influential actor in the Middle East. After the collapse of the Soviet Union, when the Russians withdrew completely from the Middle East, the American scene remained almost unrivaled by the Americans. With the start of the US-led war in Iraq and Afghanistan and the subsequent developments that led to the US military and political defeat, a new chapter in regional security was created in which ISIL and Taliban terrorism went along with the Arab Spring to destabilize the Middle East. Because of this, the Americans took every opportunity to strengthen their military presence. Iraq, Syria and Afghanistan have always been the three areas where terrorism was shaped, and the countries of the region have each reacted to this evil phenomenon accordingly. The West dealt with this phenomenon on a case-by-case basis in the general circumstances that created the fluid situation in the Arab countries and the region. Russian President Vladimir Putin accused the US of falling asleep in the face of ISIS and terrorism in Syria. In fact, this was an opportunity for the Russians to revive their presence in Syria. This article suggests that utilizing the recognition policy along with the constructivism theory will offer a better knowledge of Russia’s endeavors to endorse its international position. Accordingly, Russia’s distinctiveness and its ambitions for a situation of great power have played a vital role in shaping national interests and, subsequently, in foreign policy, in Putin's era in particular. The focal claim of the paper is that scrutinize Russia’s foreign policy with realistic methods cannot be attained. Consequently, with an aim to fill the prevailing vacuum, this study exploits the politics of acknowledgment in the context of constructivism to examine Russia’s foreign policy in the Middle East. The results of this paper show that the key aim of Russian foreign policy discourse, accompanied by increasing power and wealth, is to recognize and reinstate the position of great power in the universal system. The Syrian crisis has created an opportunity for Russia to unite its position in the developing global and regional order after ages of dynamic and prevalent existence in the Middle East as well as contradicting US unilateralism. In the meantime, the writer thinks that the question of identifying Russia’s position in the global system by the West has played a foremost role in serving its national interests.Keywords: constructivism, foreign Policy, middle East, Russia, regionalism
Procedia PDF Downloads 155