Search results for: compromise
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 224

Search results for: compromise

194 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 658
193 How Information Sharing Can Improve Organizational Performance?

Authors: Syed Abdul Rehman Khan

Abstract:

In today’s world, information sharing plays a vital role in successful operations of supply chain; and boost to the profitability of the organizations (end-to-end supply chains). Many researches have been completed over the role of information sharing in supply chain. In this research article, we will investigate the ‘how information sharing can boost profitability & productivity of the organization; for this purpose, we have developed one conceptual model and check to that model through collected data from companies. We sent questionnaire to 369 companies; and will filled form received from 172 firms and the response rate was almost 47%. For the data analysis, we have used Regression in (SPSS software) In the research findings, our all hypothesis has been accepted significantly and due to the information sharing between suppliers and manufacturers ‘quality of material and timely delivery’ increase and also ‘collaboration & trust’ will become more stronger and these all factors will lead to the company’s profitability directly and in-directly. But unfortunately, companies could not avail the all fruitful benefits of information sharing due to the fear of ‘compromise confidentiality or leakage of information’.

Keywords: collaboration, information sharing, risk factor, timely delivery

Procedia PDF Downloads 384
192 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 354
191 Removal of an Acid Dye from Water Using Cloud Point Extraction and Investigation of Surfactant Regeneration by pH Control

Authors: Ghouas Halima, Haddou Boumedienne, Jean Peal Cancelier, Cristophe Gourdon, Ssaka Collines

Abstract:

This work concerns the coacervate extraction of industrial dye, namely BezanylGreen - F2B, from an aqueous solution by nonionic surfactant “Lutensol AO7 and TX-114” (readily biodegradable). Binary water/surfactant and pseudo-binary (in the presence of solute) phase diagrams were plotted. The extraction results as a function of wt.% of the surfactant and temperature are expressed by the following four quantities: percentage of solute extracted, E%, residual concentrations of solute and surfactant in the dilute phase (Xs,w, and Xt,w, respectively) and volume fraction of coacervate at equilibrium (Фc). For each parameter, whose values are determined by a design of experiments, these results are subjected to empirical smoothing in three dimensions. The aim of this study is to find out the best compromise between E% and Фc. E% increases with surfactant concentration and temperature in optimal conditions, and the extraction extent of TA reaches 98 and 96 % using TX-114 and Lutensol AO7, respectively. The effect of sodium sulfate or cetyltrimethylammonium bromide (CTAB) addition is also studied. Finally, the possibility of recycling the surfactant is proved.

Keywords: extraction, cloud point, non ionic surfactant, bezanyl green

Procedia PDF Downloads 94
190 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 224
189 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability

Authors: Mahsa Pishdar

Abstract:

Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.

Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos

Procedia PDF Downloads 159
188 Wind Comfort and Safety of People in the Vicinity of Tall Buildings

Authors: Mohan Kotamrazu

Abstract:

Tall buildings block and divert strong upper level winds to the ground. These high velocity winds many a time create adverse wind effects at ground level which can be uncomfortable and even compromise the safety of pedestrians and people who frequent the spaces in the vicinity of tall buildings. Discomfort can be experienced around the entrances and corners of tall buildings. Activities such as strolling or sitting in a park, waiting for a bus near a tall building can become highly unpleasant. For the elderly unpleasant conditions can also become dangerous leading to accidents and injuries. Today there is a growing concern among architects, planners and urban designers about the wind environment in the vicinity of tall building. Regulating authorities insist on wind tunnel testing of tall buildings in cities such as Wellington, Auckland, Boston, San Francisco, etc. prior to granting permission for their construction The present paper examines the different ways that tall buildings can induce strong winds at pedestrian level and their impact on people who frequent the spaces around tall buildings.

Keywords: tall buildings, wind effects, wind comfort, wind safety

Procedia PDF Downloads 344
187 Authority and Function of Administrative Organs According to the Constitution: A Construction of Democracy in the Administrative Law of Indonesia

Authors: Andhika Danesjvara, Nur Widyastanti

Abstract:

The constitution regulates the forms, types, and powers of sState organs in a government. The powers of the organs are then regulated in more detail in the legislation. One of these organs is a government organ, headed by a president or by another name that serves as the main organizer of government. The laws and regulations will govern how the organs of government shall exercise their authority and functions. In a modern state, the function of enacting laws or called executive power does not exercise the functions of government alone, but there are other organs that help the government run the country. These organs are often called government agencies, government accelerating bodies, independent regulatory bodies, commissions, councils or other similar names. The legislation also limits the power of officials within the organs to keep from abusing its authority. The main question in this paper is whether organs are the implementation of a democratic country, or as a form of compromise with the power of stakeholders. It becomes important to see how the administrative organs perform their functions. The administrative organs that are bound by government procedures work in the public service; therefore the next question is how far the function of public service is appropriate and not contradictory to the constitution.

Keywords: administrative organs, constitution, democracy, government

Procedia PDF Downloads 258
186 Optimizing Exposure Parameters in Digital Mammography: A Study in Morocco

Authors: Talbi Mohammed, Oustous Aziz, Ben Messaoud Mounir, Sebihi Rajaa, Khalis Mohammed

Abstract:

Background: Breast cancer is the leading cause of death for women around the world. Screening mammography is the reference examination, due to its sensitivity for detecting small lesions and micro-calcifications. Therefore, it is essential to ensure quality mammographic examinations with the most optimal dose. These conditions depend on the choice of exposure parameters. Clinically, practices must be evaluated in order to determine the most appropriate exposure parameters. Material and Methods: We performed our measurements on a mobile mammography unit (PLANMED Sofie-classic.) in Morocco. A solid dosimeter (AGMS Radcal) and a MTM 100 phantom allow to quantify the delivered dose and the image quality. For image quality assessment, scores are defined by the rate of visible inserts (MTM 100 phantom), obtained and compared for each acquisition. Results: The results show that the parameters of the mammography unit on which we have made our measurements can be improved in order to offer a better compromise between image quality and breast dose. The last one can be reduced up from 13.27% to 22.16%, while preserving comparable image quality.

Keywords: Mammography, Breast Dose, Image Quality, Phantom

Procedia PDF Downloads 139
185 When Sexual Desire Fades: Women Talk about Changes in Desire within Long Term Heterosexual Relationships

Authors: Avigail Moor

Abstract:

A decline in women’s sexual desire over the course of long-term relationships, relative to men’s, has been frequently noted. Yet, while there is ample evidence that this change in women is quite common, it is still generally pathologized. Moreover, little is known regarding its true meaning for women and the effect it has on their wellbeing. In light of that, our primary goal was to investigate women's subjective experiences of this reality. Do they connect it to dysfunction in self or marriage, or rather they don't equate love and sex, which for them simply become less connected with time, even as the relationship remains entirely fulfilling? A second goal was to explore how such gender-based differences in sexual desire impact women, and indirectly the couple and partner, in terms of wellbeing and satisfaction from the relationship. In-depth semi-structured interviews were conducted with 15 women in committed long-term relations, aged 25 and over. The findings indicate that for women, there is no contradiction between a loving relation and a decline in spontaneous sexual desire. At the same time, while not rooted in a problem, it does create some. Tension, frustration, conflict, and pressure are some of the negative sequelae that carry adverse effects for women’s wellbeing, the solution to which requires, in their opinion, honest dialogue, mutual respect, and reasonable compromise.

Keywords: gender, sexuality, sexual desire, well being

Procedia PDF Downloads 105
184 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 276
183 Active-Material Variation Analysis of a Lithium-Ion Battery

Authors: Muhammad Husnat Khalid, Stephan Bihn, Dirk Uwe Sauer, Nisai Fuengwarodsakul

Abstract:

To combat the effects of climate change, lithium-ion batteries are getting a lot of attention for energy storage. However, due to its diverse range of applications extending from small electronics equipment to energy storage systems, its output requirements, as well as limitations, vary significantly. Many efforts are underway to increase the power and energy output of the cells without any significant compromise on their size and weight. In this paper, different active materials are explored for an existing cell Kokam that initially has graphite as anode and NCO as cathode material. The Pareto front optimization tool is then utilized to pick a cell that gives the optimum results in terms of energy, power, or both. The parameter variation of the cells is done in the MATLAB application ISEA Cell and Pack Database (ICPD) created by the Institute of Power Electronics and Electrical Drives (ISEA) RWTH Aachen, University that creates the physical-chemical model of the existing cells.

Keywords: battery storage system, lithium-ion battery, active material variation, cell design optimization

Procedia PDF Downloads 66
182 Imputation of Urban Movement Patterns Using Big Data

Authors: Eusebio Odiari, Mark Birkin, Susan Grant-Muller, Nicolas Malleson

Abstract:

Big data typically refers to consumer datasets revealing some detailed heterogeneity in human behavior, which if harnessed appropriately, could potentially revolutionize our understanding of the collective phenomena of the physical world. Inadvertent missing values skew these datasets and compromise the validity of the thesis. Here we discuss a conceptually consistent strategy for identifying other relevant datasets to combine with available big data, to plug the gaps and to create a rich requisite comprehensive dataset for subsequent analysis. Specifically, emphasis is on how these methodologies can for the first time enable the construction of more detailed pictures of passenger demand and drivers of mobility on the railways. These methodologies can predict the influence of changes within the network (like a change in time-table or impact of a new station), explain local phenomena outside the network (like rail-heading) and the other impacts of urban morphology. Our analysis also reveals that our new imputation data model provides for more equitable revenue sharing amongst network operators who manage different parts of the integrated UK railways.

Keywords: big-data, micro-simulation, mobility, ticketing-data, commuters, transport, synthetic, population

Procedia PDF Downloads 194
181 Multi-Objective Production Planning Problem: A Case Study of Certain and Uncertain Environment

Authors: Ahteshamul Haq, Srikant Gupta, Murshid Kamal, Irfan Ali

Abstract:

This case study designs and builds a multi-objective production planning model for a hardware firm with certain & uncertain data. During the time of interaction with the manager of the firm, they indicate some of the parameters may be vague. This vagueness in the formulated model is handled by the concept of fuzzy set theory. Triangular & Trapezoidal fuzzy numbers are used to represent the uncertainty in the collected data. The fuzzy nature is de-fuzzified into the crisp form using well-known defuzzification method via graded mean integration representation method. The proposed model attempts to maximize the production of the firm, profit related to the manufactured items & minimize the carrying inventory costs in both certain & uncertain environment. The recommended optimal plan is determined via fuzzy programming approach, and the formulated models are solved by using optimizing software LINGO 16.0 for getting the optimal production plan. The proposed model yields an efficient compromise solution with the overall satisfaction of decision maker.

Keywords: production planning problem, multi-objective optimization, fuzzy programming, fuzzy sets

Procedia PDF Downloads 180
180 Conflict of the Thai-Malaysian Gas Pipeline Project

Authors: Nopadol Burananuth

Abstract:

This research was aimed to investigate (1) the relationship among local social movements, non-governmental Organization activities and state measures deployment; and (2) the effects of local social movements, non-governmental Organization activities, and state measures deployment on conflict of local people towards the Thai-Malaysian gas pipeline project. These people included 1,000 residents of the four districts in Songkhla province. The methods of data analysis consist of multiple regression analysis. The results of the analysis showed that: (1) local social movements depended on information, and mass communication; deployment of state measures depended on compromise, coordination, and mass communication; and (2) the conflict of local people depended on mobilization, negotiation, and campaigning for participation of people in the project. Thus, it is recommended that to successfully implement any government policy, consideration must be paid to the conflict of local people, mobilization, negotiation, and campaigning for people’s participation in the project.

Keywords: conflict, NGO activities, social movements, state measures

Procedia PDF Downloads 296
179 Survival of Islamic Banking Services in Tanzania: A Quick Survey on Conflicting Legal Framework

Authors: Ayoub Ali Maulana

Abstract:

“The success and sustainability of an Islamic finance system depends on the ability to establish a comprehensive legal and regulatory framework that supports synergy amongst the components in the system”. Numbers of banks have introduced Islamic banking windows claiming that their products follow Islamic banking values without any compromise. National Bank of Commerce Limited, Stanbic Bank Limited, Kenya Commercial Bank, The Peoples Bank of Zanzibar and Amana Bank Limited are some of the banks which offer Islamic banking products in Tanzania. To date, there is no single provision in Tanzanian laws that speak of Islamic banking activities in the country. Despite the fact that consultancy commissioned to International Monetary Fund (IMF) to research on the best laws to govern Islamic banking industry in the country, the speed is not encouraging in making sure that the same is introduced as soon as possible. This paper highlights the trend of the banking services in Tanzania and examines the application of Islamic banking system in the Tanzanian conventional banking environment. In particular the paper considers whether the Islamic banking services in Tanzania can survive without an appropriate legal framework that accommodates it.

Keywords: islamic banks, interest, islamic windows, Tanzania

Procedia PDF Downloads 322
178 Sustainable Reinforcement: Investigating the Mechanical Properties of Concrete with Recycled Aggregates and Sisal Fibers

Authors: Salahaldein Alsadey, Issa Amaish

Abstract:

Recycled aggregates (RA) have the potential to compromise concrete performance, contributing to issues such as reduced strength and increased susceptibility to cracking. This study investigates the impact of sisal fiber (SF) on the mechanical properties of concrete, with the objective of utilizing sisal fibers as a reinforcing element in concrete compositions containing natural aggregate and varying percentages (25%, 50%, and 75%) of coarse recycled aggregate replacement. The investigation aims to discern the positive and negative effects on compressive and flexural strength, thereby assessing the viability of sisal fiber-reinforced recycled concrete in comparison to conventional concrete composed of natural aggregate without sisal fiber. Test results revealed that concrete samples incorporating sisal fiber exhibited elevated compressive and flexural strength. Comparative analysis of these strength values was conducted with reference to samples devoid of sisal fiber.

Keywords: sustainable construction, construction materials, recycled aggregate, sisal fibers, compressive strength, flexural strength, eco-friendly concrete, natural fiber composites, recycled materials, construction waste management

Procedia PDF Downloads 38
177 Quality Management in Construction Project

Authors: Harsh Panchal, Saurabh Amrutkar

Abstract:

Quality management is an essential part of any project that has directly related to the performance of a project. Quality management is depended on multiple factors at different stages in a project, right from time management to construction logistics. A project is a mixture of various components that include iternary management, health and safety, crew productivity, and many more. From the survey conducted, we came to the conclusion that advancement in technology and indigenous approach to any project will result in maximum quality standards and better project performance. In this paper, we discuss various components of the factors above that lead to compromise the quality of a project and how it can be controlled in order to achieve maximum quality assurance using quality planning and total quality management. The paper also focuses on limitations and problems faced in each factor responsible for quality management and to tackle them using techniques and processes based on activities and identifying the sequence, approaching critical path, and duration. The project management concept that deals with the sequence of scope cost time give us an overview regarding the ongoing quality management, in a nutshell, giving us hints to regulate the current procedure for maximum achievable quality. It also deals with the problems faced by engineers that make the mundane work process slow, reducing the quality outcome drastically.

Keywords: management, performance, project, quality

Procedia PDF Downloads 126
176 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 156
175 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India

Authors: Sri Mahan Borah

Abstract:

The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.

Keywords: migration, displacement, North-East, India

Procedia PDF Downloads 372
174 Multi-Objective Multi-Mode Resource-Constrained Project Scheduling Problem by Preemptive Fuzzy Goal Programming

Authors: Busaba Phurksaphanrat

Abstract:

This research proposes a pre-emptive fuzzy goal programming model for multi-objective multi-mode resource constrained project scheduling problem. The objectives of the problem are minimization of the total time and the total cost of the project. Objective in a multi-mode resource-constrained project scheduling problem is often a minimization of make-span. However, both time and cost should be considered at the same time with different level of important priorities. Moreover, all elements of cost functions in a project are not included in the conventional cost objective function. Incomplete total project cost causes an error in finding the project scheduling time. In this research, pre-emptive fuzzy goal programming is presented to solve the multi-objective multi-mode resource constrained project scheduling problem. It can find the compromise solution of the problem. Moreover, it is also flexible in adjusting to find a variety of alternative solutions.

Keywords: multi-mode resource constrained project scheduling problem, fuzzy set, goal programming, pre-emptive fuzzy goal programming

Procedia PDF Downloads 404
173 A Model for Solid Transportation Problem with Three Hierarchical Objectives under Uncertain Environment

Authors: Wajahat Ali, Shakeel Javaid

Abstract:

In this study, we have developed a mathematical programming model for a solid transportation problem with three objective functions arranged in hierarchical order. The mathematical programming models with more than one objective function to be solved in hierarchical order is termed as a multi-level programming model. Our study explores a Multi-Level Solid Transportation Problem with Uncertain Parameters (MLSTPWU). The proposed MLSTPWU model consists of three objective functions, viz. minimization of transportation cost, minimization of total transportation time, and minimization of deterioration during transportation. These three objective functions are supposed to be solved by decision-makers at three consecutive levels. Three constraint functions are added to the model, restricting the total availability, total demand, and capacity of modes of transportation. All the parameters involved in the model are assumed to be uncertain in nature. A solution method based on fuzzy logic is also discussed to obtain the compromise solution for the proposed model. Further, a simulated numerical example is discussed to establish the efficiency and applicability of the proposed model.

Keywords: solid transportation problem, multi-level programming, uncertain variable, uncertain environment

Procedia PDF Downloads 57
172 Common Sense Leadership in the Example of Turkish Political Leader Devlet Bahçeli

Authors: B. Gültekin, T. Gültekin

Abstract:

Peace diplomacy is the most important international tool to maintain peace all over the World. This study consists of three parts. In the first part, the leadership of Devlet Bahçeli, leader of the Nationalist Movement Party, will be introduced as a tool of peace communication and peace management. Also, in this part, peace communication will be explained by the peace leadership traits of Devlet Bahçeli, who is one of the efficient political leaders representing the concepts of compromise and agreement on different sides of politics. In the second part of study, it is aimed to analyze Devlet Bahçeli’s leadership within the frame of peace communication and the final part of this study is about creating an original public communication model for public diplomacy based on Devlet Bahçeli as an example. As a result, the main purpose of this study is to develop an original peace communication model including peace modules, peace management projects, original dialogue procedures and protocols exhibited in the policies of Devlet Bahçeli. The political leadership represented by Devlet Bahçeli inspires political leaders to provide peace communication. In this study, principles and policies of peace leadership of Devlet Bahçeli will be explained as an original model on a peace communication platform.

Keywords: public diplomacy, dialogue management, peace leadership, peace diplomacy

Procedia PDF Downloads 132
171 Investigating the Behavior of Water Shortage Indices for Performance Evaluation of a Water Resources System

Authors: Frederick N. F. Chou, Nguyen Thi Thuy Linh

Abstract:

The impact of water shortages has been increasingly severe as a consequence of population growth, urbanization, economic development, and climate change. The need for improvements in reliable water supply systems is urgent with the increasing living standards of regions. In this study, a suitable shortage index capable of multi-aspect description - frequency, magnitude, and duration - is adopted to more accurately describe the characteristics of a shortage situation. The values of the index were determined to cope with the increasing need for reliability. There are four reservoirs in series located on the Be River of the Dong Nai River Basin in Southern Vietnam. The primary purpose of the three upstream reservoirs is hydropower generation while the primary purpose of the fourth is water supply. A compromise between hydropower generation and water supply can be negotiated for these four reservoirs to reduce the severity of water shortages. A generalized water allocation model was applied to simulate the water supply, and hydropower generation of various management alternatives and the system’s reliability was evaluated using the adopted multiple shortage indices. Modifying management policies of water resources using data-based indexes can improve the reliability of water supply.

Keywords: cascade reservoirs, hydropower, shortage index, water supply

Procedia PDF Downloads 243
170 Challenges Caused by the Integration of Technology as a Pedagogy in One of the Historically Disadvantaged Higher Education Institutions

Authors: Rachel Gugu Mkhasibe

Abstract:

Incorporation of technology as a pedagogy has many benefits. For instance, improvement of pedagogy, increased information access, increased cooperation, and collaboration. However, as good as it may be, this integration of technology as a pedagogy has not been widely adopted in most historically Black higher education institutions especially those in developing countries. For example, the socioeconomic background of students in historically black universities, the weak financial support available from these universities, as well as a large population of students struggle to access the recommended modern physical resources such as iPads, laptops, mobile phones, to name a few. This contributes to an increase in the increase of educational inequalities. The qualitative research approach was utilized in this work to gather detailed data about the obstacles created by the integration of technology as a pedagogy. Interviews were conducted to generate data from 20 academics from 10 Leve two students from one of the historically disadvantaged higher education Institutions in South Africa. The findings revealed that although both students and academics had overwhelming support of the integration of technology as a pedagogy in their institution, the environment which they found themselves in compromise the incorporation of technology as a pedagogy. Therefore, this paper recommends that Department of Higher Education and University Management should intervene and budget for technology to be provided in all the institutions of higher education regardless of where the institutions are situated.

Keywords: collaboration, integration, pedagogy, technology

Procedia PDF Downloads 43
169 An Animation-Based Resource for Screening Emotional and Behavioural Distress in Children Aged 6 to 12

Authors: Zoe Lynch, Kirsty Zieschank

Abstract:

There are several factors that compromise the utility and wide-spread use of existing emotional and behavioural distress screening instruments. Some of these factors include lengthy administration times, high costs, feasibility issues, and a lack of self-report options for children under 12 years of age. This animation-based resource was developed to overcome as many of these factors as possible. Developed for educators and medical and mental health professionals, this resource offers children a self-guided mechanism for reporting any current emotional and behavioural distress. An avatar assistant, selected by the child, accompanies them through each stage of the screening process, offering further instruction if prompted. Children enter their age and gender before viewing comparative animations conveying common childhood emotional and behavioural difficulties. The child then selects the most relatable animations, along with the frequency with which they experience the depicted emotions. From a perspective of intellectual development, an engaging, animated format means that outcomes will not be constrained by children’s reading, writing, cognitive, or verbal expression abilities. Having been user-tested with children aged 6 to 12, this resource shows promising results as a self-guided screening instrument.

Keywords: animation-based screening instrument, mental health, primary-aged children, self-guided

Procedia PDF Downloads 128
168 Ocular Complications, Adverse Effects of the Procedure, Side-effects of Medications Used for Graft Survival, and Preventable Vision Loss in Live-related Renal Transplant Recipients: Experience at a Transplant Centre in Pakistan

Authors: Fatema Ali Lanewala, Akhtar Jamal Khan

Abstract:

The ocular complications in renal transplant recipients at the biggest transplant center in Pakistan were seen to be diverse, multiple, and sight-threatening. These complications could mainly be due to the primary disease causing renal failure, the process of transplantation, and/or the medications used pre and post-transplantation. A retrospective case series recently published in the Journal of Pakistan Medical Association highlights the common ocular pathologies encountered in renal transplant population. Majority of the patients suffered from cataract, which is a known side-effect of long-term steroids routinely used for graft survival. There was a unique finding in Pakistani population, never reported before from any other transplant centre world over; a large number of recipients was reported to be suffering from night blindness, which significantly improved on vitamin A supplementation. There were a variety of other ocular complications seen which emphasizes the necessity of ocular care and routine examination of transplant recipient’s eyes by an ophthalmologist in order to avoid visual compromise and improve the quality of life of the transplant recipient.

Keywords: cataract, night blindness, ocular complications, renal transplantation

Procedia PDF Downloads 67
167 Disaster Risk Reduction (DRR) through Harvesting Encosternum delegorguei Insect (Harurwa) in Nerumedzo, Bikita District, Zimbabwe

Authors: Mkhokheli Sithole, Brenda N. Muchapondwa

Abstract:

Food security is becoming a critical issue for people residing mainly in the rural areas where frequent droughts interrupt food production, reduce income, compromise the ability to save and erode livelihoods. This tends to increase the vulnerability of poor households to food and income insecurity, hence, malnutrition. There is an emerging need for DRR strategies to complement the existing rain fed crop production based livelihoods. One of such strategies employed by the community of Nerumedzo in Bikita district is the harvesting of Encosternum delegorguei insect. This article analyses the livelihood impacts of Encosternum delegorguei insect as a DRR strategy. The research used a combination of qualitative and quantitative approaches. The insect samples were tested in the laboratory for their nutritional composition while surveys were done on a sample of 40 community members. Participatory observations and 5 focus group discussions were also done. The results revealed that harvesting the Encosternum delegorguei insects provides a livelihood for the locals by complementing crop production thereby mitigating potential negative effects of frequent droughts. The insects are now a significant source of income to poor households in the community.

Keywords: disaster risk reduction, livelihoods, human, social sciences

Procedia PDF Downloads 171
166 Prevalence of Hinglish on the Indian English News Channels and Its Impact on the New Language Learners: A Qualitative Analysis

Authors: Swatantra

Abstract:

Hinglish, a blended version of Hindi and English, emerged due to the lack of the competence and command of the speakers over the foreign language, i., e., English. But, amazingly, the trend has gained wide acceptance. In India, this acceptance has gone up to the extent that popular news anchors at the prime time shows are frequently using it. At the moment, instead of being considered a flaw of their presentation Hinglish is emerging as a trendy genre. Its pervasive usage and extensive acceptance is motivating youngsters to opt for the similar kind of patterns. The current study is an endeavour to assess the impact of this trend on the new language learners. With the help of semi-structured interviews, the researcher has tried to gauge the level of comfort and desire to be at par with the other fluent English speakers. The results clearly depict a substantiated boost in the confidence level of learners because they are able to use the vocabulary and sentence patterns of their own choice and convenience. The prevalence and acceptance of the trend in the main stream media have really served as a catalyst and the desire to be at par with the other fluent speakers is also fading away. The users of Hinglish find this trend to be closer to their heart as in the earlier times in the absence of exact translation they had to compromise with the meaning or spirit of the word/phrase / sentence. But now enhanced flexibility is leaving them more comfortable and confident.

Keywords: Hinglish, language learners, linguistic trends, media

Procedia PDF Downloads 124
165 The Contribution of the PCR-Enzymatic Digestion in the Positive Diagnosis of Proximal Spinal Muscular Atrophy in the Moroccan Population

Authors: H. Merhni, A. Sbiti, I. Ratbi, A. Sefiani

Abstract:

The proximal spinal muscular atrophy (SMA) is a group of neuromuscular disorders characterized by progressive muscle weakness due to the degeneration and loss of anterior motor neurons of the spinal cord. Depending on the age of onset of symptoms and their evolution, four types of SMA, varying in severity, result in a mutations of the SMN gene (survival of Motor neuron). We have analyzed the DNA of 295 patients referred to our genetic counseling; since January 1996 until October 2014; for suspected SMA. The homozygous deletion of exon 7 of the SMN gene was found in 133 patients; of which, 40.6% were born to consanguineous parents. In countries like Morocco, where the frequency of heterozygotes for SMA is high, genetic testing should be offered as first-line and, after careful clinical assessment, especially in newborns and infants with congenital hypotonia unexplained and prognosis compromise. The molecular diagnosis of SMA allows a quick and certainly diagnosis, provide adequate genetic counseling for families at risk and suggest, for couples who want prenatal diagnosis. The analysis of the SMN gene is a perfect example of genetic testing with an excellent cost/benefit ratio that can be of great interest in public health, especially in low-income countries. We emphasize in this work for the benefit of the generalization of molecular diagnosis of SMA by the technique of PCR-enzymatic digestion in other centers in Morocco.

Keywords: Exon7, PCR-digestion, SMA, SMN gene

Procedia PDF Downloads 222