Search results for: existential threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1045

Search results for: existential threat

835 A Simulation for Behaviors of Preys to Avoid Pursuit of Predator

Authors: Jae Moon Lee

Abstract:

Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey.

Keywords: predator, prey, energy, safe distance, simulation

Procedia PDF Downloads 234
834 Control of an Outbreak of Vancomycin-Resistant Enterococci in a Tunisian Teaching Hospital

Authors: Hela Ghali, Sihem Ben Fredj, Mohamed Ben Rejeb, Sawssen Layouni, Salwa Khefacha, Lamine Dhidah, Houyem Said Laatiri

Abstract:

Background: Antimicrobial resistance is a growing threat to public health and motivates to improve prevention and control programs both at international (WHO) and national levels. Despite their low pathogenicity, vancomycin-resistant enterococci (VRE) are common nosocomial pathogens in several countries. The high potential for transmission of VRE between patients and the threat to send its resistance genes to other bacteria such as staphylococcus aureus already resistant to meticilin, justify strict control measures. Indeed, in Europe, the proportion of Enterococcus faecium responsible for invasive infections, varies from 1% to 35% in 2011 and less than 5% were resistant to vancomycin. In addition, it represents the second cause of urinary tract and wound infections and the third cause of nosocomial bacteremia in the United States. The nosocomial outbreaks of VRE have been mainly described in intensive care services, hematology-oncology and haemodialysis. An epidemic of VRE has affected our hospital and the objective of this work is to describe the measures put in place. Materials/Methods: Following the alert given by the service of plastic surgery concerning a patient carrier of VRE, a team of the prevention and healthcare security service (doctor + technician) made an investigation. A review of files was conducted to draw the synoptic table and the table of cases. Results: By contacting the microbiology laboratory, we have identified four other cases of VRE and who were hospitalized in Medical resuscitation department (2 cases, one of them was transferred to the Physical rehabilitation department), and Nephrology department (2 cases). The visit has allowed to detect several malfunctions in professional practice. A crisis cell has allowed to validate, coordinate and implement control measures following the recommendations of the Technical Center of nosocomial infections. In fact, the process was to technically isolate cases in their sector of hospitalization, to restrict the use of antibiotics, to strength measures of basic hygiene, and to make a screening by rectal swab for both cases and contacts (other patients and health staff). These measures have helped to control the situation and no other case has been reported for a month. 2 new cases have been detected in the intensive care unit after a month. However, these are short-term strategies, and other measures in the medium and long term should be taken into account in order to face similar outbreaks. Conclusion: The efforts to control the outbreak were not efficient since 2 new cases have been reported after a month. Therefore, a continuous monitoring in order to detect new cases earlier is crucial to minimize the dissemination of VRE.

Keywords: hospitals, nosocomial infection, outbreak, vancomycin-resistant enterococci

Procedia PDF Downloads 274
833 Management by Sufficient Economy Philosophy for Hospitality Business in Samut Songkram

Authors: Krisada Sungkhamanee

Abstract:

The objectives of this research are to know the management form of Samut Songkram lodging entrepreneurs with sufficient economy framework, to know the threat that affect this business and drawing the fit model for this province in order to sustain their business with Samut Songkram style. What will happen if they do not use this philosophy? Will they have a cash short fall? The data and information are collected by informal discussion with 8 managers and 400 questionnaires. We will use a mix of methods both qualitative research and quantitative research for our study. Bent Flyvbjerg’s phronesis is utilized for this analysis. Our research will prove that sufficient economy can help small and medium business firms solve their problems. We think that the results of our research will be a financial model to solve many problems of the entrepreneurs and this way will use to practice in other areas of our country.

Keywords: Samut Songkram, hospitality business, sufficient economy philosophy, style

Procedia PDF Downloads 275
832 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 197
831 Energy Models for Analyzing the Economic Wide Impact of the Environmental Policies

Authors: Majdi M. Alomari, Nafesah I. Alshdaifat, Mohammad S. Widyan

Abstract:

Different countries have introduced different schemes and policies to counter global warming. The rationale behind the proposed policies and the potential barriers to successful implementation of the policies adopted by the countries were analyzed and estimated based on different models. It is argued that these models enhance the transparency and provide a better understanding to the policy makers. However, these models are underpinned with several structural and baseline assumptions. These assumptions, modeling features and future prediction of emission reductions and other implication such as cost and benefits of a transition to a low-carbon economy and its economy wide impacts were discussed. On the other hand, there are potential barriers in the form political, financial, and cultural and many others that pose a threat to the mitigation options.

Keywords: energy models, environmental policy instruments, mitigating CO2 emission, economic wide impact

Procedia PDF Downloads 497
830 Towards a Strategic Framework for State-Level Epistemological Functions

Authors: Mark Darius Juszczak

Abstract:

While epistemology, as a sub-field of philosophy, is generally concerned with theoretical questions about the nature of knowledge, the explosion in digital media technologies has resulted in an exponential increase in the storage and transmission of human information. That increase has resulted in a particular non-linear dynamic – digital epistemological functions are radically altering how and what we know. Neither the rate of that change nor the consequences of it have been well studied or taken into account in developing state-level strategies for epistemological functions. At the current time, US Federal policy, like that of virtually all other countries, maintains, at the national state level, clearly defined boundaries between various epistemological agencies - agencies that, in one way or another, mediate the functional use of knowledge. These agencies can take the form of patent and trademark offices, national library and archive systems, departments of education, departments such as the FTC, university systems and regulations, military research systems such as DARPA, federal scientific research agencies, medical and pharmaceutical accreditation agencies, federal funding for scientific research and legislative committees and subcommittees that attempt to alter the laws that govern epistemological functions. All of these agencies are in the constant process of creating, analyzing, and regulating knowledge. Those processes are, at the most general level, epistemological functions – they act upon and define what knowledge is. At the same time, however, there are no high-level strategic epistemological directives or frameworks that define those functions. The only time in US history where a proxy state-level epistemological strategy existed was between 1961 and 1969 when the Kennedy Administration committed the United States to the Apollo program. While that program had a singular technical objective as its outcome, that objective was so technologically advanced for its day and so complex so that it required a massive redirection of state-level epistemological functions – in essence, a broad and diverse set of state-level agencies suddenly found themselves working together towards a common epistemological goal. This paper does not call for a repeat of the Apollo program. Rather, its purpose is to investigate the minimum structural requirements for a national state-level epistemological strategy in the United States. In addition, this paper also seeks to analyze how the epistemological work of the multitude of national agencies within the United States would be affected by such a high-level framework. This paper is an exploratory study of this type of framework. The primary hypothesis of the author is that such a function is possible but would require extensive re-framing and reclassification of traditional epistemological functions at the respective agency level. In much the same way that, for example, DHS (Department of Homeland Security) evolved to respond to a new type of security threat in the world for the United States, it is theorized that a lack of coordination and alignment in epistemological functions will equally result in a strategic threat to the United States.

Keywords: strategic security, epistemological functions, epistemological agencies, Apollo program

Procedia PDF Downloads 53
829 In Search of Good Fortune: Individualization, Youth and the Spanish Labour Market within a Context of Crisis

Authors: Matthew Lee Turnbough

Abstract:

In 2007 Spain began to experience the effects of a deep economic crisis, which would generate a situation characterised by instability and uncertainty. This has been an obstacle, especially acute for the youth of this country seeking to enter the workforce. As a result of the impact of COVID-19, the youth in Spain are now suffering the effects of a new crisis that has deepened an already fragile labour environment. In this paper, we analyse the discourses that have emerged from a precarious labour market, specifically from two companies dedicated to operating job portals and job listings in Spain, Job Today, and CornerJob. These two start-up businesses have developed mobile applications geared towards young adults in search of employment in the service sector, two of the companies with the highest user rates in Spain. Utilizing a discourse analysis approach, we explore the impact of individualization and how the process of psychologization may contribute to an increasing reliance on individual solutions to social problems. As such, we seek to highlight the expectations and demands that are placed upon young workers and the type of subjectivity that this dynamic could foster, all this within an unstable framework seemingly marked by chance, a context which is key for the emergence of individualization. Furthermore, we consider the extent to which young adults incorporate these discourses and the strategies they employ basing our analysis on the VULSOCU (New Forms of Socio-Existential Vulnerability, Supports, and Care in Spain) research project, specifically the results of nineteen in-depth interviews and three discussion groups with young adults in this country. Consequently, we seek to elucidate the argumentative threads rooted in the process of individualization and underline the implications of this dynamic for the young worker and his/her labour insertion while also identifying manifestations of the goddess of fortune as a representation of chance in this context. Finally, we approach this panorama of social change in Spain from the perspective of the individuals or young adults who find themselves immersed in this transition from one crisis to another.

Keywords: chance, crisis, discourses, individualization, work, youth

Procedia PDF Downloads 88
828 Criminal Liability for Criminal Tax

Authors: Theresia Simatupang dan Rahmayanti

Abstract:

Tax Law is a legal product and therefore should be subject to the legal norms, both about this actions, implementation, and about the material. Law has always aimed at providing justice, and besides that the law as a tool used to organize the order or rule of law. tax classification of a crime in this is very necessary, because the crime of taxation is very detrimental to the country and is still very high in society and socialization associated with punishment in sentencing that would have to provide a deterrent for the perpetrators, so refer to the this, these criminal offenses can endanger the stability of the nation's economy and the country that require special snacks. The application of legal sanctions against the perpetrators of the crime of taxation already has a strong legal basis, namely UU KUP. UU KUP have loaded threat (sanctions) severe punishment for tax payers who commit offenses and crimes in the field of taxation, which is contained in Article 38, and Article 39, Article 41, Article 41 A, and 41 B as well as Article 43 of Law and Law No. 12 KUP about 1985 Land Tax and Building. Criminal sanctions against violators of the tax provision are important because tax payers sanctions for violating tax laws.

Keywords: accountability, tax crime, criminal liability, taxation

Procedia PDF Downloads 319
827 Environmental Threats and Great Barrier Reef: A Vulnerability Assessment of World’s Best Tropical Marine Ecosystems

Authors: Ravi Kant Anand, Nikkey Keshri

Abstract:

The Great Barrier Reef of Australia is known for its beautiful landscapes and seascapes with ecological importance. This site was selected as a World Heritage site in 1981 and popularized internationally for tourism, recreational activities and fishing. But the major environmental hazards such as climate change, pollution, overfishing and shipping are making worst the site of marine ecosystem. Climate change is directly hitting on Great Barrier Reef through increasing level of sea, acidification of ocean, increasing in temperature, uneven precipitation, changes in the El Nino and increasing level of cyclones and storms. Apart from that pollution is second biggest factor which vanishing the coral reef ecosystem. Pollution including over increasement of pesticides and chemicals, eutrophication, pollution through mining, sediment runoff, loss of coastal wetland and oil spills. Coral bleaching is the biggest problem because of the environmental threatening agents. Acidification of ocean water reduced the formation of calcium carbonate skeleton. The floral ecosystem (including sea grasses and mangroves) of ocean water is the key source of food for fishes and other faunal organisms but the powerful waves, extreme temperature, destructive storms and river run- off causing the threat for them. If one natural system is under threat, it means the whole marine food web is affected from algae to whale. Poisoning of marine water through different polluting agents have been affecting the production of corals, breeding of fishes, weakening of marine health and increased in death of fishes and corals. In lieu of World Heritage site, tourism sector is directly affected and causing increasement in unemployment. Fishing sector also affected. Fluctuation in the temperature of ocean water affects the production of corals because it needs desolate place, proper sunlight and temperature up to 21 degree centigrade. But storms, El Nino, rise in temperature and sea level are induced for continuous reduction of the coral production. If we do not restrict the environmental problems of Great Barrier Reef than the best known ecological beauty with coral reefs, pelagic environments, algal meadows, coasts and estuaries, mangroves forests and sea grasses, fish species, coral gardens and the one of the best tourist spots will lost in upcoming years. My research will focus on the different environmental threats, its socio-economic impacts and different conservative measures.

Keywords: climate change, overfishing, acidification, eutrophication

Procedia PDF Downloads 351
826 Silage for Dairy Production: A Case Study of Pakistan

Authors: Noor-ul-Ain, Muhammad Thair Khan, Adeela Ajmal, Hamid Mustafa

Abstract:

Pakistan is an agricultural country and livestock only share 11.8 percent to national GDP during 2015-16. Pakistan is a 3rd largest milk producing country having 41.2, 35.6, 29.4, 68.4 and 1.0 million head cattle, buffalo, sheep, goat and camel, respectively. Modern urbanization and shortage of feed resources for livestock species in a country is an alarming threat. The introduction of new technology and advanced techniques solve this issue. This includes drought feeding, increase production, aid to crop management, balance nutrition and easily storaged of wet feed products. It is therefore clear that silage has important role in animal feed and feeding. Financial model of this study clear the effectiveness of silage. Therefore, it is revealed from this study that silage is a cost-effective option for a profitable dairy farming in Pakistan.

Keywords: feed, silage, dairy, production, Pakistan

Procedia PDF Downloads 400
825 Response of Full-Scale Room Building Against Blast Loading

Authors: Eid Badshah, Amjad Naseer, Muhammad Ashraf

Abstract:

In this paper full-scale brick masonry room along with the veranda of a typical school building was subjected to eight successive blast tests with increasing charge weights ranging from 0.5kg to 16.02kg at 3.66m fixed stand-off distance. Pressure-time histories were obtained by data acquisition system from pressure sensors, installed on different points of room as well as veranda columns. The resulting damage pattern of different locations was observed during each test. Weak zones of masonry room were identified. Scaled distances for different damage levels in masonry room were experimentally obtained. The results provided a basis for determining the response of masonry room building against blast loading in a specific threat scenario.

Keywords: peak pressure, composition-B, TNT, pressure sensor, scaled distance, masonry

Procedia PDF Downloads 98
824 Epistemological and Ethical Dimensions of Current Concepts of Human Resilience in the Neurosciences

Authors: Norbert W. Paul

Abstract:

Since a number of years, scientific interest in human resilience is rapidly increasing especially in psychology and more recently and highly visible in neurobiological research. Concepts of resilience are regularly discussed in the light of liminal experiences and existential challenges in human life. Resilience research is providing both, explanatory models and strategies to promote or foster human resilience. Surprisingly, these approaches attracted little attention so far in philosophy in general and in ethics in particular. This is even more astonishing given the fact that the neurosciences as such have been and still are of major interest to philosophy and ethics and even brought about the specialized field of neuroethics, which, however, is not concerned with concepts of resilience, so far. As a result of the little attention given to the topic of resilience, the whole concept has to date been a philosophically under-theorized. This abstinence of ethics and philosophy in resilience research is lamentable because resilience as a concept as well as resilience interventions based on neurobiological findings do undoubtedly pose philosophical, social and ethical questions. In this paper, we will argue that particular notions of resilience are crossing the sometimes fine line between maintaining a person’s mental health despite the impact of severe psychological or physical adverse events and ethically more debatable discourses of enhancement. While we neither argue for or against enhancement nor re-interpret resilience research and interventions by subsuming them strategies of psychological and/or neuro-enhancement, we encourage those who see social or ethical problems with enhancement technologies should also take a closer look on resilience and the related neurobiological concepts. We will proceed in three steps. In our first step, we will describe the concept of resilience in general and its neurobiological study in particular. Here, we will point out some important differences in the way ‘resilience’ is conceptualized and how neurobiological research understands resilience. In what follows we will try to show that a one-sided concept of resilience – as it is often presented in neurobiological research on resilience – does pose social and ethical problems. Secondly, we will identify and explore the social and ethical challenges of (neurobiological) enhancement. In the last and final step of this paper, we will argue that a one-sided reading of resilience can be understood as latent form of enhancement in transition and poses ethical questions similar to those discussed in relation to other approaches to the biomedical enhancement of humans.

Keywords: resilience, neurosciences, epistemology, bioethics

Procedia PDF Downloads 125
823 Risk and Uncertainty in Aviation: A Thorough Analysis of System Vulnerabilities

Authors: C. V. Pietreanu, S. E. Zaharia, C. Dinu

Abstract:

Hazard assessment and risks quantification are key components for estimating the impact of existing regulations. But since regulatory compliance cannot cover all risks in aviation, the authors point out that by studying causal factors and eliminating uncertainty, an accurate analysis can be outlined. The research debuts by making delimitations on notions, as confusion on the terms over time has reflected in less rigorous analysis. Throughout this paper, it will be emphasized the fact that the variation in human performance and organizational factors represent the biggest threat from an operational perspective. Therefore, advanced risk assessment methods analyzed by the authors aim to understand vulnerabilities of the system given by a nonlinear behavior. Ultimately, the mathematical modeling of existing hazards and risks by eliminating uncertainty implies establishing an optimal solution (i.e. risk minimization).

Keywords: control, human factor, optimization, risk management, uncertainty

Procedia PDF Downloads 227
822 Cybercrime: International Police Cooperation with Europol

Authors: Daniel Suarez Alonso

Abstract:

Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.

Keywords: Europol, international cooperation, cybercrime, computer crime, law

Procedia PDF Downloads 25
821 Smart Model with the DEMATEL and ANFIS Multistage to Assess the Value of the Brand

Authors: Hamed Saremi

Abstract:

One of the challenges in manufacturing and service companies to provide a product or service is recognized Brand to consumers in target markets. They provide most of their processes under the same capacity. But the constant threat of devastating internal and external resources to prevent a rise Brands and more companies are recognizing the stages are bankrupt. This paper has tried to identify and analyze effective indicators of brand equity and focuses on indicators and presents a model of intelligent create a model to prevent possible damage. In this study identified indicators of brand equity based on literature study and according to expert opinions, set of indicators By techniques DEMATEL Then to used Multi-Step Adaptive Neural-Fuzzy Inference system (ANFIS) to design a multi-stage intelligent system for assessment of brand equity.

Keywords: anfis, dematel, brand, cosmetic product, brand value

Procedia PDF Downloads 380
820 A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques

Authors: Tosin Ige

Abstract:

Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining.

Keywords: data, privacy, data mining, association rule, privacy preserving, mining technique

Procedia PDF Downloads 128
819 Possibility of Agritourism Development for Sustainable Rural Development in Sri Lanka

Authors: Prasansha Kumari

Abstract:

Agritourism is a growing industry in many parts of the world. At present, agritourism is promoted by most of the countries in the world aiming at sustainable rural development. This study intends to identify and analyze the potential for agritourism development in Sri Lanka with special reference to five farming areas in Kegalle district. SWOT analysis used to identify the possibility of agritourism in this areas. The study rival that there are several opportunities to the development of agritourism while identified the main threat and weakness for developing agritourism in the study areas. The opportunities related to a number of tourist attraction places and increase the demand for agritourism. The main problems related to infrastructure facilities, large farming lands, knowledge and skill of farmers, government support, credits and financial assistance, attitude of young generation and environmental impact.

Keywords: agritourism, sustainable rural development, farming, tourism

Procedia PDF Downloads 246
818 Deconstruction of the Term 'Shaman' in the Metaphorical Pair 'Artist as a Shaman'

Authors: Ilona Ivova Anachkova

Abstract:

The analogy between the artist and the shaman as both being practitioners that more easily recognize and explore spiritual matters, and thus contribute to the society in a unique way has been implied in both Modernity and Postmodernity. The Romantic conception of the shaman as a great artist who helps common men see and understand messages of a higher consciousness has been employed throughout Modernity and is active even now. This paper deconstructs the term ‘shaman’ in the metaphorical analogy ‘artist – shaman’ that was developed more fully in Modernity in different artistic and scientific discourses. The shaman is a figure that to a certain extent adequately reflects the late modern and postmodern holistic views on the world. Such views aim at distancing from traditional religious and overly rationalistic discourses. However, the term ‘shaman’ can be well substituted by other concepts such as the priest, for example. The concept ‘shaman’ is based on modern ethnographic and historical investigations. Its later philosophical, psychological and artistic appropriations designate the role of the artist as a spiritual and cultural leader. However, the artist and the shaman are not fully interchangeable terms. The figure of the shaman in ‘primitive’ societies has performed many social functions that are now delegated to different institutions and positions. The shaman incorporates the functions of a judge, a healer. He is a link to divine entities. He is the creative, aspiring human being that has heightened sensitivity to the world in both its spiritual and material aspects. Building the metaphorical analogy between the shaman and the artist comes in many ways. Both are seen as healers of the society, having propensity towards connection to spiritual entities, or being more inclined to creativity than others. The ‘shaman’ however is a fashionable word for a spiritual person used perhaps because of the anti-traditionalist religious modern and postmodern views. The figure of the priest is associated with a too rational, theoretical and detached attitude towards spiritual matters, while the practices of the shaman and the artist are considered engaged with spirituality on a deeper existential level. The term ‘shaman’ however does not have priority of other words/figures that can explore and deploy spiritual aspects of reality. Having substituted the term ‘shaman’ in the pair ‘artist as a shaman’ with ‘the priest’ or literally ‘anybody,' we witness destruction of spiritual hierarchies and come to the view that everybody is responsible for their own spiritual and creative evolution.

Keywords: artist as a shaman, creativity, extended theory of art, functions of art, priest as an artist

Procedia PDF Downloads 199
817 Characterization of Leakage Current on the Surface of Porcelain Insulator under Contaminated Conditions

Authors: Hocine Terrab , Abdelhafid Bayadi, Adel Kara, Ayman El-Hag

Abstract:

Insulator flashover under polluted conditions has been a serious threat on the reliability of power systems. It is known that the flashover process is mainly affected by the environmental conditions such as; the pollution level and humidity. Those are the essential parameters influencing the wetting process. This paper presents an investigation of the characteristics of leakage current (LC) developed on the surface of porcelain insulator at contaminated conditions under AC voltage. The study is done in an artificial fog chamber and the LC is characterized for different stages; dry, wetted and presence of discharge activities. Time-frequency and spectral analysis are adopted to calculate the evolution of LC characteristics with various stages prior to flashover occurrence. The preliminary results could be used in analysing the LC to develop more effective diagnosis of early signs of dry band arcing as an indication for insulation washing.

Keywords: flashover, harmonic components, leakage current, phase angle, statistical analysis

Procedia PDF Downloads 400
816 Prosthetic Rehabilitation of Midfacial: Nasal Defects

Authors: Bilal Ahmed

Abstract:

Rehabilitation of congenital and acquired maxillofacial defects is always a challenging clinical scenario. These defects pose major physiological and psychological threat not only to the patient but to the entire family. There has been an enormous scientific development in maxillofacial rehabilitation with the advent of CAD CAM, 3-D scanning, Osseo-integrated implants and improved restorative materials. There are also specialized centers with latest diagnostic and treatment facilities in the developed countries. However, in certain clinical case scenarios, conventional prosthodontic principles are still the gold standards. Similarly in a less developed world, financial and technical constraints are factors affecting treatment planning and final outcomes. However, we can do a lot of benefits to the affected human beings, even with use of simple and cost-effective conventional prosthodontic techniques and materials. These treatment strategies may sometimes be considered as intermediate or temporary options, but with regular follow-up maintenance these can be used on a definitive basis.

Keywords: maxillofacial defects, obturators, prosthodontics, medical and health sciences

Procedia PDF Downloads 318
815 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 511
814 Non-Cooperative Game Theory Approach for Ensuring Community Satisfaction on Public-Private Partnership Projects

Authors: Jason Salim, Zhouyang Lu

Abstract:

Private sector involvement in Public Private Partnership (PPP) projects may raise public suspicion, as PPP is often mistaken as merely a partnership between private and government agencies without consideration for greater “public” (community). This public marginalization is crucial to be dealt with because undermining opinion of majority may cause problems such as protests and/ or low demand. Game theory approach applied in this paper shows that probability of public acceptance towards a project is affected by overall public’s perception on Private sectors’ possible profit accumulation from the project. On the contrary, goodwill of the government and private coalition alone is not enough to minimize the probability of public opposition towards a PPP project. Additionally, the threat of loss or damage raised from public opposition does not affect the profit-maximization behavior of Private sectors.

Keywords: community satisfaction, game theory, non-cooperative, PPP, public policy

Procedia PDF Downloads 667
813 The Role of Leapfrogging: Cross-Level Interactions and MNE Decision-Making in Conflict-Settings

Authors: Arrian Cornwell, Larisa Yarovaya, Mary Thomson

Abstract:

This paper seeks to examine the transboundary nature of foreign subsidiary exit vs. stay decisions when threatened by conflict in a host country. Using the concepts of nested vulnerability and teleconnections, we show that the threat of conflict can transcend bounded territories and have non-linear outcomes for actors, institutions and systems at broader scales of analysis. To the best of our knowledge, this has not been done before. By introducing the concepts of ‘leapfrogging upwards’ and ‘cascading downwards’, we develop a two-stage model which characterises the impacts of conflict as transboundary phenomena. We apply our model to a dataset of 266 foreign subsidiaries in six conflict-afflicted host countries over 2011-2015. Our results indicate that information is transmitted upwards and subsequent pressure flows cascade downwards, which, in turn, influence exit decisions.

Keywords: subsidiary exit, conflict, information transmission, pressure flows, transboundary

Procedia PDF Downloads 242
812 The Best Methods of Motivating and Encouraging the Students to Study: A Case Study

Authors: Mahmoud I. Syam, Osama K. El-Hafy

Abstract:

With lack of student motivation, there will be a little or no real learning in the class and this directly effects student achievement and test scores. Some students are naturally motivated to learn, but many students are not motivated, they do care little about learning and need their instructors to motivate them. Thus, motivating students is part of the instructor’s job. It’s a tough task to motivate students and make them have more attention and enthusiasm. As a part of this research, a questionnaire has been distributed among a sample of 155 students out of 1502 students from Foundation Program at Qatar University. The questionnaire helped us to determine some methods to motivate the students and encourage them to study such as variety of teaching activities, encouraging students to participate during the lectures, creating intense competition between the students, using instructional technology, not using grades as a threat and respecting the students and treating them in a good manner. Accordingly, some hypotheses are tested and some recommendations are presented.

Keywords: learning, motivating, student, teacher, testing hypotheses

Procedia PDF Downloads 433
811 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 278
810 Radical Web Text Classification Using a Composite-Based Approach

Authors: Kolade Olawande Owoeye, George R. S. Weir

Abstract:

The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.

Keywords: extremist, web pages, classification, semantics, posit

Procedia PDF Downloads 119
809 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review

Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta

Abstract:

Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.

Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism

Procedia PDF Downloads 352
808 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 176
807 Development of Web-Based Iceberg Detection Using Deep Learning

Authors: A. Kavya Sri, K. Sai Vineela, R. Vanitha, S. Rohith

Abstract:

Large pieces of ice that break from the glaciers are known as icebergs. The threat that icebergs pose to navigation, production of offshore oil and gas services, and underwater pipelines makes their detection crucial. In this project, an automated iceberg tracking method using deep learning techniques and satellite images of icebergs is to be developed. With a temporal resolution of 12 days and a spatial resolution of 20 m, Sentinel-1 (SAR) images can be used to track iceberg drift over the Southern Ocean. In contrast to multispectral images, SAR images are used for analysis in meteorological conditions. This project develops a web-based graphical user interface to detect and track icebergs using sentinel-1 images. To track the movement of the icebergs by using temporal images based on their latitude and longitude values and by comparing the center and area of all detected icebergs. Testing the accuracy is done by precision and recall measures.

Keywords: synthetic aperture radar (SAR), icebergs, deep learning, spatial resolution, temporal resolution

Procedia PDF Downloads 58
806 The Plan for the Establishment of the Talent Organization of the United Nations

Authors: Hassan Kian

Abstract:

The future of millions of people and consequently, the future of societies and humanity is threatened by a great threat which is called wasted human resources. Perhaps Pasteur, Beethoven and Avicenna, Lavoisier and Einstein and millions of genius individuals and thinkers may have never been discovered and could not found a chance of being known due to various reasons such as poverty or social status, and other problems. So without being able to serve humanity, their talents are fully wasted. While, if a global mechanism exists to discover their talents in different countries and provide to them the right direction, during less than a generation, human society will face to a profound transformation and sustainable social justice will be formed as the basis of sustainable development of human resources. Therefore, the situation of the institution which organizes the affair of discovering and guiding talents was vacant at the level of the international community and its necessity has been felt. So in this plan, the establishment and development of such an organization have been suggested in the international context.

Keywords: talent identification, comparative advantage, sustainable justice, sustainable development

Procedia PDF Downloads 200