Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5459

Search results for: general attacks

5099 The Operating Results of the English General Music Course on the Education Platform

Authors: Shan-Ken Chine

Abstract:

This research aims to a one-year course run of String Music Appreciation, an international online course launched on the British open education platform. It explains how to present music teaching videos with three main features. They are music lesson explanations, instrumental playing demonstrations, and live music performances. The plan of this course is with four major themes and a total of 97 steps. In addition, the paper also uses the testing data provided by the education platform to analyze the performance of learners and to understand the operation of the course. It contains three test data in the statistics dashboard. They are course-run measures, total statistics, and statistics by week. The paper ends with a review of the course's star rating in this one-year run. The result of this course run will be adjusted when it starts again in the future.

Keywords: music online courses, MOOCs, ubiquitous learning, string music, general music education

Procedia PDF Downloads 8
5098 Factors Influencing Intention to Engage in Long-term Care Services among Nursing Aide Trainees and the General Public

Authors: Ju-Chun Chien

Abstract:

Rapid aging and depopulation could lead to serious problems, including workforce shortages and health expenditure costs. The current and predicted future LTC workforce shortages could be a real threat to Taiwan’s society. By means of comparison of data from 144 nursing aide trainees and 727 general public, the main purpose of the present study was to determine whether there were any notable differences between the two groups toward engaging in LTC services. Moreover, this study focused on recognizing the attributes of the general public who had the willingness to take LTC jobs but continue to ride the fence. A self-developed questionnaire was designed based on Ajzen’s Theory of Planned Behavior model. After conducting exploratory factor analysis (EFA) and reliability analysis, the questionnaire was a reliable and valid instrument for both nursing aide trainees and the general public. The main results were as follows: Firstly, nearly 70% of nursing aide trainees showed interest in LTC jobs. Most of them were middle-aged female (M = 46.85, SD = 9.31), had a high school diploma or lower, had unrelated work experience in healthcare, and were mostly unemployed. The most common reason for attending the LTC training program was to gain skills in a particular field. The second most common reason was to obtain the license. The third and fourth reasons were to be interested in caring for people and to increase income. The three major reasons that might push them to leave LTC jobs were physical exhaustion, payment is bad, and being looked down on. Secondly, the variables that best-predicted nursing aide trainees’ intention to engage in LTC services were having personal willingness, perceived behavior control, with high school diploma or lower, and supported from family and friends. Finally, only 11.80% of the general public reported having interest in LTC jobs (the disapproval rating was 50% for the general public). In comparison to nursing aide trainees who showed interest in LTC settings, 64.8% of the new workforce for LTC among the general public was male and had an associate degree, 54.8% had relevant healthcare experience, 67.1% was currently employed, and they were younger (M = 32.19, SD = 13.19) and unmarried (66.3%). Furthermore, the most commonly reason for the new workforce to engage in LTC jobs were to gain skills in a particular field. The second priority was to be interested in caring for people. The third and fourth most reasons were to give back to society and to increase income, respectively. The top five most commonly reasons for the new workforce to quitting LTC jobs were listed as follows: physical exhaustion, being looked down on, excessive working hours, payment is bad, and excessive job stress.

Keywords: long-term care services, nursing aide trainees, Taiwanese people, theory of planned behavior

Procedia PDF Downloads 127
5097 Investigating the Factors Leading to Utilization of Facebook and Twitter/X Sites by Youths at Elections Evening in Nigeria: A Case Study of 2023 General Elections

Authors: Abdullahi Garba Abu, Muhammad Bello Sada, Aminu Abubakar

Abstract:

Facebook and Twitter/X platforms are preferred and largely patronized by Youths in Nigeria. The simplicity and popularity of Facebook and Twitter/X have made them preferred social networking sites for Youths to handle or execute different political activities in favor of their chosen candidates or political parties. This is largely related to their interest in using the platform for the purposes of participation in 2023 political activities and general elections. The two Social Networking Sites were used to vigorously pursue party activities on the eve of the 2023 general elections. Youths engaged the two platforms in campaigning for their candidates and political parties and succeeded in reaching a wide audience, shared the policies and manifestos of their parties, engaged with supporters and even posted advertising campaigns for specific demographics. However, the utilization of Facebook and Twitter /X platforms during the 2023 elections was largely seen in two lights: positive and negative lights/intentions. Therefore, this research investigates the motivating factors for which largely Nigerian Youths engage Facebook and Twitter platforms in political activities, with reference to the 2023 general elections. The research uses a survey method through which it reaches out to respondents from all six geo-politial zones. The research found that Nigerian Youths utilize the two social media sites to campaign for politicians voluntarily based on their belief in the capabilities of the candidates. It also found out that Youths were lured into using Facebook and Twitter/X sites to campaign through tribal, religious, and ethnic factors. More so, the research found out that eagerness to share political materials in support of candidates made Youths in Nigeria share unverifiable content on Facebook and Twitter sites.

Keywords: Facebook, Twitter/X, Nigerian youths, 2023 elections

Procedia PDF Downloads 25
5096 The Optimal Public Debt Ceiling in Taiwan: A Simulation Approach

Authors: Ho Yuan-Hong, Huang Chiung-Ju

Abstract:

This study conducts simulation analyses to find the optimal debt ceiling of Taiwan, while factoring in welfare maximization under a dynamic stochastic general equilibrium framework. The simulation is based on Taiwan's 2001 to 2011 economic data and shows that welfare is maximized at a "debt"⁄"GDP" ratio of 0.2, increases in the "debt"⁄"GDP " ratio leads to increases in both tax and interest rates and decreases in the consumption ratio and working hours. The study results indicate that the optimal debt ceiling of Taiwan is 20% of GDP, where if the "debt"⁄"GDP" ratio is greater than 40%, the welfare will be negative and result in welfare loss.

Keywords: debt sustainability, optimal debt ceiling, dynamic stochastic general equilibrium, welfare maximization

Procedia PDF Downloads 329
5095 The General Trend of FDI and the Effects of These Investments for Countries: 2000-2013

Authors: Esra Cebeci

Abstract:

As a result of acceleration of globalization in the 21st century economic boundaries are removed. With liberalization of capital and foreign trade, not only developed countries but also developing countries get into rapid growth efforts. In developing countries, one of the most important problem is insufficient capital accumulation. For reduce this deficit, one of the general approaches that is offered increasing amount of foreign direct investments. Also, in developing countries saving rates are low. So, foreign direct investments make possible an increase for domestic savings. In this regard, the multinational corporations are capable of these investments have importance. By providing micro-macro effects for countries, demand for these firms are many. These effects in general positive, some negative effects may able to come into being especially for developing countries. Foreign direct investments are performed buying an existing corporation, merging or greenfield investments. In recent, foreign direct investments are performed as a green field investments for developing countries. The study aims to analysis foreign direct investment trends for 2000-2013 years. In the first part of this study, the importance of foreign direct investments and their determinants are explained. In the second part, the article also shows that comparative analysis of the inward and outward investments for developing and developed countries. In conclusion, while developed countries can stand competition against other countries with these investments, developing countries can provide a sustainable growth with capital inflows.

Keywords: foreign direct investments, multinational corporations, determinants of FDI, FDI trend

Procedia PDF Downloads 371
5094 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 245
5093 Characterization and Predictors of Community Integration of People with Psychiatric Problems: Comparisons with the General Population

Authors: J. Cabral, C. Barreto Carvalho, C. da Motta, M. Sousa

Abstract:

Community integration is a construct that an increasing body of research has shown to have a significant impact in well-being and recovery of people with psychiatric problems. However, there are few studies that explore which factors can be associated and predict community integration. Moreover, community integration has been mostly studied in minority groups, and currently literature on the definition and manifestation of community integration in the more general population is scarce. Thus, the current study aims to characterize community integration and explore possible predictor variables in a sample of participants with psychiatric problems (PP, N=183) and a sample of participants from the general population (GP, N=211). Results show that people with psychiatric problems present above average values of community integration, but are significantly lower than their healthy counterparts. It was also possible to observe that community integration does not vary in terms of the socio-demographic characteristics of both groups in this study. Correlation and multiple regression showed that, among several variables that literature present as relevant in the community integration process, only three variables emerged as having the most explanatory value in community integration of both groups: sense of community, basic needs satisfaction and submission. These results also shown that those variables have increased explanatory power in the PP sample, which leads us to emphasize the need to address this issue in future studies and increase the understanding of the factors that can be involved in the promotion of community integration, in order to devise more effective interventions in this field.

Keywords: community integration, mental illness, predictors, psychiatric problems

Procedia PDF Downloads 462
5092 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: authentication, enterprise IoT cybersecurity, PKI/TTP, IoT space

Procedia PDF Downloads 142
5091 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 452
5090 Graphical Theoretical Construction of Discrete time Share Price Paths from Matroid

Authors: Min Wang, Sergey Utev

Abstract:

The lessons from the 2007-09 global financial crisis have driven scientific research, which considers the design of new methodologies and financial models in the global market. The quantum mechanics approach was introduced in the unpredictable stock market modeling. One famous quantum tool is Feynman path integral method, which was used to model insurance risk by Tamturk and Utev and adapted to formalize the path-dependent option pricing by Hao and Utev. The research is based on the path-dependent calculation method, which is motivated by the Feynman path integral method. The path calculation can be studied in two ways, one way is to label, and the other is computational. Labeling is a part of the representation of objects, and generating functions can provide many different ways of representing share price paths. In this paper, the recent works on graphical theoretical construction of individual share price path via matroid is presented. Firstly, a study is done on the knowledge of matroid, relationship between lattice path matroid and Tutte polynomials and ways to connect points in the lattice path matroid and Tutte polynomials is suggested. Secondly, It is found that a general binary tree can be validly constructed from a connected lattice path matroid rather than general lattice path matroid. Lastly, it is suggested that there is a way to represent share price paths via a general binary tree, and an algorithm is developed to construct share price paths from general binary trees. A relationship is also provided between lattice integer points and Tutte polynomials of a transversal matroid. Use this way of connection together with the algorithm, a share price path can be constructed from a given connected lattice path matroid.

Keywords: combinatorial construction, graphical representation, matroid, path calculation, share price, Tutte polynomial

Procedia PDF Downloads 109
5089 A Survey of Discrete Facility Location Problems

Authors: Z. Ulukan, E. Demircioğlu,

Abstract:

Facility location is a complex real-world problem which needs a strategic management decision. This paper provides a general review on studies, efforts and developments in Facility Location Problems which are classical optimization problems having a wide-spread applications in various areas such as transportation, distribution, production, supply chain decisions and telecommunication. Our goal is not to review all variants of different studies in FLPs or to describe very detailed computational techniques and solution approaches, but rather to provide a broad overview of major location problems that have been studied, indicating how they are formulated and what are proposed by researchers to tackle the problem. A brief, elucidative table based on a grouping according to “General Problem Type” and “Methods Proposed” used in the studies is also presented at the end of the work.

Keywords: discrete location problems, exact methods, heuristic algorithms, single source capacitated facility location problems

Procedia PDF Downloads 435
5088 History Impact of Cuba's Sports Results on Panamerican Games

Authors: Jose Ramon Sanabria Navarro, Yahilina Silveira Perez

Abstract:

The Pan American Games are one of the best regional sports integration events for the Americas, thousands of athletes from different countries are integrated based on obtaining satisfactory sports results and bringing the glory of the national identity of the sport to their country. There are countries that despite the small number of inhabitants have obtained very satisfactory results such as Cuba. Objective: To analyze the impact of Cuba's sports results in the Pan American Games. The methodology was based on the postulates of the materialist dialectic since the investigated reality was studied from historicity, systematicity and in its systemic character. The population and sample consisted of 41 countries of the American continent, and the 15 events carried out to date were analyzed. The impact of Cuba is very relevant because it is the country that has the second place by country in terms of number of medals, is among the first in terms of medals per inhabitants and in general sense of all the indicators treated assumes the fourth place integral. What is the current status of Cuba's sports results in Pan American Games? Having as a general objective, analyze the impact of Cuba's sports results in the Pan American Games. The hypotheses that will lead this research have the following methodological and interaction order: H1: Cuba's performance in Pan American Sports Games positively impacts the amount of medals obtained. H2: The amount of medals from Cuba in Pan American Sports Games positively impacts the general podium for countries of these regional events. H3: The amount of medals obtained by Cuba in Pan American Sports Games positively impacts the number of inhabitants. H4: The amount of medals obtained by Cuba positively impacts the overall result of the countries. H5: Cuba's performance in the Panamerican Sports Games positively impacts the overall results of these regional events. In general, it is possible to demonstrate the impact of Cuba's sports performance in Pan American Games and the organizational sports structure that has allowed the country to obtain them is evidenced.

Keywords: Cuba, history of sport, sports games, regional events, sport

Procedia PDF Downloads 99
5087 Olfactometer Response of Red Palm Weevil (Rhynchophorus ferrugineus) (Coleoptera: Curculionidae) and Its Biology for the Evaluation of Resistance in the Commercially Grown Date Palm (Phoenix dactylifera L.) Cultivars in Pakistan

Authors: Mujahid Manzoor, Muhammad Shafique, Jam Nazeer Ahmad, Farman Ahmad, Muhammad Ali, Muhammad Rizwan Tariq, Shahbaz Ahmad, Muhammad Saleem Haider

Abstract:

Date palms (P. dactylifera L.) are prominent in the Kingdom of Saudi Arabia (KSA), Iran, UAE, and Iraq, as well as Algeria, Egypt, and Pakistan. Insect pests' attacks on different palm cultivars adversely affected their production in the last few decades. Pakistan ranked sixth for date production around the world. The most commercially grown cultivars are Aseel, Dhaki, Falsi, Karbalai, Mozawati, Jan Swore, Kohra, Hillawi, Kohra, and Begum Jhangi. Red palm weevils are considered as hazardous insect pests responsible for economic loss in palm orchards. This research work depicts the infestation of red palm weevils in eleven different palm cultivars (Hillawi, Mozawati, Kechanr, Aseel, Shamrani, Khudravi, Dhaki, Zeri, Kobra, Zaidi, Denda), which frequently grow in different regions of Pakistan through Y-shaped olfactometer analysis. In addition, the level of both antixenosis and antibiosis was spotted by examining the various parameters such as %age lure of weevils of mature females, general count of laid eggs in addition to their activeness. Furthermore, obtained results depicted that a positive contact was established with minimum antixenotic consequence revealed by a cultivar, “Hillawi” among most hold of RPW adults (22.32%), number of eggs laid (16.66%) and egg hatching (84.66%), while other cultivars, including Mozawati, Aseel, Kechanr, Shamrani, Khudravi, Dhaki, Zeri, and Zaidi, exhibited a greater level of antixenosis. Moreover, “Hillawi” documented the maximum number of eggs, while Kechanr, Mozawati, Aseel Kobra, and Denda showed minimum attraction by red palm weevils. Maximum red palm weevils were attracted in an olfactometer assay of sugarcane varieties.

Keywords: P. dactylifera, R. ferrugineus, olfactometer, antixenosis

Procedia PDF Downloads 82
5086 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 109
5085 A General Approach to Define Adjoint of Linear and Non-linear Operators

Authors: Mehdi Jafari Matehkolaee

Abstract:

In this paper, we have obtained the adjoint of an arbitrary operator (linear and nonlinear) in Hilbert space by introducing an n-dimensional Riemannian manifold. This general formalism covers every linear operator (non – differential) in Hilbert space. In fact, our approach shows that instead of using the adjoint definition of an operator directly, it can be obtained directly by relying on a suitable generalized space according to the action of the operator in question. For the case of nonlinear operators, we have to change the definition of the linear operator adjoint. But here, we have obtained an adjoint of these operators with respect to the definition of the derivative of the operator. As a matter of fact, we have shown one of the straight applications of the ''Frechet derivative'' in the algebra of the operators.

Keywords: adjoint operator, non-linear operator, differentiable operator, manifold

Procedia PDF Downloads 93
5084 Improvement Image Summarization using Image Processing and Particle swarm optimization Algorithm

Authors: Hooman Torabifard

Abstract:

In the last few years, with the progress of technology and computers and artificial intelligence entry into all kinds of scientific and industrial fields, the lifestyles of human life have changed and in general, the way of humans live on earth has many changes and development. Until now, some of the changes has occurred in the context of digital images and image processing and still continues. However, besides all the benefits, there have been disadvantages. One of these disadvantages is the multiplicity of images with high volume and data; the focus of this paper is on improving and developing a method for summarizing and enhancing the productivity of these images. The general method used for this purpose in this paper consists of a set of methods based on data obtained from image processing and using the PSO (Particle swarm optimization) algorithm. In the remainder of this paper, the method used is elaborated in detail.

Keywords: image summarization, particle swarm optimization, image threshold, image processing

Procedia PDF Downloads 107
5083 Jurisdiction of Military Court for Military Members Who Committed General Crimes in Indonesia's Military Justice System and Comparison with Another Countries

Authors: Dini Dewi Heniarti

Abstract:

Military Court which is a judicial institution within the military institution has a heavy duty. Military court has to ensuring a fair legal process for military personnel (due process of law) and enforces military discipline. Military justice must also ensure protects the rights of military personnel. In Indonesia tren of military court changes in vision. The debate is happened on the jurisdiction of military court that allegedly has the potential existence of impunity. The Decree of People’s Consultative Assembly Number VII/MPR/2000 which states that the army general who committed the crime should not be tried in military court is one that underlies the proposed amendment limits the jurisdiction of military court. For the identify of the background in a specific format that is limited to juridical review. The goals this research is to gain knowledge, deep understanding and the concept of jurisdiction of military courts for military members who committed general crimes in adjudication procedure from the perspective of legal reform as alternative to establish independency of military judiciary. This research using Rule of Law as Grand Theory, Development Legal Theory as a Middle Theory and Criminal Justice System and concept of jurisdiction as supporting as Applied Theory. This study using a normative juridical approach, and equipped by primary data juridical approach of historical and comparative approach. The author uses descriptive analytical specifications. The main data used in this research is secondary data, which includes primary legal materials, secondary legal material and legal materials tertiary. Analysis primary data and qualitative data is done legally. Technique checking the validity of the data in this study used multiple methods with the research triangulation. This paper will demonstrate the problems concerning the jurisdiction of military courts for military personnel who committed general crimes in perspective of military justice reform Indonesia and adjudication procedures for military member who committed general crimes in the military justice system in Indonesia, as alternative to establish independency of judiciary in military justice in Indonesia. Comparative approached the military justice system from another countries is aimed to development military justice in Indonesia.

Keywords: jurisdiction, military courts, military justice, independency of judiciary

Procedia PDF Downloads 546
5082 Translation of the Bible into the Yoruba Language: A Functionalist Approach in Resolving Cultural Problems

Authors: Ifeoluwa Omotehinse Oloruntoba

Abstract:

Through comparative and causal models of translation, this paper examined the translation of ‘bread’ into the Yoruba language in three Yoruba versions of the Bible: Bibeli Yoruba Atoka (YBA), Bibeli Mimo ni Ede Yoruba Oni (BMY) and Bibeli Mimo (BM). In biblical times, bread was a very important delicacy that it was synonymous with food in general and in the Bible, bread sometimes refers to a type of food (a mixture of flour, water, and yeast that is baked) or food in general. However, this is not the case in the Yoruba culture. In fact, some decades ago, bread was not known in Nigeria and had no name in the Yoruba language until the 1900s when it was codified as burẹdi in Yoruba, a term borrowed from English and transliterated. Nevertheless, in Nigeria presently, bread is not a special food and it is not appreciated or consumed like in the West. This makes it difficult to translate bread in the Bible into Yoruba. From an investigation on the translation of this term, it was discovered that bread which has 330 occurrences in the English Bible translation (King James) has few occurrences in the three Yoruba Bible versions. In the first version (YBA) published in the 1880s, where bread is synonymous with food in general, it is mostly translated as oúnjẹ (food) or the verb jẹ (to eat), revealing that something is eaten but not indicating what it is. However, when the bread is a type of food, it is rendered as akara, a special delicacy of the Yoruba people made from beans flour. In the later version (BMY) published in the 1990s, bread as food, in general, is also mainly translated as oúnjẹ or the verb jẹ, but when it is a type of food, it is translated as akara with few occurrences of burẹdi. In the latest edition (BM), bread as food is either rendered as ounje or literally translated as burẹdi. Where it is a type of food in this version, it is mainly rendered as burẹdi with few occurrences of akara, indicating the assimilation of bread into the Yoruba culture. This result, although limited, shows that the Bible was translated into Yoruba to make it accessible to Yoruba speakers in their everyday language, hence the application of both domesticating and foreignising strategies. This research also emphasizes the role of the translator as an intermediary between two cultures.

Keywords: translation, Bible, Yoruba, cultural problems

Procedia PDF Downloads 238
5081 Experimental Investigation on Strengthening of Timber Beam Using Glass Fibers and Steel Plates

Authors: Sisaynew Tesfaw Admassu

Abstract:

The strengthening of timber beams can be necessary for several reasons including the increase of live loads (possible in a historical building for a change of destination of use or upgrading to meet new requirements), the reduction of the resistant cross-sections following deterioration (attacks of biological agents such as fungi, and insects) or traumatic events (fires) and the excess of deflection in the members. The main purpose of strengthening an element is not merely to repair it, but also to prevent and minimize the appearance of future problems. This study did an experimental investigation on the behavior of reference and strengthened solid timber beams. The strengthening materials used in this study were CSM-450 glass fiber and steel materials for both flexural and shear strengthening techniques. Twenty-two solid timber beams of Juniperus procera (TID) species with the dimensions of 60 x 90 x 780 mm were used in the present study. The binding material to bond the strengthening materials with timber was general-purpose resin with Luperox® K10 MEKP catalyst. Three beams were used as control beams (unstrengthen beams) while the remaining nineteen beams were strengthened using the strengthening materials for flexure and shear. All the beams were tested for three points loading to failure by using a Universal Testing Machine, UTM-600kN machine. The experimental results showed that the strengthened beams performed better than the unstrengthen beams. The experimental result of flexural strengthened beams showed that the load-bearing capacity of strengthened beams increased between 16.34 – 42.55%. Four layers of Glass Fiber Reinforced polymer on the tension side of the beams was shown to be the most effective way to enhance load-bearing capacity. The strengthened beams also have an enhancement in their flexural stiffness. The stiffness of flexural strengthened beams was increased between 1.18 – 65.53% as compared to the control beams. The highest increment in stiffness has occurred on beams strengthened using 2x60 mm steel plates. The shear-strengthened beams showed a relatively small amount of performance as compared to flexural-strengthened beams; the reason is that the beams are sufficient for shear. The polyester resin used in the experimental work showed good performance in bonding agents between materials. The resin showed more effectiveness in GFRP materials than steel materials.

Keywords: heritage structures, strengthening, stiffness, adhesive, polyester resin, steel plates

Procedia PDF Downloads 44
5080 Modelling Spatial Dynamics of Terrorism

Authors: André Python

Abstract:

To this day, terrorism persists as a worldwide threat, exemplified by the recent deadly attacks in January 2015 in Paris and the ongoing massacres perpetrated by ISIS in Iraq and Syria. In response to this threat, states deploy various counterterrorism measures, the cost of which could be reduced through effective preventive measures. In order to increase the efficiency of preventive measures, policy-makers may benefit from accurate predictive models that are able to capture the complex spatial dynamics of terrorism occurring at a local scale. Despite empirical research carried out at country-level that has confirmed theories explaining the diffusion processes of terrorism across space and time, scholars have failed to assess diffusion’s theories on a local scale. Moreover, since scholars have not made the most of recent statistical modelling approaches, they have been unable to build up predictive models accurate in both space and time. In an effort to address these shortcomings, this research suggests a novel approach to systematically assess the theories of terrorism’s diffusion on a local scale and provide a predictive model of the local spatial dynamics of terrorism worldwide. With a focus on the lethal terrorist events that occurred after 9/11, this paper addresses the following question: why and how does lethal terrorism diffuse in space and time? Based on geolocalised data on worldwide terrorist attacks and covariates gathered from 2002 to 2013, a binomial spatio-temporal point process is used to model the probability of terrorist attacks on a sphere (the world), the surface of which is discretised in the form of Delaunay triangles and refined in areas of specific interest. Within a Bayesian framework, the model is fitted through an integrated nested Laplace approximation - a recent fitting approach that computes fast and accurate estimates of posterior marginals. Hence, for each location in the world, the model provides a probability of encountering a lethal terrorist attack and measures of volatility, which inform on the model’s predictability. Diffusion processes are visualised through interactive maps that highlight space-time variations in the probability and volatility of encountering a lethal attack from 2002 to 2013. Based on the previous twelve years of observation, the location and lethality of terrorist events in 2014 are statistically accurately predicted. Throughout the global scope of this research, local diffusion processes such as escalation and relocation are systematically examined: the former process describes an expansion from high concentration areas of lethal terrorist events (hotspots) to neighbouring areas, while the latter is characterised by changes in the location of hotspots. By controlling for the effect of geographical, economical and demographic variables, the results of the model suggest that the diffusion processes of lethal terrorism are jointly driven by contagious and non-contagious factors that operate on a local scale – as predicted by theories of diffusion. Moreover, by providing a quantitative measure of predictability, the model prevents policy-makers from making decisions based on highly uncertain predictions. Ultimately, this research may provide important complementary tools to enhance the efficiency of policies that aim to prevent and combat terrorism.

Keywords: diffusion process, terrorism, spatial dynamics, spatio-temporal modeling

Procedia PDF Downloads 321
5079 Meniere's Disease and its Prevalence, Symptoms, Risk Factors and Associated Treatment Solutions for this Disease

Authors: Amirreza Razzaghipour Sorkhab

Abstract:

One of the most common disorders among humans is hearing impairment. This paper provides an evidence base that recovers understanding of Meniere’s disease and highlights the physical and mental health correlates of the disorder. Meniere's disease is more common in the elderly. The term idiopathic endolymphatic hydrops has been attributed to this disease by some in the previous. Meniere’s disease demonstrations a genetic tendency, and a family history is found in 10% of cases, with an autosomal dominant inheritance pattern. The COCH gene may be one of the hereditary factors contributing to Meniere’s disease, and the possibility of a COCH mutation should be considered in patients with Meniere’s disease symptoms. Should be considered Missense mutations in the COCH gene cause the autosomal dominant sensorineural hearing loss and vestibular disorder. Meniere’s disease is a complex, heterogeneous disorder of the inner ear and that is characterized by episodes of vertigo lasting from minutes to hours, fluctuating sensorineural hearing loss, tinnitus, and aural fullness. The existing evidence supports the suggestion that age and sleep disorder are risk factors for Meniere's disease. Many factors have been reported to precipitate the progress of Menier, including endolymphatic hydrops, immunology, viral infection, inheritance, vestibular migraine, and altered intra-labyrinthine fluid dynamics. Although there is currently no treatment that has a proven helpful effect on hearing levels or on the long-term evolution of the disease, however, in the primary stages, the hearing may improve among attacks, but a permanent hearing loss occurs in the majority of cases. Current publications have proposed a role for the intratympanic use of medicine, mostly aminoglycosides, for the control of vertigo. more than 85% of patients with Meniere's disease are helped by either changes in lifestyle and medical treatment or minimally aggressive surgical procedures such as intratympanic steroid therapy, intratympanic gentamicin therapy, and endolymphatic sac surgery. However, unilateral vestibular extirpation methods (intratympanic gentamicin, vestibular nerve section, or labyrinthectomy) are more predictable but invasive approaches to control the vertigo attacks. Medical therapy aimed at reducing endolymph volume, such as low-sodium diet, diuretic use, is the typical initial treatment.

Keywords: meniere's disease, endolymphatic hydrops, hearing loss, vertigo, tinnitus, COCH gene

Procedia PDF Downloads 65
5078 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria

Authors: Theresa Chinyere ONU

Abstract:

This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.

Keywords: education, social terrorism, women, Nigeria

Procedia PDF Downloads 551
5077 Cognitive Fusion and Obstacles to Valued Living: Beyond Pain-Specific Events in Chronic Pain

Authors: Sergio A. Carvalho, Jose Pinto-Gouveia, David Gillanders, Paula Castilho

Abstract:

The role of psychological processes has long been recognized as crucial factors in depressive symptoms in chronic pain (CP). Although some studies have explored the negative impact of being entangled with internal experiences (e.g., thoughts, emotions, physical sensations) – cognitive fusion, it is not extensively explored 1) whether these are pain-related or rather general difficult experiences, and 2) how they relate to experiencing obstacles in committing to valued actions. The current study followed a cross-sectional design in a sample of 231 participants with CP, in which a mediational model was tested through path analyses in AMOS software. The model presented a very good model fit (Χ²/DF = 1.161; CFI = .999; TLI = .996; RMSEA = .026, PCLOSE = .550.), and results showed that pain intensity was not directly related to depressive symptoms (β = .055; p = .239) but was mediated by cognitive fusion with both general and pain-related internal experiences (β = .181, 95%CI [.097; .271]; p = .015). Additionally, results showed that only general cognitive fusion (but not pain-specific fusion) was associated with experiencing obstacles to living a meaningful life, which mediated its impact on depressive symptoms (β = .197, 95%CI [.102; .307]; p = .001). Overall, this study adds on current literature by suggesting that psychological interventions to pain management should not be focused only on management of pain-related experiences, but also on developing more effective ways of relating to overall internal experiences.

Keywords: cognitive fusion, chronic pain, depressive symptoms, valued living

Procedia PDF Downloads 183
5076 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 133
5075 An Ensemble Learning Method for Applying Particle Swarm Optimization Algorithms to Systems Engineering Problems

Authors: Ken Hampshire, Thomas Mazzuchi, Shahram Sarkani

Abstract:

As a subset of metaheuristics, nature-inspired optimization algorithms such as particle swarm optimization (PSO) have shown promise both in solving intractable problems and in their extensibility to novel problem formulations due to their general approach requiring few assumptions. Unfortunately, single instantiations of algorithms require detailed tuning of parameters and cannot be proven to be best suited to a particular illustrative problem on account of the “no free lunch” (NFL) theorem. Using these algorithms in real-world problems requires exquisite knowledge of the many techniques and is not conducive to reconciling the various approaches to given classes of problems. This research aims to present a unified view of PSO-based approaches from the perspective of relevant systems engineering problems, with the express purpose of then eliciting the best solution for any problem formulation in an ensemble learning bucket of models approach. The central hypothesis of the research is that extending the PSO algorithms found in the literature to real-world optimization problems requires a general ensemble-based method for all problem formulations but a specific implementation and solution for any instance. The main results are a problem-based literature survey and a general method to find more globally optimal solutions for any systems engineering optimization problem.

Keywords: particle swarm optimization, nature-inspired optimization, metaheuristics, systems engineering, ensemble learning

Procedia PDF Downloads 63
5074 Investigation of the EEG Signal Parameters during Epileptic Seizure Phases in Consequence to the Application of External Healing Therapy on Subjects

Authors: Karan Sharma, Ajay Kumar

Abstract:

Epileptic seizure is a type of disease due to which electrical charge in the brain flows abruptly resulting in abnormal activity by the subject. One percent of total world population gets epileptic seizure attacks.Due to abrupt flow of charge, EEG (Electroencephalogram) waveforms change. On the display appear a lot of spikes and sharp waves in the EEG signals. Detection of epileptic seizure by using conventional methods is time-consuming. Many methods have been evolved that detect it automatically. The initial part of this paper provides the review of techniques used to detect epileptic seizure automatically. The automatic detection is based on the feature extraction and classification patterns. For better accuracy decomposition of the signal is required before feature extraction. A number of parameters are calculated by the researchers using different techniques e.g. approximate entropy, sample entropy, Fuzzy approximate entropy, intrinsic mode function, cross-correlation etc. to discriminate between a normal signal & an epileptic seizure signal.The main objective of this review paper is to present the variations in the EEG signals at both stages (i) Interictal (recording between the epileptic seizure attacks). (ii) Ictal (recording during the epileptic seizure), using most appropriate methods of analysis to provide better healthcare diagnosis. This research paper then investigates the effects of a noninvasive healing therapy on the subjects by studying the EEG signals using latest signal processing techniques. The study has been conducted with Reiki as a healing technique, beneficial for restoring balance in cases of body mind alterations associated with an epileptic seizure. Reiki is practiced around the world and is recommended for different health services as a treatment approach. Reiki is an energy medicine, specifically a biofield therapy developed in Japan in the early 20th century. It is a system involving the laying on of hands, to stimulate the body’s natural energetic system. Earlier studies have shown an apparent connection between Reiki and the autonomous nervous system. The Reiki sessions are applied by an experienced therapist. EEG signals are measured at baseline, during session and post intervention to bring about effective epileptic seizure control or its elimination altogether.

Keywords: EEG signal, Reiki, time consuming, epileptic seizure

Procedia PDF Downloads 381
5073 Functional and Efficient Query Interpreters: Principle, Application and Performances’ Comparison

Authors: Laurent Thiry, Michel Hassenforder

Abstract:

This paper presents a general approach to implement efficient queries’ interpreters in a functional programming language. Indeed, most of the standard tools actually available use an imperative and/or object-oriented language for the implementation (e.g. Java for Jena-Fuseki) but other paradigms are possible with, maybe, better performances. To proceed, the paper first explains how to model data structures and queries in a functional point of view. Then, it proposes a general methodology to get performances (i.e. number of computation steps to answer a query) then it explains how to integrate some optimization techniques (short-cut fusion and, more important, data transformations). It then compares the functional server proposed to a standard tool (Fuseki) demonstrating that the first one can be twice to ten times faster to answer queries.

Keywords: data transformation, functional programming, information server, optimization

Procedia PDF Downloads 129
5072 Bulk Viscous Bianchi Type V Cosmological Model with Time Dependent Gravitational Constant and Cosmological Constant in General Relativity

Authors: Reena Behal, D. P. Shukla

Abstract:

In this paper, we investigate Bulk Viscous Bianchi Type V Cosmological Model with Time dependent gravitational constant and cosmological constant in general Relativity by assuming ξ(t)=ξ_(0 ) p^m where ξ_(0 ) and m are constants. We also assume a variation law for Hubble parameter as H(R) = a (R^(-n)+1), where a>0, n>1 being constant. Two universe models were obtained, and their physical behavior has been discussed. When n=1 the Universe starts from singular state whereas when n=0 the cosmology follows a no singular state. The presence of bulk viscosity increase matter density’s value.

Keywords: Bulk Viscous Bianchi Type V Cosmological Model, hubble constants, gravitational constant, cosmological constants

Procedia PDF Downloads 150
5071 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 269
5070 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 403