Search results for: impact threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11223

Search results for: impact threat

11163 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016

Authors: Ray Maximillian, Idil Syawfi

Abstract:

Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.

Keywords: China, illegal fishing, Indonesia, natuna, securitization

Procedia PDF Downloads 191
11162 Organizational Performance and Impact of Social Innovation

Authors: Alfonso Unceta, Javier Castro-Spila

Abstract:

This paper offers a conceptual and empirical exploration between the organizational performance and the impact of social innovation. The paper contributes on the social innovation field in three domains: a) It provides analytical and empirical evidence linking organizational performance to the impact of social innovation; b) it provides a first outline of impact assessment of social innovation when it is developed by a diversity of heterogeneous actors (systemic social innovation); c) it provides a first outline for the development of innovation policies to support social innovations according to a typology of organizations and a typology of impact.

Keywords: absorptive capacity, social innovation impact, organizational performance, RESINDEX, Basque Country

Procedia PDF Downloads 451
11161 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 75
11160 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 336
11159 Moderating and Mediating Effects of Business Model Innovation Barriers during Crises: A Structural Equation Model Tested on German Chemical Start-Ups

Authors: Sarah Mueller-Saegebrecht, André Brendler

Abstract:

Business model innovation (BMI) as an intentional change of an existing business model (BM) or the design of a new BM is essential to a firm's development in dynamic markets. The relevance of BMI is also evident in the ongoing COVID-19 pandemic, in which start-ups, in particular, are affected by limited access to resources. However, first studies also show that they react faster to the pandemic than established firms. A strategy to successfully handle such threatening dynamic changes represents BMI. Entrepreneurship literature shows how and when firms should utilize BMI in times of crisis and which barriers one can expect during the BMI process. Nevertheless, research merging BMI barriers and crises is still underexplored. Specifically, further knowledge about antecedents and the effect of moderators on the BMI process is necessary for advancing BMI research. The addressed research gap of this study is two-folded: First, foundations to the subject on how different crises impact BM change intention exist, yet their analysis lacks the inclusion of barriers. Especially, entrepreneurship literature lacks knowledge about the individual perception of BMI barriers, which is essential to predict managerial reactions. Moreover, internal BMI barriers have been the focal point of current research, while external BMI barriers remain virtually understudied. Second, to date, BMI research is based on qualitative methodologies. Thus, a lack of quantitative work can specify and confirm these qualitative findings. By focusing on the crisis context, this study contributes to BMI literature by offering a first quantitative attempt to embed BMI barriers into a structural equation model. It measures managers' perception of BMI development and implementation barriers in the BMI process, asking the following research question: How does a manager's perception of BMI barriers influence BMI development and implementation in times of crisis? Two distinct research streams in economic literature explain how individuals react when perceiving a threat. "Prospect Theory" claims that managers demonstrate risk-seeking tendencies when facing a potential loss, and opposing "Threat-Rigidity Theory" suggests that managers demonstrate risk-averse behavior when facing a potential loss. This study quantitively tests which theory can best predict managers' BM reaction to a perceived crisis. Out of three in-depth interviews in the German chemical industry, 60 past BMIs were identified. The participating start-up managers gave insights into their start-up's strategic and operational functioning. After, each interviewee described crises that had already affected their BM. The participants explained how they conducted BMI to overcome these crises, which development and implementation barriers they faced, and how severe they perceived them, assessed on a 5-point Likert scale. In contrast to current research, results reveal that a higher perceived threat level of a crisis harms BM experimentation. Managers seem to conduct less BMI in times of crisis, whereby BMI development barriers dampen this relation. The structural equation model unveils a mediating role of BMI implementation barriers on the link between the intention to change a BM and the concrete BMI implementation. In conclusion, this study confirms the threat-rigidity theory.

Keywords: barrier perception, business model innovation, business model innovation barriers, crises, prospect theory, start-ups, structural equation model, threat-rigidity theory

Procedia PDF Downloads 68
11158 Investigation of Single Particle Breakage inside an Impact Mill

Authors: E. Ghasemi Ardi, K. J. Dong, A. B. Yu, R. Y. Yang

Abstract:

In current work, a numerical model based on the discrete element method (DEM) was developed which provided information about particle dynamic and impact event condition inside a laboratory scale impact mill (Fritsch). It showed that each particle mostly experiences three impacts inside the mill. While the first impact frequently happens at front surface of the rotor’s rib, the frequent location of the second impact is side surfaces of the rotor’s rib. It was also showed that while the first impact happens at small impact angle mostly varying around 35º, the second impact happens at around 70º which is close to normal impact condition. Also analyzing impact energy revealed that varying mill speed from 6000 to 14000 rpm, the ratio of first impact’s average impact energy and minimum required energy to break particle (Wₘᵢₙ) increased from 0.30 to 0.85. Moreover, it was seen that second impact poses intense impact energy on particle which can be considered as the main cause of particle splitting. Finally, obtained information from DEM simulation along with obtained data from conducted experiments was implemented in semi-empirical equations in order to find selection and breakage functions. Then, using a back-calculation approach, those parameters were used to predict the PSDs of ground particles under different impact energies. Results were compared with experiment results and showed reasonable accuracy and prediction ability.

Keywords: single particle breakage, particle dynamic, population balance model, particle size distribution, discrete element method

Procedia PDF Downloads 262
11157 Analysis of the Environmental Impact of Selected Small Heat and Power Plants Operating in Poland

Authors: M. Stelmachowski, M. Wojtczak

Abstract:

The aim of the work was to assess the environmental impact of the selected small and medium-sized companies supplying heat and electricity to the cities with a population of about 50,000 inhabitants. Evaluation and comparison of the impact on the environment have been carried out for the three plants producing heat and two CHP plants with particular attention to emissions into the atmosphere and the impact of introducing a system of trading carbon emissions of these companies.

Keywords: CO2 emission, district heating, heat and power plant, impact on environment

Procedia PDF Downloads 447
11156 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides

Authors: Maria Elisabete Costa Ferreira

Abstract:

Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.

Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force

Procedia PDF Downloads 34
11155 The Introduction of Modern Diagnostic Techniques and It Impact on Local Garages

Authors: Mustapha Majid

Abstract:

Gone were the days when technicians/mechanics will have to spend too much time trying to identify a mechanical fault and rectify the problem. Now the emphasis is on the use of Automobile diagnosing Equipment through the use of computers and special software. An investigation conducted at Tamale Metropolis and Accra in the Northern and Greater Accra regions of Ghana, respectively. Methodology for data gathering were; questionnaires, physical observation, interviews, and newspaper. The study revealed that majority of mechanics lack computer skills which can enable them use diagnosis tools such as Exhaust Gas Analyzer, Scan Tools, Electronic Wheel Balancing machine, etc.

Keywords: diagnosing, local garages and modern garages, lack of knowledge of diagnosing posing an existential threat, training of local mechanics

Procedia PDF Downloads 122
11154 A New Instrumented Drop-Weight Test Machine for Studying the Impact Behaviour of Reinforced Concrete Beams

Authors: M. Al-Farttoosi, M. Y. Rafiq, J. Summerscales, C. Williams

Abstract:

Structures can be subjected to impact loading from various sources like earthquake, tsunami, missiles and explosions. The impact loading can cause different degrees of damage to concrete structures. The demand for strengthening and rehabilitation of damaged structures is increasing. In recent years, Car0bon Fibre Reinforced Polymer (CFRP) matrix composites has gain more attention for strengthening and repairing these structures. To study the impact behaviour of the reinforced concrete (RC) beams strengthened or repaired using CFRP, a heavy impact test machine was designed and manufactured .The machine included a newly designed support system for beams together with various instrumentation. This paper describes the support design configuration of the impact test machine, instrumentation and dynamic analysis of the concrete beams. To evaluate the efficiency of the new impact test machine, experimental impact tests were conducted on simple supported reinforced concrete beam. Different methods were used to determine the impact force and impact response of the RC beams in terms of inertia force, maximum deflection, reaction force and fracture energy. The manufactured impact test machine was successfully used in testing RC beams under impact loading and used successfully to test the reinforced concrete beams strengthened or repaired using CFRP under impact loading.

Keywords: beam, concrete, impact, machine

Procedia PDF Downloads 392
11153 Management Opposition, Strikes, and Union Threats

Authors: Patrick Nüß

Abstract:

I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.

Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments

Procedia PDF Downloads 155
11152 Financial and Human Resources of Terrorism

Authors: Abdurrahman Karacabey

Abstract:

Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.

Keywords: financial resources, human resources, isis, terrorism

Procedia PDF Downloads 382
11151 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development

Authors: Halilu Babaji, Adamu Buba

Abstract:

The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.

Keywords: arms, development, proliferation, security

Procedia PDF Downloads 278
11150 Investigation of Building Pounding during Earthquake and Calculation of Impact Force between Two Adjacent Structures

Authors: H. Naderpour, R. C. Barros, S. M. Khatami

Abstract:

Seismic excitation is naturally caused large horizontal relative displacements, which is able to provide collisions between two adjacent buildings due to insufficient separation distance and severe damages are occurred due to impact especially in tall buildings. In this paper, an impact is numerically simulated and two needed parameters are calculated, including impact force and energy absorption. In order to calculate mentioned parameters, mathematical study needs to model an unreal link element, which is logically assumed to be spring and dashpot to determine lateral displacement and damping ratio of impact. For the determination of dynamic response of impact, a new equation of motion is theoretically suggested to evaluate impact force and energy dissipation. In order to confirm the rendered equation, a series of parametric study are performed and the accuracy of formula is confirmed.

Keywords: pounding, impact, dissipated energy, coefficient of restitution

Procedia PDF Downloads 324
11149 Prediction of Heavy-Weight Impact Noise and Vibration of Floating Floor Using Modified Impact Spectrum

Authors: Ju-Hyung Kim, Dae-Ho Mun, Hong-Gun Park

Abstract:

When an impact is applied to a floating floor, noise and vibration response of high-frequency range is reduced effectively, while amplifies the response at low-frequency range. This means floating floor can make worse noise condition when heavy-weight impact is applied. The amplified response is the result of interaction between finishing layer (mortar plate) and concrete slab. Because an impact force is not directly delivered to concrete slab, the impact force waveform or spectrum can be changed. In this paper, the changed impact spectrum was derived from several floating floor vibration tests. Based on the measured data, numerical modeling can describe the floating floor response, especially at low-frequency range. As a result, heavy-weight impact noise can be predicted using modified impact spectrum.

Keywords: floating floor, heavy-weight impact, prediction, vibration

Procedia PDF Downloads 335
11148 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 69
11147 Heritage Impact Assessment Policy within Western Balkans, Albania

Authors: Anisa Duraj

Abstract:

As usually acknowledged, cultural heritage is the weakest component in EIA studies. The role of heritage impact assessment (HIA) in development projects is not often accounted for, and in those cases where it is, HIA is considered as a reactive response and not as a solutions provider. Because of continuous development projects, in most cases, heritage is unconsidered and often put under threat. Cultural protection and development challenges ask for prudent legal regulation and appropriate policy implementation. The challenges become even more peculiar in underdeveloped countries or endangered areas, which are generally characterized by numerous legal constraints. Therefore, the need for strategic proposals for HIA is of high importance. In order to trigger HIA as a proactive operation in the IA process and make sure to cover cultural heritage in the whole EIA framework, an appropriate system of evaluation of impacts should be provided. To obtain the required results for HIA, this last must be part of a regional policy, which will address and guide development projects toward a proper evaluation of their impacts affecting heritage. In order to get a clearer picture of existing gabs but also new possibilities for HIA, this paper will focus on the Western Balkans region and the undergoing changes that it faces. Concerning continuous development pressure in the region and within the aspiration of the Western Balkans countries to join the European Union (EU) as member states, attention should be paid to new development policies under the EU directives for conducting EIAs, and accurate support is required for the restructuration of existing policies as well as for the implementation of the UN Agenda for SDGs. In the framework of new emerging needs, if HIA is taken into account, the outcome would be an inclusive regional program that would help to overcome marginality issues of spaces and people.

Keywords: cultural heritage, impact assessment, SDGs, urban development, western Balkans, regional policy, HIA, EIA

Procedia PDF Downloads 64
11146 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 475
11145 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 46
11144 Optimising GIS in Cushioning the Environmental Impact of Infrastructural Projects

Authors: Akerele Akintunde Hareef

Abstract:

GIS is an integrating tool for storing, retrieving, manipulating, and analyzing spatial data. It is a tool which defines an area with respect to features and other relevant thematic delineations. On the other hand, Environmental Impact Assessment in short is both positive and negative impact of an infrastructure on an environment. Impact of infrastructural projects on the environment is an aspect of development that barely get extensive portion of pre-project execution phase and when they do, the effects are most times not implemented to cushion the impact they have on human and the environment. In this research, infrastructural projects like road constructions, water reticulation projects, building constructions, bridge etc. have immense impact on the environment and the people that reside in location of construction. Hence, the need for this research tends to portray the relevance of Environmental Impact assessment in calculating the vulnerability of human and the environment to imbalance necessitated by this infrastructural development and how the use of GIS application can be optimally applied to annul or minimize the effect.

Keywords: environmental impact assessment (EIA), geographic information system (GIS), infrastructural projects, environment

Procedia PDF Downloads 516
11143 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 68
11142 The Effect of Floor Impact Sound Insulation Performance Using Scrambled Thermoplastic Poly Urethane and Ethylene Vinyl Acetate

Authors: Bonsoo Koo, Seong Shin Hong, Byung Kwon Lee

Abstract:

Most of apartments in Korea have wall type structure that present poor performance regarding floor impact sound insulation. In order to minimize the transmission of floor impact sound, flooring structures are used in which an insulating material, 30 mm thickness pad of EPS or EVA, is sandwiched between a concrete slab and the finished mortar. Generally, a single-material pad used for insulation has a heavyweight impact sound level of 44~47 dB with 210 mm thickness slab. This study provides an analysis of the floor impact sound insulation performance using thermoplastic poly urethane (TPU), ethylene vinyl acetate (EVA), and expanded polystyrene (EPS) materials with buffering performance. Following mock-up tests the effect of lightweight impact sound turned out to be similar but heavyweight impact sound was decreased by 3 dB compared to conventional single material insulation pad.

Keywords: floor impact sound, thermoplastic poly urethane, ethylene vinyl acetate, heavyweight impact sound

Procedia PDF Downloads 375
11141 Athletics and Academics: A Mixed Methods Enquiry on University/College Student Athletes' Experiences

Authors: Tshepang Tshube

Abstract:

The primary purpose of this study was to examine student-athletes’ experiences, particularly an in-depth account of balancing school and sport. The secondary objective was to assess student-athletes’ susceptibility to the effects of the “dumb-jock” stereotype threat and also determine the strength of athletic and academic identity as predicated by the extent to which stereotype is perceived by student-athletes. Sub-objectives are (a) examine support structures available for student-athletes in their respective academic institutions, (b) to establish the most effective ways to address student-athletes’ learning needs, (c) to establish crucial entourage members who play a pivotal role in student-athletes’ academic pursuits, (d) and unique and effective ways lecturers and coaches can contribute to student-athletes’ learning experiences. To achieve the above stated objectives, the study used a mixed methods approach. A total of 110 student-athletes from colleges and universities in Botswana completed an online survey that was followed by semi-structured interviews with eight student-athletes, and four coaches. The online survey assessed student-athletes’ demographic variables, measured athletic (AIMS), academic (modified from AIMS) identities, and perceived stereotype threat. Student-athletes reported a slightly higher academic identity (M=5.9, SD= .85) compared to athletic identity (M=5.4, SD=1.0). Student-athletes reported a moderate mean (M=3.6, SD=.82) just above the midpoint of the 7-point scale for stereotype threat. A univariate ANOVA was conducted to determine if there was any significant difference between university and college brackets in Botswana with regard to three variables: athletic identity, student identity and stereotype threat. The only significant difference was in the academic identity (Post Hoc-Tukey Student Identity: Bracket A < Bracket B, Bracket C) with Bracket A schools being the least athletically competitive. Bracket C and B are the most athletically competitive brackets in Botswana. Follow-up interviews with student-athletes and coaches were conducted. All interviews lasted an average of 55 minutes. Following all the interviews, all recordings were transcribed which is an obvious first step in qualitative data analysis process. The researcher and an independent academic with experience in qualitative research independently listened to all recordings of the interviews and read the transcripts several times. Qualitative data results indicate that even though student-athletes reported a slightly higher student identity, there are parallels between sports and academic structures on college campuses. Results also provide evidence of lack of academic support for student-athletes. It is therefore crucial for student-athletes to have access to academic support services (e.g., tutoring, flexible study times, and reduced academic loads) to meet their academic needs. Coaches and lecturers play a fundamental role in sporting student-athletes. Coaches and professors’ academic efficacy on student-athletes enhances student-athletes’ academic confidence. Results are discussed within the stereotype threat theory.

Keywords: athletic identity, colligiate sport, sterotype threat, student athletes

Procedia PDF Downloads 436
11140 Indoor Air Pollution: A Major Threat to Human Health

Authors: Pooja Rawat, Rakhi Tyagi

Abstract:

Globally, almost 3 billion people rely on biomass (wood, charcoal, dung and crop residues) and coal as their primary source of domestic energy. Cooking and heating with solid fuels on open fire give rise to major pollutants. Women are primarily affected by these pollutants as they spend most of their time in the house. The WHO World Health Report 2002 estimates that indoor air pollution (IAP) is responsible for 2.7% of the loss of disability adjusted life years (DALYs) worldwide and 3.7% in high mortality developing countries. Indoor air pollution has the potential to not only impact health, but also impact the general economic well-being of the household. Exposure to high level of household pollution lead to acute and chronic respiratory conditions (e.g.: pneumonia, chronic obstructive pulmonary disease, lung cancer and cataract). There has been many strategies for reducing IAP like subsidize cleaner fuel technologies, for example use of kerosene rather than traditional biomass fuels. Another example is development, promotion of 'improved cooking stoves'. India, likely ranks second- distributing over 12 million improved stoves in the first seven years of a national program to develop. IAP should be reduced by understanding the welfare effects of reducing IAP within households and to understanding the most cost effective way to reduce it.

Keywords: open fire, indoor pollution, lung diseases, indoor air pollution

Procedia PDF Downloads 268
11139 Noise Pollution: An Emerging Threat to Urban Health

Authors: M. Sirajul Islam Molla

Abstract:

Noise pollution has been a continuous and an increasing threat to human health in urban population all over the world. The situation in Bangladesh particularly in major cities has been dangerously aggravating. Despite the government of Bangladesh have laws in its hand to curb the noise pollution the authority’s reluctance in enforcing it, is making the situation worse. We do not see any difference in some other major cities of the South Asian Regional Countries like Delhi and Kathmandu, both of the cities are facing the same situation like Dhaka. With the expansion of technology-based township all over the world, the noise pollution has been an emerging threat to urban health. The information for this review has been derived from websites of GOs, NGOs, peer-reviewed papers, seminars and symposia. The worse situation of noise pollution results in people’s irritation and protest, but in many cases, the protesters are facing the wrath of the polluters. Two such consequences in Bangladesh have resulted in killing the protesters by the polluters – one happened in Dhaka city and the other in a rural town. The law-enforcing agencies proactively do not attempt to impose the law. Noise pollution has been increasing so rapidly that it has become a burden on human health in urban populations. Prolonged exposure to higher noise causes mental stress, sleeplessness, high blood pressure, cardiac failure, respiratory disorder, miscarriage and breaks attention of students to their studies and also irritates their behavior. The noise pollution-caused mortality has also been increasing all over the world. Recommendations from the international conferences such as ICUH should be forwarded to the United Nations. The UN then should pass it on to the concerned countries. The UN should also keenly monitor if the countries have appropriate plan to curb noise pollution to meet the sustainable development goals.

Keywords: decibel, environment, noise, pollution

Procedia PDF Downloads 216
11138 A Study on the Life Prediction Performance Degradation Analysis of the Hydraulic Breaker

Authors: Jong Won, Park, Sung Hyun, Kim

Abstract:

The kinetic energy to pass subjected to shock and chisel reciprocating piston hydraulic power supplied by the excavator using for the purpose of crushing the rock, and roads, buildings, etc., hydraulic breakers blow. Impact frequency, efficiency measurement of the impact energy, hydraulic breakers, to demonstrate the ability of hydraulic breaker manufacturers and users to a very important item. And difficult in order to confirm the initial performance degradation in the life of the hydraulic breaker has been thought to be a problem.In this study, we measure the efficiency of hydraulic breaker, Impact energy and Impact frequency, the degradation analysis of research to predict the life.

Keywords: impact energy, impact frequency, hydraulic breaker, life prediction

Procedia PDF Downloads 406
11137 Prediction of Pounding between Two SDOF Systems by Using Link Element Based On Mathematic Relations and Suggestion of New Equation for Impact Damping Ratio

Authors: Seyed M. Khatami, H. Naderpour, R. Vahdani, R. C. Barros

Abstract:

Many previous studies have been carried out to calculate the impact force and the dissipated energy between two neighboring buildings during seismic excitation, when they collide with each other. Numerical studies are an important part of impact, which several researchers have tried to simulate the impact by using different formulas. Estimation of the impact force and the dissipated energy depends significantly on some parameters of impact. Mass of bodies, stiffness of spring, coefficient of restitution, damping ratio of dashpot and impact velocity are some known and unknown parameters to simulate the impact and measure dissipated energy during collision. Collision is usually shown by force-displacement hysteresis curve. The enclosed area of the hysteresis loop explains the dissipated energy during impact. In this paper, the effect of using different types of impact models is investigated in order to calculate the impact force. To increase the accuracy of impact model and to optimize the results of simulations, a new damping equation is assumed and is validated to get the best results of impact force and dissipated energy, which can show the accuracy of suggested equation of motion in comparison with other formulas. This relation is called "n-m". Based on mathematical relation, an initial value is selected for the mentioned coefficients and kinetic energy loss is calculated. After each simulation, kinetic energy loss and energy dissipation are compared with each other. If they are equal, selected parameters are true and, if not, the constant of parameters are modified and a new analysis is performed. Finally, two unknown parameters are suggested to estimate the impact force and calculate the dissipated energy.

Keywords: impact force, dissipated energy, kinetic energy loss, damping relation

Procedia PDF Downloads 524
11136 Opening of North Sea Route and Geopolitics in Arctic: Impact and Possibilities of Route

Authors: Nikkey Keshri

Abstract:

Arctic is a polar region located at the north of the earth. This consists of the Arctic Ocean and other parts of Canada, Russia, the United States, Denmark, Norway, Sweden, Finland, and Iceland. Arctic has vast natural resources which are exploited with modern technology, and the economic opening up of Russia has given new opportunities. All these states have connected with the Arctic region for economic activities and this effect the region ecology. The pollution problem is a serious threat to the people health living around pollution sources. Due to the prevailing worldwide sea and air currents, the Arctic area is the fallout region for long-range transport pollutants, and in some places the concentrations exceed the levels of densely populated urban areas. The Arctic is especially vulnerable to the effects of global warming, as has become apparent in the melting sea ice in recent years. Climate models predict much greater warming in the Arctic than the global average, resulting in significant international attention to the region. The global warming has an adverse impact on the climate, indigenous people, wildlife, and infrastructure. However, there are several opportunities that have emerged in the form of shipping routes, resources, and new territories. The shipping route through the Arctic is a reality and is currently navigable for a few weeks during summers. There are large deposits of oil and gas, minerals and fish and the surrounding countries with Arctic coastlines are becoming quite assertive about exercising their sovereignty over the newfound wealth. The main part of the research is that how the opening of Northern Sea Route is providing opportunities or problem in the Arctic and it is becoming geopolitically important. It focuses on the interest Arctic and non Arctic states, their present and anticipated global geopolitical aims. The Northern Sea Route might open up due to climate changes and that Iceland might benefit or has an impact from the situation. Efforts will be made to answer the research question: ‘Whether Opening of North Sea Route is providing opportunities or becoming a risk for Arctic region?’ Every research has a structure which usually called design. In this research, both Qualitative and Quantitative method is used in terms of various literature, maps, pie- charts, etc to find out the answer for the research question. The aim of this research is to find out the impact of Opening of North Sea Route over Arctic region and how this make arctic geopolitically important. The aim behind this research is to find out the impact of climate change and how the particular geographical area is being affected.

Keywords: climate change, geopolitics, international relation, Northern Sea Route

Procedia PDF Downloads 232
11135 Opportunities and Optimization of the Our Eyes Initiative as the Strategy for Counter-Terrorism in ASEAN

Authors: Chastiti Mediafira Wulolo, Tri Legionosuko, Suhirwan, Yusuf

Abstract:

Terrorism and radicalization have become a common threat to every nation in this world. As a part of the asymmetric warfare threat, terrorism and radicalization need a complex strategy as the problem solver. One such way is by collaborating with the international community. The Our Eyes Initiative (OEI), for example, is a cooperation pact in the field of intelligence information exchanges related to terrorism and radicalization initiated by the Indonesian Ministry of Defence. The pact has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages military acts as a central role, but it still requires the involvement of various parties such as the police, intelligence agencies and other government institutions. This paper will use a qualitative content analysis method to address the opportunity and enhance the optimization of OEI. As the result, it will explain how OEI takes the opportunities as the strategy for counter-terrorism by building it up as the regional cooperation, building the legitimacy of government and creating the legal framework of the information sharing system.

Keywords: our eyes initiative, terrorism, counter-terrorism, ASEAN, cooperation, strategy

Procedia PDF Downloads 150
11134 Considering Partially Developed Artifacts in Change Impact Analysis Implementation

Authors: Nazri Kama, Sufyan Basri, Roslina Ibrahim

Abstract:

It is important to manage the changes in the software to meet the evolving needs of the customer. Accepting too many changes causes delay in the completion and it incurs additional cost. One type of information that helps to make the decision is through change impact analysis. Current impact analysis approaches assume that all classes in the class artifact are completely developed and the class artifact is used as a source of analysis. However, these assumptions are impractical for impact analysis in the software development phase as some classes in the class artifact are still under development or partially developed that leads to inaccuracy. This paper presents a novel impact analysis approach to be used in the software development phase. The significant achievements of the approach are demonstrated through an extensive experimental validation using three case studies.

Keywords: software development, impact analysis, traceability, static analysis.

Procedia PDF Downloads 580