Search results for: important links
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14644

Search results for: important links

14314 The Application of New Ligands including Different Atoms and Evaluation of Their Nucleophile Effects against Various Metals

Authors: Saman Hajmohamadi, Sohrab Hajmohamadi

Abstract:

The objectives of this experiment were to investigate the application of new ligands including different atoms and evaluation of their nucleophile effects against various metals. Chemistry researchers are really interested in this field. From among various ligands, there are some ligands with different coordinating ligands as well. There are great number of intermediate complexes and major elements of organic compositions with various atoms. There is a regular adding of new compositions. Complexes are the most important chemical combinations with various catalysts and biological, medicinal and other applications. Those complexes with ligands including different atom givers are really important and their synthesis could solve most of chemical problems. Supplying of new ligands is an important and key part of coordination chemistry which may cause some varieties and different properties in complexes with equal central nucleus. As a result, this research has evaluated new ligands including different coordination atoms, such as oxygen, nitrogen etc. along with their behavior against various metals like copper, nickel, iron etc.

Keywords: ligands, nucleophile, iron, cobalt, copper

Procedia PDF Downloads 175
14313 The Effective Method for Postering Thinking Dispositions of Learners

Authors: H. Jalahi, A. Yazdanpanah Nozari

Abstract:

Background and Purpose: Assessment of learners’ performance is an important factors in teaching-learning process. When a factor is sensitive and has high influence on life, their assessment should be done precisely. Thinking dispositions are very important factors in medical education because of its specific condition. In this study a model is designed for fostering thinking dispositions of learners in which authentic assessment is an important element. Materials and Methods: Objective based research is developmental, and such a model was not designed for curricula. Data collection and comparing approaches about assessment and analyzing current assessments offered applied proposals. Results: Based on research findings, the current assessments are response-based, that is students instead of product of response, only offers the specific response which the teachers expects; but authentic assessment is a form of assessment in which students are asked to perform real-word tasks that demonstrate meaningful application of essential knowledge and skills. Conclusion: Because of the difficulties and unexpected problems in life and individuals needs to lifelong learning and conditions in medical course that require decision making in specific times, we must pay attention to reach thinking dispositions and it should be included in curriculum. Authentic assessment as an important aspect of curriculum can help fostering thinking dispositions of learners. Using this kind of assessments which focus on application of information and skills to solve real-word tasks have more important role in medical courses.

Keywords: assessment, authentic, medical courses, developmental

Procedia PDF Downloads 331
14312 Hotel and Service Industry in USA: Is It Leveraged? Case Study of Seven Important Hotel Chains

Authors: Azadeh Shahbazi

Abstract:

This study tries to find out the determinants of capital structure in hotel industry in 7 important hotel chains in USA within the period of 12 years of 2000 to 2012. The study is used a panel pooled regression to realize the relation among different variables. Results show that the variables which could make changes in the capital structure of firms are Non-Debt Tax Shield and Tangibility.

Keywords: capital structure, service industry, hospitality, finance

Procedia PDF Downloads 442
14311 Childhood Trauma and Identity in Adulthood

Authors: Aakriti Lohiya

Abstract:

This study examines the commonly recognised childhood trauma that can have a significant and enduring effect on a person's cognitive and psychological health. The purpose of this study was to look at the intricate interactions that exist between negative self-identity, cognitive distortions, and early trauma. For the study, a sample of (200 women were taken, who were socially active) was gathered. Standardised measures were utilised to evaluate the participants' experiences of childhood trauma, and validated psychological tools were employed to assess negative self-identity and cognitive distortions. The links and predicting correlations between childhood trauma, negative self-identity, and cognitive distortions were investigated using statistical techniques, such as correlation analysis and multiple regression modelling. The results demonstrated that there is no correlation between the degree of early trauma and the emergence of a negative self-identity and cognitive distortions. It examines whether cognitive distortion and events in childhood have any relationship with negative self-identity using various scales. Participants completed the Childhood Trauma Questionnaire, which assessed retrospective accounts of childhood trauma; the Cognitive Distortions Scale, which measured internal attributions and perceptions of controllability; and the attachment style questionnaire, which assessed the attachment attribute of their daily life, which will lead negative. The implications for therapy were also considered.

Keywords: cognitive distortion, therapy, childhood trauma, attachment

Procedia PDF Downloads 42
14310 Brand Creation for Community Product: A Case Study at Samut Songkram, Thailand

Authors: Cholpassorn Sitthiwarongchai

Abstract:

The purposes of this paper were to search for the uniqueness of community products from Bang Khonthi District, Samut Songkram Province, Thailand and to create a proper brand for the community products. Four important questions were asked to identify the uniqueness of the community products. The first question: What is the brand of coconut sugar that community wants to imply? The answer was 100 percent authentic coconut sugar. The second question: What is the nature of this product? The answer was that it is a natural product without any harmful chemical. The third question is: Who are the target customers? The answer was that homemakers and tourists are target customers. The fourth question: What is the brand guarantee to customers? The answer was that the brand guarantees that the product is 100 percent natural process with a high quality and it is a community production. The findings revealed that in terms of product, customers rated quality and package as the two most important factors. In terms of price, customers rated lower price and a visible label as the two most important factors. In terms of place, customer rated layout and the cleanliness of the place as the two most important factors. In terms of promotion, customer rated public relations and brochure at the store as the most important factors. From the group discussion, the local community agreed that the brand for the community coconut sugar of Salapi community should be a picture of a green coconut tree and yellow color background. This brand implies the strength of community and authentic of the high quality natural product.

Keywords: coconut sugar, community brand, Samut Songkram, natural product

Procedia PDF Downloads 367
14309 Common Regulatory Mechanisms Reveals Links between Aberrant Glycosylation and Biological Hallmarks in Cancer

Authors: Jahanshah Ashkani, Kevin J. Naidoo

Abstract:

Glycosylation is the major posttranslational modification (PTM) process in cellular development. In tumour development, it is marked by structural alteration of carbohydrates (glycans) that is the result of aberrant glycosylation. Altered glycan structures affect cell surface ligand-receptor interactions that interfere with the regulation of cell adhesion, migration, and proliferation. The resulting changes in glycan biosynthesis pathways originate from altered expression of glycosyltransferases and glycosidases. While the alteration in glycosylation patterns is a recognized “hallmark of cancer”, the influential overview of the biology of cancer proposes eight hallmarks with no explicit suggestion to connectivity with glycosylation. Recently, we have discovered a connection between the glycosyltransferase gene expression and cancer type and subtype. Here we present an association between aberrant glycosylation and the biological hallmarks of breast cancer by exploring the common regulatory mechanisms at the genomic scale. The result of this study bridges the glycobiological and biological pathways that are accepted hallmarks of cancer by connecting their common regulatory pathways. This is an impetus for further investigation as target therapies of breast cancer are very likely to be uncovered from this.

Keywords: aberrant glycosylation, biological hallmarks, breast cancer, regulatory mechanism

Procedia PDF Downloads 223
14308 Effects of Plasma Technology in Biodegradable Films for Food Packaging

Authors: Viviane P. Romani, Bradley D. Olsen, Vilásia G. Martins

Abstract:

Biodegradable films for food packaging have gained growing attention due to environmental pollution caused by synthetic films and the interest in the better use of resources from nature. Important research advances were made in the development of materials from proteins, polysaccharides, and lipids. However, the commercial use of these new generation of sustainable materials for food packaging is still limited due to their low mechanical and barrier properties that could compromise the food quality and safety. Thus, strategies to improve the performance of these materials have been tested, such as chemical modifications, incorporation of reinforcing structures and others. Cold plasma is a versatile, fast and environmentally friendly technology. It consists of a partially ionized gas containing free electrons, ions, and radicals and neutral particles able to react with polymers and start different reactions, leading to the polymer degradation, functionalization, etching and/or cross-linking. In the present study, biodegradable films from fish protein prepared through the casting technique were plasma treated using an AC glow discharge equipment. The reactor was preliminary evacuated to ~7 Pa and the films were exposed to air plasma for 2, 5 and 8 min. The films were evaluated by their mechanical and water vapor permeability (WVP) properties and changes in the protein structure were observed using Scanning Electron Microscopy (SEM) and X-ray diffraction (XRD). Potential cross-links and elimination of surface defects by etching might be the reason for the increase in tensile strength and decrease in the elongation at break observed. Among the times of plasma application tested, no differences were observed when higher times of exposure were used. The X-ray pattern showed a broad peak at 2θ = 19.51º that corresponds to the distance of 4.6Å by applying the Bragg’s law. This distance corresponds to the average backbone distance within the α-helix. Thus, the changes observed in the films might indicate that the helical configuration of fish protein was disturbed by plasma treatment. SEM images showed surface damage in the films with 5 and 8 min of plasma treatment, indicating that 2 min was the most adequate time of treatment. It was verified that plasma removes water from the films once weight loss of 4.45% was registered for films treated during 2 min. However, after 24 h in 50% of relative humidity, the water lost was recovered. WVP increased from 0.53 to 0.65 g.mm/h.m².kPa after plasma treatment during 2 min, that is desired for some foods applications which require water passage through the packaging. In general, the plasma technology affects the properties and structure of fish protein films. Since this technology changes the surface of polymers, these films might be used to develop multilayer materials, as well as to incorporate active substances in the surface to obtain active packaging.

Keywords: fish protein films, food packaging, improvement of properties, plasma treatment

Procedia PDF Downloads 139
14307 The Cadmium Adsorption Study by Using Seyitomer Fly Ash, Diatomite and Molasses in Wastewater

Authors: N. Tugrul, E. Moroydor Derun, E. Cinar, A. S. Kipcak, N. Baran Acarali, S. Piskin

Abstract:

Fly ash is an important waste, produced in thermal power plants which causes very important environmental pollutions. For this reason the usage and evaluation the fly ash in various areas are very important. Nearly, 15 million tons/year of fly ash is produced in Turkey. In this study, usage of fly ash with diatomite and molasses for heavy metal (Cd) adsorption from wastewater is investigated. The samples of Seyitomer region fly ash were analyzed by X-ray fluorescence (XRF) and Scanning Electron Microscope (SEM) then diatomite (0 and 1% in terms of fly ash, w/w) and molasses (0-0.75 mL) were pelletized under 30 MPa of pressure for the usage of cadmium (Cd) adsorption in wastewater. After the adsorption process, samples of Seyitomer were analyzed using Optical Emission Spectroscopy (ICP-OES). As a result, it is seen that the usage of Seyitomer fly ash is proper for cadmium (Cd) adsorption and an optimum adsorption yield with 52% is found at a compound with Seyitomer fly ash (10 g), diatomite (0.5 g) and molasses (0.75 mL) at 2.5 h of reaction time, pH:4, 20ºC of reaction temperature and 300 rpm of stirring rate.

Keywords: heavy metal, fly ash, molasses, diatomite, adsorption, wastewater

Procedia PDF Downloads 272
14306 Habitate Potentials of Human Societies in the Alluvial Cone of the Sistan Plain in the Bronze Age

Authors: Reza Mehrafarin, Nafiseh Mirshekari, Mahila Mehrafarin

Abstract:

Sistan is one of the ancient regions of Iran, which is located in the east of this country. 1660 ancient sites were identified in the archeological field surveys that we did in this area. Of these, about 900 sites belong to the Bronze Age, which are located in an area of about 3000 square kilometers. The Bronze Age in Iran began at the end of the fourth millennium BC and ended at the beginning of the second millennium BC. During this period, many cities and villages were established in Sistan, that the burnt city (Shahr-e Sokhta) was its most important center, with an area of about 150 hectares and a population of 5,000. In this article, we have tried to identify and introduce the most important features of the Bronze Age of Sistan, especially the burnt city. Another goal of the article is to identify the factors that led to the emergence of the Bronze Age, especially urbanization in Sistan at the end of the fourth millennium BCand then we want to know what factors caused the destruction of Bronze Age civilization and urbanization in Sistan. Studying and evaluating these factors are the most important goals of this article. The research method of this article is field research. As we surveyed all of Sistan with a large number of archaeologists for two years in order to identify its ancient sites and understanding its geographical space. The result of this survey led to the identification of a large number of ancient sites which were formed in three major terraces in Sistan. The most important factor in the emergence of these civilizations, especially the Bronze Age in Sistan, was the Hirmand River. On the other hand, the most important factor in the destruction of the Bronze Age and its cities in Sistan was the Hirmand River.As it was destroyed by the movement of the Hirmand River bed or the long droughts of the Bronze Age of Sistan.

Keywords: archaeological survey, bronze age, sistan, urbanization

Procedia PDF Downloads 77
14305 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie

Abstract:

Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.

Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design

Procedia PDF Downloads 435
14304 Attitudes towards Bilingualism: The Case of Cameroon

Authors: Patricia W. Ngassa

Abstract:

Language attitude is an area arousing the interest of linguists who are continuously discovering new methods of detecting attitudes. This paper problematizes Cameroonians’ alleged tendency of neglecting home languages and considering Bilingualism in borrowed languages as more important. 30 questionnaires were used to know attitudes of parents towards bilingualism and our home languages. Results revealed that our borrowed official languages are considered more important than home languages.

Keywords: bilingualism, mother tongue, Cameroon, official language

Procedia PDF Downloads 588
14303 Sustainable Development and Modern Challenges of Higher Educational Institutions in the Regions of Georgia

Authors: Natia Tsiklashvili, Tamari Poladashvili

Abstract:

Education is one of the fundamental factors of economic prosperity in all respects. It is impossible to talk about the sustainable economic development of the country without substantial investments in human capital and investment into higher educational institutions. Education improves the standard of living of the population and expands the opportunities to receive more benefits, which will be equally important for both the individual and the society as a whole. There are growing initiatives among educated people such as entrepreneurship, technological development, etc. At the same time, the distribution of income between population groups is improving. The given paper discusses the scientific literature in the field of sustainable development through higher educational institutions. Scholars of economic theory emphasize a few major aspects that show the role of higher education in economic growth: a) Alongside education, human capital gradually increases which leads to increased competitiveness of the labor force, not only in the national but also in the international labor market (Neoclassical growth theory), b) The high level of education can increase the efficiency of the economy, investment in human capital, innovation, and knowledge are significant contributors to economic growth. Hence, it focuses on positive externalities and spillover effects of a knowledge-based economy which leads to economic development (endogenous growth theory), c) Education can facilitate the diffusion and transfer of knowledge. Hence, it supports macroeconomic sustainability and microeconomic conditions of individuals. While discussing the economic importance of education, we consider education as the spiritual development of the human that advances general skills, acquires a profession, and improves living conditions. Scholars agree that human capital is not only money but liquid assets, stocks, and competitive knowledge. The last one is the main lever in the context of increasing human competitiveness and high productivity. To address the local issues, the present article researched ten educational institutions across Georgia, including state and private HEIs. Qualitative research was done by analyzing in-depth interweaves of representatives from each institution, and respondents were rectors/vice-rectors/heads of quality assurance service at the institute. The result shows that there is a number of challenges that institution face in order to maintain sustainable development and be the strong links to education and the labor market. Mostly it’s contacted with bureaucracy, insufficient finances they receive, and local challenges that differ across the regions.

Keywords: higher education, higher educational institutions, sustainable development, regions, Georgia

Procedia PDF Downloads 63
14302 Mother-Child Attachment and Anxiety Symptoms in Middle Childhood: Differences in Levels of Attachment Security

Authors: Simran Sharda

Abstract:

There is increasing evidence that leads psychologists today to believe that the attachment formed between a mother and child plays a much more profound role in later-life outcomes than previously expected. Particularly, the fact that a link may exist between maternal attachment and the development in addition to the severity of social anxiety in middle childhood seems to be gaining ground. This research will examine and address a myriad of major issues related to the impact of mother-child attachment: behaviors of children with different levels of secure attachment, various aspects of anxiety in relation to attachment security as well as other styles of mother-child attachments, especially avoidant attachment and over-attachment. This analysis serves to compile previous literature on the subject and touch light upon a logical extension of the research. Moreover, researchers have identified links between attachment and the externalization of problem behaviors: these behaviors may later manifest as social anxiety as well as increased severity and likelihood of PTSD diagnosis (an anxiety disorder). Furthermore, secure attachment has been linked to increased health benefits, cognitive skills, emotive socialization, and developmental psychopathology.

Keywords: child development, anxiety, cognition, developmental psychopathology, mother-child relationships, maternal, cognitive development

Procedia PDF Downloads 130
14301 Genetic Diversity of Sorghum bicolor (L.) Moench Genotypes as Revealed by Microsatellite Markers

Authors: Maletsema Alina Mofokeng, Hussein Shimelis, Mark Laing, Pangirayi Tongoona

Abstract:

Sorghum is one of the most important cereal crops grown for food, feed and bioenergy. Knowledge of genetic diversity is important for conservation of genetic resources and improvement of crop plants through breeding. The objective of this study was to assess the level of genetic diversity among sorghum genotypes using microsatellite markers. A total of 103 accessions of sorghum genotypes obtained from the Department of Agriculture, Forestry and Fisheries, the African Centre for Crop Improvement and Agricultural Research Council-Grain Crops Institute collections in South Africa were estimated using 30 microsatellite markers. For all the loci analysed, 306 polymorphic alleles were detected with a mean value of 6.4 per locus. The polymorphic information content had an average value of 0.50 with heterozygosity mean value of 0.55 suggesting an important genetic diversity within the sorghum genotypes used. The unweighted pair group method with arithmetic mean clustering based on Euclidian coefficients revealed two major distinct groups without allocating genotypes based on the source of collection or origin. The genotypes 4154.1.1.1, 2055.1.1.1, 4441.1.1.1, 4442.1.1.1, 4722.1.1.1, and 4606.1.1.1 were the most diverse. The sorghum genotypes with high genetic diversity could serve as important sources of novel alleles for breeding and strategic genetic conservation.

Keywords: Genetic Diversity, Genotypes, Microsatellites, Sorghum

Procedia PDF Downloads 347
14300 Numerical Investigation of Flow Characteristics inside the External Gear Pump Using Urea Liquid Medium

Authors: Kumaresh Selvakumar, Man Young Kim

Abstract:

In selective catalytic reduction (SCR) unit, the injection system is provided with unique dosing pump to govern the urea injection phenomenon. The urea based operating liquid from the AdBlue tank links up directly with the dosing pump unit to furnish appropriate high pressure for examining the flow characteristics inside the liquid pump. This work aims in demonstrating the importance of external gear pump to provide pertinent high pressure and respective mass flow rate for each rotation. Numerical simulations are conducted using immersed solid method technique for better understanding of unsteady flow characteristics within the pump. Parametric analyses have been carried out for the gear speed and mass flow rate to find the behavior of pressure fluctuations. In the simulation results, the outlet pressure achieves maximum magnitude with the increase in rotational speed and the fluctuations grow higher.

Keywords: AdBlue tank, external gear pump, immersed solid method, selective catalytic reduction

Procedia PDF Downloads 247
14299 The Role of Self-Regulation and Assessment Feedback on Creative Performance

Authors: Sylvie Studente, Filia J. Garivaldis

Abstract:

The emotions and cognitions that underpin creative performance have been of interest for decades if not centuries, however, research evidence has still not conclusively offered reliable predictors of creativity. It is unclear whether stressors are detrimental to creative thinking, or whether some stress imposes necessary constraints to facilitate the creative process. The present research aims to examine the role of individual differences in self-regulation in influencing the links between emotions, cognitions, and creativity. Self-regulation is the capacity to disengage from moods that inhibit goal progress, and cope with failure, focus on impending intentions, and enhance the intrinsic appeal of tasks. Therefore, it is anticipated that individuals with an intuitive ability in self-regulation are able to harness their emotions and cognitions, to perform well on a creative task. In contrast, individuals with a deficiency in self-regulation will experience difficulty in such a task. Furthermore, stress in the form of positive and negative assessment feedback in the context of education will be manipulated to explore the interactive effects of environmental and individual difference factors on creative performance. The results will provide insight into the underlying factors associated with emotions and creativity, and inform future research in individual differences in cognition and emotion, and environmental triggers of creativity.

Keywords: creativity, feedback, self-regulation, stress

Procedia PDF Downloads 446
14298 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 300
14297 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs

Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk

Abstract:

It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.

Keywords: cross ABC method, customs supply chain, risk, risk management

Procedia PDF Downloads 348
14296 The Relationship between Religious Orientation and Country Reputation

Authors: Sibel Aydogan, Ceyda Aysuna

Abstract:

Religion is a social superstructure institution. Religious beliefs and practices are undeniable phenomena in the simplest and / or most complex societies and communities. All individuals in the society are not devout, but yet they are affected by religion one way or another. This study aims to identify the relationship between religion and country reputation. The uniqueness of the study lies in the fact that in the literature there is no study aimed to examine this relationship. Because of this reason the findings of the study can have important implications to fill this literature gap. Beyond examining this relationship, in the study also different religious oriented people’s opinions of country reputation was analyzed. The results of the analysis of data consisting of 985 respondents reveal that there is a significant relationship between religion and people’s opinions on country reputation. Another important finding of the study is people with different religious orientations have different opinions about a country’s reputation. The findings of the reputation may be important for people and organizations who are responsible for increasing a country’s reputation. Also the findings may shed light on country branding activities.

Keywords: religion, religiosity, religious orientation, country reputation, Turkey

Procedia PDF Downloads 385
14295 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 363
14294 Problems of Translating Technical Terms from English into Arabic

Authors: Nisreen Naji Al-Khawaldeh, Lara Ahmad Mansour El-Awar

Abstract:

The present study investigated the strategies MA translation students used for translating technical terms, the most common obstacles they encountered in translating such terms, and the motives behind using such terms as they are in their original form despite their translatability into Arabic. To achieve these objectives, a translation test was administered to 100 MA students specialising in translation at both Hashemite University and The University of Jordan. It consisted of two parts: (a) 50 English technical terms to be translated (b) two questions to be answered concerning the challenges or problems encountered while translating the previous technical terms and the motives that drive them to use most of the English technical terms as they are despite their translatability into Arabic. The analysis of the results revealed that MA translation students faced problems in translating technical terms, namely the inability to find the equivalent form for the given technical terms, the use of literal translation, and the wider use of loan-words type. Besides, the students used different strategies to translate the technical terms, namely borrowing (i.e., loan- words), paraphrasing, synonymy, naturalization, equivalence, and literal translation. Moreover, it was also revealed that most technical terms were used as they are in the source language despite their translatability into Arabic because these technical terms are easier to use in English rather than in Arabic. Also, when these terms were introduced to the Arab world, they were introduced in English, not in Arabic. So, the brain links these objects to their English terms.

Keywords: arabic, english, technical terms, translation strategies, translation problems

Procedia PDF Downloads 242
14293 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 431
14292 Etymological Studies and their Role in Consolidating the Identity of the Cultural Heritage; Terminology Related to the Traditional Dagger Making in the Sultanate of Oman as a Model

Authors: Muhammed Muvaffak Alhasan, Ali Alriyami, Ali Almanei

Abstract:

Despite the extreme importance of etymological studies in documenting the linguistic heritage, and showing its roots and connections in the classical language; However, etymological dictionaries are still rare in the Arab library in general. Etymology is the science of etymology that investigates how vocabulary is reproduced and reproduced, by exploring the origin of words and the phonetic and semantic changes that occurred in them over time, trying to reconfigure an identity card for the word showing its origin and the path it took through time until it reached its current state. This research seeks to make an etymological study on the terminology used in the traditional dagger making in the Sultanate of Oman through the following steps: 1. Collecting the terms relating to traditional dagger making and recording them in order to document and preserve them. 2. Arranging them alphabetically in order to facilitate searching and dealing with them. 3. Setting up a historical identification card for each word by applying an etymological study that shows its source from which they descended its links with standard and the phonological and semantic changes it underwent until it reached its current form.

Keywords: cultural heritage, etymology, Omani dagger, Oman

Procedia PDF Downloads 55
14291 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235
14290 Presidential Interactions with Faculty Senates: Expectations and Practices

Authors: Michael T. Miller, G. David Gearhart

Abstract:

Shared governance is an important element in higher education decision making. Through the joint decision making process, faculty members are provided an opportunity to help shape the future of an institution while increasing support for decisions that are made. Presidents, those leaders who are legally bound to guide their institutions, must find ways to collaborate effectively with faculty members in making decisions, and the first step in this process is understanding when and how presidents and faculty leaders interact. In the current study, a national sample of college presidents reported their preparation for the presidency, their perceptions of the functions of a faculty senate, and ultimately, the locations for important interactions between presidents and faculty senates. Results indicated that presidents, regardless of their preparation, found official functions to be the most important for communicating, although, those presidents with academic backgrounds were more likely to perceive faculty senates as having a role in all aspects of an institutions management.

Keywords: college faculty, college president, faculty senate, leadership

Procedia PDF Downloads 105
14289 Epidemiological Model for Citrus Black Spot Dynamics along the Pre-Harvest Supply Chain

Authors: Nqobile Muleya, Winston Garira, Godwin Mchau

Abstract:

Citrus Black Spot (CBS) is a fungal disease that is responsible for huge economical loss and poses a threat to the citrus industry worldwide. We construct a mathematical model framework for citrus black spot between fruits to characterise the dynamics of the disease development, paying attention to the pathogen life cycle. We have made an observation from the model analysis that the initial inoculum from ascomata is very important for disease development and thereafter it is no longer important due to conidia which is responsible for secondary infection. Most importantly, the model indicated that ascospores and conidia are very important parameters in developing citrus black spot within a short distance. The basic reproductive number and its importance in relation to citrus black spot persistence are outlined. A numerical simulation of the model was done to explain the theoretical findings.

Keywords: epidemiological modelling, Guidnardia citricarpa, life cycle stage, fungal, disease development

Procedia PDF Downloads 339
14288 Experiment of Geophysical Exploration in Egypt

Authors: Ramadan Fayez Zowaid Hussein

Abstract:

Exploration geophysics is an applied branch of geophysics, and it is very important to use such a method in Egypt and not just Egypt but in Africa and the Middle East. This research aims to work deeply on the importance of this method, and this paper focuses more on the benefits of the exploration of geophysics and how to apply it to scientific methods. It helps to discover earthquakes and assist in seismology. It also helps to map the surface structure of a region and also magnetic techniques, including aeromagnetic surveys to map magnetic anomalies. This is known that having a great experience in this field as it was very interesting reading a lot and searching about this matter and this technology, and all was found made this fantastic: as the method is existing and we do not use it. It costs a lot, but one believes that this method is very important; for example, in discovering earthquakes, check the surface of the ground easily; it makes us see the surface of the ground clearly so we can find the elements of the earth easily. In conclusion, geophysical exploration use is very important, and it must be highlighted and considered to be discussed in the Middle East, not just in the Middle East but also in Africa.

Keywords: geophysics, magnetic, gravitational, hydrocarbon exploration

Procedia PDF Downloads 42
14287 Microstructural Evidences for Exhaustion Theory of Low Temperature Creep in Martensitic Steels

Authors: Nagarjuna Remalli, Robert Brandt

Abstract:

Down-sizing of combustion engines in automobiles are prevailed owing to required increase in efficiency. This leads to a stress increment on valve springs, which affects their intended function due to an increase in relaxation. High strength martensitic steels are used for valve spring applications. Recent investigations unveiled that low temperature creep (LTC) in martensitic steels obey a logarithmic creep law. The exhaustion theory links the logarithmic creep behavior to an activation energy which is characteristic for any given time during creep. This activation energy increases with creep strain due to barriers of low activation energies exhausted during creep. The assumption of the exhaustion theory is that the material is inhomogeneous in microscopic scale. According to these assumptions it is anticipated that small obstacles (e. g. ε–carbides) having a wide range of size distribution are non-uniformly distributed in the materials. X-ray diffraction studies revealed the presence of ε–carbides in high strength martensitic steels. In this study, high strength martensitic steels that are crept in the temperature range of 75 – 150 °C were investigated with the aid of a transmission electron microscope for the evidence of an inhomogeneous distribution of obstacles having different size to examine the validation of exhaustion theory.

Keywords: creep mechanisms, exhaustion theory, low temperature creep, martensitic steels

Procedia PDF Downloads 225
14286 A Machine Learning Approach for Intelligent Transportation System Management on Urban Roads

Authors: Ashish Dhamaniya, Vineet Jain, Rajesh Chouhan

Abstract:

Traffic management is one of the gigantic issue in most of the urban roads in al-most all metropolitan cities in India. Speed is one of the critical traffic parameters for effective Intelligent Transportation System (ITS) implementation as it decides the arrival rate of vehicles on an intersection which are majorly the point of con-gestions. The study aimed to leverage Machine Learning (ML) models to produce precise predictions of speed on urban roadway links. The research objective was to assess how categorized traffic volume and road width, serving as variables, in-fluence speed prediction. Four tree-based regression models namely: Decision Tree (DT), Random Forest (RF), Extra Tree (ET), and Extreme Gradient Boost (XGB)are employed for this purpose. The models' performances were validated using test data, and the results demonstrate that Random Forest surpasses other machine learning techniques and a conventional utility theory-based model in speed prediction. The study is useful for managing the urban roadway network performance under mixed traffic conditions and effective implementation of ITS.

Keywords: stream speed, urban roads, machine learning, traffic flow

Procedia PDF Downloads 30
14285 Evaluating the Impact of Replacement Policies on the Cache Performance and Energy Consumption in Different Multicore Embedded Systems

Authors: Sajjad Rostami-Sani, Mojtaba Valinataj, Amir-Hossein Khojir-Angasi

Abstract:

The cache has an important role in the reduction of access delay between a processor and memory in high-performance embedded systems. In these systems, the energy consumption is one of the most important concerns, and it will become more important with smaller processor feature sizes and higher frequencies. Meanwhile, the cache system dissipates a significant portion of energy compared to the other components of a processor. There are some elements that can affect the energy consumption of the cache such as replacement policy and degree of associativity. Due to these points, it can be inferred that selecting an appropriate configuration for the cache is a crucial part of designing a system. In this paper, we investigate the effect of different cache replacement policies on both cache’s performance and energy consumption. Furthermore, the impact of different Instruction Set Architectures (ISAs) on cache’s performance and energy consumption has been investigated.

Keywords: energy consumption, replacement policy, instruction set architecture, multicore processor

Procedia PDF Downloads 117