Search results for: military architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2241

Search results for: military architecture

2001 The Relationship between Anatomical Components of Mosques and Place Attachment with Respect to Islamic Wisdom and Art

Authors: Alitajer Saeed, Negintaji Farshad

Abstract:

This study has been examined the relationship between anatomical components of mosques and place attachment of people to anatomies of mosques with the approach of attending to Islamic wisdom. To this end, this article by reviewing the theoretical and empirical literature of mosques' anatomy and the role of anatomy on the architectural design of Iranian mosques by examining the quantitative and qualitative indicators and in order to understand and identify the anatomy of mosques, components such as: entrance, portico, minarets, domes, bedchamber and pool have been investigated. For this purpose, SPSS software has been used. Research is related to field and is of descriptive, analytical and inferential type and quantitative and qualitative indicators have been examined. Statistical analysis obtained from the questionnaire indicates that there is a significant relationship between the anatomical components of architecture and place attachment of the participants. By understanding and identifying the anatomy of mosques and appropriate planning to use the anatomy in Islamic architecture and considering it as an eminent indicators of designing, it can present great Iranian architecture.

Keywords: Islamic wisdom, Islamic architecture, mosque anatomy place attachment, Islamic art

Procedia PDF Downloads 481
2000 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 346
1999 Architectural Design Studio (ADS) as an Operational Synthesis in Architectural Education

Authors: Francisco A. Ribeiro Da Costa

Abstract:

Who is responsible for teaching architecture; consider various ways to participate in learning, manipulating various pedagogical tools to streamline the creative process. The Architectural Design Studio (ADS) should become a holistic, systemic process responding to the complexity of our world. This essay corresponds to a deep reflection developed by the author on the teaching of architecture. The outcomes achieved are the corollary of experimentation; discussion and application of pedagogical methods that allowed consolidate the creativity applied by students. The purpose is to show the conjectures that have been considered effective in creating an intellectual environment that nurtures the subject of Architectural Design Studio (ADS), as an operational synthesis in the final stage of the degree. These assumptions, which are part of the proposed model, displaying theories and teaching methodologies that try to respect the learning process based on student learning styles Kolb, ensuring their latent specificities and formulating the structure of the ASD discipline. In addition, the assessing methods are proposed, which consider the architectural Design Studio as an operational synthesis in the teaching of architecture.

Keywords: teaching-learning, architectural design studio, architecture, education

Procedia PDF Downloads 365
1998 Development of Application Architecture for RFID Based Indoor Tracking Using Passive RFID Tag

Authors: Sumaya Ismail, Aijaz Ahmad Rehi

Abstract:

Abstract The location tracking and positioning systems have technologically grown exponentially in recent decade. In particular, Global Position system (GPS) has become a universal norm to be a part of almost every software application directly or indirectly for the location based modules. However major drawback of GPS based system is their inability of working in indoor environments. Researchers are thus focused on the alternative technologies which can be used in indoor environments for a vast range of application domains which require indoor location tracking. One of the most popular technology used for indoor tracking is radio frequency identification (RFID). Due to its numerous advantages, including its cost effectiveness, it is considered as a technology of choice in indoor location tracking systems. To contribute to the emerging trend of the research, this paper proposes an application architecture of passive RFID tag based indoor location tracking system. For the proof of concept, a test bed will be developed to in this study. In addition, various indoor location tracking algorithms will be used to assess their appropriateness in the proposed application architecture.

Keywords: RFID, GPS, indoor location tracking, application architecture, passive RFID tag

Procedia PDF Downloads 79
1997 Usage of Military Continuity Management System for Flooding Solution

Authors: Jiri Palecek, Radmila Hajkova, Alena Oulehlova, Hana Malachova

Abstract:

The increase of emergency incidents and crisis situations requires proactive crisis management of authorities and for its solution. Application business continuity management systems help the crisis management authorities quickly and responsibly react to events and to plan more effectively and efficiently powers and resources. The main goal of this article is describing Military Continuity Management System (MCMS) based on the principles of Business Continuity Management System (BCMS) for dealing with floods in the territory of the selected municipalities. There are explained steps of loading, running and evaluating activities in the software application MCMS. Software MCMS provides complete control over the tasks, contribute a comprehensive and responsible approach solutions to solution floods in the municipality.

Keywords: business continuity management, floods plan, flood activity, level of flood activity

Procedia PDF Downloads 251
1996 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 126
1995 Development of Management System of the Experience of Defensive Modeling and Simulation by Data Mining Approach

Authors: D. Nam Kim, D. Jin Kim, Jeonghwan Jeon

Abstract:

Defense Defensive Modeling and Simulation (M&S) is a system which enables impracticable training for reducing constraints of time, space and financial resources. The necessity of defensive M&S has been increasing not only for education and training but also virtual fight. Soldiers who are using defensive M&S for education and training will obtain empirical knowledge and know-how. However, the obtained knowledge of individual soldiers have not been managed and utilized yet since the nature of military organizations: confidentiality and frequent change of members. Therefore, this study aims to develop a management system for the experience of defensive M&S based on data mining approach. Since individual empirical knowledge gained through using the defensive M&S is both quantitative and qualitative data, data mining approach is appropriate for dealing with individual empirical knowledge. This research is expected to be helpful for soldiers and military policy makers.

Keywords: data mining, defensive m&s, management system, knowledge management

Procedia PDF Downloads 226
1994 Environment and Water in the Conceptions of a Sustainable Architecture

Authors: Carlos H. Ferreira, Joana R. Pereira

Abstract:

In recent decades, calls for sustainable architecture based on environmental policies have been frequent. Despite a vast number of documents, technical procedures, and publications involving these themes, conceptions, and even architectural practice are often distanced from critical and methodological reflection on the relationship between environment and architecture. Among the various issues that we could consider in this relationship, we highlight in this article the relevance of water in the environment and in the architectural design. From documentary references and works carried out, we seek contributions to a better systematization and framing of water in architectural thinking. We distinguish, on the one hand, more conceptual issues that involve the environmental relationship of water, involving its cycle, relevance in the landscape, and infrastructural commitments. On the other hand, we highlight a more operative component, focusing on the place of water in the design process, from its perception in space-shape dimensions to more specific technical requirements that involve the interdisciplinary boundaries of architecture. In both approaches to water in architectural design, we seek to contribute to greater sensitivity and efficiency in the art of designing a more sustainable future.

Keywords: sustainability, environment, water, resilience design

Procedia PDF Downloads 103
1993 The Importance of Information in Psychological Operations for Counterterrorism

Authors: Abbas Fazelinia

Abstract:

Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method.

Keywords: psychological operations, terrorist, counterterrorism, terrorism

Procedia PDF Downloads 301
1992 Impact of Organic Architecture in Building Design

Authors: Zainab Yahaya Suleiman

Abstract:

Physical fitness, as one of the most important keys to a healthy wellbeing, is the basis of dynamic and creative intellectual activity. As a result, the fitness world is expanding every day. It is believed that a fitness centre is a place of healing and also the natural environment is vital to speedy recovery. The aim of this paper is to propose and designs a suitable location for a fitness centre in Batagarawa metropolis. Batagarawa city is enriched with four tertiary institutions with diverse commerce and culture but lacks the facility of a well-equipped fitness centre. The proposed fitness centre intends to be an organically sound centre that will make use of principles of organic architecture to create a new pleasant environment between man and his environments. Organic architecture is the science of designing a building within pleasant natural resources and features surrounding the environment. It is regarded as visual poetry and reinterpretation of nature’s principles; as well as embodies a settlement of person, place, and materials. Using organic architecture, the design was interlaced with the dynamic, organic and monumental features surrounding the environment. The city has inadequate/no facility that is considered organic where one can keep fit in a friendly, conducive and adequate location. Thus, the need for establishing a fitness centre to cater for this need cannot be over-emphasised. Conclusively, a fitness centre will be an added advantage to this fast growing centre of learning.

Keywords: organic architecture, fitness center, environment, natural resources, natural features, building design

Procedia PDF Downloads 384
1991 Multi Agent Based Pre-Hospital Emergency Management Architecture

Authors: Jaleh Shoshtarian Malak, Niloofar Mohamadzadeh

Abstract:

Managing pre-hospital emergency patients requires real-time practices and efficient resource utilization. Since we are facing a distributed Network of healthcare providers, services and applications choosing the right resources and treatment protocol considering patient situation is a critical task. Delivering care to emergency patients at right time and with the suitable treatment settings can save ones live and prevent further complication. In recent years Multi Agent Systems (MAS) introduced great solutions to deal with real-time, distributed and complicated problems. In this paper we propose a multi agent based pre-hospital emergency management architecture in order to manage coordination, collaboration, treatment protocol and healthcare provider selection between different parties in pre-hospital emergency in a self-organizing manner. We used AnyLogic Agent Based Modeling (ABM) tool in order to simulate our proposed architecture. We have analyzed and described the functionality of EMS center, Ambulance, Consultation Center, EHR Repository and Quality of Care Monitoring as main collaborating agents. Future work includes implementation of the proposed architecture and evaluation of its impact on patient quality of care improvement.

Keywords: multi agent systems, pre-hospital emergency, simulation, software architecture

Procedia PDF Downloads 388
1990 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 307
1989 Nanotechnology as a Futuristic Approach to Architecture with Special Reference to Chandigarh

Authors: Chaudhary Archana, Dhingra Poshika

Abstract:

The architecture of the world is at a crossroads with the advent of new technology. The issues of energy efficiency and global warming are getting important with the coming times. New technologies are making their mark. For the architecture profession, nanotechnology will greatly impact construction materials and their properties. Nanotechnology, the understanding and control of matter at a scale of one to one hundred billions of a meter, is bringing incredible changes to the materials and processes of buildings. Materials will behave in many different ways as we are able to more precisely control their properties at the nanoscale. It is precisely called the next industrial revolution. We live in an age where scientific progress continues to transform human lifestyle. This is evermore true when it comes to the progress being made in the field of nanotechnology. This science stands to change and advance the practice of design in a multitude of ways – where architectural progress is being made at the molecular level. The nanotechnology has already been adopted in various buildings across the world. What an impact it shall have on the futuristic architecture in Chandigarh, India shall be discussed in the paper. But before we hurtle off toward a nano-utopia, we need to step back and ask ourselves whether this is a direction in which we really want to go.

Keywords: building materials, energy efficiency, nanotechnology, sustainability

Procedia PDF Downloads 426
1988 Ethical Perspectives on Implementation of Computer Aided Design Curriculum in Architecture in Nigeria: A Case Study of Chukwuemeka Odumegwu Ojukwu University, Uli

Authors: Kelechi Ezeji

Abstract:

The use of Computer Aided Design (CAD) technologies has become pervasive in the Architecture, Engineering and Construction (AEC) industry. This has led to its inclusion as an important part of the training module in the curriculum for Architecture Schools in Nigeria. This paper examines the ethical questions that arise in the implementation of Computer Aided Design (CAD) Content of the curriculum for Architectural education. Using existing literature, it begins this scrutiny from the propriety of inclusion of CAD into the education of the architect and the obligations of the different stakeholders in the implementation process. It also examines the questions raised by the negative use of computing technologies as well as perceived negative influence of the use of CAD on design creativity. Survey methodology was employed to gather data from the Department of Architecture, Chukwuemeka Odumegwu Ojukwu University Uli, which has been used as a case study on how the issues raised are being addressed. The paper draws conclusions on what will make for successful ethical implementation.

Keywords: computer aided design, curriculum, education, ethics

Procedia PDF Downloads 385
1987 Improving the Performances of the nMPRA Architecture by Implementing Specific Functions in Hardware

Authors: Ionel Zagan, Vasile Gheorghita Gaitan

Abstract:

Minimizing the response time to asynchronous events in a real-time system is an important factor in increasing the speed of response and an interesting concept in designing equipment fast enough for the most demanding applications. The present article will present the results regarding the validation of the nMPRA (Multi Pipeline Register Architecture) architecture using the FPGA Virtex-7 circuit. The nMPRA concept is a hardware processor with the scheduler implemented at the processor level; this is done without affecting a possible bus communication, as is the case with the other CPU solutions. The implementation of static or dynamic scheduling operations in hardware and the improvement of handling interrupts and events by the real-time executive described in the present article represent a key solution for eliminating the overhead of the operating system functions. The nMPRA processor is capable of executing a preemptive scheduling, using various algorithms without a software scheduler. Therefore, we have also presented various scheduling methods and algorithms used in scheduling the real-time tasks.

Keywords: nMPRA architecture, pipeline processor, preemptive scheduling, real-time system

Procedia PDF Downloads 330
1986 The Kadiria Zawiya: Architecture and Islamic Sufi Paradigm

Authors: Ghada Chater, Mounir Dhouib

Abstract:

Zawiyas are mausoleums where saints called 'waly' are buried and where ritual practices of Sufi Islamic movement take place. These funerary monuments have constituted since the medieval period a fundamental component of rural and urban Islamic landscape, especially that of Tunisia.The hypothesis is that these monuments reflect in their architecture the Sufi underlying thought. The paper’s target is to verify the validity of this hypothesis and possibly show the incarnation mode of Islamic Sufi paradigm in the zawiya’s architecture. This study considers the main Zawiya of one of the most important religious brotherhoods in Tunisia, which is Kadiria. A morphological analysis has been conducted and crossed later to a spiritual hermeneutic test. The result of this confrontation was significant: the paradigmatic element of the zawiya, materialized by the esoteric / exoteric dome 'kubba', returns in its geometry and structure to one of the Sufism key concepts: the unity of the creative spirit in the diversity and plurality of evanescent bodies. Thus, the creative act finds its reflection not only in the spirit of the perfect human microcosm (the waly microcosm), but also within the building dedicated to him.

Keywords: architecture, Islam, Sufism, waly, zawiya

Procedia PDF Downloads 314
1985 Towards a Common Architecture for Cloud Computing Interoperability

Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey

Abstract:

Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.

Keywords: cloud computing, reference architecture, interoperability, standard

Procedia PDF Downloads 134
1984 The Control System Architecture of Space Environment Simulator

Authors: Zhan Haiyang, Gu Miao

Abstract:

This article mainly introduces the control system architecture of space environment simulator, simultaneously also briefly introduce the automation control technology of industrial process and the measurement technology of vacuum and cold black environment. According to the volume of chamber, the space environment simulator is divided into three types of small, medium and large. According to the classification and application of space environment simulator, the control system is divided into the control system of small, medium, large space environment simulator and the centralized control system of multiple space environment simulators.

Keywords: space environment simulator, control system, architecture, automation control technology

Procedia PDF Downloads 446
1983 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 444
1982 Structuring and Visualizing Healthcare Claims Data Using Systems Architecture Methodology

Authors: Inas S. Khayal, Weiping Zhou, Jonathan Skinner

Abstract:

Healthcare delivery systems around the world are in crisis. The need to improve health outcomes while decreasing healthcare costs have led to an imminent call to action to transform the healthcare delivery system. While Bioinformatics and Biomedical Engineering have primarily focused on biological level data and biomedical technology, there is clear evidence of the importance of the delivery of care on patient outcomes. Classic singular decomposition approaches from reductionist science are not capable of explaining complex systems. Approaches and methods from systems science and systems engineering are utilized to structure healthcare delivery system data. Specifically, systems architecture is used to develop a multi-scale and multi-dimensional characterization of the healthcare delivery system, defined here as the Healthcare Delivery System Knowledge Base. This paper is the first to contribute a new method of structuring and visualizing a multi-dimensional and multi-scale healthcare delivery system using systems architecture in order to better understand healthcare delivery.

Keywords: health informatics, systems thinking, systems architecture, healthcare delivery system, data analytics

Procedia PDF Downloads 317
1981 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 135
1980 The Role of People in Continuing Airworthiness: A Case Study Based on the Royal Thai Air Force

Authors: B. Ratchaneepun, N.S. Bardell

Abstract:

It is recognized that people are the main drivers in almost all the processes that affect airworthiness assurance. This is especially true in the area of aircraft maintenance, which is an essential part of continuing airworthiness. This work investigates what impact English language proficiency, the intersection of the military and Thai cultures, and the lack of initial and continuing human factors training have on the work performance of maintenance personnel in the Royal Thai Air Force (RTAF). A quantitative research method based on a cross-sectional survey was used to gather data about these three key aspects of “people” in a military airworthiness environment. 30 questions were developed addressing the crucial topics of English language proficiency, impact of culture, and human factors training. The officers and the non-commissioned officers (NCOs) who work for the Aeronautical Engineering Divisions in the RTAF comprised the survey participants. The survey data were analysed to support various hypotheses by using a t-test method. English competency in the RTAF is very important since all of the service manuals for Thai military aircraft are written in English. Without such competency, it is difficult for maintenance staff to perform tasks and correctly interpret the relevant maintenance manual instructions; any misunderstandings could lead to potential accidents. The survey results showed that the officers appreciated the importance of this more than the NCOs, who are the people actually doing the hands-on maintenance work. Military culture focuses on the success of a given mission, and leverages the power distance between the lower and higher ranks. In Thai society, a power distance also exists between younger and older citizens. In the RTAF, such a combination tends to inhibit a just reporting culture and hence hinders safety. The survey results confirmed this, showing that the older people and higher ranks involved with RTAF aircraft maintenance believe that the workplace has a positive safety culture and climate, whereas the younger people and lower ranks think the opposite. The final area of consideration concerned human factors training and non-technical skills training. The survey revealed that those participants who had previously attended such courses appreciated its value and were aware of its benefits in daily life. However, currently there is no regulation in the RTAF to mandate recurrent training to maintain such knowledge and skills. The findings from this work suggest that the people involved in assuring the continuing airworthiness of the RTAF would benefit from: (i) more rigorous requirements and standards in the recruitment, initial training and continuation training regarding English competence; (ii) the development of a strong safety culture that exploits the uniqueness of both the military culture and the Thai culture; and (iii) providing more initial and recurrent training in human factors and non-technical skills.

Keywords: aircraft maintenance, continuing airworthiness, military culture, people, Royal Thai Air Force

Procedia PDF Downloads 100
1979 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network

Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang

Abstract:

Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.

Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving

Procedia PDF Downloads 293
1978 Virtual Reality Exposure Therapy for Post-Traumatic Stress Disorder: A Literature Review

Authors: Daniel Azizyan, Marina Vardanyan, Astghik Dallakyan

Abstract:

The objective of this literature review is to bring valuable and much-needed insight into Virtual Reality Exposure Therapy (VRET) for the treatment of Post-Traumatic Stress Disorder (PTSD) among military personnel. As the issues regarding war veterans who suffer from PTSD become more and more widespread, the task of finding possible solutions that would provide alternative approaches to existing methods being used today becomes more relevant than ever. By analyzing the previous applications of VRET, this literature review covers the state of the research done currently on the topic, reviews the known information while identifying the main problems, and aims to use missed opportunities and find potential solutions. It provides the answers to the most relevant questions concerning VRET and leads to important conclusions in the hope of making the technology more practical, widespread, and effective.

Keywords: military PTSD, post-traumatic stress disorder, prolonged exposure, virtual reality exposure therapy, VRE

Procedia PDF Downloads 77
1977 Analysis of the Benefits of Motion Simulators in 5th Generation Fighter Pilots' Training

Authors: Ali Mithad Emre

Abstract:

In military aviation, the use of flight simulators has proliferated recently in order to train fifth generation fighter pilots. With these simulators, pilots can carry out real-time flights resulting in seeing their faults and can perform emergency drills prior to real flights. Since we cannot risk losing the aircraft and the pilot himself/herself in the flight training process, flight simulators are of great importance to adapt the fighter pilots competently to real flights aboard the fifth generation aircraft. The real flights are impossible to simulate thoroughly on the ground. To some extent, the fixed-based simulators may assist the pilot to steer aircraft technically and visually but flight simulators can’t trick the pilot’s vestibular, sensory, and perceptual systems without motion platforms. This paper discusses the benefits of motion simulators for fifth generation fighter pilots’ training in preference to the fixed-based counterparts by analyzing their pros and cons.

Keywords: military, pilot, sickness, simulator

Procedia PDF Downloads 448
1976 Implementation of a Baseline RISC for the Realization of a Dynamically Reconfigurable Processor

Authors: Hajer Najjar, Riad Bourguiba, Jaouhar Mouine

Abstract:

Reduced instruction set computer (RISC) processors are widely used because of their multiple advantages. In fact, they are based on a simple instruction set so that they increase the speed of the processor and reduce its energy consumption. In this paper, we will present a basic RISC architecture processor that will be developed later to converge to a new architecture with runtime reconfiguration.

Keywords: processor, RISC, DLX, pipeline, runtime reconfiguration

Procedia PDF Downloads 379
1975 Combined Civilian and Military Disaster Response: A Critical Analysis of the 2010 Haiti Earthquake Relief Effort

Authors: Matthew Arnaouti, Michael Baird, Gabrielle Cahill, Tamara Worlton, Michelle Joseph

Abstract:

Introduction: Over ten years after the 7.0 magnitude Earthquake struck the capital of Haiti, impacting over three million people and leading to the deaths of over two hundred thousand, the multinational humanitarian response remains the largest disaster relief effort to date. This study critically evaluates the multi-sector and multinational disaster response to the Earthquake, looking at how the lessons learned from this analysis can be applied to future disaster response efforts. We put particular emphasis on assessing the interaction between civilian and military sectors during this humanitarian relief effort, with the hopes of highlighting how concrete guidelines are essential to improve future responses. Methods: An extensive scoping review of the relevant literature was conducted - where library scientists conducted reproducible, verified systematic searches of multiple databases. Grey literature and hand searches were utilised to identify additional unclassified military documents, for inclusion in the study. More than 100 documents were included for data extraction and analysis. Key domains were identified, these included: Humanitarian and Military Response, Communication, Coordination, Resources, Needs Assessment and Pre-Existing Policy. Corresponding information and lessons-learned pertaining to these domains was then extracted - detailing the barriers and facilitators to an effective response. Results: Multiple themes were noted which stratified all identified domains - including the lack of adequate pre-existing policy, as well as extensive ambiguity of actors’ roles. This ambiguity was continually influenced by the complex role the United States military played in the disaster response. At a deeper level, the effects of neo-colonialism and concern about infringements on Haitian sovereignty played a substantial role at all levels: setting the pre-existing conditions and determining the redevelopment efforts that followed. Furthermore, external factors significantly impacted the response, particularly the loss of life within the political and security sectors. This was compounded by the destruction of important infrastructure systems - particularly electricity supplies and telecommunication networks, as well as air and seaport capabilities. Conclusions: This study stands as one of the first and most comprehensive evaluations, systematically analysing the civilian and military response - including their collaborative efforts. This study offers vital information for improving future combined responses and provides a significant opportunity for advancing knowledge in disaster relief efforts - which remains a more pressing issue than ever. The categories and domains formulated serve to highlight interdependent factors that should be applied in future disaster responses, with significant potential to aid the effective performance of humanitarian actors. Further studies will be grounded in these findings, particularly the need for greater inclusion of the Haitian perspective in the literature, through additional qualitative research studies.

Keywords: civilian and military collaboration, combined response, disaster, disaster response, earthquake, Haiti, humanitarian response

Procedia PDF Downloads 95
1974 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 547
1973 Chicago School of Architecture 1900

Authors: Lula Chou

Abstract:

At the turn of the 20th century, Chicago faced a large real estate boom and technological advances through industrialization that led to the rise of the commercial skyscrapers. Focusing on creating a Midwest regional character and new functional meanings of structural art, architects like Sullivan, Adler, Burnham, and Root dominated the first Chicago School of Architecture. After they spearheaded the arena of modern skyscrapers, other cities in the United States like New York soon followed the trend. While battling with eclecticism and Beaux-Arts beliefs in decorative style, Chicago architects adapted Classical monumentality into their modern expressions that emphasized organicism and functionalism. With various experiments of material possibilities in the steel-framed constructions, Chicago architecture succeeded in forming humanitarian aesthetics alongside fulfilling functional requirements of the new generation.

Keywords: Chicago school, modernity, monumentality, skyscrapers, Sullivan

Procedia PDF Downloads 108
1972 Layers of Identities in Nahdliyyin Mosque Architecture and Some Related Socio-Political Context Within

Authors: Yulia Eka Putrie, Widjaja Martokusumo

Abstract:

The development of architecture today indicates that an architectural object often does not represent one single identity only. One architectural object could represents layers of multiple identities of an increasingly complex society. Mosque architecture for example, is mainly associated with one religious identity; that mosque architecture serves as the representation of Islamic identity. However, on many occasions, mosque architecture also serves as the representation of other motives, such as political, social, even individual identity. In normal circumstances, these layers of identities are not always seen or realized by common people outside the community. They are only represented implicitly in some symbolic forms, activities, and events. On the other hand, in specific circumstances, these kinds of identities were represented explicitly in mosque architecture. This paper is a part of an initial research on the representation of socio-political identities in Nahdliyyin mosques in East Java, Indonesia. Nahdliyyin mosques were chosen as the object of research because of its significance in Indonesian socio-political context, because majority of Indonesian muslims are culturally associated with Nahdlatul Ulama (NU) with its aswaja doctrine. Some frictions in mosque ownership and management between Nahdliyyin and other islamic school of thoughts, has resulted in preventive efforts, where some of the efforts are related to the representation of their identity in their mosque architecture. The research is a field research that took place in Malang, East Java. Malang is one of main cities in East Java; a cultural and regional basis of NU and Nahdliyyin people. Formal analysis were conducted in ten large Nahdliyyin mosques in Malang. Some structured and in-depth interviews were also held to explore the motives of identity representation in some architectural aspects of the mosques. The result of this initial study indicates that there are layers of identities which were manifested in the studied mosques. These layers of identities in Nahdliyyin mosques were based on the same main values, but represented through various formal expressions. Furthermore, the study also brings the deeper understanding on socio-political context of mosques in Nahdliyyin culture.

Keywords: Nahdliyyin mosque architecture, layers of identities, representation, Nahdlatul Ulama

Procedia PDF Downloads 489