Search results for: Host restriction
185 The Effects of Mobile Phones in Mitigating Cultural Shock Amongst Refugees: Case of South Africa
Authors: Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona
Abstract:
The potential of mobile phones is evident in their ability to address isolation and loneliness, support the improvement of interpersonal relations, and contribute to the facilitation of assimilation processes. Mobile phones can play a role in facilitating the integration of refugees into a new environment. This study aims to evaluate the impact of mobile phone use on helping refugees navigate the challenges posed by cultural differences in the host country. Semi-structured interviews were employed to collect data for the study, involving a sample size of 27 participants. Participants in the study were refugees based in South Africa, and thematic analysis was the chosen method for data analysis. The research highlights the numerous challenges faced by refugees in their host nation, including a lack of local cultural skills, the separation of family and friends from their countries of origin, hurdles in acquiring legal documentation, and the complexities of assimilating into the unfamiliar community. The use of mobile phones by refugees comes with several advantages, such as the advancement of language and cultural understanding, seamless integration into the host country, streamlined communication, and the exploration of diverse opportunities. Concurrently, mobile phones allow refugees in South Africa to manage the impact of culture shock.
Keywords: Mobile phones, culture shock, refugees, South Africa.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 194184 A Visual Cryptography and Statistics Based Method for Ownership Identification of Digital Images
Authors: Ching-Sheng Hsu, Young-Chang Hou
Abstract:
In this paper, a novel copyright protection scheme for digital images based on Visual Cryptography and Statistics is proposed. In our scheme, the theories and properties of sampling distribution of means and visual cryptography are employed to achieve the requirements of robustness and security. Our method does not need to alter the original image and can identify the ownership without resorting to the original image. Besides, our method allows multiple watermarks to be registered for a single host image without causing any damage to other hidden watermarks. Moreover, it is also possible for our scheme to cast a larger watermark into a smaller host image. Finally, experimental results will show the robustness of our scheme against several common attacks.
Keywords: Copyright protection, digital watermarking, samplingdistribution, visual cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1883183 Using a Trust-Based Environment Key for Mobile Agent Code Protection
Authors: Salima Hacini, Zahia Guessoum, Zizette Boufaïda
Abstract:
Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to propose a trust based mechanism to improve the security of mobile agents and allow their execution in various environments. Thus, an adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information collected during the interaction enables generation of an environment key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can be selected.Keywords: Internet security, malicious host, mobile agent security, trust management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1413182 The Role of Multinational Enterprises' Investments in Emerging Country's Economic Development, Case of Georgia
Authors: V. Charaia
Abstract:
From the strategic point of view, not all Foreign Direct Investments (FDIs) are always positively benefiting the host economy, i.e. not all Multinational Enterprises (MNEs) are promoting local/host economies. FDI could have different impact on different sectors of the economy, based not only on annual investment amount, but MNE motivations and peculiarities of the host economy in particular. FDI analysis based only on its amount can lead to incorrect decisions, it is much more important to understand the essence of investment. Consequently, our research is oriented on MNE’s motivations, answering which sectors are most popular among international investors and why, what motivated them to invest into one or another business. Georgian economy for the last period of time is attracting more and more efficiency seeking investments, which could be translated as - concentrating production in a limited number of locations to supply various markets, while benefiting local economy with: new technologies, employment, exports diversification, increased income for the local economy and so on. Foreign investors and MNEs in particular are no longer and not so much interested in the resource seeking investments, which was the case for Georgia in the last decade of XX century. Despite the fact of huge progress for the Georgian economy, still there is a room for foreign investors to make a local market oriented investments. The local market is still rich in imported products, which should be replaced by local ones. And the last but not the least important issue is that approximately 30% of all FDIs in Georgia according to this research are “efficiency seeking” investments, which is an enormous progress and a hope for future Georgian success.
Keywords: Investments, MNE, FDI motivations, Georgian economy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1090181 A New Approach to Steganography using Sinc-Convolution Method
Authors: Ahmad R. Naghsh-Nilchi, Latifeh Pourmohammadbagher
Abstract:
Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. The encryption methods are usually much more robust than the steganographic ones. However, they have a high visibility and would provoke the attackers easily since it usually is obvious from an encrypted image that something is hidden! The combination of steganography and encryption will cover both of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm. This method could be applied to almost all image formats including TIF, BMP, GIF and JPEG. The experiment results show that our method is able to hide a desired image with high security and low visibility.Keywords: Sinc Approximation, Image Encryption, Sincconvolution, Image Steganography, JSTEG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1828180 Regression Approach for Optimal Purchase of Hosts Cluster in Fixed Fund for Hadoop Big Data Platform
Authors: Haitao Yang, Jianming Lv, Fei Xu, Xintong Wang, Yilin Huang, Lanting Xia, Xuewu Zhu
Abstract:
Given a fixed fund, purchasing fewer hosts of higher capability or inversely more of lower capability is a must-be-made trade-off in practices for building a Hadoop big data platform. An exploratory study is presented for a Housing Big Data Platform project (HBDP), where typical big data computing is with SQL queries of aggregate, join, and space-time condition selections executed upon massive data from more than 10 million housing units. In HBDP, an empirical formula was introduced to predict the performance of host clusters potential for the intended typical big data computing, and it was shaped via a regression approach. With this empirical formula, it is easy to suggest an optimal cluster configuration. The investigation was based on a typical Hadoop computing ecosystem HDFS+Hive+Spark. A proper metric was raised to measure the performance of Hadoop clusters in HBDP, which was tested and compared with its predicted counterpart, on executing three kinds of typical SQL query tasks. Tests were conducted with respect to factors of CPU benchmark, memory size, virtual host division, and the number of element physical host in cluster. The research has been applied to practical cluster procurement for housing big data computing.
Keywords: Hadoop platform planning, optimal cluster scheme at fixed-fund, performance empirical formula, typical SQL query tasks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 837179 A Report on Occurrence and Parasite-Host of Ligula intestinalis in Sattarkhan Lake(East Azerbaijan-Iran)
Authors: Mahbobeh Hajirostamloo
Abstract:
Ligula intestinalis is a three-host life-cycle Pseudophyllidean Cestode which in its plerocercoid stage infests a range of fresh water species. The objective of the present study was the worm occurrence within planctonic copepods, fishes and piscivorous birds and examine of parasite-hosts samples in the Lake of Sattarkhan Dam (near the city of Ahar, East Azerbaijan, Iran). Fish sample were collected with fyke and gill nets and the abdominal cavity was examined for the presence of ligula. Zooplanktons were captured using a planktonic net and occurrence of parasitic larval form in the body cavity was determined. Piscivorous birds were selected by telescope, they hunted and dissected for presence of parasite eggs in their gut. Results indicated that prevalence of infection was 16% for cyclopid copepoda and majority of infected cyclopid were female Cyclops. Investigation of 310 fishes specimens were indicated to infection of five species of cyprinid fishes. In addition, results indicated to manipulation of six species of migratory aquatic and semi aquatic birds by ligula. Obtained results are in agreement by previous studies. Its definite in this study that all of fishes in Sattarkhan Lake capable to infection, its important for health because they capture by native people and it is documented that ligula can be introduce as a zoonose. It's seemed that to prevent from disperses of parasite and restricted of infection, biological elimination can be effective and it's necessary to inform native people about sanitation.Keywords: Ligula intestinalis, parasite-host, Sattarkhan Lake, Iran.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837178 Digital Watermarking Based on Visual Cryptography and Histogram
Authors: R. Rama Kishore, Sunesh
Abstract:
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.
Keywords: Butterworth filter, digital watermarking, histogram, visual cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1678177 An Atomic-Domains-Based Approach for Attack Graph Generation
Authors: Fangfang Chen, Chunlu Wang, Zhihong Tian, Shuyuan Jin, Tianle Zhang
Abstract:
Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we propose a new approach which is simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications among all the atomic domains. Our approach simplifies the process of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic domains which makes the process of AGG scalable.Keywords: atomic domain, vulnerability, attack graphs, generation, computer security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1655176 A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation
Authors: Soroosh Rezazadeh, Mehran Yazdi
Abstract:
In this paper, a robust digital image watermarking scheme for copyright protection applications using the singular value decomposition (SVD) is proposed. In this scheme, an entropy masking model has been applied on the host image for the texture segmentation. Moreover, the local luminance and textures of the host image are considered for watermark embedding procedure to increase the robustness of the watermarking scheme. In contrast to all existing SVD-based watermarking systems that have been designed to embed visual watermarks, our system uses a pseudo-random sequence as a watermark. We have tested the performance of our method using a wide variety of image processing attacks on different test images. A comparison is made between the results of our proposed algorithm with those of a wavelet-based method to demonstrate the superior performance of our algorithm.Keywords: Watermarking, copyright protection, singular value decomposition, entropy masking, texture segmentation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1765175 Free Vibration Analysis of Functionally Graded Pretwisted Plate in Thermal Environment Using Finite Element Method
Authors: S. Parida, S. C. Mohanty
Abstract:
The free vibration behavior of thick pretwisted cantilevered functionally graded material (FGM) plate subjected to the thermal environment is investigated numerically in the present paper. A mathematical model is developed in the framework of higher order shear deformation theory (HOST) with C0 finite element formulation i.e. independent displacement and rotations. The material properties are assumed to be temperature dependent and vary continuously through the thickness based on the volume fraction exponent in simple power rule. The finite element model has been discretized into eight node quadratic serendipity elements with node wise seven degrees of freedom. The effect of plate geometry, temperature field, material composition, and the modal analysis on the vibrational characteristics is examined. Finally, the results are verified by comparing with those available in literature.
Keywords: FGM, pretwisted plate, thermal environment, HOST, simple power law.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 788174 Binding Ability of Carbazolylphenyl Dendrimers with Zinc (II) Tetraphenylporphyrin Core towards Cryptands
Authors: Galina Mamardashvili, Nugzar Mamardashvili, Win Dehaen
Abstract:
The processes of complexation of the Zn-tetraarylporphyrins with eight 4-(4-(3,6-bis(t-butyl)carbazol-9-yl-phenyl)-1,2,3-triazole (ZnP1) and eight 4-(4-(3,6-di-tert-butyl-9-H-carbazol-9-yl)phenoxy)methyl)-2,4,6-trimethylphenyl (ZnP2)with the 1,10-diaza-4,7,13,18tetraoxabicyclo[8.5.5]eicosane (L1),1,10-diaza-4,7,13,16,21,24-hexaoxabicyclo[8.8.8]hexacosane (L2)and 1,10-diaza-5,6,14,15-dibenzo-4,7,13,16,21,24 hexaoxabicyclo[8.8.8] hexacosane (L3) were investigated by the method of spectrophotometric titration and 1H NMR-spectroscopy. We determined the structures of the host-guest complexes, and their stability constants in toluene were calculated. It was found out that the ZnP1 interacts with the guest molecules L1, L2 with the formation of stable "nest" type complexes and does not form similar complexes with the L3 (presumably due to the fact that the L3 does not match the size of the porphyrin ZnP(1) cavity). On the other hand, the porphyrin ZnP2 binds all of the ligands L1-L3, however complexes thus formed are less stable than complexes ZnP1-L1, ZnP1-L2. In the report, we will also discuss the influence of the alkali cations additives on the stability of the complexes between the porphyrin ZnP1, ZnP2 hosts and guest molecules of the ligands L1-L3.
Keywords: Porphyrin, cryptand, cation, complex guest-host.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 762173 Cloning and Over Expression of an Aspergillus niger XP Phytase Gene (phyA) in Pichia pastoris
Authors: Ngo Thanh Xuan, Mai Thi Hang, Vu Nguyen Thanh
Abstract:
A. niger XP isolated from Vietnam produces very low amount of acidic phytase with optimal pH at 2.5 and 5.5. The phytase production of this strain was successfully improved through gene cloning and expression. A 1.4 - kb DNA fragment containing the coding region of the phyA gene was amplified by PCR and inserted into the expression vector pPICZαA with a signal peptide α- factor, under the control of AOX1 promoter. The recombined plasmid was transformed into the host strain P. pastoris KM71H and X33 by electroporation. Both host strains could efficiently express and secret phytase. The multicopy strains were screened for over expression of phytase. All the selected multicopy strains of P. pastoris X33 were examined for phytase activity, the maximum phytase yield of 1329 IU/ml was obtained after 4 days of incubation in medium BMM. The recombinant protein with MW of 97.4 KW showed to be the only one protein secreted in the culture broth. Multicopy transformant P. pastoris X33 supposed to be potential candidate for producing the commercial preparation of phytase.
Keywords: Aspergillus niger XP, cloning, over expression, Pichia pastoris, phyA , phytase.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2212172 Li4SiO4 Prepared by Sol-gel Method as Potential Host for LISICON Structured Solid Electrolytes
Authors: Syed Bahari Ramadzan Syed Adnan, Nor Sabirin Mohamed, Norwati K.A
Abstract:
In this study, Li4SiO4 powder was successfully synthesized via sol gel method followed by drying at 150oC. Lithium oxide, Li2O and silicon oxide, SiO2 were used as the starting materials with citric acid as the chelating agent. The obtained powder was then sintered at various temperatures. Crystallographic phase analysis, morphology and ionic conductivity were investigated systematically employing X-ray diffraction, Fourier Transform Infrared, Scanning Electron Microscopy and AC impedance spectroscopy. XRD result showed the formation of pure monoclinic Li4SiO4 crystal structure with lattice parameters a = 5.140 Å, b = 6.094 Å, c = 5.293 Å, β = 90o in the sample sintered at 750oC. This observation was confirmed by FTIR analysis. The bulk conductivity of this sample at room temperature was 3.35 × 10-6 S cm-1 and the highest bulk conductivity of 1.16 × 10-4 S cm-1 was obtained at 100°C. The results indicated that, the Li4SiO4 compound has potential to be used as host for LISICON structured solid electrolyte for low temperature application.Keywords: Conductivity, LISICON, Li4SiO4, Solid electrolyte, Structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3320171 An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength
Authors: Kamaldeep Joshi, Rajkumar Yadav, Ashok Kumar Yadav
Abstract:
Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data. It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the watermark varies by a factor of s i.e. (s=10, 20, 30, 40, 50) and it is inserted in the same image.
Keywords: Watermarking, discrete wavelet transform, scaling factor, steganography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1443170 Intensive Biological Control in Spanish Greenhouses: Problems of the Success
Authors: Carolina Sanchez, Juan R. Gallego, Manuel Gamez, Tomas Cabello
Abstract:
Currently, biological control programs in greenhouse crops involve the use, at the same time, several natural enemies during the crop cycle. Also, large number of plant species grown in greenhouses, among them, the used cultivars are also wide. However, the cultivar effects on entomophagous species efficacy (predators and parasitoids) have been scarcely studied. A new method had been developed, using the factitious prey or host Ephestia kuehniella. It allow us to evaluate, under greenhouse or controlled conditions (semi-field), the cultivar effects on the entomophagous species effectiveness. The work was carried out in greenhouse tomato crop. It has been found the biological and ecological activities of predatory species (Nesidiocoris tenuis) and egg-parasitoid (Trichogramma achaeae) can be well represented with the use of the factitious prey or host; being better in the former than the latter. The data found in the trial are shown and discussed. The developed method could be applied to evaluate new plant materials before making available to farmers as commercial varieties, at low costs and easy use.
Keywords: Cultivar Effects, Efficiency, Predators, Parasitoids.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2388169 Specific Frequency of Globular Clusters in Different Galaxy Types
Authors: Ahmed H. Abdullah, Pavel Kroupa
Abstract:
Globular clusters (GC) are important objects for tracing the early evolution of a galaxy. We study the correlation between the cluster population and the global properties of the host galaxy. We found that the correlation between cluster population (NGC) and the baryonic mass (Mb) of the host galaxy are best described as 10 −5.6038Mb. In order to understand the origin of the U -shape relation between the GC specific frequency (SN) and Mb (caused by the high value of SN for dwarfs galaxies and giant ellipticals and a minimum SN for intermediate mass galaxies≈ 1010M), we derive a theoretical model for the specific frequency (SNth). The theoretical model for SNth is based on the slope of the power-law embedded cluster mass function (β) and different time scale (Δt) of the forming galaxy. Our results show a good agreement between the observation and the model at a certain β and Δt. The model seems able to reproduce higher value of SNth of β = 1.5 at the midst formation time scale.Keywords: Galaxies, dwarf, globular cluster, specific frequency, formation time scale.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 800168 ECA-SCTP: Enhanced Cooperative ACK for SCTP Path Recovery in Concurrent Multiple Transfer
Authors: GangHeok Kim, SungHoon Seo, JooSeok Song
Abstract:
Stream Control Transmission Protocol (SCTP) has been proposed to provide reliable transport of real-time communications. Due to its attractive features, such as multi-streaming and multihoming, the SCTP is often expected to be an alternative protocol for TCP and UDP. In the original SCTP standard, the secondary path is mainly regarded as a redundancy. Recently, most of researches have focused on extending the SCTP to enable a host to send its packets to a destination over multiple paths simultaneously. In order to transfer packets concurrently over the multiple paths, the SCTP should be well designed to avoid unnecessary fast retransmission and the mis-estimation of congestion window size through the paths. Therefore, we propose an Enhanced Cooperative ACK SCTP (ECASCTP) to improve the path recovery efficiency of multi-homed host which is under concurrent multiple transfer mode. We evaluated the performance of our proposed scheme using ns-2 simulation in terms of cwnd variation, path recovery time, and goodput. Our scheme provides better performance in lossy and path asymmetric networks.Keywords: SCTP, Concurrent Multiple Transfer, CooperativeSack, Dynamic ack policy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546167 Qualitative Parametric Comparison of Load Balancing Algorithms in Parallel and Distributed Computing Environment
Authors: Amit Chhabra, Gurvinder Singh, Sandeep Singh Waraich, Bhavneet Sidhu, Gaurav Kumar
Abstract:
Decrease in hardware costs and advances in computer networking technologies have led to increased interest in the use of large-scale parallel and distributed computing systems. One of the biggest issues in such systems is the development of effective techniques/algorithms for the distribution of the processes/load of a parallel program on multiple hosts to achieve goal(s) such as minimizing execution time, minimizing communication delays, maximizing resource utilization and maximizing throughput. Substantive research using queuing analysis and assuming job arrivals following a Poisson pattern, have shown that in a multi-host system the probability of one of the hosts being idle while other host has multiple jobs queued up can be very high. Such imbalances in system load suggest that performance can be improved by either transferring jobs from the currently heavily loaded hosts to the lightly loaded ones or distributing load evenly/fairly among the hosts .The algorithms known as load balancing algorithms, helps to achieve the above said goal(s). These algorithms come into two basic categories - static and dynamic. Whereas static load balancing algorithms (SLB) take decisions regarding assignment of tasks to processors based on the average estimated values of process execution times and communication delays at compile time, Dynamic load balancing algorithms (DLB) are adaptive to changing situations and take decisions at run time. The objective of this paper work is to identify qualitative parameters for the comparison of above said algorithms. In future this work can be extended to develop an experimental environment to study these Load balancing algorithms based on comparative parameters quantitatively.Keywords: SLB, DLB, Host, Algorithm and Load.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1657166 The Impact of Host Country Effects on Transferring HRM Practices from Western Headquarters to Ukrainian Subsidiaries
Authors: O. A. Novitskaya
Abstract:
The emerging markets of post-USSR countries have attracted Western multinational companies; however, weak institutions and unstable host country environments have hindered the implementation of successful management practices. The Ukrainian market, in light of recent events, is particularly interesting to study for its compatibility with Western businesses. This paper focuses on factors that can facilitate or inhibit the transfer of human resource management practices from Western headquarters to Ukrainian subsidiaries. To explain the national context’s effects better, a business systems approach has been applied to a qualitative study of 16 wholly owned Western subsidiaries, dissecting the reasons for a weak integration of Western practices in Ukraine. Results show that underdeveloped institutions have forced companies to develop additional practices that compensate for national weaknesses, as well as to adjust to a constantly changing environment. Flexibility and local responsiveness were observed as vital for success in Ukraine.Keywords: Business system, HR practices, human resource management, multinational companies, Ukraine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3347165 Improvement of Semen Quality in Holstein Bulls during Heat Stress by Supplementing Omega-3 Fatty Acids
Authors: Hamid. Gholami, Mohammad. Chamani, Armin. Towhidi, Mohammad. H. Fazeli
Abstract:
The aim of current study was to investigate the changes in the quality parameters of Holstein bull semen during the heat stress and the effect of feeding a source of omega-3 fatty acids in this period. Samples were obtained from 19 Holstein bulls during the expected time of heat stress in Iran (June to September 2009). Control group (n=10) were fed a standard concentrate feed while treatment group (n=9) had this feed top dressed with 100 g of an omega-3 enriched nutriceutical. Semen quality was assessed on ejaculates collected after 1, 5, 9 and 12 weeks of supplementation. Computer-assisted assessment of sperm motility, viability (eosinnigrosin) and hypo-osmotic swelling test (HOST) were conducted. Heat stress affected sperm quality parameters by week 5 and 9 (p<0.05). Supplementation has significantly increased total motility, progressive motility, HOST and average path velocity in the fresh semen of bulls (P<0.05).Keywords: Bull, heat stress, omega-3 fatty acids, spermatozoa.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2642164 The Relationship between Citizenship Acquisition and Ethnic Identity of Immigrant Women in Taiwan
Authors: Yuan-Yu Chiang, Yu-Han Tseng, Chin-Chen Wen
Abstract:
In the last few decades, many southeast-Asia women migrate to Taiwan by marriage, and it usually takes several years for them to acquire Taiwanese citizenship. This study investigates the relationship between their citizenship acquisition and whether they develop Taiwanese identities, and how does it affect their ethnical identity towards their original ethnics. Furthermore, the present study also explores that whether citizenship acquisition help the immigrant women to explore the host society further and make commitment to it, or the identification towards mainstream Taiwanese society is only symbolic and superficial? One hundred and ninety-two immigrant women were measured using Multigroup Ethnic Identity Measure-Revised and a global 10-point ethnic identity question. Correlation tests, t-test, and hierarchical regression were performed to answer the above questions. The results revealed that citizenship acquisition does help immigrant women to identify with Taiwanese society, but it does not affect how they identify with their own ethnics. Furthermore, the results also indicated that acquiring citizenship would not help these immigrant women become involved in deeper cultural exploration of Taiwan nor would it encourage them to make commitments to the host society.
Keywords: Immigrants, international marriage, ethnic identity, Taiwan.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1657163 Hybrid Intelligent Intrusion Detection System
Authors: Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed
Abstract:
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that are being investigated includes neural networks and fuzzy logic with network profiling, that uses simple data mining techniques to process the network data. The proposed system is a hybrid system that combines anomaly, misuse and host based detection. Simple Fuzzy rules allow us to construct if-then rules that reflect common ways of describing security attacks. For host based intrusion detection we use neural-networks along with self organizing maps. Suspicious intrusions can be traced back to its original source path and any traffic from that particular source will be redirected back to them in future. Both network traffic and system audit data are used as inputs for both.Keywords: Intrusion Detection, Network Security, Data mining, Fuzzy Logic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2131162 Structural and Optical Properties of Ce3+ Doped YPO4: Nanophosphors Synthesis by Sol Gel Method
Authors: B. Kahouadji, L. Guerbous, L. Lamiri, A. Mendoud
Abstract:
Recently, nanomaterials are developed in the form of nano-films, nano-crystals and nano-pores. Lanthanide phosphates as a material find extensive application as laser, ceramic, sensor, phosphor, and also in optoelectronics, medical and biological labels, solar cells and light sources. Among the different kinds of rare-earth orthophosphates, yttrium orthophosphate has been shown to be an efficient host lattice for rare earth activator ions, which have become a research focus because of their important role in the field of light display systems, lasers, and optoelectronic devices. It is in this context that the 4fn- « 4fn-1 5d transitions of rare earth in insulating materials, lying in the UV and VUV, are the aim of large number of studies .Though there has been a few reports on Eu3+, Nd3+, Pr3+,Er3+, Ce3+, Tm3+ doped YPO4. The 4fn- « 4fn-1 5d transitions of the rare earth dependent to the host-matrix, several matrices ions were used to study these transitions, in this work we are suggesting to study on a very specific class of inorganic material that are orthophosphate doped with rare earth ions. This study focused on the effect of Ce3+ concentration on the structural and optical properties of Ce3+ doped YPO4 yttrium orthophosphate with powder form prepared by the Sol Gel method.
Keywords: YPO4, Ce3+, 4fn- <->4fn-1 5d transitions, scintillator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2733161 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.
Keywords: Digital watermarking, discrete cosine transform, chaotic grid map, entropy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 719160 Parameter Selections of Fuzzy C-Means Based on Robust Analysis
Authors: Kuo-Lung Wu
Abstract:
The weighting exponent m is called the fuzzifier that can have influence on the clustering performance of fuzzy c-means (FCM) and mÎ[1.5,2.5] is suggested by Pal and Bezdek [13]. In this paper, we will discuss the robust properties of FCM and show that the parameter m will have influence on the robustness of FCM. According to our analysis, we find that a large m value will make FCM more robust to noise and outliers. However, if m is larger than the theoretical upper bound proposed by Yu et al. [14], the sample mean will become the unique optimizer. Here, we suggest to implement the FCM algorithm with mÎ[1.5,4] under the restriction when m is smaller than the theoretical upper bound.Keywords: Fuzzy c-means, robust, fuzzifier.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1661159 A Study on the Mobile Web Generating using Element of User Experience
Authors: Heeae Ko, Jongkeun Kim, Kunjung Sim, Kunho Sim, Yonghwan Lim
Abstract:
As mobile service's subscriber is increasing; mobile contents services are getting more and more variables. So, mobile contents development needs not only contents design but also guideline for just mobile. And when mobile contents are developed, it is important to pass the limit and restriction of the mobile. The restrictions of mobile are small browser and screen size, limited download size and uncomfortable navigation. So each contents of mobile guideline will be presented for user's usability, easy of development and consistency of rule. This paper will be proposed methodology which is each contents of mobile guideline. Mobile web will be developed by mobile guideline which I proposed.Keywords: Guideline, interface, mobile, mobile computing, userexperience.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1664158 Electronic Voting System using Mobile Terminal
Authors: Keonwoo Kim, Dowon Hong
Abstract:
Electronic voting (E-voting) using an internet has been recently performed in some nations and regions. There is no spatial restriction which a voter directly has to visit the polling place, but an e-voting using an internet has to go together the computer in which the internet connection is possible. Also, this voting requires an access code for the e-voting through the beforehand report of a voter. To minimize these disadvantages, we propose a method in which a voter, who has the wireless certificate issued in advance, uses its own cellular phone for an e-voting without the special registration for a vote. Our proposal allows a voter to cast his vote in a simple and convenient way without the limit of time and location, thereby increasing the voting rate, and also ensuring confidentiality and anonymity.Keywords: Voting, mobile terminal, confidentiality, anonymity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2770157 Numerical Study of Hypersonic Glide Vehicle based on Blunted Waverider
Authors: Liu Jian-xia, Hou Zhong-xi, Chen Xiao-qing
Abstract:
The waverider is proved to be a remarkably useful configuration for hypersonic glide vehicle (HGV) in terms of the high lift-to-drag ratio. Due to the severe aerodynamic heating and the processing technical restriction, the sharp leading edge of waverider should be blunted, and then the flow characteristics and the aerodynamic performance along the trajectory will change. In this paper, the flow characteristics of a HGV, including the rarefied gas effect and transition phenomenon, were studied based on a reference trajectory. A numerical simulation was carried out to study the performance of the HGV under a typical condition.Keywords: Aerodynamic, CFD, Thermodynamic, Waverider
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2903156 Corruption and International Business Community Is Integration into International Business ameans of Reducing Corruption?The case of Russia
Authors: Anouch Mkhitarian
Abstract:
The article examines an opportunity of corruption restriction exercised by international business community in Russia. Integration of Russian economy into the international business does not reduce corruption inside the country. Foreign actors investing in Russia under the condition of obtaining their required rates of returns will be reluctant to harm their investments by involving into anticorruption activities. Furthermore, many Russian firms- competitive advantage could be directly related to their corruption connections. In this case, foreign investments would only accentuate corrupt companies- success by supporting them financiallyKeywords: Corrution, FDI, Russian Federation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1602