Search results for: regional security
616 Integration of Asian Stock Markets
Authors: Noor A. Auzairy, Rubi Ahmad, Catherine S.F. Ho, Ros Z. Z. Sapian
Abstract:
This paper is to explore the relationship and the level of stock market integration of the Asian countries, primarily concentrating on Malaysia, Thailand, Indonesia, and South Korea, with the world from January 1997 to December 2009. The degree of short-run and long-run stock market integration of those Asian countries are analyzed in order to determine the significance of series of regional and world financial crises, liberalization policies and other financial reforms in influencing the level of stock market integration. To test for cointegration, this paper applies coefficient correlation, univariate regression analyses, cointegration tests, and vector autoregressive models (VAR) by using the four Asian stock markets main indices and the MSCI World index. The empirical findings from this work reveal that there is no long-run stock market integration for the four countries and the world market. However, there is short run integration.Keywords: Asia, integration, relationship, stock market.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2478615 Eight-State BB84: A C# Simulation
Authors: Liliana Zisu
Abstract:
The first and best known quantum protocol BB84, whose security is unconditional allows the transmission of a key with a length equal to that of the message. This key used with an encryption algorithm leads to an unbreakable cryptographic scheme. Despite advantages the protocol still can be improved in at least two aspects: its efficiency which is of about 50%, only half of the photons transmitted are used to create the encryption key and the second aspect refers to the communication that takes place on the classic channel, as it must be reduced or even eliminated. The paper presents a method that improves the two aspects of the BB84 protocol by using quantum memory and eight states of polarization. The implementation of both the proposed method and the BB84 protocol was done through a C# application.
Keywords: BB84, protocol, quantum cryptography, quantum key distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1228614 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks
Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev
Abstract:
One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.
Keywords: Channel estimation, inter-cell interference, pilot contamination attacks, wireless communications.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 677613 Photovoltaic Small-Scale Wastewater Treatment Project for Rural and New-Cultivated Areas in Egypt
Authors: Fadia M. A. Ghali
Abstract:
The problem of wastewater treatment in Egypt is a two-fold problem; the first part concerning the existing rural areas, the second one dealing with new industrial/domestic areas. In Egypt several agricultural projects have been initiated by the government and the private sector as well, in order to change its infrastructure. As a reliable energy source, photovoltaic pumping systems have contributed to supply water for local rural communities worldwide; they can also be implemented to solve the problem “wastewater environment pollution". The solution of this problem can be categorised as recycle process. In addition, because of regional conditions past technologies are being reexamined to select a smallscale treatment system requiring low construction and maintenance costs. This paper gives the design guidelines of a Photovoltaic Small- Scale Wastewater Treatment Plant (PVSSWTP) based on technologies that can be transferred.
Keywords: Renewable energy sources, Photovoltaic, small-scale projects, wastewater treatment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2602612 The Numerical Study of Low Level Jets Formation in South Eastern of Iran
Authors: Mehdi Salehi Barough, Saviz Sehat Kashani, A.A. Bidokhti, A.Ranjbar
Abstract:
The presence of cold air with the convergent topography of the Lut valley over the valley-s sloping terrain can generate Low Level Jets (LLJ). Moreover, the valley-parallel pressure gradients and northerly LLJ are produced as a result of the large-scale processes. In the numerical study the regional MM5 model was run leading to achieve an appropriate dynamical analysis of flows in the region for summer and winter. The results of this study show the presence of summer synoptical systems cause the formation of north-south pressure gradients in the valley which could be led to the blowing of winds with the velocity more than 14 ms-1 and vulnerable dust and wind storms lasting more than 120 days. Whereas the presence of cold air masses in the region in winter, cause the average speed of LLJs decrease. In this time downslope flows are noticeable in creating the night LLJs.Keywords: Cold advection, Low Level Jet, MM5 Model, Pressure gradient
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1525611 New Approach for Constructing a Secure Biometric Database
Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir
Abstract:
The multimodal biometric identification is the combination of several biometric systems; the challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.
Keywords: Biometric databases, Multimodal biometrics, security authentication, Digital watermarking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2090610 Perceptions of Corporate Social Responsibility Concept in Greece
Authors: Grigoris Giannarakis, Nikolaos Litinas, Ioannis Theotokas
Abstract:
This study attempts to clarify major perspectives of Corporate Social Responsibility (CSR) in the Greek market related to companies that have sufficient CSR. An empirical analysis was undertaken, based on literature review and previous observations and surveys, in order to provide a general analysis of the CSR concept in Greece. The results of Accountability Rating institution were used in order to identify companies that adopt an integrated social responsibility approach. Companies that responded to the survey are both regional and international and belong to different industrial fields. Some of the main survey results reveal: multiple aspects for the CSR concept, weak consensus as regards the importance of stakeholders and benefits from the CSR implementation, the important role of CSR in the decision procedure and CSR practices concerning social issues that affect mostly company-s competitiveness. Sharing companies- experience could address common social issues through CSR best practices and develop new knowledge.
Keywords: Corporate Social Responsibility, Greece, Kendall's co-efficient of concordance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2241609 Unconditionally Secure Quantum Payment System
Authors: Essam Al-Daoud
Abstract:
A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction integrity.
Keywords: Bell state, GHZ state, Quantum key distribution, Quantum payment system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1550608 Re-Design of Load Shedding Schemes of the Kosovo Power System
Authors: A.Gjukaj, G.Kabashi, G.Pula, N.Avdiu, B.Prebreza
Abstract:
This paper discusses aspects of re-design of loadshedding schemes with respect to actual developments in the Kosovo power system. Load-shedding is a type of emergency control that is designed to ensure system stability by reducing power system load to match the power generation supply. This paper presents a new adaptive load-shedding scheme that provides emergency protection against excess frequency decline, in cases when the Kosovo power system might be disconnected from the regional transmission network. The proposed load-shedding scheme uses the local frequency rate information to adapt the load-shedding pattern to suit the size and location of the occurring disturbance. The proposed scheme is tested in a software simulation on a large scale PSS/E model which represents nine power system areas of Southeast Europe including the Kosovo power system.Keywords: About Load Shedding, Power System Transient, PSS/E Dynamic Simulation, Under-frequency Protection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2765607 A Global Perspective on Urban Environmental Problems in Developing Countries: The Case of Turkey
Authors: Nükhet Konuk, N. Gamze Turan, Yüksel Ardalı
Abstract:
Cities play a vital role in the social fabric of countries and in national and regional economic growth worldwide; however, the environmental effects of such growth need to be assessed and managed better. The critical and most immediate problems faced by cities of developing countries are the health impacts of urban pollution that derive from inadequate water, sanitation, drainage and solid waste services, poor urban and industrial waste management, and air pollution. As globalization continues, earth's natural processes transform local problems into international issues. The aim of this study is to provide a broad overview of the pollution from urban wastes and emissions in Turkey which is a developing country. It is aimed to underline the significance of reorganizing the institutional tools in a worldwide perspective in order to generate coherent solutions to urban problems, and to enhance urban quality.Keywords: Environmental pollution, developing countries, environmental degradation, urban environmental problems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2218606 Quick Spatial Assessment of Drought Information Derived from MODIS Imagery Using Amplitude Analysis
Authors: Meng-Lung Lin, Qiubing Wang, Fujun Sun, Tzu-How Chu, Yi-Shiang Shiu
Abstract:
The normalized difference vegetation index (NDVI) and normalized difference moisture index (NDMI) derived from the moderate resolution imaging spectroradiometer (MODIS) have been widely used to identify spatial information of drought condition. The relationship between NDVI and NDMI has been analyzed using Pearson correlation analysis and showed strong positive relationship. The drought indices have detected drought conditions and identified spatial extents of drought. A comparison between normal year and drought year demonstrates that the amplitude analysis considered both vegetation and moisture condition is an effective method to identify drought condition. We proposed the amplitude analysis is useful for quick spatial assessment of drought information at a regional scale.Keywords: NDVI, NDMI, Drought, remote sensing, spatialassessment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328605 The Use of Scuba Diving Tourism for Marine Protected Area Management
Authors: L. Mota, O. Frausto
Abstract:
Marine Protected Areas can benefit from nature based tourism, monitoring environmental impacts and also become target for human presence. From more than 3 million tourists visiting Cozumel Island every year, an average of 2,8 million arrive by cruise ship, and 41% are estimated to have motivation for water activities. The destination is relying so much on the tourism activity, that scuba diving and snorkeling in the National Park Reef of Cozumel sustain the major economic activity. In order to achieve the sustainable development indicator designed for regional environmental development, the PNAC offers a training course to tourism providers to access the protected area. This way, the update of the last 5 years of such training is directed to diving staff, boat crew and professionals, making them able to assist in managing the natural resource. Moreover, the case study is an example to be used for raising awareness among tourists visiting protected areas.
Keywords: Education, Marine Protected Area, scuba diving, sustainability, tourism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2531604 Efficient STAKCERT KDD Processes in Worm Detection
Authors: Madihah Mohd Saudi, Andrea J Cullen, Mike E Woodward
Abstract:
This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT model yielded a 98.13% accuracy rate for worm detection by integrating the STAKCERT KDD processes.Keywords: data mining, incident response, KDD processes, security metrics and worm detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1655603 A Proposal to Mobile Payment Implementing 2AF+
Authors: Nael Hirzallah, Sana Nseir
Abstract:
Merchants are competing to offer the use of mobile payment to encourage shopping. many mobile payment systems were made available in various locations worldwide; however, they have various drawbacks. This paper proposes a new mobile payment system that discusses the main drawbacks of these systems, namely security and speed of transaction. The proposal is featured by being simple to use by customers and merchants. Furthermore, the proposed system depends on a new authentication factor that is introduced in this paper and called by Two-Factors Authentication Plus, (2FA+).
Keywords: Electronic Commerce, Payment schemes, Mobile Payment, Authentication Factors, Mobile Applications.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2597602 Spatial Structure and Process of Arctic Warming and Land Cover Change in the Feedback Systems Framework
Authors: Eric Kojo Wu Aikins
Abstract:
This paper examines the relationships between and among the various drivers of climate change that have both climatic and ecological consequences for vegetation and land cover change in arctic areas, particularly in arctic Alaska. It discusses the various processes that have created spatial and climatic structures that have facilitated observable vegetation and land cover changes in the Arctic. Also, it indicates that the drivers of both climatic and ecological changes in the Arctic are multi-faceted and operate in a system with both positive and negative feedbacks that largely results in further increases or decreases of the initial drivers of climatic and vegetation change mainly at the local and regional scales. It demonstrates that the impact of arctic warming on land cover change and the Arctic ecosystems is not unidirectional and one dimensional in nature but it represents a multi-directional and multi-dimensional forces operating in a feedback system.Keywords: Arctic Vegetation Change, Climate Change, Feedback System, Spatial Process and Structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1747601 The Emerging Central Business District (CBD) in Lafia Town, Nigeria, and its Related Urban Planning Problems
Authors: Barau Daniel, Bashayi Obadiah
Abstract:
A spatial analysis of a large 20th century urban settlement (town/city) easily presents the celebrated central Business District (CBD). Theories of Urban Land Economics have easily justified and attempted to explain the existence of such a district activity area within the cityscape. This work examines the gradual emergence and development of the CBD in Lafia Town, Nigeria over 20 years and the attended urban problems caused by its emergence. Personal knowledge and observation of land use change are the main sources of data for the work, with unstructured interview with residents. The result are that the absence of a co-ordinate land use plan for the town, multi-nuclei nature, and regional location of surrounding towns have affected the growth pattern, hence the CBD. Traffic congestion, dispersed CBD land uses are some of the urban planning problems. The work concludes by advocating for integrating CBD uses.
Keywords: Urban planning, Central Business District (CBD), downtown.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4055600 Investigation and Congestion Management to Solvethe Over-Load Problem of Shiraz Substation in FREC
Authors: M Nayeripour, E. Azad, A. Roosta, T. Niknam
Abstract:
In this paper, the transformers over-load problem of Shiraz substation in Fars Regional Electric Company (FREC) is investigated for a period of three years plan. So the suggestions for using phase shifting transformer (PST) and unified power flow controller (UPFC) in order to solve this problem are examined in details and finally, some economical and practical designs will be given in order to solve the related problems. Practical consideration and using the basic and fundamental concept of powers in transmission lines in order to find the economical design are the main advantages of this research. The simulation results of the integrated overall system with different designs compare them base on economical and practical aspects to solve the over-load and loss-reduction.
Keywords: Congestion management, Phase shifting transformer(PST), Unified power flow controller (UPFC), Transmission lines.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2002599 IKEv1 and IKEv2: A Quantitative Analyses
Authors: H.Soussi, M.Hussain, H.Afifi, D.Seret
Abstract:
Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks (VPNs). In this context IETF Internet Key Exchange (IKE) is the most promising protocol under permanent review. We have made a humble effort to pinpoint IKEv2 net gain over IKEv1 due to recent modifications in its original structure, along with a brief overview of salient improvements between the two versions. We have used US National Institute of Technology NIIST VPN simulator to get some comparisons of important performance metrics.
Keywords: Quantitative Analyses, IKEv1, IKEv2, NIIST.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4593598 The Common Agricultural Policy in a Czech Context
Authors: Markéta Slováková
Abstract:
The largest share of policy and money within the European Union goes to agriculture. The Union’s Common Agricultural Policy has undergone several transformations in the last five decades, with the main change taking place in the 1990s. This change influenced agriculture in the Czech Republic, inasmuch as the fledgling republic was preparing to join the European Union and adopt its policies. In the 1990s, Czech agriculture passed from a centrally planned economy to a market economy and subsequently adopted the terms of the Common Agricultural Policy. The Czech Republic is also characterized by a significant diversification of landscape sphere. Agricultural entrepreneurs in the Czech Republic are still not accustomed to the possibility of grants from the European Union. They focus rather on national or regional subsidies. Only half of all agricultural entrepreneurs in the Czech Republic use European subsidies. This article focuses on the introduction of the Common Agricultural Policy to the Czech Republic and its subsequent influence on Czech agriculture. It is demonstrated through the implementation rate of the CAP in the EU Member States and a closer focus on Czech integration.Keywords: Common Agricultural Policy, Agriculture, European Union, Transformation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2108597 Digitization of Television Broadcasting in Nigeria Review
Authors: Samaila Balarabe
Abstract:
Information and Communication Technology (ICT) has opened up new and robust ways of sending and receiving information at global level. Any type of information including voice and video is sent to the diverse publics, who equally have variety of choices. Thus, the development of any nation is tied to efficient information dissemination. In Nigeria, television broadcasting started in 1959 with the establishment of the Western Nigeria Television (WNTV) by the opposition leader, Chief Obafemi Awolowo. Later on, the government took over the station and fully controlled it. Subsequently, regional stations were opened to propagate government policies and programs. The television industry in Nigeria continued to grow in terms of viewership and number with over fifty national television stations and twenty five private ones. Thus, existing documents on digitization of television broadcasting industry and related literature were used as the main source of information. Therefore, this paper analyses the efforts being made by the Nigerian government through its ICT policy towards digitization of its television broadcasting in order to cope with the global trend. Recommendations are proffered with a view to achieving the target goal.
Keywords: Broadcasting, Digitization, Information, Television.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9529596 Proposed Developments of Elliptic Curve Digital Signature Algorithm
Authors: Sattar B. Sadkhan, Najlae Falah Hameed
Abstract:
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of DSA, where it is a digital signature scheme designed to provide a digital signature based on a secret number known only to the signer and also on the actual message being signed. These digital signatures are considered the digital counterparts to handwritten signatures, and are the basis for validating the authenticity of a connection. The security of these schemes results from the infeasibility to compute the signature without the private key. In this paper we introduce a proposed to development the original ECDSA with more complexity.Keywords: Elliptic Curve Digital Signature Algorithm, DSA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1672595 Links between Landscape Management and Environmental Risk Assessment: Considerations from the Italian Context
Authors: M. Balestrieri, C. Pusceddu
Abstract:
Issues relating to the destructive phenomena that can damage people and goods have returned to the centre of debate in Italy with the increase in catastrophic episodes in recent years in a country which is highly vulnerable to hydrological risk. Environmental factors and geological and geomorphological territorial characteristics play an important role in determining the level of vulnerability and the natural tendency to risk. However, a territory has also been subjected to the requirements of and transformations of society and this brings other relevant factors. The reasons for the increase in destructive phenomena are often to be found in the territorial development models adopted. Stewardship of the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about this connection and at the same time to clarify the role of environmental risk assessment as a tool to aid in the sustainable management of landscape. Finally, the study reflects on how regional and urban planners deal with environmental risk and which aspects should be monitored in order to adopt responsible and useful interventions.Keywords: Assessment, landscape, risk, planning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1827594 Monte Carlo and Biophysics Analysis in a Criminal Trial
Authors: Luca Indovina, Carmela Coppola, Carlo Altucci, Riccardo Barberi, Rocco Romano
Abstract:
In this paper a real court case, held in Italy at the Court of Nola, in which a correct physical description, conducted with both a Monte Carlo and biophysical analysis, would have been sufficient to arrive at conclusions confirmed by documentary evidence, is considered. This will be an example of how forensic physics can be useful in confirming documentary evidence in order to reach hardly questionable conclusions. This was a libel trial in which the defendant, Mr. DS (Defendant for Slander), had falsely accused one of his neighbors, Mr. OP (Offended Person), of having caused him some damages. The damages would have been caused by an external plaster piece that would have detached from the neighbor’s property and would have hit Mr DS while he was in his garden, much more than a meter far away from the facade of the building from which the plaster piece would have detached. In the trial, Mr. DS claimed to have suffered a scratch on his forehead, but he never showed the plaster that had hit him, nor was able to tell from where the plaster would have arrived. Furthermore, Mr. DS presented a medical certificate with a diagnosis of contusion of the cerebral cortex. On the contrary, the images of Mr. OP’s security cameras do not show any movement in the garden of Mr. DS in a long interval of time (about 2 hours) around the time of the alleged accident, nor do they show any people entering or coming out from the house of Mr. DS in the same interval of time. Biophysical analysis shows that both the diagnosis of the medical certificate and the wound declared by the defendant, already in conflict with each other, are not compatible with the fall of external plaster pieces too small to be found. The wind was at a level 1 of the Beaufort scale, that is, unable to raise even dust (level 4 of the Beaufort scale). Therefore, the motion of the plaster pieces can be described as a projectile motion, whereas collisions with the building cornice can be treated using Newtons law of coefficients of restitution. Numerous numerical Monte Carlo simulations show that the pieces of plaster would not have been able to reach even the garden of Mr. DS, let alone a distance over 1.30 meters. Results agree with the documentary evidence (images of Mr. OP’s security cameras) that Mr. DS could not have been hit by plaster pieces coming from Mr. OP’s property.Keywords: Biophysical analysis, Monte Carlo simulations, Newton’s law of restitution, projectile motion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 614593 Multi Language Text Editor for Burushaski and Urdu through Unicode
Authors: Irfan Qadir Baig, Muhammad Sharif, Aman Ullah Khan
Abstract:
This paper introduces an isolated and unique ancient language Burushaski, spoken in Hunza, Nagar, Yasin and parts of Gilgit in the Northern Areas of Pakistan. It explains the working mechanism of Multi Language Text Editor for Urdu and Burushaski. It is developed under the use of ISO/IEC 10646 Unicode standards for Urdu and Burushaski open-type fonts. It gives an ample opportunity to this regional ancient language to have a modern Information technology for its promotion and preservation. The main objective of this research paper is to help preserve the heritage of such rare languages and give smart way of automation. It also facilitates to those who are interested in undertaking research on Burushaski or keen to trace fonatic relationship between the national Urdu language and Burushaski. Since this editor covers both Burushaski and Urdu so it can play an important role to introduce Burusho linguistic culture to the world at large. Precisely, as a result of this research paper, Burushaski publication through IT means would be possible.Keywords: Burushaski, Bri Naqsh, Unicode, Burusho, Hunza, Meshaski.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2107592 Study of Remote Sensing and Satellite Images Ability in Preparing Agricultural Land Use Map (ALUM)
Authors: Ali Gholami
Abstract:
In this research the Preparation of Land use map of scanner LISS III satellite data, belonging to the IRS in the Aghche region in Isfahan province, is studied carefully. For this purpose, the IRS satellite images of August 2008 and various land preparation uses in region including rangelands, irrigation farming, dry farming, gardens and urban areas were separated and identified. Therefore, the GPS and Erdas Imaging software were used and three methods of Maximum Likelihood, Mahalanobis Distance and Minimum Distance were analyzed. In each of these methods, matrix error and Kappa index were calculated and accuracy of each method, based on percentages: 53.13, 56.64 and 48.44, were obtained respectively. Considering the low accuracy of these methods in separation of land preparation use, the visual interpretation of the map was used. Finally, regional visits of 150 points were noted at random and no error was observed. It shows that the map prepared by visual interpretation is in high accuracy. Although the probable errors due to visual interpretation and geometric correction might happen but the desired accuracy of the map which is more than 85 percent is reliable.Keywords: Land use map, Aghche Region, Erdas Imagine, satellite images
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1571591 Advancing the Hi-Tech Ecosystem in the Periphery: The Case of the Sea of Galilee Region
Authors: Yael Dubinsky, Orit Hazzan
Abstract:
There is a constant need for hi-tech innovation to be decentralized to peripheral regions. This work describes how we applied Design Science Research (DSR) principles to define what we refer to as the Sea of Galilee (SoG) method. The goal of the SoG method is to harness existing and new technological initiatives in peripheral regions to create a socio-technological network that can initiate and maintain hi-tech activities. The SoG method consists of a set of principles, a stakeholder network, and actual hi-tech business initiatives, including their infrastructure and practices. The three cycles of DSR, the Relevance, Design, and Rigor cycles, lay out a research framework to sharpen the requirements, collect data from case studies, and iteratively refine the SoG method based on the existing knowledge base. We propose that the SoG method can be deployed by regional authorities that wish to be considered as smart regions (an extension of the notion of smart cities).
Keywords: Design Science Research, socio-technological initiatives, Sea of Galilee method, periphery stakeholder network, hi-tech initiatives.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 321590 Vehicular Ad Hoc Network
Authors: S. Swapna Kumar
Abstract:
A Vehicular Ad-Hoc Network (VANET) is a mobile Ad-Hoc Network that provides connectivity moving device to fixed equipments. Such type of device is equipped with vehicle provides safety for the passengers. In the recent research areas of traffic management there observed the wide scope of design of new methodology of extension of wireless sensor networks and ad-hoc network principal for development of VANET technology. This paper provides the wide research view of the VANET and MANET concept for the researchers to contribute the better optimization technique for the development of effective and fast atomization technique for the large size of data exchange in this complex networks.
Keywords: Ad-Hoc, MANET, Sensors, Security, VANET
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4501589 A Risk Assessment for the Small Hive Beetle Based on Meteorological Standard Measurements
Authors: J. Junk, M. Eickermann
Abstract:
The Small Hive Beetle, Aethina tumida (Coleoptera: Nitidulidae) is a parasite for honey bee colonies, Apis mellifera, and was recently introduced to the European continent, accidentally. Based on the literature, a model was developed by using regional meteorological variables (daily values of minimum, maximum and mean air temperature as well as mean soil temperature at 50 mm depth) to calculate the time-point of hive invasion by A. tumida in springtime, the development duration of pupae as well as the number of generations of A. tumida per year. Luxembourg was used as a test region for our model for 2005 to 2013. The model output indicates a successful surviving of the Small Hive Beetle in Luxembourg with two up to three generations per year. Additionally, based on our meteorological data sets a first migration of SHB to apiaries can be expected from mid of March up to April. Our approach can be transferred easily to other countries to estimate the risk potential for a successful introduction and spreading of A. tumida in Western Europe.
Keywords: Aethina tumida, air temperature, larval development, soil temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 753588 Analysis of Air Quality in the Outdoor Environment of the City of Messina by an Application of the Pollution Index Method
Authors: G. Cannistraro, L. Ponterio
Abstract:
In this paper is reported an analysis about the outdoor air pollution of the urban centre of the city of Messina. The variations of the most critical pollutants concentrations (PM10, O3, CO, C6H6) and their trends respect of climatic parameters and vehicular traffic have been studied. Linear regressions have been effectuated for representing the relations among the pollutants; the differences between pollutants concentrations on weekend/weekday were also analyzed. In order to evaluate air pollution and its effects on human health, a method for calculating a pollution index was implemented and applied in the urban centre of the city. This index is based on the weighted mean of the most detrimental air pollutants concentrations respect of their limit values for protection of human health. The analyzed data of the polluting substances were collected by the Assessorship of the Environment of the Regional Province of Messina in the year 2004. A statistical analysis of the air quality index trends is also reported.
Keywords: Environmental pollution, Pollutants levels, Linearregression, Air Quality Index, Statistical analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1779587 Urban Sprawl and the Loss of Peri-Urban Land in Kumasi, Ghana
Authors: Patrick B. Cobbinah, Clifford Amoako
Abstract:
Kumasi is Ghana’s second largest and fastest growing city with an annual population growth rate of 5.4 percent. A major result of this phenomenon is a growing sprawl at the fringes of the city. This paper assesses the nature, extent and impact of sprawl on Kumasi and examines urban planning efforts at addressing this phenomenon. Both secondary and empirical data were collected from decentralized government departments of the Kumasi Metropolitan Assembly and residents of some sprawling communities. The study reveals that sprawl in the metropolis is rapidly consuming fringe rural communities. This situation has weakened effective management of the metropolis causing problems such as congestion and conversion of peri-urban land into residential use without ancillary infrastructure and social services. The paper recommends effective and timely planning and provision of services as well as an overall economic development and spatial integration through regional planning as a way of achieving a long term solution to sprawl.
Keywords: Kumasi, peri-urban, urban planning, urban sprawl.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4978