Search results for: Adaptation in social environment
2459 Multi-Criteria Nautical Ports Capacity and Services Planning
Authors: N. Perko, N. Kavran, M. Bukljaš, I. Berbić
Abstract:
This paper is a result of implemented research on proposed introduced methodology for nautical ports capacity planning by introducing a multi-criteria approach of defined criteria in the Adriatic Sea region. The purpose was analyzing the determinants - characteristics of infrastructure and services of nautical ports capacity allocated, especially nowadays due to COVID-19 pandemic, as crucial for successful operation of nautical ports. Giving the importance of the defined priorities for short-term and long-term planning is essential not only in terms of the development of nautical tourism, but also in terms of developing the maritime system, but unfortunately this is not always carried out. Evaluation of the use of resources should follow from a detailed analysis of all aspects of resources bearing in mind that nautical tourism used resources in a sustainable manner and generates effects in the tourism and maritime sectors. Consequently, identified multiplier effect of nautical tourism, which should be defined and quantified in detail, should be one of the major competitive products on the Croatian Adriatic and the Mediterranean. Research of nautical tourism is necessary to quantify the effects and required planning system development. In the future, the greatest threat to long-term sustainable development of nautical tourism can be its further uncontrolled or unlimited and undirected development, especially under pressure markedly higher demand than supply for new moorings in the Mediterranean. Results of this implemented research are applicable to nautical ports management and decision makers of maritime transport system development. This paper will present implemented research and obtained result - developed methodology for nautical port capacity planning - Port Capacity Planning Multi-criteria decision-making. A proposed methodological approach of multi-criteria capacity planning includes four criteria (spatial - transport, cost - infrastructure, ecological and organizational criteria, and additional services). The importance of the criteria and sub-criteria is evaluated and carried out the basis for a sensitivity analysis of the importance of the criteria and sub-criteria. Based on the analysis of the identified and quantified importance of certain criteria and sub-criteria as well as sensitivity analysis and analysis of changes of the quantified importance scientific and applicable results will be presented. These obtained results have practical applicability by management of nautical ports in the planning of increasing capacity and further development and for the adaptation of existing nautical ports. The obtained research is applicable and replicable in other seas and results are especially important and useful in this COVID-19 pandemic challenging maritime development framework.
Keywords: Adriatic Sea, capacity, infrastructures, maritime system, methodology, nautical ports, nautical tourism, service.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4462458 Greenhouse Gasses’ Effect on Atmospheric Temperature Increase and the Observable Effects on Ecosystems
Authors: Alexander J. Severinsky
Abstract:
Radiative forces of greenhouse gases (GHG) increase the temperature of the Earth's surface, more on land, and less in oceans, due to their thermal capacities. Given this inertia, the temperature increase is delayed over time. Air temperature, however, is not delayed as air thermal capacity is much lower. In this study, through analysis and synthesis of multidisciplinary science and data, an estimate of atmospheric temperature increase is made. Then, this estimate is used to shed light on current observations of ice and snow loss, desertification and forest fires, and increased extreme air disturbances. The reason for this inquiry is due to the author’s skepticism that current changes cannot be explained by a "~1 oC" global average surface temperature rise within the last 50-60 years. The only other plausible cause to explore for understanding is that of atmospheric temperature rise. The study utilizes an analysis of air temperature rise from three different scientific disciplines: thermodynamics, climate science experiments, and climactic historical studies. The results coming from these diverse disciplines are nearly the same, within ± 1.6%. The direct radiative force of GHGs with a high level of scientific understanding is near 4.7 W/m2 on average over the Earth’s entire surface in 2018, as compared to one in pre-Industrial time in the mid-1700s. The additional radiative force of fast feedbacks coming from various forms of water gives approximately an additional ~15 W/m2. In 2018, these radiative forces heated the atmosphere by approximately 5.1 oC, which will create a thermal equilibrium average ground surface temperature increase of 4.6 oC to 4.8 oC by the end of this century. After 2018, the temperature will continue to rise without any additional increases in the concentration of the GHGs, primarily of carbon dioxide and methane. These findings of the radiative force of GHGs in 2018 were applied to estimates of effects on major Earth ecosystems. This additional force of nearly 20 W/m2 causes an increase in ice melting by an additional rate of over 90 cm/year, green leaves temperature increase by nearly 5 oC, and a work energy increase of air by approximately 40 Joules/mole. This explains the observed high rates of ice melting at all altitudes and latitudes, the spread of deserts and increases in forest fires, as well as increased energy of tornadoes, typhoons, hurricanes, and extreme weather, much more plausibly than the 1.5 oC increase in average global surface temperature in the same time interval. Planned mitigation and adaptation measures might prove to be much more effective when directed toward the reduction of existing GHGs in the atmosphere.
Keywords: GHG radiative forces, GHG air temperature, GHG thermodynamics, GHG historical, GHG experimental, GHG radiative force on ice, GHG radiative force on plants, GHG radiative force in air.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5662457 The Link between Financial and Overall Corporate Strategies
Authors: Jaroslav Pavlíček
Abstract:
Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The concept of strategic management should fulfill some basic requirements to make it applicable for both the typical, but also more specific company environment. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, small and medium-sized enterprises (SMEs). Furthermore, the methodology recommends procedures while solving an up-to-date worldwide task of the definition of the company strategy and its financial strategy.
Keywords: corporate strategy, financial strategy, corporate planning
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19522456 Cognitive Relaying in Interference Limited Spectrum Sharing Environment: Outage Probability and Outage Capacity
Authors: Md Fazlul Kader, Soo Young Shin
Abstract:
In this paper, we consider a cognitive relay network (CRN) in which the primary receiver (PR) is protected by peak transmit power ¯PST and/or peak interference power Q constraints. In addition, the interference effect from the primary transmitter (PT) is considered to show its impact on the performance of the CRN. We investigate the outage probability (OP) and outage capacity (OC) of the CRN by deriving closed-form expressions over Rayleigh fading channel. Results show that both the OP and OC improve by increasing the cooperative relay nodes as well as when the PT is far away from the SR.Keywords: Cognitive relay, outage, interference limited, decode-and-forward (DF).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19092455 Modeling and Implementation of an Oceanic- Robot Glider
Authors: C. Clements, M. Hasenohr, A. Anvar
Abstract:
A glider is in essence an unpowered vehicle and in this project we designed and built an oceanic glider, designed to operate underwater. This Glider was designed to collect ocean data such as temperature, pressure and (in future measures physical dimensions of the operating environment) and output this data to an external source. Development of the Oceanic Glider required research into various actuation systems that control buoyancy, pitch and yaw and the dynamics of these systems. It also involved the design and manufacture of the Glider and the design and implementation of a controller that enabled the Glider to navigate and move in an appropriate manner.
Keywords: Ocean Glider, Robot, Automation, Command, Control, Navigation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17632454 Use of Cellulosic Fibres in Double Layer Porous Asphalt
Authors: Márcia Afonso, Marisa Dinis-Almeida, Cristina Fael
Abstract:
Climate change, namely precipitation patterns alteration, has led to extreme conditions such as floods and droughts. In turn, excessive construction has led to the waterproofing of the soil, increasing the surface runoff and decreasing the groundwater recharge capacity. The permeable pavements used in areas with low traffic lead to a decrease in the probability of floods peaks occurrence and the sediments reduction and pollutants transport, ensuring rainwater quality improvement. This study aims to evaluate the porous asphalt performance, developed in the laboratory, with addition of cellulosic fibres. One of the main objectives of cellulosic fibres use is to stop binder drainage, preventing its loss during storage and transport. Comparing to the conventional porous asphalt the cellulosic fibres addition improved the porous asphalt performance. The cellulosic fibres allowed the bitumen content increase, enabling retention and better aggregates coating and, consequently, a greater mixture durability. With this solution, it is intended to develop better practices of resilience and adaptation to the extreme climate changes and respond to the sustainability current demands, through the eco-friendly materials use. The mix design was performed for different size aggregates (with fine aggregates – PA1 and with coarse aggregates – PA2). The percentage influence of the fibres to be used was studied. It was observed that overall, the binder drainage decreases as the cellulose fibres percentage increases. It was found that the PA2 mixture obtained most binder drainage relative to PA1 mixture, irrespective of the fibres percentage used. Subsequently, the performance was evaluated through laboratory tests of indirect tensile stiffness modulus, water sensitivity, permeability and permanent deformation. The stiffness modulus for the two mixtures groups (with and without cellulosic fibres) presented very similar values between them. For the water sensitivity test it was observed that porous asphalt containing more fine aggregates are more susceptible to the water presence than mixtures with coarse aggregates. The porous asphalt with coarse aggregates have more air voids which allow water to pass easily leading to ITSR higher values. In the permeability test was observed that asphalt porous without cellulosic fibres presented had lower permeability than asphalt porous with cellulosic fibres. The resistance to permanent deformation results indicates better behaviour of porous asphalt with cellulosic fibres, verifying a bigger rut depth in porous asphalt without cellulosic fibres. In this study, it was observed that porous asphalt with bitumen higher percentages improve the performance to permanent deformation. This fact was only possible due to the bitumen retention by the cellulosic fibres.
Keywords: Binder drainage, cellulosic fibres, permanent deformation, porous asphalt.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7432453 Analysis of Combined Use of NN and MFCC for Speech Recognition
Authors: Safdar Tanweer, Abdul Mobin, Afshar Alam
Abstract:
The performance and analysis of speech recognition system is illustrated in this paper. An approach to recognize the English word corresponding to digit (0-9) spoken by 2 different speakers is captured in noise free environment. For feature extraction, speech Mel frequency cepstral coefficients (MFCC) has been used which gives a set of feature vectors from recorded speech samples. Neural network model is used to enhance the recognition performance. Feed forward neural network with back propagation algorithm model is used. However other speech recognition techniques such as HMM, DTW exist. All experiments are carried out on Matlab.
Keywords: Speech Recognition, MFCC, Neural Network, classifier.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32682452 Preparation of POMA Nanofibers by Electrospinning and Its Applications in Tissue Engineering
Authors: Lu-Chen Yeh‚ Jui-Ming Yeh
Abstract:
In this manuscript, we produced neat electrospun poly(o-methoxyaniline) (POMA) fibers and utilized it for applying the growth of neural stem cells. The transparency and morphology of as-prepared POMA fibers was characterized by UV-visible spectroscopy and scanning electron microscopy, respectively. It was found to have no adverse effects on the long-term proliferation of the neural stem cells (NSCs), retained the ability to self-renew, and exhibit multipotentiality. Results of immunofluorescence staining studies confirmed that POMA electrospun fibers could provide a great environment for NSCs and enhance its differentiation.
Keywords: Electrospun, polyaniline, neural stem cell, differentiation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17852451 Holistic Simulation-Based Impact Analysis Framework for Sustainable Manufacturing
Authors: Mijoh A. Gbededo, Kapila Liyanage, Sabuj Mallik
Abstract:
The emerging approaches to sustainable manufacturing are considered to be solution-oriented with the aim of addressing the environmental, economic and social issues holistically. However, the analysis of the interdependencies amongst the three sustainability dimensions has not been fully captured in the literature. In a recent review of approaches to sustainable manufacturing, two categories of techniques are identified: 1) Sustainable Product Development (SPD), and 2) Sustainability Performance Assessment (SPA) techniques. The challenges of the approaches are not only related to the arguments and misconceptions of the relationships between the techniques and sustainable development but also to the inability to capture and integrate the three sustainability dimensions. This requires a clear definition of some of the approaches and a road-map to the development of a holistic approach that supports sustainability decision-making. In this context, eco-innovation, social impact assessment, and life cycle sustainability analysis play an important role. This paper deployed an integrative approach that enabled amalgamation of sustainable manufacturing approaches and the theories of reciprocity and motivation into a holistic simulation-based impact analysis framework. The findings in this research have the potential to guide sustainability analysts to capture the aspects of the three sustainability dimensions into an analytical model. Additionally, the research findings presented can aid the construction of a holistic simulation model of a sustainable manufacturing and support effective decision-making.
Keywords: Life cycle sustainability analysis, sustainable manufacturing, sustainability performance assessment, sustainable product development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8492450 Using the Polynomial Approximation Algorithm in the Algorithm 2 for Manipulator's Control in an Unknown Environment
Authors: Pavel K. Lopatin, Artyom S. Yegorov
Abstract:
The Algorithm 2 for a n-link manipulator movement amidst arbitrary unknown static obstacles for a case when a sensor system supplies information about local neighborhoods of different points in the configuration space is presented. The Algorithm 2 guarantees the reaching of a target position in a finite number of steps. The Algorithm 2 is reduced to a finite number of calls of a subroutine for planning a trajectory in the presence of known forbidden states. The polynomial approximation algorithm which is used as the subroutine is presented. The results of the Algorithm2 implementation are given.
Keywords: Manipulator, trajectory planning, unknown obstacles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12402449 Recycling-Oriented Product Assessment during Design Process with Usage of Agent Technology
Authors: Ewa Dostatni, Jacek Diakun, Damian Grajewski, Radosław Wichniarek, Anna Karwasz
Abstract:
In the paper the method of product analysis from recycling point of view has been described. The analysis bases on set of measures that assess a product from the point of view of final stages of its lifecycle. It was assumed that such analysis will be performed at the design phase – in order to conduct such analysis the computer system that aids the designer during the design process has been developed. The structure of the computer tool, based on agent technology, and example results has been also included in the paper.Keywords: Agent technology, PLM, design for environment, ecodesign.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16742448 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).
Keywords: Mininet, OpenFlow, POX controller, SDN.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29702447 Cooperative Learning: A Case Study on Teamwork through Community Service Project
Authors: Priyadharshini Ahrumugam
Abstract:
Cooperative groups through much research have been recognized to churn remarkable achievements instead of solitary or individualistic efforts. Based on Johnson and Johnson’s model of cooperative learning, the five key components of cooperation are positive interdependence, face-to-face promotive interaction, individual accountability, social skills, and group processing. In 2011, the Malaysian Ministry of Higher Education (MOHE) introduced the Holistic Student Development policy with the aim to develop morally sound individuals equipped with lifelong learning skills. The Community Service project was included in the improvement initiative. The purpose of this study is to assess the relationship of team-based learning in facilitating particularly students’ positive interdependence and face-to-face promotive interaction. The research methods involve in-depth interviews with the team leaders and selected team members, and a content analysis of the undergraduate students’ reflective journals. A significant positive relationship was found between students’ progressive outlook towards teamwork and the highlighted two components. The key findings show that students have gained in their individual learning and work results through teamwork and interaction with other students. The inclusion of Community Service as a MOHE subject resonates with cooperative learning methods that enhances supportive relationships and develops students’ social skills together with their professional skills.Keywords: Community service, cooperative learning, positive interdependence, teamwork.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22022446 The Supplier Relationship Management Market Trends
Authors: Eulálio G. Campelo F., Wolffried Stucky
Abstract:
The paper introduces and discusses definitions and concepts from the supplier relationship management area. This review has the goal to provide readers with the basic conditions to understand the market mechanisms and the technological developments of the SRM market. Further on, the work gives a picture of the actual business environment in which the SRM vendors are in, and the main trends in the field, based on the main SRM functionalities i.e. e-Procurement, e-Sourcing and Supplier Enablement, which indicates users and software providers the future technological developments and practises that will take place in this area in the next couple of years.Keywords: Supplier Relationship Management, e-Procurement, e-Sourcing, Supplier Enablement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35242445 Swarm Navigation in a Complex Environment
Authors: Jai Raj, Jito Vanualailai, Bibhya Sharma, Shonal Singh
Abstract:
This paper proposes a solution to the motion planning and control problem of car-like mobile robots which is required to move safely to a designated target in a priori known workspace cluttered with swarm of boids exhibiting collective emergent behaviors. A generalized algorithm for target convergence and swarm avoidance is proposed that will work for any number of swarms. The control laws proposed in this paper also ensures practical stability of the system. The effectiveness of the proposed control laws are demonstrated via computer simulations of an emergent behavior.Keywords: Swarm, practical stability, motion planning, emergent.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13962444 Suggestion for Malware Detection Agent Considering Network Environment
Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung
Abstract:
Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.
Keywords: Android malware detection, software-defined network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9262443 Overcoming Boundaries in Science – A Plea against Political Isolations
Authors: Tim Engartner
Abstract:
If science is supposed to gain greater social relevance and acceptance, researchers must not only relate to the broader public, but also promote intercourse within the ivory tower itself. The latter process has been under way successfully for a number of years in the form of transdisciplinary research initiatives. What is still lacking is a broad debate about the necessity to look around properly and face up to opposing views on one and the same topic within our own discipline.Keywords: Schools of thought, pluralism, openness, value judgements, controversy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11292442 Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks
Authors: V. Narasimha Raghavan, T. Peer Meera Labbai, N. Bhalaji, Suvitha Kesavan
Abstract:
In this paper, a new approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate in an ad hoc environment. The extended DSR protocol is tested under different scenarios by varying the number of malicious nodes and node moving speed. It is also tested varying the number of nodes in simulation used. The result indicates the achieved throughput by extended DSR is greater than the standard DSR and indicates the percentage of malicious drops over total drops are less in the case of extended DSR than the standard DSR.Keywords: Mobile Adhoc Networks, DSR, Grudger protocol, Nodes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16882441 An Automated Approach for Assembling Modular Fixtures Using SolidWorks
Authors: Uday Hameed Farhan, Majid Tolouei-Rad, Simona O'Brien
Abstract:
Modular fixtures (MFs) are very important tools in manufacturing processes in terms of reduction the cost and the production time. This paper introduces an automated approach for assembling MFs elements by employing SolidWorks as a powerful 3D CAD software. Visual Basic (VB) programming language was applied integrating with SolidWorks API (Application programming interface) functions. This integration allowed creating plug-in file and generating new menus in the SolidWorks environment. The menus allow the user to select, insert, and assemble MFs elements.Keywords: Assembly automation, modular fixtures, SolidWorks, Visual Basic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27822440 Per Flow Packet Scheduling Scheme to Improve the End-to-End Fairness in Mobile Ad Hoc Wireless Network
Authors: K. Sasikala, R. S. D Wahidabanu
Abstract:
Various fairness models and criteria proposed by academia and industries for wired networks can be applied for ad hoc wireless network. The end-to-end fairness in an ad hoc wireless network is a challenging task compared to wired networks, which has not been addressed effectively. Most of the traffic in an ad hoc network are transport layer flows and thus the fairness of transport layer flows has attracted the interest of the researchers. The factors such as MAC protocol, routing protocol, the length of a route, buffer size, active queue management algorithm and the congestion control algorithms affects the fairness of transport layer flows. In this paper, we have considered the rate of data transmission, the queue management and packet scheduling technique. The ad hoc network is dynamic in nature due to various parameters such as transmission of control packets, multihop nature of forwarding packets, changes in source and destination nodes, changes in the routing path influences determining throughput and fairness among the concurrent flows. In addition, the effect of interaction between the protocol in the data link and transport layers has also plays a role in determining the rate of the data transmission. We maintain queue for each flow and the delay information of each flow is maintained accordingly. The pre-processing of flow is done up to the network layer only. The source and destination address information is used for separating the flow and the transport layer information is not used. This minimizes the delay in the network. Each flow is attached to a timer and is updated dynamically. Finite State Machine (FSM) is proposed for queue and transmission control mechanism. The performance of the proposed approach is evaluated in ns-2 simulation environment. The throughput and fairness based on mobility for different flows used as performance metrics. We have compared the performance of the proposed approach with ATP and the transport layer information is used. This minimizes the delay in the network. Each flow is attached to a timer and is updated dynamically. Finite State Machine (FSM) is proposed for queue and transmission control mechanism. The performance of the proposed approach is evaluated in ns-2 simulation environment. The throughput and fairness based on not mobility for different flows used as performance metrics. We have compared the performance of the proposed approach with ATP and MC-MLAS and the performance of the proposed approach is encouraging.
Keywords: ATP, End-to-End fairness, FSM, MAC, QoS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19862439 Implication of Taliban’s Recent Relationship with Neighboring Countries and Its Impact on the Current Peace Process
Authors: Lutfurahman Aftab
Abstract:
The Taliban’s relationships with the neighboring countries are a complex political issue that local people interpret one way, and politicians have different perceptions; therefore, it is a current issue that needs to be analyzed broadly and impartially. In this article, we investigate the Taliban’s current relationships with the neighboring countries, as well as look at the effects these relationships have on the current peace negotiations in Doha, which began on September 12, 2020. The issue of Taliban and the current peace process has turned to be the center-of-attention for most of the neighboring countries, and every country has opened new pages in their foreign policies because after the Taliban-US peace agreement, the neighboring countries are meticulously and closely observing the situation and they believe that the Taliban is on the verge to tighten their grips on the future political power of Afghanistan. Every neighboring country of Afghanistan has political, economic, and social interests in this land-locked country. The Taliban’s current role within the peace talks and anticipated future position within the Afghan government will have great political, economic, and social implications on countries in the region as they assess their foreign policies. As these countries move to form closer ties with the Taliban, the government of Afghanistan is worried that this may hinder the peace process. Afghanistan has long blamed Pakistan for sheltering the Taliban and providing safe havens for the terrorist groups, including Al Qaeda, and the recent visits of Taliban’s delegations to Islamabad, Pakistan, have raised concern among government officials in Afghanistan who believe that the Taliban is not independent in their decisions, and for every step they take, are consulting with Pakistan’s political leadership.
Keywords: peace process, USA, Afghanistan, Taliban
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4482438 The 5S Responses of Obese Teenagers in Verbal Bullying
Authors: Alpha Bolinao, Francine Rose De Castro, Jessie Kate Lumba, Raztine Mae Paeste, Hannah Grace Tosio
Abstract:
The present study aimed to know the role of verbal bullying in the lives of obese teenagers exposed to it. The study employed a qualitative design specifically the phenomenological approach that focuses on the obese teenagers’ verbal bullying experiences. The study also used the social constructivism approach wherein it described the obese teenagers’ verbal bullying experiences as they interact with the social world. Through purposive and referral sampling technique, the researchers were able to choose twelve (12) respondents from different schools around the City of Manila, enrolled in the School Year 2015-2016, ages 16-21 years old, has experienced verbal bullying for the last ten (10) years and with the Body Mass Index (BMI) of equal to or greater than 30. Upon the consent of the respondents, ethical considerations were ensured. In-depth one (1) hour interviews were guided by the researchers’ aide memoir. The recorded interviews were transcribed into a field text and the responses were thoroughly analyzed through Thematic Analysis and Kelly’s Repertory Grid. It was found that the role of verbal bullying in the lives of obese teenagers exposed to it is a process and is best described through a syringe, or the 5S Responses of Obese Teenagers in Bullying, with five conceptual themes which also signify the experiences and the process that obese teenagers have gone through after experiencing verbal bullying. The themes conceptualized were: Suffering, self-doubt, suppression, self-acceptance and sanguineness. This paper may serve as a basis for a counseling program to help the obese teenagers cope with their bullying experiences.
Keywords: Obesity, obese teenagers, bullying, experiences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17342437 The New Approach to Sustainability in the Design of Urban and Architectural Interiors – Elements of Composition Revised
Authors: Patrycja J. Haupt
Abstract:
Today we tend to go back to the past to our root relation to nature. Therefore in search of friendly spaces there are elements of natural environment introduced as elements of spatial composition. Though reinvented through the use of the new substance such as greenery, water etc. made possible by state of the art technologies, still, in principal, they remain the same. As a result, sustainable design, based upon the recognized means of composition in addition to the relation of architecture and urbanism vs. nature introduces a new aesthetical values into architectural and urban space.Keywords: architectural composition, biodiversity, elements of composition, green architecture, sustainable design, urban composition, water management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21072436 From Victim to Ethical Agent: Oscar Wilde's The Ballad of Reading Gaol as Post-Traumatic Writing
Authors: Mona Salah El-Din Hassanein
Abstract:
Faced with a sudden, unexpected, and overwhelming event, the individual's normal cognitive processing may cease to function, trapping the psyche in "speechless terror", while images, feelings and sensations are experienced with emotional intensity. Unable to master such situation, the individual becomes a trauma victim who will be susceptible to traumatic recollections like intrusive thoughts, flashbacks, and repetitive re-living of the primal event in a way that blurs the distinction between past and present, and forecloses the future. Trauma is timeless, repetitious, and contagious; a trauma observer could fall prey to "secondary victimhood". Central to the process of healing the psychic wounds in the aftermath of trauma is verbalizing the traumatic experience (i.e., putting it into words) – an act which provides a chance for assimilation, testimony, and reevaluation. In light of this paradigm, this paper proposes a reading of Oscar Wilde's The Ballad of Reading Gaol, written shortly after his release from prison, as a post-traumatic text which traces the disruptive effects of the traumatic experience of Wilde's imprisonment for homosexual offences and the ensuing reversal of fortune he endured. Post-traumatic writing demonstrates the process of "working through" a trauma which may lead to the possibility of ethical agency in the form of a "survivor mission". This paper draws on fundamental concepts and key insights in literary trauma theory which is characterized by interdisciplinarity, combining the perspectives of different fields like critical theory, psychology, psychiatry, psychoanalysis, history, and social studies. Of particular relevance to this paper are the concepts of "vicarious traumatization" and "survivor mission", as The Ballad of Reading Gaol was written in response to Wilde's own prison trauma and the indirect traumatization he experienced as a result of witnessing the execution of a fellow prisoner whose story forms the narrative base of the poem. The Ballad displays Wilde's sense of mission which leads him to recognize the social as well as ethical implications of personal tragedy. Through a close textual analysis of The Ballad of Reading Gaol within the framework of literary trauma theory, the paper aims to: (a) demonstrate how the poem's thematic concerns, structure and rhetorical figures reflect the structure of trauma; (b) highlight Wilde's attempts to come to terms with the effects of the cataclysmic experience which transformed him into a social outcast; and (c) show how Wilde manages to transcend the victim status and assumes the role of ethical agent to voice a critique of the Victorian penal system and the standards of morality underlying the cruelties practiced against wrong doers and to solicit social action.
Keywords: Ballad of Reading Gaol, post-traumatic writing, trauma theory, Wilde.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14302435 An Exploratory Study on the Difference between Online and Offline Conformity Behavior among Chinese College Students
Authors: Xinyue Ma, Dishen Zhang, Yijun Liu, Yutian Jiang, Huiyan Yu, Chufeng Gu
Abstract:
Conformity is defined as one in a social group changing his or her behavior to match the others’ behavior in the group. It is used to find that people show a higher level of online conformity behavior than offline. However, as anonymity can decrease the level of online conformity behavior, the difference between online and offline conformity behavior among Chinese college students still needs to be tested. In this study, college students (N = 60) have been randomly assigned into three groups: control group, offline experimental group, and online experimental group. Through comparing the results of offline experimental group and online experimental group with the Mann-Whitney U test, this study verified the results of Asch’s experiment, and found out that people show a lower level of online conformity behavior than offline, which contradicted the previous finding found in China. These results can be used to explain why some people make a lot of vicious remarks and radical ideas on the Internet but perform normally in their real life: the anonymity of the network makes the online group pressure less than offline, so people are less likely to conform to social norms and public opinions on the Internet. What is more, these results support the importance and relevance of online voting, because fewer online group pressures make it easier for people to expose their true ideas, thus gathering more comprehensive and truthful views and opinions.
Keywords: Anonymity, Asch’s group conformity, Chinese college students, online conformity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6222434 Teachers Leadership Dimension in History Learning
Authors: Lee Bih Ni, Zulfhikar Rabe, Nurul Asyikin Hassan
Abstract:
The Ministry of Education Malaysia dynamically and drastically made the subject of History mandatory to be in force in 2013. This is in recognition of the nation's heritage and treasures in maintaining true facts and information for future generations of the State. History reveals the civilization of a nation and the fact of national cultural heritage. Civilization needs to be preserved as a legacy of sovereign heritage. Today's generation is the catalyst for future heirs who will support the principle and direction of the country. In line with the National Education Philosophy that aims to shape the potential development of individuals holistically and uniquely in order to produce a balanced and harmonious student in terms of intellectual, spiritual, emotional and physical. Hence, understanding the importance of studying the history subject as a pillar of identity and the history of nationhood is to be a priority in the pursuit of knowledge and empowering the spirit of statehood that is nurtured through continuous learning at school. Judging from the aspect of teacher leadership role in integrating history in a combined way based on Teacher Education Philosophy. It empowers the teaching profession towards the teacher to support noble character. It also supports progressive and scientific views. Teachers are willing to uphold the State's aspirations and celebrate the country's cultural heritage. They guarantee individual development and maintain a united, democratic, progressive and disciplined society. Teacher's role as a change and leadership agent in education begins in the classroom through formal or informal educational processes. This situation is expanded in schools, communities and countries. The focus of this paper is on the role of teacher leadership influencing the effectiveness of teaching and learning history in the classroom environment. Leadership guides to teachers' perceptions on the role of teacher leadership, teaching leadership, and the teacher leadership role and effective teacher leadership role. Discussions give emphasis on aspects of factors affecting the classroom environment, forming the classroom agenda, effective classroom implementation methods, suitable climate for historical learning and teacher challenges in implicating the effectiveness of teaching and learning processes.Keywords: Teacher leadership, leadership lessons, effective classroom, effective teacher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11342433 Development of a Model for the Redesign of Plant Structures
Authors: L. Richter, J. Lübkemann, P. Nyhuis
Abstract:
In order to remain competitive in what is a turbulent environment; businesses must be able to react rapidly to change. The past response to volatile market conditions was to introduce an element of flexibility to production. Nowadays, what is often required is a redesign of factory structures in order to cope with the state of constant flux. The Institute of Production Systems and Logistics is currently developing a descriptive and causal model for the redesign of plant structures as part of an ongoing research project. This article presents the first research findings attained in devising this model.
Keywords: Causal model, change driven factory redesign, factory planning, plant structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18152432 Support of Knowledge Sharing in Manufacturing Companies: A Case Study
Authors: Zuzana Crhova, Karel Kolman, Drahomíra Pavelkova
Abstract:
Knowledge is considered as an important asset which can help organizations to create competitive advantage. The necessity of taking care of these assets is more important in these days – in days of turbulent changes in business environment. Knowledge could facilitate adaption to constant changes. The aim of this paper is to describe how the knowledge sharing can be supported in the manufacturing companies. The methods of case studies and grounded theory were used to present information gained by carrying out semistructured interviews. Results show that knowledge sharing is supported in very similar ways in respondent companies.
Keywords: Case Study, Human Resource Management, Knowledge, Knowledge Sharing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22732431 Application of Wireless Visual Sensor for Semi- Autonomous Mine Navigation System
Authors: Vinay Kumar Pilania, Debashish Chakravarty
Abstract:
The present paper represent the efforts undertaken for the development of an semi-automatic robot that may be used for various post-disaster rescue operation planning and their subsequent execution using one-way communication of video and data from the robot to the controller and controller to the robot respectively. Wireless communication has been used for the purpose so that the robot may access the unapproachable places easily without any difficulties. It is expected that the information obtained from the robot would be of definite help to the rescue team for better planning and execution of their operations.Keywords: Mine environment, mine navigation, mine rescue robot, video data transmission.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17322430 Helping Others and Youth Mental Health: A Qualitative Study Exploring Perspectives of Youth Engaging in Prosocial Activities
Authors: Saima Hirani, Emmanuela Ojukwu, Nilanga Aki Bandara
Abstract:
Mental health challenges that begin during the youth age period may continue across the entire life course. One way to support youth mental health is to encourage youth engagement in prosocial activities. This study aimed to explore youth’s perceptions about helping others and mental wellbeing, barriers, and enablers for youth to initiate and continue prosocial activities, and strategies for developing the attribute of helping others in youth. We conducted a qualitative study using semi-structured, virtual interviews with 18 young individuals (aged 16-24 years) living in Vancouver, British Columbia, Canada. Youth perceived helping others as a source of feeling peace and calm, finding meaning in life, experiencing social connection and promoting self-care, and relieving stress. Participants reported opportunities to learn new skills, the role of religion, social connections, previous positive experiences, and role modeling as enablers for their prosocial behavior. Heavy time commitment, negative behavior from others, self-doubt, and late exposure to such activities were considered barriers by youth when participating in prosocial activities. Youth also brought forward key recommendations for engaging youth in helping others. The findings of this study support the notion that youth have positive experiences when engaging in helping others and that involving young people in prosocial activities could be used as a protective intervention for promoting youth mental health and overall wellbeing.
Keywords: Helping others, prosocial behavior, youth, mental wellbeing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 290