863 research outputs found

    Globalization and its impact on the local identity of architecture

    Get PDF
    This paper explores the concept of architectural identity and its relationship with globalization. It analyzes the various dimensions of architecture and its development, as well as the phenomenon of globalization and its impact on local architectural identity. The paper identifies two opposing trends in this context - globalization ideology and the emphasis on architectural identity. The research problem is focused on the impact of globalization on the local architectural identity of structural design. It aims to find ways to maintain, promote, and develop architectural concepts and local architectural identity. The paper provides a literature review of globalization and explains its constituent parts, aims, and features, including its positive and negative aspects and associated risks. It also explores the findings regarding cultural dimensions of globalization, focusing on the cultural dimension. The paper discusses the relationship between culture, globalization, architecture, and architectural identity while considering an intellectual extent as defined by one of its definitions. Overall, this research aims to provide an optimal solution to counteract the negative impact of globalization on architectural identity and promote its development

    Cyber security behavioural intentions for trade secret protection

    Get PDF
    Trade secrets have become an important aspect of competitive advantage for new and established businesses in the new digital economy. This is particularly true in corporate venturing, where most corporates rely on new entrepreneurial ventures with creative ideas to drive innovation and fuel growth. In this manner, these corporates run corporate venturing units such as corporate accelerators to support entrepreneurs creating new ventures. During the accelerated pace of venturing, trade secrets become the core intangible asset that requires protection for any new venture. Yet, people remain the weakest link in the cyber security chain and that requires more understanding to enhance cyber security protection. A new approach was suggested in this study to explore the protection of trade secrets through the confidentiality of information, the ownership of intellectual property and the secrecy of commercial secrets. This study developed a conceptual model to explore cyber security behaviour for trade secret protection within corporate accelerators. Well-established theories were adopted to develop the research conceptual model for trade secret protection, integrating the protection motivation theory (PMT), social bond theory (SBT) and the concept of psychological ownership. This study began with a comprehensive up-to-date systematic literature review in the field of cyber security behavioural intentions over the past decade. The top 10 journals in the field of cyber security behaviour were reviewed and 46 publications that used 35 behaviour theories were identified. A concept matrix based on a concept-centric approach was applied to present the behavioural theories used in the relevant literature. By analysing the relevant literature results, the key cyber security behaviour elements were identified and illustrated via a concept map and matrix. Based on the output of the literature review analysis, valuable findings and insights were presented. This study investigates entrepreneurs’ cyber security behavioural intentions to protect trade secrets in agile dynamic corporate environments. The research design adopted a hypothetico-deductive approach using a quantitative survey for empirical data collection. To evaluate the conceptual model, a partial least squares method of structural equation modelling (PLS-SEM) analysis was used. This involved validity and reliability assessments, in addition to hypotheses testing. The research results found statistically significant relationships for severity, vulnerability, response efficacy, response cost, involvement and personal norms in relation to cyber security behavioural intentions to protect trade secrets

    Distributed Combining Techniques for Distributed Detection in Fading Wireless Sensor Networks

    Get PDF
    We investigate distributed combining techniques for distributed detection in wireless sensor networks (WSNs) over Rayleigh fading multiple access channel (MAC). The MAC also suffers from with path loss and additive noise. The WSN is modelled as a Poisson point process (PPP). Two distributed transmit combining techniques are proposed to mitigate fading; distributed equal gain transmit combining (ddEGTC) and distributed maximum ratio transmit combining (dMRTC). The performance of the previous methods is analysed using stochastic geometry tools, where the mean and variance of the detector’s test statistic are found thus enabling the fitting of the received signal distribution by a log-normal distribution. Surprisingly, simulation results show a that ddEGTC outperforms dMRTC

    Experimental and Kinetic Study of the Effect of using Zr- and Pt-loaded Metals on Y-zeolite-based Catalyst to Improve the Products of n-heptane Hydroisomerization Reactions

    Get PDF
    The escalating cost of Pt metal has prompted researchers to incorporate other metals into Pt/catalysts to reduce the amount of Pt. In this work, several bimetallic Pt-Zr/HY-zeolite catalysts were prepared by incorporating small amounts of the inexpensive Zr into the Pt/HY-zeolite to form an active and selective catalyst. Results showed that although half of the required platinum metal was used, the catalytic activity of the prepared Pt-Zr/HY bimetallic catalyst was higher than that of the monometallic (Pt or Zr)/HY catalysts, as a result of the improved Lewis acidity of that catalyst that resulted from the addition of the Zr metal; additionally, the branched alkanes' yield also increased. The optimum catalyst was bimetallic, containing 0.5 wt% Pt + 0.5 wt% Zr, which achieved the highest yield of isomers at 70.2 mol%, along with 82.61 and 84.98 mol% for conversion and selectivity, respectively, under 1 MPa and 250°C reaction conditions. In addition, the hydroisomerization reaction kinetic model was achieved, giving good predicted results in agreement with the experimental calculations, with an acceptable relative error. It was found that lower activation energies (about 44.5 kJ/mol) were needed for olefin hydrogenation to iso-paraffins, while higher activation energies were required for i-paraffin hydrocracking (about 138.1kJ/mol)

    Next Generation Marine Data Networks in an IoT Environment

    Get PDF
    Packet data networks at sea offer the potential for increased safety, connectivity and meteorological data acquisition. Existing solutions including satellite communication are expensive and prohibitive to most small vessels. In this paper, an Internet of Things (IoT) application is proposed as a marine data acquisition and cartography system over Ship Ad-hoc Networks (SANET). Ships are proposed to communicate over Very High Frequency (VHF) which is already available on the majority of ships and are equipped with several sensors such as sea depth, temperature, wind speed and direction, etc. On shore, 5G base station nodes represent sinks for the collected data and are equipped with Mobile Edge Computing (MEC) capabilities for data aggregation and processing. The sensory data is ultimately aggregated at a central cloud on the internet to produce public up to date cartography systems. We discuss the deployment limitations and benefits of the proposed system and investigate it's performance using four different MANET routing protocols which are Ad hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance Vector (DSDV) and Dynamic Source Routing (DSR) protocols. Simulation results illustrate the efficiency of the proposed system with packet delivery rates of up to 60 percent at shore base stations

    Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review

    Get PDF
    Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by considering critical aspects of the cloud, such as service models, deployment models, and involved parties. A comprehensive comparison of cloud security classifications constructs an exhaustive taxonomy. ISO27005, NIST SP 800–30, CRAMM, CORAS, OCTAVE Allegro, and COBIT 5 are rigorously compared based on their applicability, adaptability, and suitability within a cloud-based hosting methodology. The findings of this research recommend OCTAVE Allegro as the preferred cloud hosting paradigm. With many security models available in management studies, it is imperative to identify those suitable for the rapidly expanding and dynamically evolving cloud environment. This study underscores the significant methods for securing data on cloud-hosting platforms, thereby contributing to establishing a robust cloud security taxonomy and hosting methodology

    A novel mutation in HSD11B2 causes apparent mineralocorticoid excess in an Omani kindred

    Get PDF
    Apparent mineralocorticoid excess (AME) is a rare autosomal recessive genetic disorder causing severe hypertension in childhood due to a deficiency of 11β-hydroxysteroid dehydrogenase type 2 (11βHSD2), which is encoded by HSD11B2. Without treatment, chronic hypertension leads to early development of end-organ damage. Approximately 40 causative mutations in HSD11B2 have been identified in ∼100 AME patients worldwide. We have studied the clinical presentation, biochemical parameters, and molecular genetics in six patients from a consanguineous Omani family with AME. DNA sequence analysis of affected members of this family revealed homozygous c.799A>G mutations within exon 4 of HSD11B2, corresponding to a p.T267A mutation of 11βHSD2. The structural change and predicted consequences owing to the p.T267A mutation have been modeled in silico. We conclude that this novel mutation is responsible for AME in this family

    Anatomy and histochemistry of structures producing aroma in leaves of Sygyzium aromaticum (L.) Merr. and Clausena excavata Burm. f.

    Get PDF
    Anatomical and histochemical studies on leaves of Syzygium aromaticum and Clausena excavata have been carried out. This study was conducted in order to investigate the relationship between aroma production and a plant's secretory structures. Leaves from the two tropical aromatic plants were sampled from the Institute of Bioscience (IBS) Conservatory Park and transversely sectioned through lamina, midrib and petiole with a sliding microtome for anatomical investigation. Through light microscopy, oil cells and secretory cavities were distributed near the adaxial and abaxial epidermal layers with large in size, up to 60 µm length. Other leaf anatomical characters such as shape of petiole and midrib, pattern of vascular bundle, palisade and spongy mesophyll, the presence or absence of brachysclereids and crystals are also observed. This study also aimed to investigate the leaf's secretory structures responsible for plants' aroma production and to detect the presence of terpenes and essential oil in secretory structures histochemically

    Estimating the lifetime and Reentry of the Aluminum Space Debris of Sizes (1-10 cm) in LEO under Atmosphere Drag Effects

    Get PDF
      This study concerns in addressing the lifetime and reentry of the space debris in LEO which extends from 200 to 1200 km. In this study the new Computer programs are designed to simulate orbit dynamics of space debris lifetime and reentry under atmospheric drag force by using Runge-Kutta Method to solve the differential equations of drag force and this model was adapted with the Drag Thermosphere Model (DTM78, 94), the Aluminum 2024 space debris in certain size (1-10 cm) were used in this study, which is frequently employed in the structure of spacecraft and aerospace designs. The selected atmospheric model for this investigation is the drag thermospheric models DTM78 and DTM94, because of this dependence on solar and geomagnetic activities. It has been found that the lifetime of the space debris increases with increasing perigee altitudes. It has been found that the elliptical shape of the debris orbit would change gradually into a circular shape, then its kinetic energy would be transformed into heat and hence debris destroy in the dense atmosphere
    corecore