Search results for: psychological security
1639 Cognitive Benefits of Being Bilingual: The Effect of Language Learning on the Working Memory in Emerging Miao-Mandarin Juveniles in Rural Regions of China
Authors: Peien Ma
Abstract:
Bilingual effect/advantage theorized the positive effect of being bilingual on general cognitive abilities, but it was unknown which factors tend to modulate these bilingualism effects on working memory capacity. This study imposed empirical field research on a group of low-SES emerging bilinguals, Miao people, in the hill tribes of rural China to investigate whether bilingualism affected their verbal working memory performance. 20 Miao-Chinese bilinguals (13 girls and 7 boys with a mean age of 11.45, SD=1.67) and 20 Chinese monolingual peers (13 girls and 7 boys with a mean age of 11.6, SD=0.68) were recruited. These bilingual and monolingual juveniles, matched on age, sex, socioeconomic status, and educational status, completed a language background questionnaire and a standard forward and backward digit span test adapted from Wechsler Adult Intelligence Scale-Revised (WAIS-R). The results showed that bilinguals earned a significantly higher overall mean score of the task, suggesting the superiority of working memory ability over the monolinguals. And bilingual cognitive benefits were independent of proficiency levels in learners’ two languages. The results suggested that bilingualism enhances working memory in sequential bilinguals from low SES backgrounds and shed light on our understanding of the bilingual advantage from a psychological and social perspective.Keywords: bilingual effects, heritage language, Miao/Hmong language Mandarin, working memory
Procedia PDF Downloads 1551638 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol
Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani
Abstract:
Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.Keywords: heuristics routing, intelligent routing, VANET, route optimization
Procedia PDF Downloads 1761637 Cosmetic Surgery on the Rise: The Impact of Remote Communication
Authors: Bruno Di Pace, Roxanne H. Padley
Abstract:
Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.Keywords: cosmetic surgery, remote communication, telehealth, zoom boom
Procedia PDF Downloads 1791636 Level of Roles Performed in Tourism Development: The Case Study of Local Municipality, Chiang Khan District, Loei
Authors: Sukanya Sripho
Abstract:
This paper aims to examine the level of roles performed in tourism development by local people residing in Chiang Khan Sub-District Municipality, Loei Province in Northeast of Thailand. In addition, this study also tested whether personal factors had a relationship with the level of roles performed in tourism development. These personal factors included gender, age, educational level, career, position and duty in the community, average income per month, length of residence and involvement in the tourism industry. The findings revealed a high level in each role performed. These roles were ranked from the highest mean score to the lowest mean score as follows: (1) improving and rejuvenating tourist attractions; (2) improving tourist facilities; (3) promoting people participation; (4) publicizing tourist attractions; (5) protecting for safety and security; and (6) surveying and managing the information of tourist attractions. Furthermore, it was found that position and duty in the community, length of residence and involvement in tourism industry had a relationship with the level of roles performed in tourism development at a significance level of 0.05.Keywords: Role, local municipality administration, tourism development, Thailand
Procedia PDF Downloads 4401635 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State
Authors: Rajendra Kumar Isaac, Monisha Isaac
Abstract:
Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.Keywords: climate variability, agriculture, land use, mitigation strategies
Procedia PDF Downloads 2691634 Majority through the Eyes of Minority: The Role of Social Norms in the Link between Intergroup Contact and Attitudes of the Roma toward Majority Society
Authors: Roman Koky, Sylvie Graf
Abstract:
The relationship between the Roma and members of the majority is tense across Europe due to the fact that the Roma people are the most stigmatized minorities. Studies show that Roma is discriminated against on all levels of society. Improving intergroup relations between the Roma and members of the majority (i.e., non-Roma) is thus one of the most pressing issues of social psychological research. Intergroup contact theory is one of the most effective strategies for improving intergroup relations. However, current research has some limitations, such as the fact that most researchers focus primarily on the perspective of the majority, while the perspective of minorities (e.g., the Roma) is largely missing. Due to the persisting segregation of Roma, and thus the lack of opportunities for direct intergroup contact between the Roma and the majority, using direct intergroup contact as an intervention to reduce prejudice is difficult. In this research, we, therefore, focused on the effect of indirect forms of intergroup contact, particularly extended contact (i.e., experiences with outgroup members shared by fellow ingroup members such as friends or family). Extended contact functions as a descriptive social norm that informs about the actual amount of contact in one’s environment. In a group of Czech Roma (N = 226), the descriptive social norm was associated with ingroup injunctive social norm (e.g., the perceived support of intergroup contact with non-Roma by fellow ingroup members) and lower amount of prejudice toward the non-Roma. We discuss the findings with respect to possibilities to improve the relations between Roma and members of the majority across Europe.Keywords: intergroup contact, prejudice, majority, minority, social norms
Procedia PDF Downloads 1131633 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data
Authors: Ruchika Yadav
Abstract:
Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability
Procedia PDF Downloads 1381632 The Influence of Online Audience Response on Journalists
Authors: Raja Arslan Ahmad Khan
Abstract:
Audience feedback and data play an increasingly crucial role, particularly in the digital age. The advent of digital media and the digitalization of news have given rise to novel forms of audience feedback, markedly different from traditional channels. The engagement of online audiences challenges the conventional role of journalists, introducing a dynamic where audiences can wield both direct and indirect influence. This struggle between the audience and journalists is evident in their contributions and interactions. Media professionals are grappling with challenges such as derogatory remarks, hate speech, online harassment, audience hostility, and attacks from online audiences. The influence of online audiences extends to shaping journalists' daily routines and work practices. Consequently, this study seeks to analyze the impact of online audience feedback on journalists at a routine level within the Malaysian context. Employing a Hierarchy of Influence model as a theoretical framework, the study will utilize a quantitative approach with a snowball survey method. The study's findings aim to enhance our understanding of how online audiences influence journalists and their work practices, encompassing aspects like journalists' autonomy and integrity, editorial decision-making, performance and accountability, daily routines, work practices, as well as the psychological and emotional costs they bear. It's important to note that the study has limitations due to the use of the snowball survey method and its focus within the specific context of Malaysia, making it relatively small in scale.Keywords: online audiences, feedback, influence, journalists, Malaysia
Procedia PDF Downloads 651631 The Meaning of the Best Interests of the Child in Indonesia’s Rampant Phenomenon of Child Marriage
Authors: Elisabeth Sundari, Anny Retnowati
Abstract:
This research aims to examine the meaning of 'the best interests of the child' in Indonesia's rampant phenomenon of child marriage. The methodology used empirical and normative legal research by examining the parent's reason and the judges' considerations in granting child marriage dispensation applications. It takes data samples from judges' decisions purposively in two courts that differ in geographical and religious backgrounds to see data variation. Namely, the District Court and Religious Court of Yogyakarta City, as well as Gunung Kidul Regency, in the last three years (2020-2022). It analyses the data qualitatively to explore how judges interpreted 'the best interests of the child' in their decision. The results show that judges granted 100% of all child marriage dispensation applications filed by parents. The three reasons parents gave for applying for dispensation were that they were ashamed of having a pregnant child without being married, followed religious teachings, and obtained legal status for the baby. The judges supported those reasons by granting the dispensation application. The external factor of the child itself influenced the meaning of 'The best interests of the child' in marrying off children in Indonesia, such as cultural taboos, religious teachings, and obtaining legal status for the baby, rather than internal factors of the child, such as the will to marry, the mental and psychological readiness of the child to become a mother, as well as a wife. This research contributes to the finding that external factors, such as local culture and religion, can influence the meaning of 'the best interests of the child.'Keywords: interests, child, Indonesia, marriage
Procedia PDF Downloads 701630 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study
Authors: Nahian Salsabeel, Faria Leera
Abstract:
—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia
Procedia PDF Downloads 1531629 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing
Authors: Thomas Yeboah
Abstract:
Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing
Procedia PDF Downloads 6261628 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 2521627 Process Integration of Natural Gas Hydrate Production by CH₄-CO₂/H₂ Replacement Coupling Steam Methane Reforming
Authors: Mengying Wang, Xiaohui Wang, Chun Deng, Bei Liu, Changyu Sun, Guangjin Chen, Mahmoud El-Halwagi
Abstract:
Significant amounts of natural gas hydrates (NGHs) are considered potential new sustainable energy resources in the future. However, common used methods for methane gas recovery from hydrate sediments require high investment but with low gas production efficiency, and may cause potential environment and security problems. Therefore, there is a need for effective gas production from hydrates. The natural gas hydrate production method by CO₂/H₂ replacement coupling steam methane reforming can improve the replacement effect and reduce the cost of gas separation. This paper develops a simulation model of the gas production process integrated with steam reforming and membrane separation. The process parameters (i.e., reactor temperature, pressure, H₂O/CH₄ ratio) and the composition of CO₂ and H₂ in the feed gas are analyzed. Energy analysis is also conducted. Two design scenarios with different composition of CO₂ and H₂ in the feed gas are proposed and evaluated to assess the energy efficiency of the novel system. Results show that when the composition of CO₂ in the feed gas is between 43 % and 72 %, there is a certain composition that can meet the requirement that the flow rate of recycled gas is equal to that of feed gas, so as to ensure that the subsequent production process does not need to add feed gas or discharge recycled gas. The energy efficiency of the CO₂ in feed gas at 43 % and 72 % is greater than 1, and the energy efficiency is relatively higher when the CO₂ mole fraction in feed gas is 72 %.Keywords: Gas production, hydrate, process integration, steam reforming
Procedia PDF Downloads 1811626 Women Retelling the Iranian Revolution: A Comparative Study of Novelists Maryam Madjidi and Negar Djavadi
Authors: Alessandro Giardino
Abstract:
The Iranian Revolution has been the object of numberless historical and semi-fictional accounts, often providing a monolithic perspective on the events, due to the westerner positioning of those recounting them. Against this tradition, two contemporary French-Iranian novels "Disoriental" (2016) by Negar Djavadi and "Marx and The Doll" (2017) by Maryam Madjidi have offered readers a female-oriented and interestingly layered representation of the Iranian Revolution, hence addressing the responsibilities and misconceptions of Western countries. Furthermore, these two women writers have shed light on the disenchantment of the Iranian intellectual class vis-à-vis the foundation of the Islamic Republic, by particularly focusing on the deterioration of women’s rights, as well as the repression of political, ethnical, religious and sexual minorities. By a psycholinguistic and semasiological analysis of the two novels by Djavadi and Madjidi, this essay will focus on alternative accounts of the revolution in order to reflect upon the role of intersectional literature to the understanding of history. More specifically, as both women, refugees, and bi-cultural writers, Djavadi and Madjidi unearthed moments and figures of the revolution which had disappeared from the prevalent narrative. In doing so, however, these two writers resorted to entirely opposite styles of writing that, it will be argued, stem from different types of female resistance. In defining these two approaches as a "narrative resistance" and a "photographic resistance," the essay will elucidate the dependence of these writers’ language on generational and psychological factors, but it will also stir a reflection on their different communicative strategies.Keywords: Iranian revolution, French-Iranian, intersectionality, literature, women writers
Procedia PDF Downloads 1551625 Autonomy and Other Variables Related to the Expression of Love among Saudi Couples
Authors: Reshaa Alruwaili
Abstract:
The primary aim of this study was to examine the hypothesis presented by Self Determination theory which suggests that autonomy impacts positively the expression of love. Other hypotheses were also examined which suggest that other variables explain the expression of love, including: dyadic adjustment (dyadic consensus, dyadic satisfaction and dyadic cohesion), couple satisfaction, age, gender, the length of marriage, number of children and attachment styles. The participants were Saudi couples, which provided the opportunity to consider the influence of Saudi culture on the expression of love. A questionnaire was employed to obtain measures of all the relevant variables, including a measure of expression of love that was built from 27 items, constituting verbal, physical and caring features, and a measure of autonomy based on three features: authorship, interest-taking and susceptibility. Data were collected from both members of 34 Saudi couples. Descriptive analysis of both expression of love and autonomy was conducted. Correlation and regression were used to assess the relationships between expression of love and autonomy and other variables. Results indicated that Saudi couples who most often express their love tend to be more than somewhat autonomous. Not much difference was found between husbands and wives in expressing love, although wives were slightly more autonomous than husbands. Expression of love was enhanced by the autonomy of the participants to a greater extent when dyadic satisfaction was controlled, since the latter was negatively correlated with autonomy and had no effect on the expression of love. Basic psychological needs, dyadic consensus and dismissive-avoidant attachment improve the expression of love, while it is decreased by the number of children.Keywords: autonomy, determination theory, expression of love, dyadic adjustment
Procedia PDF Downloads 2301624 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3441623 TomoTherapy® System Repositioning Accuracy According to Treatment Localization
Authors: Veronica Sorgato, Jeremy Belhassen, Philippe Chartier, Roddy Sihanath, Nicolas Docquiere, Jean-Yves Giraud
Abstract:
We analyzed the image-guided radiotherapy method used by the TomoTherapy® System (Accuray Corp.) for patient repositioning in clinical routine. The TomoTherapy® System computes X, Y, Z and roll displacements to match the reference CT, on which the dosimetry has been performed, with the pre-treatment MV CT. The accuracy of the repositioning method has been studied according to the treatment localization. For this, a database of 18774 treatment sessions, performed during 2 consecutive years (2016-2017 period) has been used. The database includes the X, Y, Z and roll displacements proposed by TomoTherapy® System as well as the manual correction of these proposals applied by the radiation therapist. This manual correction aims to further improve the repositioning based on the clinical situation and depends on the structures surrounding the target tumor tissue. The statistical analysis performed on the database aims to define repositioning limits to be used as security and guiding tool for the manual adjustment implemented by the radiation therapist. This tool will participate not only to notify potential repositioning errors but also to further improve patient positioning for optimal treatment.Keywords: accuracy, IGRT MVCT, image-guided radiotherapy megavoltage computed tomography, statistical analysis, tomotherapy, localization
Procedia PDF Downloads 2251622 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA
Authors: S. Saju, G. Thirugnanam
Abstract:
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet
Procedia PDF Downloads 5271621 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2771620 The Trauma Suffered by Left behind Children and Its Impact on Their Emotional Development: A Pilot Study with Brazilian Immigrants in the United States
Authors: Liliane Clark
Abstract:
Immigrating to a different country may imply having to handle many difficult exertions. There is a particular issue that has to be endured by some immigrants: the children they had to leave behind. It is a phenomenon that occurs with certain frequency. Surprisingly, despite the fact that immigration in the United States is such a large proceeding, there is not much research about the topic in America exploring the trauma of the abandonment caused by this separation and its consequences on the mental health of those children. The term “left behind children” is usually applied to children who were left behind by their parents in their original nation under the care of a noteworthy relative, frequently the grandparents, when they moved to another country. This preliminary research, which is a partial study projected for a doctoral thesis, investigated whether the trauma of abandonment experienced by ten left behind children had affected their emotional development. The Strengths and Difficulties Questionnaire (SDQ) and a brief interview were utilized to assess the information. The SDQ explored scales such as emotional symptoms, conduct problems, hyperactivity, peer problems and prosocial behavior. In this pilot study, the results indicated that all these issues had some sort of significant correlation between them. During the interviews, the participants or their parents identified a range of symptoms: anxiety disorder, eating disorders, panic attacks, psychotic-like experiences, drug use and depression. Hence, it seems that there is a connection between the trauma of abandonment suffered due to the separation and the children’s consequent symptomatic behavior. Further studies are indeed necessary to validate the initial results of this investigation.Keywords: abandonment, parent migration, psychological problems, trauma
Procedia PDF Downloads 1871619 Robust Recognition of Locomotion Patterns via Data-Driven Machine Learning in the Cloud Environment
Authors: Shinoy Vengaramkode Bhaskaran, Kaushik Sathupadi, Sandesh Achar
Abstract:
Human locomotion recognition is important in a variety of sectors, such as robotics, security, healthcare, fitness tracking and cloud computing. With the increasing pervasiveness of peripheral devices, particularly Inertial Measurement Units (IMUs) sensors, researchers have attempted to exploit these advancements in order to precisely and efficiently identify and categorize human activities. This research paper introduces a state-of-the-art methodology for the recognition of human locomotion patterns in a cloud environment. The methodology is based on a publicly available benchmark dataset. The investigation implements a denoising and windowing strategy to deal with the unprocessed data. Next, feature extraction is adopted to abstract the main cues from the data. The SelectKBest strategy is used to abstract optimal features from the data. Furthermore, state-of-the-art ML classifiers are used to evaluate the performance of the system, including logistic regression, random forest, gradient boosting and SVM have been investigated to accomplish precise locomotion classification. Finally, a detailed comparative analysis of results is presented to reveal the performance of recognition models.Keywords: artificial intelligence, cloud computing, IoT, human locomotion, gradient boosting, random forest, neural networks, body-worn sensors
Procedia PDF Downloads 71618 Sources of Occupational Stress among Teachers in Command Secondary Schools of Nigerian Army
Authors: Mary Esere, Mogbekeloluwa Fakokunde, Adetoun Idowu
Abstract:
Background: Working in a military setting could elicit some amount of stressful doses into ones system because of the attendant peculiar characteristics found in the military environment. Thus, this study was carried out to find out the sources of occupational stress among teachers in various Command Secondary Schools within 2 Division of Nigerian Army. Method: The study employed a survey method. Simple random sampling technique was used to select the schools in the Division. A total of 200 respondents participated in the study. Sources of Teachers’ Occupational Stress Questionnaire (STOSQ) was administered to the respondents to collect relevant data. The t-test and Analysis of Variance (ANOVA) statistics were used to test the hypotheses. Findings: From the study, it was discovered that teachers in this setting do experience occupational stress. Their major sources of stress bother on issues relating to salaries and allowances and staff welfare concerns. The findings also revealed that there were no significant differences in the sources of occupational stress among the teachers in respect to gender and marital status. Discussion: Based on these findings, it was recommended that the Appropriate Superior Authority (ASA) should reconstitute the proscribed Armed Forces Schools Management Board (AFSMB) where issues, such as staff salaries and welfare concerns for teachers working in the schools under the three services (Army, Navy, Airforce) will always be addressed. This will go a long way in enhancing the psychological well-being of the teachers.Keywords: Nigerian army, occupational stress, sources, teachers
Procedia PDF Downloads 4891617 The Effect of Artificial Intelligence on Human Rights Regulations
Authors: Karam Aziz Hamdy Fahmy
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 621616 Anxiety Sensitivity and Coping Motives Predict Substance Use Craving and Relapse
Authors: Ruhollah Heydari Sheikh Ahmad, Sara Alaie Khoraem
Abstract:
Introduction: Substance use disorder is conceptualized as a chronic relapsing condition where relapse is usually defined as the return to problematic substance use following treatment. An issue of great importance is the identification of the predictors of relapse and the development of treatments that may help prevent relapse. One of the strongest predictors of relapse is craving. The purpose of the present study was to study the effect of anxiety, anxiety sensitivity, and coping motives on craving. Materials and method: Participants (n=74) were male opiate users recruited from a semi-private clinic providing de-toxification and treatment services for substance users. Anxiety, anxiety sensitivity, coping motives and craving were assessed using relevant questionnaires. The addiction severity index was used to assess addiction severity. Results: All patients were methadone maintained and one year after detoxification, 36 patients (48.64%) relapsed. Stress and anxiety, anxiety sensitivity, addiction severity and coping motives predicted craving and relapse. Anxiety sensitivity specifically predicted early relapse. Conclusion: Substance use is a severe mental disorder, with high relapse rates. Substance users high in anxiety sensitivity are particularly prone to relapse during the first six months of treatment. Addiction severity and coping motives need to be taken into account when providing interventional services for substance users. Findings imply the significance of additional psychological attention to methadone maintained patients to prevent craving and relapse.Keywords: anxiety sensitivity, coping motives, relapse, substance use craving
Procedia PDF Downloads 2931615 Designing and Implementation of MPLS Based VPN
Authors: Muhammad Kamran Asif
Abstract:
MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode
Procedia PDF Downloads 3301614 Negative Self-Awareness and Its Effect on Crime
Authors: Guinevere Servis
Abstract:
This paper hypothesizes that withdrawal from positive self-awareness, and the increase of counterfactual-thinking and self-handicapping can help provide ample justification for an individual before, during and/or after committing a crime. The understanding of who someone is, one’s perspective on the world, and why they think the way they do is key to therapy in preventing recidivism. Developing habits to escape self-awareness, by using self-handicapping and counterfactual ideologies, may provide the necessary thinking patterns to decide disobeying the law is a worthy act to pursue. An increase in self-awareness is hypothesized to decrease the likelihood of recidivism, and ways of thinking that withdraw from self awareness can increase the likelihood of it. Especially for those who have been disadvantaged in life and disobeyed the law, self-handicapping and counterfactual thinking can also help to justify one's wrongdoing. The understanding of how a criminal views their disadvantages in the world, and one’s thinking patterns are hypothesized to help one better understand the entire scope on why a crime was committed and thus reduce the likelihood of recidivism. Utilizing therapy for prisoners to increase self-awareness of both thought and action can lead to a healthy, happier life and reduce the likelihood of reoffending. By discussing the terms associated with self-awareness theory and other psychological topics such as self-handicapping, counterfactual thinking, this paper argues the actions towards increasing positive self-awareness can help decrease likelihood of recidivism. Adversely, hypothesizing that increasing the ways of thinking that withdraw one from self-awareness, through counterfactual thinking and self-handicapping, can inherently increase the likelihood of recidivism. Evaluating these findings to further understand the needed changes in correctional institutions is fundamental to reducing crime, benefiting the criminal, the victim(s) and their family, and the state.Keywords: crime, self-awareness theory, correctional institutions, self-regulate, counterfactual thinking, recidivism
Procedia PDF Downloads 981613 A Functional Correlate of the Two Polarities of Depressive Experience Model
Authors: Jaime R. Silva, Gabriel E. Reyes, Marianne Krause
Abstract:
Background: The two-polarity model of the depressive personality argues that experience is organized around two axes: interpersonal relatedness and self-definition. Differential emphasis on one of these poles defines three types of depressive experience: Anaclitic, Introjective or Mixed pattern. On the one hand, Anaclitic pattern has been conceptually related with exaggerated biological stress sensitivity. On the other hand, the Introjective pattern was linked with anhedonic symptomatology. The general aim of the study was to find empirical support for this relationship. Methods: 101 non-clinical individuals participated in two experimental sessions. During the first session, the biological stress reactivity (cortisol concentration in saliva) and the subjective stress perceived (self-reported) during the Trier Social Stress Test (TSST), were investigated. In the second session, a visual discrimination task with a specific reward system, to study the reinforcement sensitivity (anhedonia), was performed. Results: Results evidenced that participants with Introjective depressive symptoms showed a higher interpersonal sensitivity and a diminished sensitivity to reinforcement. In addition, results also indicated that such a group has a poor psychological detection of its exacerbated reactivity to stress, which is the opposite pattern evidenced amongst the Anaclitic group. Conclusions: In perspective, these results empirically support the two-polarity of the depressive personality model. Clinical implications are discussed.Keywords: depression, interpersonal stress, personality, trier social stress test
Procedia PDF Downloads 2491612 Breakfast Eating Pattern Associated with Nutritional Status of Urban Primary Schoolchildren in Iran and India
Authors: Sahar Hooshmand, Mohammad Reza Bagherzadeh Anasari
Abstract:
The aim of this study was to examine the effect of breakfast eating pattern (between frequencies of breakfast consumers and non-consumers) on nutritional status (weight for age, height for age and weight for height). A total 4570 primary school children aged 6-9 years old constituted the sample. From these, 2234 Iranian school children (1218 girls and 1016 boys) and 2336 Indian school children (1096 girls and 1240 boys) were included in a cross sectional study. Breakfast frequency consumption was recorded through an interview with mothers of children. Height and wight of children were taken and body mass index were calculated. The World Health Organization’s (WHO) AnthroPlus software used to assess the nutritional status of the children. Weight for age z-scores were slightly associated with frequency of consuming breakfast in both India (χ2 = 60.083, p=0.000) and Iran (χ2 = 18.267, p=0.032). A significant association was seen between frequency of child‘s breakfast intake and the height z-scores in both India (χ2 = 31.334, p=0.000) and Iran (χ2 = 19.443, p=0.022). Most of children with normal height had breakfast daily in both countries. A significant association was seen with children‘s BMI z-scores of Indian children (χ2 = 31.247, p=0.000) but it was not significant in Iran (χ2 = 10.791, p=0.095). The present study confirms the observations of other studies that showed more frequency in having breakfast is associated with better nutritional status.Keywords: breakfast, schoolchildren, nutritional status, global food security
Procedia PDF Downloads 5161611 Determination of Measurement Uncertainty of the Diagnostic Meteorological Model CALMET
Authors: Nina Miklavčič, Urška Kugovnik, Natalia Galkina, Primož Ribarič, Rudi Vončina
Abstract:
Today, the need for weather predictions is deeply rooted in the everyday life of people as well as it is in industry. The forecasts influence final decision-making processes in multiple areas, from agriculture and prevention of natural disasters to air traffic regulations and solutions on a national level for health, security, and economic problems. Namely, in Slovenia, alongside other existing forms of application, weather forecasts are adopted for the prognosis of electrical current transmission through powerlines. Meteorological parameters are one of the key factors which need to be considered in estimations of the reliable supply of electrical energy to consumers. And like for any other measured value, the knowledge about measurement uncertainty is also critical for the secure and reliable supply of energy. The estimation of measurement uncertainty grants us a more accurate interpretation of data, a better quality of the end results, and even a possibility of improvement of weather forecast models. In the article, we focused on the estimation of measurement uncertainty of the diagnostic microscale meteorological model CALMET. For the purposes of our research, we used a network of meteorological stations spread in the area of our interest, which enables a side-by-side comparison of measured meteorological values with the values calculated with the help of CALMET and the measurement uncertainty estimation as a final result.Keywords: uncertancy, meteorological model, meteorological measurment, CALMET
Procedia PDF Downloads 791610 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 70