Search results for: image security
2336 Real-Time Lane Marking Detection Using Weighted Filter
Authors: Ayhan Kucukmanisa, Orhan Akbulut, Oguzhan Urhan
Abstract:
Nowadays, advanced driver assistance systems (ADAS) have become popular, since they enable safe driving. Lane detection is a vital step for ADAS. The performance of the lane detection process is critical to obtain a high accuracy lane departure warning system (LDWS). Challenging factors such as road cracks, erosion of lane markings, weather conditions might affect the performance of a lane detection system. In this paper, 1-D weighted filter based on row filtering to detect lane marking is proposed. 2-D input image is filtered by 1-D weighted filter considering four-pixel values located symmetrically around the center of candidate pixel. Performance evaluation is carried out by two metrics which are true positive rate (TPR) and false positive rate (FPR). Experimental results demonstrate that the proposed approach provides better lane marking detection accuracy compared to the previous methods while providing real-time processing performance.Keywords: lane marking filter, lane detection, ADAS, LDWS
Procedia PDF Downloads 1972335 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education
Authors: Yu Cheng-Yu
Abstract:
‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.Keywords: social construction, heterogeneity, new media, big data, visual culture art education
Procedia PDF Downloads 2502334 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 5012333 Cross-Sectional Associations between Deprivation Status and Physical Activity, Dietary Behaviours, Health-Related Variables, and Health-Related Quality of Life among Children Aged 9-11 Years
Authors: Maria Cardova
Abstract:
Aim and objectives: The purpose of this studywas to explore to what extent the deprivation statusinfluenced children’s physical activity, dietary behaviour, and health outcomes such as weight status. Background: The United Kingdom’s childhood obesity rates are currently ranked among the highest in Europe. North West England deals with highest rates of childhood obesity. Data from the UK Millennium Cohort Study suggested a deprivation gradient to childhood obesity in England, with obesity rates being the highest in the most deprived areas. Traditionally, it has been individual conception of health, but the contemporary stance is that health behaviours affecting obesity are influenced by a broad range of factors operating at multiple levels. According to socio-ecological model of health behaviour, differences in obesity rates and health outcomes are likely explained by differences in lifestyle behaviours including physical activity and diet behaviours. However, higher rates of obesity among deprived children are not due to physical inactivity, in fact, most socially disadvantaged children are the most physically active. Poor diet including high consumption of fast food and sugar-sweetened beverages and low consumption of fruit and vegetables was found to be the most prevalent among adolescents living in poverty. Methods: This study adopted quantitative approach. It consisted of combination of basic demographic data, anthropometry, and questionnaires. Children (N = 165, mean age = 10.04 years; 53.33% female; 46.66% male) completed survey packs during school day including KIDSCREEN, Youth Activity Profile, Beverage and Snack Questionnaire, and Child Body Image Scale questionnaires as well as had anthropometric measurements taken including Body mass index, waist circumference, weight, and height. Children’s deprivation status was based on the English Indices of Multiple Deprivation scores of the school they attended. Results: Children from more deprived areas had higher weight status, waist circumference. Deprivation status had also effect on some dimensions of the KIDSCREEN questionnaire, such as that those from more deprived areas felt less socially accepted and bullied by their peers, had worse feelings about themselves such as body image, and more difficulty with school and learning. Children from more deprived areas reported higher rates of physical activity and also differences in snack and fruit and vegetable intake than their more affluent peers. Conclusion: Results demonstrated that, children living in the most-deprived areas appear to be at greater risk of unfavourable health-related variables and behaviours and are exposed to home and neighbourhood environments that are less conducive to health-promoting behaviours compared to their peers from less deprived areas. These findings indicate that children living in highly deprived areas represent an important group for future interventions designed to promote health-behaviours that would impact on the quality of life of the child and other health variables such as weight status.Keywords: children, dietary behaviour, health, obesity, physical Activity, weight Status
Procedia PDF Downloads 1412332 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 1472331 Education in Personality Development and Grooming for Airline Business Program's Students of International College, Suan Sunandha Rajabhat University
Authors: Taksina Bunbut
Abstract:
Personality and grooming are vital for creating professionalism and safety image for all staffs in the airline industry. Airline Business Program also has an aim to educate students through the subject Personality Development and Grooming in order to elevate the quality of students to meet standard requirements of the airline industry. However, students agree that there are many difficulties that cause unsuccessful learning experience in this subject. The research is to study problems that can afflict students from getting good results in the classroom. Furthermore, exploring possible solutions to overcome challenges are also included in this study. The research sample consists of 140 students who attended the class of Personality Development and Grooming. The employed research instrument is a questionnaire. Statistic for data analysis is t-test and Multiple Regression Analysis. The result found that although students are satisfied with teaching and learning of this subject, they considered that teaching in English and teaching topics in social etiquette in different cultures are difficult for them to understand.Keywords: personality development, grooming, Airline Business Program, soft skill
Procedia PDF Downloads 2422330 Wavelet Based Signal Processing for Fault Location in Airplane Cable
Authors: Reza Rezaeipour Honarmandzad
Abstract:
Wavelet analysis is an exciting method for solving difficult problems in mathematics, physics, and engineering, with modern applications as diverse as wave propagation, data compression, signal processing, image processing, pattern recognition, etc. Wavelets allow complex information such as signals, images and patterns to be decomposed into elementary forms at different positions and scales and subsequently reconstructed with high precision. In this paper a wavelet-based signal processing algorithm for airplane cable fault location is proposed. An orthogonal discrete wavelet decomposition and reconstruction algorithm is used to eliminate the noise in the aircraft cable fault signal. The experiment result has shown that the character of emission pulse and reflect pulse used to test the aircraft cable fault point are reserved and the high-frequency noise are eliminated by means of the proposed algorithm in this paper.Keywords: wavelet analysis, signal processing, orthogonal discrete wavelet, noise, aircraft cable fault signal
Procedia PDF Downloads 5302329 Feasibility Study of Wireless Communication for the Control and Monitoring of Rotating Electrical Machine
Authors: S. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, M. Pietrzak-David
Abstract:
Electrical machine monitoring is important to protect motor from unexpected problems. Today, using wireless communication for electrical machines is interesting for both real time monitoring and diagnostic purposes. In this paper, we propose a system based on wireless communication IEEE 802.11 to control electrical machine. IEEE 802.11 standard is recommended for this type of applications because it provides a faster connection, better range from the base station, and better security. Therefore, our contribution is to study a new technique to control and monitor the rotating electrical machines (motors, generators) using wireless communication. The reliability of radio channel inside rotating electrical machine is also discussed. Then, the communication protocol, software and hardware design used for the proposed system are presented in detail and the experimental results of our system are illustrated.Keywords: control, DFIM machine, electromagnetic field, EMC, IEEE 802.11, monitoring, rotating electrical machines, wireless communication
Procedia PDF Downloads 6992328 Key Affecting Factors for Social Sustainability through Urban Green Space Planning
Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu
Abstract:
Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.Keywords: UGS, planning, social sustainability, key factors
Procedia PDF Downloads 842327 Efficient Layout-Aware Pretraining for Multimodal Form Understanding
Authors: Armineh Nourbakhsh, Sameena Shah, Carolyn Rose
Abstract:
Layout-aware language models have been used to create multimodal representations for documents that are in image form, achieving relatively high accuracy in document understanding tasks. However, the large number of parameters in the resulting models makes building and using them prohibitive without access to high-performing processing units with large memory capacity. We propose an alternative approach that can create efficient representations without the need for a neural visual backbone. This leads to an 80% reduction in the number of parameters compared to the smallest SOTA model, widely expanding applicability. In addition, our layout embeddings are pre-trained on spatial and visual cues alone and only fused with text embeddings in downstream tasks, which can facilitate applicability to low-resource of multi-lingual domains. Despite using 2.5% of training data, we show competitive performance on two form understanding tasks: semantic labeling and link prediction.Keywords: layout understanding, form understanding, multimodal document understanding, bias-augmented attention
Procedia PDF Downloads 1552326 Authentication of Physical Objects with Dot-Based 2D Code
Authors: Michał Glet, Kamil Kaczyński
Abstract:
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.Keywords: anti-forgery, authentication, paper documents, security
Procedia PDF Downloads 1362325 Automatic Method for Exudates and Hemorrhages Detection from Fundus Retinal Images
Authors: A. Biran, P. Sobhe Bidari, K. Raahemifar
Abstract:
Diabetic Retinopathy (DR) is an eye disease that leads to blindness. The earliest signs of DR are the appearance of red and yellow lesions on the retina called hemorrhages and exudates. Early diagnosis of DR prevents from blindness; hence, many automated algorithms have been proposed to extract hemorrhages and exudates. In this paper, an automated algorithm is presented to extract hemorrhages and exudates separately from retinal fundus images using different image processing techniques including Circular Hough Transform (CHT), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gabor filter and thresholding. Since Optic Disc is the same color as the exudates, it is first localized and detected. The presented method has been tested on fundus images from Structured Analysis of the Retina (STARE) and Digital Retinal Images for Vessel Extraction (DRIVE) databases by using MATLAB codes. The results show that this method is perfectly capable of detecting hard exudates and the highly probable soft exudates. It is also capable of detecting the hemorrhages and distinguishing them from blood vessels.Keywords: diabetic retinopathy, fundus, CHT, exudates, hemorrhages
Procedia PDF Downloads 2762324 Ambivalence in Embracing Artificial Intelligence in the Units of a Public Hospital in South Africa
Authors: Sanele E. Nene L., Lia M. Hewitt
Abstract:
Background: Artificial intelligence (AI) has a high value in healthcare, various applications have been developed for the efficiency of clinical operations, such as appointment/surgery scheduling, diagnostic image analysis, prognosis, prediction and management of specific ailments. Purpose: The purpose of this study was to explore, describe, contrast, evaluate, and develop the various leadership strategies as a conceptual framework, applied by public health Operational Managers (OMs) to embrace AI benefits, with the aim to improve the healthcare system in a public hospital. Design and Method: A qualitative, exploratory, descriptive and contextual research design was followed and a descriptive phenomenological approach. Five phases were followed to conduct this study. Phenomenological individual interviews and focus groups were used to collect data and a phenomenological thematic data analysis method was used. Findings and conclusion: Three themes surfaced as the experiences of AI by the OMs; Positive experiences related to AI, Management and leadership processes in AI facilitation, and Challenges related to AI.Keywords: ambivalence, embracing, Artificial intelligence, public hospital
Procedia PDF Downloads 832323 Artificial Intelligence and Police
Authors: Mehrnoosh Abouzari
Abstract:
Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police.Keywords: police, artificial intelligence, forecasting, prevention, software
Procedia PDF Downloads 2132322 Early Detection of Lymphedema in Post-Surgery Oncology Patients
Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar
Abstract:
Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes
Procedia PDF Downloads 1422321 Nanostructural Analysis of the Polylactic Acid (PLA) Fibers Functionalized by RF Plasma Treatment
Authors: J. H. O. Nascimento, F. R. Oliveira, K. K. O. S. Silva, J. Neves, V. Teixeira, J. Carneiro
Abstract:
These the aliphatic polyesters such as Polylactic Acid (PLA) in the form of fibers, nanofibers or plastic films, generally possess chemically inert surfaces, free porosity, and surface free energy (ΔG) lesser than 32 mN/m. It is therefore considered a low surface energy material, consequently has a low work of adhesion. For this reason, the products manufactured using these polymers are often subjected to surface treatments in order to change its physic-chemical surface, improving their wettability and the Work of Adhesion (WA). Plasma Radio Frequency low pressure (RF) treatment was performed in order to improve the Work of Adhesion (WA) on PLA fibers. Different parameters, such as, power, ratio of working gas (Argon/Oxygen) and treatment time were used to optimize the plasma conditions to modify the PLA surface properties. With plasma treatment, a significant increase in the work of adhesion on PLA fiber surface was observed. The analysis performed by XPS showed an increase in polar functional groups and the SEM and AFM image revealed a considerable increase in roughness.Keywords: RF plasma, surface modification, PLA fabric, atomic force macroscopic, Nanotechnology
Procedia PDF Downloads 5422320 Land Use Change Detection Using Remote Sensing and GIS
Authors: Naser Ahmadi Sani, Karim Solaimani, Lida Razaghnia, Jalal Zandi
Abstract:
In recent decades, rapid and incorrect changes in land-use have been associated with consequences such as natural resources degradation and environmental pollution. Detecting changes in land-use is one of the tools for natural resource management and assessment of changes in ecosystems. The target of this research is studying the land-use changes in Haraz basin with an area of 677000 hectares in a 15 years period (1996 to 2011) using LANDSAT data. Therefore, the quality of the images was first evaluated. Various enhancement methods for creating synthetic bonds were used in the analysis. Separate training sites were selected for each image. Then the images of each period were classified in 9 classes using supervised classification method and the maximum likelihood algorithm. Finally, the changes were extracted in GIS environment. The results showed that these changes are an alarm for the HARAZ basin status in future. The reason is that 27% of the area has been changed, which is related to changing the range lands to bare land and dry farming and also changing the dense forest to sparse forest, horticulture, farming land and residential area.Keywords: Haraz basin, change detection, land-use, satellite data
Procedia PDF Downloads 4172319 Authenticity and Performance in Political Leadership: Social Media’s Role in Shaping Public Perceptions
Authors: Simbarashe Nzvere
Abstract:
In an era dominated by digital communication, social media has become a powerful tool for political leaders to connect with the public, shape their narratives, and influence perceptions. With this much performance from political leaders, this paper will explore the dichotomy between authenticity and performance in the digital personas of political leaders. By examining how leaders craft their image on platforms such as X (Formerly Twitter), Facebook, Instagram, and Linked In, this study investigates whether these portrayals align with their true character or represent a strategic facade designed to resonate with target audiences. Utilizing case studies and content analysis, the research delves into the methods leaders employ to construct their online identities, the role of digital marketing teams in shaping these images, and the implications for public trust and political engagement. The findings highlight the complex interplay between genuine representation and strategic branding, offering insights into how social media reshapes political leadership in the 21st century.Keywords: political leadership, social media, authenticity, public perceptions, digital persona
Procedia PDF Downloads 132318 A Generalized Sparse Bayesian Learning Algorithm for Near-Field Synthetic Aperture Radar Imaging: By Exploiting Impropriety and Noncircularity
Authors: Pan Long, Bi Dongjie, Li Xifeng, Xie Yongle
Abstract:
The near-field synthetic aperture radar (SAR) imaging is an advanced nondestructive testing and evaluation (NDT&E) technique. This paper investigates the complex-valued signal processing related to the near-field SAR imaging system, where the measurement data turns out to be noncircular and improper, meaning that the complex-valued data is correlated to its complex conjugate. Furthermore, we discover that the degree of impropriety of the measurement data and that of the target image can be highly correlated in near-field SAR imaging. Based on these observations, A modified generalized sparse Bayesian learning algorithm is proposed, taking impropriety and noncircularity into account. Numerical results show that the proposed algorithm provides performance gain, with the help of noncircular assumption on the signals.Keywords: complex-valued signal processing, synthetic aperture radar, 2-D radar imaging, compressive sensing, sparse Bayesian learning
Procedia PDF Downloads 1382317 Lean Comic GAN (LC-GAN): a Light-Weight GAN Architecture Leveraging Factorized Convolution and Teacher Forcing Distillation Style Loss Aimed to Capture Two Dimensional Animated Filtered Still Shots Using Mobile Phone Camera and Edge Devices
Authors: Kaustav Mukherjee
Abstract:
In this paper we propose a Neural Style Transfer solution whereby we have created a Lightweight Separable Convolution Kernel Based GAN Architecture (SC-GAN) which will very useful for designing filter for Mobile Phone Cameras and also Edge Devices which will convert any image to its 2D ANIMATED COMIC STYLE Movies like HEMAN, SUPERMAN, JUNGLE-BOOK. This will help the 2D animation artist by relieving to create new characters from real life person's images without having to go for endless hours of manual labour drawing each and every pose of a cartoon. It can even be used to create scenes from real life images.This will reduce a huge amount of turn around time to make 2D animated movies and decrease cost in terms of manpower and time. In addition to that being extreme light-weight it can be used as camera filters capable of taking Comic Style Shots using mobile phone camera or edge device cameras like Raspberry Pi 4,NVIDIA Jetson NANO etc. Existing Methods like CartoonGAN with the model size close to 170 MB is too heavy weight for mobile phones and edge devices due to their scarcity in resources. Compared to the current state of the art our proposed method which has a total model size of 31 MB which clearly makes it ideal and ultra-efficient for designing of camera filters on low resource devices like mobile phones, tablets and edge devices running OS or RTOS. .Owing to use of high resolution input and usage of bigger convolution kernel size it produces richer resolution Comic-Style Pictures implementation with 6 times lesser number of parameters and with just 25 extra epoch trained on a dataset of less than 1000 which breaks the myth that all GAN need mammoth amount of data. Our network reduces the density of the Gan architecture by using Depthwise Separable Convolution which does the convolution operation on each of the RGB channels separately then we use a Point-Wise Convolution to bring back the network into required channel number using 1 by 1 kernel.This reduces the number of parameters substantially and makes it extreme light-weight and suitable for mobile phones and edge devices. The architecture mentioned in the present paper make use of Parameterised Batch Normalization Goodfellow etc al. (Deep Learning OPTIMIZATION FOR TRAINING DEEP MODELS page 320) which makes the network to use the advantage of Batch Norm for easier training while maintaining the non-linear feature capture by inducing the learnable parametersKeywords: comic stylisation from camera image using GAN, creating 2D animated movie style custom stickers from images, depth-wise separable convolutional neural network for light-weight GAN architecture for EDGE devices, GAN architecture for 2D animated cartoonizing neural style, neural style transfer for edge, model distilation, perceptual loss
Procedia PDF Downloads 1372316 Understanding Human Rights Violations in the Fight against Boko Haram: A Historical Perspective
Authors: Anthony Mpiani
Abstract:
Recent media and NGO reports suggest that human rights violations have been a salient characteristic of the government Joint Task Force (JTF) in the war on Boko Haram. However, there has been relatively scant scholarly engagement with the forms of abuses committed by the JTF against civilians and why such human rights violations occur. The focus of this paper is to analyse the various human rights violations committed by JTF in the war against Boko Haram. Employing a historical approach, it argues that the JTF's human rights violations is shaped by the philosophy of colonial policing in Nigeria. Consequently, the failure of successive post-colonial governments to ideologically transform policing is accountable for the human rights abuses being witnessed in Nigeria today. A philosophical transformation in Nigeria's security forces especially the police and military is a prerequisite for ending human rights abuses in the fight against Boko Haram.Keywords: colonialism, policing, joint task force, counterinsurgency, Boko Haram, human rights violations
Procedia PDF Downloads 1672315 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective
Authors: S. Fantin
Abstract:
This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.Keywords: cybersecurity, data protection, European Union, Japan
Procedia PDF Downloads 1282314 Four Phase Methodology for Developing Secure Software
Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García
Abstract:
A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis
Procedia PDF Downloads 4012313 Modelling and Simulation of Milk Fouling
Authors: Harche Rima, Laoufi Nadia Aicha
Abstract:
This work focuses on the study and modeling of the fouling phenomenon in a vertical pipe. In the first step, milk is one of the fluids obeying the phenomenon of fouling because of the denaturation of these proteins, especially lactoglobulin, which is the active element of milk, and to facilitate its use, we chose to study milk as a fouling fluid. In another step, we consider the test section of our installation as a tubular-type heat exchanger that works against the current and in a closed circuit. A simple mathematical model of Kern & Seaton, based on the kinetics of the fouling resistance, was used to evaluate the influence of the operating parameters (fluid flow velocity and exchange wall temperature) on the fouling resistance. The influence of the variation of the fouling resistance with the operating conditions on the efficiency of the heat exchanger and the importance of the dirty state exchange coefficient as an exchange quality control parameter were discussed and examined. On the other hand, an electronic scanning microscope analysis was performed on the milk deposit in order to obtain its actual image and composition, which allowed us to calculate the thickness of this deposit.Keywords: fouling, milk, tubular heat exchanger, fouling resistance
Procedia PDF Downloads 622312 The National Idea and Selthindentification of Nation is the Foundation of the Society’s Development
Authors: K. Aisultanova, O. Abdimanuly
Abstract:
The article is told about the factors influencing the formation of the national idea and national identity. Paying attention to the idea and purpose of 'Eternal county', historical dates and examples are given. The structure of the idea 'The eternal country' by ancient Turks is discussed and the history of the legend prevalent among the Kazakh people, the image of the mythical historical figures are analyzed. Al-Farabi’s philosophical work 'Honest city', Zhysip Balasagun’s poem 'Happy Knowledge' are told, the opinions of scholars researching the nation's history, literature, and culture are given. As international experience shows, the idea of a new stage in the development of the country's great national society and the state for the purpose of political, social, economic, cultural, spiritual, and the other efforts are consolidated. The idea of the national, ethnic, religious, cultural and other communities united by a group of people sharing a collective memory, goals, ideas and dreams and , world view, a complex set of beliefs and values are expressed.Keywords: independence, historical process, national idea, the national ideology, society, state
Procedia PDF Downloads 3072311 Identification of High Stress Regions in Proximal Femur During Single-Leg Stance and Sideways Fall Using QCT-Based Finite Element Model
Authors: Hossein Kheirollahi, Yunhua Luo
Abstract:
Studying stress and strain trends in the femur and recognizing femur failure mechanism is very important for preventing hip fracture in the elderly. The aim of this study was to identify high stress and strain regions in the femur during normal walking and falling to find the mechanical behavior and failure mechanism of the femur. We developed a finite element model of the femur from the subject’s quantitative computed tomography (QCT) image and used it to identify potentially high stress and strain regions during the single-leg stance and the sideways fall. It was found that fracture may initiate from the superior region of femoral neck and propagate to the inferior region during a high impact force such as sideways fall. The results of this study showed that the femur bone is more sensitive to strain than stress which indicates the effect of strain, in addition to effect of stress, should be considered for failure analysis.Keywords: finite element analysis, hip fracture, strain, stress
Procedia PDF Downloads 5062310 Digital Musical Organology: The Audio Games: The Question of “A-Musicological” Interfaces
Authors: Hervé Zénouda
Abstract:
This article seeks to shed light on an emerging creative field: "Audio games," at the crossroads between video games and computer music. Indeed, many applications, which propose entertaining audio-visual experiences with the objective of musical creation, are available today for different supports (game consoles, computers, cell phones). The originality of this field is the use of the gameplay of video games applied to music composition. Thus, composing music using interfaces but also cognitive logics that we qualify as "a-musicological" seem to us particularly interesting from the perspective of musical digital organology. This field raises questions about the representation of sound and musical structures and develops new instrumental gestures and strategies of musical composition. We will try in this article to define the characteristics of this field by highlighting some historical milestones (abstract cinema, game theory in music, actions, and graphic scores) as well as the novelties brought by digital technologies.Keywords: audio-games, video games, computer generated music, gameplay, interactivity, synesthesia, sound interfaces, relationships image/sound, audiovisual music
Procedia PDF Downloads 1182309 A Simple and Easy-To-Use Tool for Detecting Outer Contour of Leukocytes Based on Image Processing Techniques
Authors: Retno Supriyanti, Best Leader Nababan, Yogi Ramadhani, Wahyu Siswandari
Abstract:
Blood cell morphology is an important parameter in a hematology test. Currently, in developing countries, a lot of hematology is done manually, either by physicians or laboratory staff. According to the limitation of the human eye, examination based on manual method will result in a lower precision and accuracy. In addition, the hematology test by manual will further complicate the diagnosis in some areas that do not have competent medical personnel. This research aims to develop a simple tool in the detection of blood cell morphology-based computer. In this paper, we focus on the detection of the outer contour of leukocytes. The results show that the system that we developed is promising for detecting blood cell morphology automatically. It is expected, by implementing this method, the problem of accuracy, precision and limitations of the medical staff can be solved.Keywords: morphology operation, developing countries, hematology test, limitation of medical personnel
Procedia PDF Downloads 3432308 Revolutionizing Accounting: Unleashing the Power of Artificial Intelligence
Authors: Sogand Barghi
Abstract:
The integration of artificial intelligence (AI) in accounting practices is reshaping the landscape of financial management. This paper explores the innovative applications of AI in the realm of accounting, emphasizing its transformative impact on efficiency, accuracy, decision-making, and financial insights. By harnessing AI's capabilities in data analysis, pattern recognition, and automation, accounting professionals can redefine their roles, elevate strategic decision-making, and unlock unparalleled value for businesses. This paper delves into AI-driven solutions such as automated data entry, fraud detection, predictive analytics, and intelligent financial reporting, highlighting their potential to revolutionize the accounting profession. Artificial intelligence has swiftly emerged as a game-changer across industries, and accounting is no exception. This paper seeks to illuminate the profound ways in which AI is reshaping accounting practices, transcending conventional boundaries, and propelling the profession toward a new era of efficiency and insight-driven decision-making. One of the most impactful applications of AI in accounting is automation. Tasks that were once labor-intensive and time-consuming, such as data entry and reconciliation, can now be streamlined through AI-driven algorithms. This not only reduces the risk of errors but also allows accountants to allocate their valuable time to more strategic and analytical tasks. AI's ability to analyze vast amounts of data in real time enables it to detect irregularities and anomalies that might go unnoticed by traditional methods. Fraud detection algorithms can continuously monitor financial transactions, flagging any suspicious patterns and thereby bolstering financial security. AI-driven predictive analytics can forecast future financial trends based on historical data and market variables. This empowers organizations to make informed decisions, optimize resource allocation, and develop proactive strategies that enhance profitability and sustainability. Traditional financial reporting often involves extensive manual effort and data manipulation. With AI, reporting becomes more intelligent and intuitive. Automated report generation not only saves time but also ensures accuracy and consistency in financial statements. While the potential benefits of AI in accounting are undeniable, there are challenges to address. Data privacy and security concerns, the need for continuous learning to keep up with evolving AI technologies, and potential biases within algorithms demand careful attention. The convergence of AI and accounting marks a pivotal juncture in the evolution of financial management. By harnessing the capabilities of AI, accounting professionals can transcend routine tasks, becoming strategic advisors and data-driven decision-makers. The applications discussed in this paper underline the transformative power of AI, setting the stage for an accounting landscape that is smarter, more efficient, and more insightful than ever before. The future of accounting is here, and it's driven by artificial intelligence.Keywords: artificial intelligence, accounting, automation, predictive analytics, financial reporting
Procedia PDF Downloads 772307 Shaabi in the City: On Modernizing Sounds and Exclusion in Egyptian Cities
Authors: Mariam Aref Mahmoud
Abstract:
After centuries of historical development, Egypt is no stranger to national identity frustrations. What may or may not be counted as this “national identity” becomes a source of contention. Today, after decades of neoliberal reform, Cairo has become the center of Egypt’s cultural debacle. At its heart, the Egyptian capital serves as Egypt’s extension into global capitalism, its flailing hope to become part of the modernized, cosmopolitan world. Yet, to converge into this image of cosmopolitanism, Cairo must silence the perceived un-modernized sounds, cultures, and spaces that arise from within its alleyways. Currently, the agitation surrounding shaabi music, particularly, that of mahraganat, places these contentions to the center of the modernization debates. This paper will discuss the process through which the conversations between modernization, space, and culture have taken place through a historical analysis of national identity formation under Egypt’s neoliberal regimes. Through this, the paper concludes that music becomes a spatial force through which public space, identity, and globalization must be contested. From these findings researchers can then analyze Cairo through not only its physical landscapes, but also its metaphysical features – such as the soundscape.Keywords: music, space, globalization, Cairo
Procedia PDF Downloads 118