Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5310

Search results for: security experiences

2100 Risperidone for the Treatment of Retentive Fecal Incontinence in Children and Adolescents: A Randomize Clinical Trial

Authors: Ghazal Zahed, Leila Tabatabaee, Amirhossein Hosseini, Somaye Fatahi

Abstract:

Functional retentive overflow incontinence (Retentive FI) is the most common cause of fecal soiling in children. Affected patients may have more problems with their parents and peer group, self-esteem issues, and more psychiatric comorbidities than the general population. Therapeutic interventions for Retentive FI and related problems and comorbid conditions are needed at the same time. Based on the clinical experiences, patients with retentive FI and comorbid psychiatric disorders, were accelerated in their treatment of fecal incontinence when they were being treated with Risperidone for their psychiatric comorbidities, therefore this study was conducted to evaluate the effect of Risperidone in the treatment of Retentive FI in children and adolescents. In this double-blind randomized clinical trial, 136 patients aged 4-18 years eligible for the study were randomly divided into two groups receiving Risperidone and placebo. About half of these patients had newly diagnosed psychiatric disorders and were drug naïve, this was considered in their division. In addition to polyethylene glycol, all the participants received family counseling and education for withholding behaviors and related behavioral interventions, and nonpharmacological interventions for psychiatric comorbidities. A significant correlation was observed between the duration of treatment with risperidone and the presence of psychiatric comorbidities (P <0.001) for diurnal fecal incontinence. Based on our findings in this study, Risperidone, used commonly for psychiatric disorders in children and adolescents, may be useful in the treatment of retentive fecal incontinence in the presence of psychiatric comorbidities, and along with other interventions.

Keywords: Retentive Fecal Incontinence, Risperidone, Treatment, Pediatric, Encopresis, Atypical Antipsychotics, Fecal Soiling

Procedia PDF Downloads 105
2099 Highly Glazed Office Spaces: Simulated Visual Comfort vs Real User Experiences

Authors: Zahra Hamedani, Ebrahim Solgi, Henry Skates, Gillian Isoardi

Abstract:

Daylighting plays a pivotal role in promoting productivity and user satisfaction in office spaces. There is an ongoing trend in designing office buildings with a high proportion of glazing which relatively increases the risk of high visual discomfort. Providing a more realistic lighting analysis can be of high value at the early stages of building design when necessary changes can be made at a very low cost. This holistic approach can be achieved by incorporating subjective evaluation and user behaviour in computer simulation and provide a comprehensive lighting analysis. In this research, a detailed computer simulation model has been made using Radiance and Daysim. Afterwards, this model was validated by measurements and user feedback. The case study building is the school of science at Griffith University, Gold Coast, Queensland, which features highly glazed office spaces. In this paper, the visual comfort predicted by the model is compared with a preliminary survey of the building users to evaluate how user behaviour such as desk position, orientation selection, and user movement caused by daylight changes and other visual variations can inform perceptions of visual comfort. This work supports preliminary design analysis of visual comfort incorporating the effects of gaze shift patterns and views with the goal of designing effective layout for office spaces.

Keywords: lighting simulation, office buildings, user behaviour, validation, visual comfort

Procedia PDF Downloads 201
2098 Design Considerations for the Construction of an Open Decontamination Facility for Managing Civil Emergencies

Authors: Sarmin, S., Ologuin, R.S.

Abstract:

Background: Rapid population growth and land constraints in Singapore results in a possible situation in which we face a higher number of casualties and lack of operational space in healthcare facilities during disasters and HAZMAT events, collectively known as Civil Emergencies. This creates a need for available working space within hospital grounds to be amphibious or multi-functional, to ensure the institution’s capability to respond efficiently to Civil Emergencies. The Emergency Department (ED) mitigates this issue by converting the Ambulance Assembly Area used during peacetime into an Open Decontamination Facility (ODF) during Civil Emergency Response, for decontamination of casualties before they proceed to treatment areas into Ambulance Assembly Area used during peacetime. Aims: To effectively operationalize the Open Decontamination Facility (ODF) through the reduction of manual handling. Methods: From past experiences on Civil Emergency exercises, it was labor-intensive for staff to set up the Open Decontamination Facility (ODF). Manual handling to set up the Decontamination lanes by bringing down the curtains and supply of water was required to be turned on. Conclusion: The effectiveness of the design construction of an Open Decontamination Facility (ODF) is based on the use of automation of bringing down the curtains on the various lanes. The use of control panels for water supply to decontaminate patients. Safety within the ODF was considered with the installation of panic buttons, intercom for staff communication, and perimeter curtains were installed with stability arm to manage the condition with high wind velocity.

Keywords: civil emergencies, disaster, emergency department, Hazmat

Procedia PDF Downloads 92
2097 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks

Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq

Abstract:

It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.

Keywords: metaphor, Panama leaks, political cartoons, political communication

Procedia PDF Downloads 290
2096 Understanding the Effective of Cuisine Experience, Emotions on Revisit Intentions: The Case Study of Lu-Kang

Authors: An-Na Li, Ying-Yu Chen, Chang-Kuang Chiou

Abstract:

Food tourism is one of the growing industries and areas of interest in the tourism industry today. The Destination Marketing Organizations (DMOs) are aware of the importance of gastronomy in order to stimulate local and regional economic development. From the heritage and cultural aspects, gastronomy is becoming a more important part of the cultural heritage of region and countries. Heritage destinations provide culinary heritage, which fits the current interest in traditional food, and cuisine is part of a general desire for authentic experiences. However, few studies have empirically examining food tourist’s behavior. This study examined the effects of cuisine experience, emotions and tourists’ revisit intentions. A total of 402 individuals responded to the on-site survey in the historic town of Lu-Kang in Taiwan. The results indicated that tourists’ cuisine experience include place flavor, media recommended local learning, life transfer and interpersonal share. In addition, cuisine experience had significant impacts on emotions, which in turn cuisine experience and emotions had significant effects on tourists’ revisit intentions. The findings suggested that the cuisine experience is a multi- dimensions construct. On the other hands, the good quality of cuisine experience could evoke tourists’ positive emotions and it plays a significant role in promote tourist revisit intentions and word of mouth. Implications for theory and practice are discussed.

Keywords: culinary tourism, cuisine experience, emotions, revisit intentions

Procedia PDF Downloads 399
2095 The Impact Of The Covid-19 Lockdown On Solid Waste Pollution And Environmental Hazard. A Blessing In Disguise? A Case Of Liberia

Authors: Eric Berry White

Abstract:

The paper examines the causality between solid waste pollution and lockdown. Particularly in 2020, the world experiences the takeover of the Corona virus pandemic, and most countries decided to adopt lockdown measure as the best solution to curtail the spread of the virus. On March 20, 2020, the Government of Liberia implemented a curfew that starts from 3:00PM to 6:00AM. This means that no unauthorized person is allowed to be in the streets during this time. In most developing countries, the issue of public waste and environmental hazard pollution tend to have a high effect among the slum communities where there are markets. This research covers 6 slums communities around the two biggest market hubs within Monrovia, and the result shows that the lockdown measure significantly reduced public waste pollution by reducing the movement of marketers in slum communities , where limited educational and sensitization for young people is reflected on their job market exclusion, jobless circle, and youth workforce concentration in informal work market. The study discovered that with public awareness and sensitization with females, solid waste could be reduced by 13 percentage point. But there is no evidence that awareness among male conduce pollution. within affected communities, Despite the impact of the lockdown on food consumption, these results emphasized that with the right monitoring of waste and aware, pollution could be reduce. By understanding these results and implementing the best policy, the paper recommends that dump sites be close at certain hours.

Keywords: lockdown, environmental, pollution, waste

Procedia PDF Downloads 70
2094 The Evaluation of Islamic Concept in Contemporary Mosque Design with the Case of Study: Jogokariyan Mosque Yogyakarta Indonesia

Authors: Ibrahim Malik, M. Ikramullah al Kambuna

Abstract:

Today the crisis of understanding in Islamic values has been extended to the architectural design. The majority of Muslim Architects when they designed Islamic Architectural building always stuck in cultural symbols, forms of facade, carvings calligraphy, and all of things which intimately associated with middle eastern culture. As well as the interpretation of symbols form, by designing a dome in every mosque, calligraphy carving in the interior of the mosque, and the other elements in the building which interpreted to the middle east culture. So here there are problems in understanding the meaning of Islam with Kaffah (overall), which appeared a distortion of understanding to distinguish between cultural and theological values in a design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with case studies in Jogokariyan Mosque Yogyakarta Indonesia. The building evaluation are focused in building function , aesthetic, comfort, and security. And finally from this research should be found the results of the integrated design evaluation of a contemporary mosque which based on the study of the Quran and Hadith.

Keywords: evaluation, islamic concept, mosque, Hadith, Quran

Procedia PDF Downloads 492
2093 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis

Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh

Abstract:

WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.

Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication

Procedia PDF Downloads 513
2092 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria

Authors: William Abiodun Duyile

Abstract:

It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.

Keywords: sea power, naval power, land locked states, warship

Procedia PDF Downloads 131
2091 Robust Shrinkage Principal Component Parameter Estimator for Combating Multicollinearity and Outliers’ Problems in a Poisson Regression Model

Authors: Arum Kingsley Chinedu, Ugwuowo Fidelis Ifeanyi, Oranye Henrietta Ebele

Abstract:

The Poisson regression model (PRM) is a nonlinear model that belongs to the exponential family of distribution. PRM is suitable for studying count variables using appropriate covariates and sometimes experiences the problem of multicollinearity in the explanatory variables and outliers on the response variable. This study aims to address the problem of multicollinearity and outliers jointly in a Poisson regression model. We developed an estimator called the robust modified jackknife PCKL parameter estimator by combining the principal component estimator, modified jackknife KL and transformed M-estimator estimator to address both problems in a PRM. The superiority conditions for this estimator were established, and the properties of the estimator were also derived. The estimator inherits the characteristics of the combined estimators, thereby making it efficient in addressing both problems. And will also be of immediate interest to the research community and advance this study in terms of novelty compared to other studies undertaken in this area. The performance of the estimator (robust modified jackknife PCKL) with other existing estimators was compared using mean squared error (MSE) as a performance evaluation criterion through a Monte Carlo simulation study and the use of real-life data. The results of the analytical study show that the estimator outperformed other existing estimators compared with by having the smallest MSE across all sample sizes, different levels of correlation, percentages of outliers and different numbers of explanatory variables.

Keywords: jackknife modified KL, outliers, multicollinearity, principal component, transformed M-estimator.

Procedia PDF Downloads 53
2090 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 53
2089 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 276
2088 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 565
2087 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 80
2086 Combating Contraflow to Creativity Amongst Preservice Teachers in Teacher Arts Education

Authors: Michael Flannery, Annie ó Breacháin

Abstract:

Teaching the creative arts in preservice teacher education can be challenging. Some students find artistic self-expression and its related creative processes overwhelming. Low creative self-efficacy levels and creative habits of mind can impede their levels of motivation, engagement and persistence. For some, creative arts engagement can induce a state of anxiety and distress as opposed to flow. Flow theory posits that learners are happiest when they are learning in a state of flow. During the flow state, students feel, think and perform their best. They become so involved in the learning experience that nothing else seems to matter. The creative flow state is a crucial conduit of artistic processes to enable learners to explore and produce their best work. Despite the research conducted on flow state across several contexts, the phenomenon of personal flow state remains quite elusive. While some research has examined flow in relation to characteristics, conditions and personality traits, no research has investigated individuals' personal experiences of flow in a visual and tangible manner nor explored a relationship between flow state and teachers’ artistic development. This explorative case study explores preservice teachers’ impressions of flow using an arts-based approach. It identifies, categorizes and discusses patterns of commonality and difference. Grounded by theory concerning flow, self-efficacy and creative habits, this study ponders how emerging findings regarding flow impressions might aid teacher arts educators in helping preservice teachers who struggle with creative self-expression.

Keywords: creative arts, flow theory, presence, self-efficacy, teacher education

Procedia PDF Downloads 17
2085 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 328
2084 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 16
2083 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 469
2082 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 355
2081 Reconstructing the Trace of Mesozoic Subduction and Its Implication on Stratigraphy Correlation between Deep Marine Sediment and Granite: Case Study of Garba Complex, South Sumatera

Authors: Fadlan Atmaja Nursiwan, Ugi Kurnia Gusti

Abstract:

Garba Hill, located in Tekana Village, South Sumatera Province is comprised to South Sumatra Basin and classified as back arc basin. This area is entered as an active margin of Sundaland which experiences subduction several times since Mesozoic to recent time. The traces of Mesozoic subduction in the southern part of Sumatra island are exposed in Garba Hill area. The aim of this investigation is to study the tectonic changes in the first phase in Mesozoic era at the active margin of Sundaland which causes the rocks assemblage in Garba hill consist of continental and oceanic plate rocks which the correlation between those rocks show indistinct relation. This investigation is conducted by field observation in Tekana village and Lubar Village, Muara Dua, South Sumatra along with laboratory analysis included fossil and geochemistry analysis of radiolarian chert, petrography analysis of granite and basalt, and structural modelling. Fossil and geochemistry analysis of radiolarian chert and geochemistry of granite rocks shown the relation between the two rocks and Mesozoic subduction of Woyla terrane on western margin of Sundaland. Petrography analysis from granite and basalt depict the tectonic affinity of rocks. Moreover, structural analysis showed the changes of lineation direction from N-S to WNW-ESE.

Keywords: granite, mesozoic, radiolarian, subduction traces

Procedia PDF Downloads 323
2080 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 128
2079 Social Media Marketing in Indonesian Social Enterprise: The Effect of Members' Level of Participation on Brand Trust and Brand Commitment

Authors: Irsanti Hasyim, Christian Wibisono, Angela Teressia

Abstract:

Social enterprises, as one of the way of doing business are on the rise and emerging from the innovations of decades of social initiatives. In simple way, social enterprises use the business platform to achieve social and/or environmental objectives whilst simultaneously seeking a financial return. In Indonesia, the number of social enterprises rapidly grows and most of them were using social media as their business platform. Social Media are perceived as tools for creating online communities of users who share interests, activities, and objectives. Many companies view the use of online communities in social media as a profitable marketing tool from which they can derive several benefits. Through social media, consumers share experiences with and suggest ideas to others while developing new relationships within their communities. Therefore, this study intends to identify the benefits that participants in online communities seek and examine the relationships between members’ levels of participation, brand trust, and brand commitment. Using convenience sampling method, 236 fully answered questioner was collected and used as a sample of this research. The sample of this research consisted of member or follower in several social media from selected social enterprise in Indonesia. Data collected in this research were process by using Partial Least Square and came up with the result that functional benefit and monetary benefit, are only two from five benefits that proposed were the only variable that has significant result even though from APC, ARS and AARS outcomes show that the model can be claimed to be significant.

Keywords: brand trust, brand commitment, social enterprise, social media

Procedia PDF Downloads 229
2078 Ambivalence as Ethical Practice: Methodologies to Address Noise, Bias in Care, and Contact Evaluations

Authors: Anthony Townsend, Robyn Fasser

Abstract:

While complete objectivity is a desirable scientific position from which to conduct a care and contact evaluation (CCE), it is precisely the recognition that we are inherently incapable of operating objectively that is the foundation of ethical practice and skilled assessment. Drawing upon recent research from Daniel Kahneman (2021) on the differences between noise and bias, as well as different inherent biases collectively termed “The Elephant in the Brain” by Kevin Simler and Robin Hanson (2019) from Oxford University, this presentation addresses both the various ways in which our judgments, perceptions and even procedures can be distorted and contaminated while conducting a CCE, but also considers the value of second order cybernetics and the psychodynamic concept of ‘ambivalence’ as a conceptual basis to inform our assessment methodologies to limit such errors or at least better identify them. Both a conceptual framework for ambivalence, our higher-order capacity to allow for the convergence and consideration of multiple emotional experiences and cognitive perceptions to inform our reasoning, and a practical methodology for assessment relying on data triangulation, Bayesian inference and hypothesis testing is presented as a means of promoting ethical practice for health care professionals conducting CCEs. An emphasis on widening awareness and perspective, limiting ‘splitting’, is demonstrated both in how this form of emotional processing plays out in alienating dynamics in families as well as the assessment thereof. In addressing this concept, this presentation aims to illuminate the value of ambivalence as foundational to ethical practice for assessors.

Keywords: ambivalence, forensic, psychology, noise, bias, ethics

Procedia PDF Downloads 81
2077 Exploring Spiritual Needs of Taiwanese Inpatients with Advanced Cancer and Their Family Caregivers

Authors: Szu Mei Hsiao

Abstract:

This study explores the spiritual needs of inpatients with advanced cancer and their family caregivers in one southern regional teaching hospital in Taiwan and elucidates the differences and similarities of spiritual needs between them. Little research reports the different phases of spiritual needs and the potential impact of Chinese cultural values on the spiritual needs. Qualitative inquiry was used. Twenty-one patients with advanced cancer and twenty-two family caregivers were recruited. During hospitalization, all participants identified spiritual needs both the palliative phase and the dying phase: (a) the need to foster faith/confidence and hope for medicine and/or God; (b) to understand the meaning and values of life; (c) to experience more reciprocal human love and forgiveness; and (d) to obey God’s/Heaven will. Furthermore, the differences of spiritual needs between patients with advanced cancer and their family caregivers are as follows: (a) family caregivers emphasized the need to inform relatives and say goodbye in order to die peacefully; (b) patients highlighted a need to maintain a certain physical appearance in order to preserve their dignity; nurture one’s willpower; learn about the experiences of cancer survivors; and identify one’s own life experience for understanding the meaning and values of life. Moreover, the dissimilarity of spiritual needs is that the patients pointed out the need to understand God’s will during the palliative treatment phase. However, the family caregivers identified the need to forgive each other, and inform relatives and say goodbye to patients in the dying phase. This research has shown that the needs of meaning/values of life and facing death peacefully are different between two groups. Health professionals will be encouraged to detect and to develop individualized care strategies to meet spiritual needs.

Keywords: advanced cancer, Chinese culture, family caregivers, qualitative research, spiritual needs

Procedia PDF Downloads 328
2076 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 145
2075 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 284
2074 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 247
2073 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 232
2072 From Transference Love to Self Alienation in the Therapeutic Relationship: A Case Study

Authors: Efi Koutantou

Abstract:

The foundation of successful therapy is the bond between the psychotherapist and the patient, Psychoanalysis would argue. The present study explores lived experiences of a psychotherapeutic relationship in different moments, initial and final with special reference to the transference love developed through the process. The fight between moments of ‘leaving a self’ behind and following ‘lines of flight’ in the process of creating a new subjectivity and ‘becoming-other’ will be explored. Moments between de-territorialisation – surpassing given constraints such as gender, family and religion, kinship bonds - freeing the space in favor of re-territorialisation – creation of oneself creation of oneself will also be analyzed. The generation of new possibilities of being, new ways of self-actualization for this patient will be discussed. The second part of this study will explore the extent to which this ‘transference love’ results for this specific patient to become ‘the discourse of the other’; it is a desideratum whether the patient finally becomes a subject of his/her own through his/her own self-exploration of new possibilities of existence or becomes alienated within the thought of the therapist. The way in which the patient uses or is (ab)used by the transference love in order to experience and undergo alienation from an ‘authority’ which may or may not sacrifice his/her own thought in favor of satisfying the therapist will be investigated. Finally, from an observer’s perspective and from the analysis of the results of this therapeutic relationship, the counter-transference will also be analyzed, in terms of an attempt of the analyst to relive and satisfy his/her own desires through the life of the analysand. The accession and fall of an idealized self will be analyzed, the turn of the transference love into ‘hate’ will conclude this case study through a lived experience in the therapeutic procedure; a relationship which can be called to be a mixture of a real relationship and remnants from a past object relationship.

Keywords: alienation, authority, counter-transference, hate, transference love

Procedia PDF Downloads 199
2071 Textual Analysis of Media Coverage on Women’s Employment during Covid-19 Recovery: Personal Choice versus Systemic Insufficiencies

Authors: Rania Al Namara

Abstract:

During the Covid-19 pandemic, women disproportionately left the workforce compared to men, and many remained outside of the labor market during the Covid-19 recovery period—a phenomenon referred to as the “she-recession” or “shecession.” While the number of women returning to work has increased, long-standing systemic inequalities interfere with women's equal participation in the workforce. Previous research on media framing has explored the importance of news coverage of women’s issues in print and magazines to shaping the public’s views on an issue and the national response. This study adopts textual analysis to examine how 50 news stories published on CNN and CBS in March 2023 frame women’s employment challenges as a matter of choice or as a matter of insufficient systems and analyzes the narratives portrayed to understand how this discourse affects national policies regarding women’s equality in the workforce. Findings suggest that media coverage centers on four themes: unequal wages at work, work-life integration, experiences of minority women, and the struggle to acquire leadership positions. Media coverage gives space to women to tell personal stories about facing these four societal challenges. However, little coverage is devoted to the political figures and institutions that either reinforce gender inequalities or advance women’s rights in these areas. These findings highlight the need for media stories that discuss policies and reforms that broaden the choices available to women in the first place.

Keywords: Covid-19 recovery, media coverage, shecession, women’s employment

Procedia PDF Downloads 87