Search results for: nature of extension services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8627

Search results for: nature of extension services

5147 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 116
5146 To What Extent Does Physical Activity and Standard of Competition Affect Quantitative Ultrasound (QUS) Measurements of Bone in Accordance with Muscular Strength and Anthropometrics in British Young Males?

Authors: Joseph Shanks, Matthew Taylor, Foong Kiew Ooi, Chee Keong Chen

Abstract:

Introduction: Evidences of relationship between bone, muscle and standard of competition among young British population is limited in literature. The current literature recognises the independent and synergistic effects of fat free and fat mass as the stimulus for osteogenesis. This study assessed the extent to which physical activity (PA) and standard of competition (CS) influences quantitative ultrasound (QUS) measurements of bone on a cross-sectional basis accounting for muscular strength and anthropometrics in British young males. Methods: Pre-screening grouped 66 males aged 18-25 years into controls (n=33) and district level athletes (DLAs) (n=33) as well as low (n=21), moderate (n=23) and high (n=22) physical activity categories (PACs). All participants underwent QUS measurements of bone (4 sites, i.e. dominant distal radius (DR), dominant mid-shaft tibia (DT), non-dominant distal radius (NR) and non-dominant mid-shaft tibia (NT)), isokinetic strength tests (dominant and non-dominant knee flexion and extension) and anthropometric measurements. Results: There were no significant differences between any of the groups with respect to QUS measurements of bone at all sites with regards to PACs or CS. Significant higher isokinetic strength values were observed in DLAs than controls (p < 0.05), and higher than low PACs (p < 0.05) at 60o.s-1 of concentric and eccentric measurements. No differences in subcutaneous fat thickness were found between all the groups (CS or PACs). Percentages of body fat were significantly higher (p < .05) in low than high PACs and CS groups. There were significant positive relationships between non dominant radial speed of sound and fat free mass at both DR (r=0.383, p=0.001) and NR (r=0.319, p=0.009) sites in all participants. Conclusion: The present study findings indicated that muscular strength and body fat are closely related to physical activity level and standard of competition. However, bone health status reflected by quantitative ultrasound (QUS) measurements of bone is not related to physical activity level and standard of competition in British young males.

Keywords: bone, muscular strength, physical activity, standard of competition

Procedia PDF Downloads 505
5145 Understanding the Cause(S) of Social, Emotional and Behavioural Difficulties of Adolescents with ADHD and Its Implications for the Successful Implementation of Intervention(S)

Authors: Elisavet Kechagia

Abstract:

Due to the interplay of different genetic and environmental risk factors and its heterogeneous nature, the concept of attention deficit hyperactivity disorder (ADHD) has shaped controversy and conflicts, which have been, in turn, reflected in the controversial arguments about its treatment. Taking into account recent well evidence-based researches suggesting that ADHD is a condition, in which biopsychosocial factors are all weaved together, the current paper explores the multiple risk-factors that are likely to influence ADHD, with a particular focus on adolescents with ADHD who might experience comorbid social, emotional and behavioural disorders (SEBD). In the first section of this paper, the primary objective was to investigate the conflicting ideas regarding the definition, diagnosis and treatment of ADHD at an international level as well as to critically examine and identify the limitations of the two most prevailing sets of diagnostic criteria that inform current diagnosis, the American Psychiatric Association’s (APA) diagnostic scheme, DSM-V, and the World Health Organisation’s (WHO) classification of diseases, ICD-10. Taking into consideration the findings of current longitudinal studies on ADHD association with high rates of comorbid conditions and social dysfunction, in the second section the author moves towards an investigation of the transitional points −physical, psychological and social ones− that students with ADHD might experience during early adolescence, as informed by neuroscience and developmental contextualism theory. The third section is an exploration of the different perspectives of ADHD as reflected in individuals’ with ADHD self-reports and the KENT project’s findings on school staff’s attitudes and practices. In the last section, given the high rates of SEBDs in adolescents with ADHD, it is examined how cognitive behavioural therapy (CBT), coupled with other interventions, could be effective in ameliorating anti-social behaviours and/or other emotional and behavioral difficulties of students with ADHD. The findings of a range of randomised control studies indicate that CBT might have positive outcomes in adolescents with multiple behavioural problems, hence it is suggested to be considered both in schools and other community settings. Finally, taking into account the heterogeneous nature of ADHD, the different biopsychosocial and environmental risk factors that take place during adolescence and the discourse and practices concerning ADHD and SEBD, it is suggested how it might be possible to make sense of and meaningful improvements to the education of adolescents with ADHD within a multi-modal and multi-disciplinary whole-school approach that addresses the multiple problems that not only students with ADHD but also their peers might experience. Further research that would be based on more large-scale controls and would investigate the effectiveness of various interventions, as well as the profiles of those students who have benefited from particular approaches and those who have not, will generate further evidence concerning the psychoeducation of adolescents with ADHD allowing for generalised conclusions to be drawn.

Keywords: adolescence, attention deficit hyperctivity disorder, cognitive behavioural theory, comorbid social emotional behavioural disorders, treatment

Procedia PDF Downloads 306
5144 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers

Authors: Sally Selden, Jyoti Aggarwal

Abstract:

The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.

Keywords: multigenerational workforce, leadership, generational differences, federal workforce

Procedia PDF Downloads 206
5143 Motivations for Using Social Networking Sites by College Students for Educational Purposes

Authors: Kholoud H. Al-Zedjali, Abir S. Al-Harrasi, Ali H. Al-Badi

Abstract:

Recently there has been a dramatic proliferation in the number of social networking sites (SNSs) users; however, little is published about what motivates college students to use SNSs in education. The main goal of this research is to explore the college students’ motives for using SNSs in education. A conceptual framework has therefore been developed to identify the main factors that influence/motivate students to use social networking sites for learning purposes. To achieve the research objectives a quantitative method was used to collect data. A questionnaire has been distributed amongst college students. The results reveal that social influence, perceived enjoyment, institute regulation, perceived usefulness, ranking up-lift, attractiveness, communication tools, free of charge, sharing material and course nature all play an important role in the motivation of college students to use SNSs for learning purposes.

Keywords: Social Networking Sites (SNSs), education, college students, motivations

Procedia PDF Downloads 251
5142 Retrieving Similar Segmented Objects Using Motion Descriptors

Authors: Konstantinos C. Kartsakalis, Angeliki Skoura, Vasileios Megalooikonomou

Abstract:

The fuzzy composition of objects depicted in images acquired through MR imaging or the use of bio-scanners has often been a point of controversy for field experts attempting to effectively delineate between the visualized objects. Modern approaches in medical image segmentation tend to consider fuzziness as a characteristic and inherent feature of the depicted object, instead of an undesirable trait. In this paper, a novel technique for efficient image retrieval in the context of images in which segmented objects are either crisp or fuzzily bounded is presented. Moreover, the proposed method is applied in the case of multiple, even conflicting, segmentations from field experts. Experimental results demonstrate the efficiency of the suggested method in retrieving similar objects from the aforementioned categories while taking into account the fuzzy nature of the depicted data.

Keywords: fuzzy object, fuzzy image segmentation, motion descriptors, MRI imaging, object-based image retrieval

Procedia PDF Downloads 366
5141 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 247
5140 Translation Training in the AI Era

Authors: Min Gao

Abstract:

In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.

Keywords: job market of translation, large language model, translation ethics, translation training

Procedia PDF Downloads 57
5139 Performance Assessment of Horizontal Axis Tidal Turbine with Variable Length Blades

Authors: Farhana Arzu, Roslan Hashim

Abstract:

Renewable energy is the only alternative sources of energy to meet the current energy demand, healthy environment and future growth which is considered essential for essential sustainable development. Marine renewable energy is one of the major means to meet this demand. Turbines (both horizontal and vertical) play a vital role for extraction of tidal energy. The influence of swept area on the performance improvement of tidal turbine is a vital factor to study for the reduction of relatively high power generation cost in marine industry. This study concentrates on performance investigation of variable length blade tidal turbine concept that has already been proved as an efficient way to improve energy extraction in the wind industry. The concept of variable blade length utilizes the idea of increasing swept area through the turbine blade extension when the tidal stream velocity falls below the rated condition to maximize energy capture while blade retracts above rated condition. A three bladed horizontal axis variable length blade horizontal axis tidal turbine was modelled by modifying a standard fixed length blade turbine. Classical blade element momentum theory based numerical investigation has been carried out using QBlade software to predict performance. The results obtained from QBlade were compared with the available published results and found very good agreement. Three major performance parameters (i.e., thrust, moment, and power coefficients) and power output for different blade extensions were studied and compared with a standard fixed bladed baseline turbine at certain operational conditions. Substantial improvement in performance coefficient is observed with the increase in swept area of the turbine rotor. Power generation is found to increase in great extent when operating at below rated tidal stream velocity reducing the associated cost per unit electric power generation.

Keywords: variable length blade, performance, tidal turbine, power generation

Procedia PDF Downloads 264
5138 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 351
5137 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 132
5136 Post-harvest Handling Practices and Technologies Harnessed by Smallholder Fruit Crop Farmers in Vhembe District, Limpopo Province, South Africa

Authors: Vhahangwele Belemu, Isaac Busayo Oluwatayo

Abstract:

Post-harvest losses pose a serious challenge to smallholder fruit crop farmers, especially in the rural communities of South Africa, affecting their economic livelihoods and food security. This study investigated the post-harvest handling practices and technologies harnessed by smallholder fruit crop farmers in the Vhembe district of Limpopo province, South Africa. Data were collected on a random sample of 224 smallholder fruit crop farmers selected from the four municipalities of the district using a multistage sampling technique. Analytical tools employed include descriptive statistics and the tobit regression model. A descriptive analysis of farmers’ socioeconomic characteristics showed that a sizeable number of these farmers are still in their active working age (mean = 52 years) with more males (63.8%) than their female (36.2%) counterparts. Respondents’ distribution by educational status revealed that only a few of these had no formal education (2.2%), with the majority having secondary education (48.7%). Results of data analysis further revealed that the prominent post-harvest technologies and handling practices harnessed by these farmers include using appropriate harvesting techniques (20.5%), selling at a reduced price (19.6%), transportation consideration (18.3%), cleaning and disinfecting (17.9%), sorting and grading (16.5%), manual cleaning (15.6%) and packaging technique (11.6%) among others. The result of the Tobit regression analysis conducted to examine the determinants of post-harvest technologies and handling practices harnessed showed that age, educational status of respondents, awareness of technology/handling practices, farm size, access to credit, extension contact, and membership of association were the significant factors. The study suggests enhanced awareness creation, access to credit facility and improved access to market as important factors to consider by relevant stakeholders to assist smallholder fruit crop farmers in the study area.

Keywords: fruit crop farmers, handling practices, post harvest losses, smallholder, Vhembe District, South Africa

Procedia PDF Downloads 50
5135 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 363
5134 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 259
5133 Use of Interpretable Evolved Search Query Classifiers for Sinhala Documents

Authors: Prasanna Haddela

Abstract:

Document analysis is a well matured yet still active research field, partly as a result of the intricate nature of building computational tools but also due to the inherent problems arising from the variety and complexity of human languages. Breaking down language barriers is vital in enabling access to a number of recent technologies. This paper investigates the application of document classification methods to new Sinhalese datasets. This language is geographically isolated and rich with many of its own unique features. We will examine the interpretability of the classification models with a particular focus on the use of evolved Lucene search queries generated using a Genetic Algorithm (GA) as a method of document classification. We will compare the accuracy and interpretability of these search queries with other popular classifiers. The results are promising and are roughly in line with previous work on English language datasets.

Keywords: evolved search queries, Sinhala document classification, Lucene Sinhala analyzer, interpretable text classification, genetic algorithm

Procedia PDF Downloads 104
5132 Design of a Lumbar Interspinous Process Fixation Device for Minimizing Soft Tissue Removal and Operation Time

Authors: Minhyuk Heo, Jihwan Yun, Seonghun Park

Abstract:

It has been reported that intervertebral fusion surgery, which removes most of the ligaments and muscles of the spine, increases the degenerative disease in adjacent spinal segments. Therefore, it is required to develop a lumbar interspinous process fixation device that minimizes the risks and side effects from the surgery. The objective of the current study is to design an interspinous process fixation device with simple structures in order to minimize soft tissue removal and operation time during intervertebral fusion surgery. For the design concepts of a lumbar fixation device, the principle of the ratchet was first applied on the joining parts of the device in order to shorten the operation time. The coil spring structure was selected for connecting parts between the spinous processes so that a normal range of motion in spinal segments is preserved and degenerative spinal diseases are not developed in the adjacent spinal segments. The stiffness of the spring was determined not to interrupt the motion of a lumbar spine. The designed value of the spring stiffness allows the upper part of the spring to move ~10° which is higher than the range of flexion and extension for normal lumbar spine (6°-8°), when a moment of 10Nm is applied on the upper face of L1. A finite element (FE) model composed of L1 to L5 lumbar spines was generated to verify the mechanical integrity and the dynamic stability of the designed lumbar fixation device and to further optimize the lumbar fixation device. The FE model generated above produced the same pressure value on intervertebral disc and dynamic behavior as the normal intact model reported in the literature. The consistent results from this comparison validates the accuracy in the modeling of the current FE model. Currently, we are trying to generate an abnormal model with defects in one or more components of the normal FE model above. Then, the mechanical integrity and the dynamic stability of the designed lumbar fixation device will be analyzed after being installed in the abnormal model and then the lumbar fixation device will be further optimized.

Keywords: lumbar interspinous process fixation device, finite element method, lumbar spine, kinematics

Procedia PDF Downloads 220
5131 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 291
5130 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 112
5129 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 160
5128 Development of Management System of the Experience of Defensive Modeling and Simulation by Data Mining Approach

Authors: D. Nam Kim, D. Jin Kim, Jeonghwan Jeon

Abstract:

Defense Defensive Modeling and Simulation (M&S) is a system which enables impracticable training for reducing constraints of time, space and financial resources. The necessity of defensive M&S has been increasing not only for education and training but also virtual fight. Soldiers who are using defensive M&S for education and training will obtain empirical knowledge and know-how. However, the obtained knowledge of individual soldiers have not been managed and utilized yet since the nature of military organizations: confidentiality and frequent change of members. Therefore, this study aims to develop a management system for the experience of defensive M&S based on data mining approach. Since individual empirical knowledge gained through using the defensive M&S is both quantitative and qualitative data, data mining approach is appropriate for dealing with individual empirical knowledge. This research is expected to be helpful for soldiers and military policy makers.

Keywords: data mining, defensive m&s, management system, knowledge management

Procedia PDF Downloads 240
5127 Welfare State and Income Distribution to School-Age Children

Authors: Kanyarat Bussaban, Siriporn Poolsuwan

Abstract:

This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.

Keywords: inequality, income distribution, quality of school-age children lives, welfare state

Procedia PDF Downloads 361
5126 National Strategy for Swedish Wildlife Management

Authors: Maria Hornell, Marcus Ohman

Abstract:

Nature, and the society it is a part of, is under constant change. The landscape, climate and game populations vary over time, as well as society's priorities and the way it uses the land where wildlife may proliferate. Sweden currently has historically large wildlife populations which are a resource for the benefit and joy of many people. Wildlife may also be seen as a problem as it may cause damage in contradiction to other human interests. The Swedish Environmental Protection Agency introduces a new long-term strategy for national wildlife management. The strategy envisions a wildlife management in balance. It focuses on wildlife values in a broad sense including outdoor recreation and tourism as well as conservation of biodiversity. It is fundamental that these values should be open and accessible for the major part of the population. For that to be possible new ways to manage, mitigate and prevent damages and other problems that wildlife causes need to be developed. The strategy describes a roadmap for the development and strengthening of Sweden's wildlife management until 2020. It aims at being applicable for those authorities and stakeholders with interest in wildlife management being a guide for their own strategies, goals, and activities.

Keywords: wildlife management, strategy, Sweden, SEPA

Procedia PDF Downloads 205
5125 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 306
5124 Collaborative Drawing with Children Having Autism Spectrum Condition

Authors: Charalambous-Darden Nefi, Antoniou Phivi

Abstract:

This study presents drawing as an alternative tool for facilitating interaction and communication among the members of a class (teachers and students) in an inclusive school setting. It applies elements of the Collaborative Drawing Method (CDM), an interactive method of drawing where two individuals draw together on the same surface. For the past ten years, the facilitators of this study have been researching the effects of spontaneous and non-spontaneous drawing upon elementary school students with Autism Spectrum Conditions (ASC). This research eventually led them to the application of elements of the CDM. The method was applied to both adults and children and children with one another. The astonishing outcomes of these applications indicate that collaborative drawing, with its inclusive nature, has the potential to help individuals develop interaction and communication among themselves, making it suitable for everyone. This workshop aims to allow the participants to become familiar with the CDM by applying it during the workshop, with the ultimate goal of enhancing their educational approaches by adding the CDM to their teaching methods.

Keywords: autism, collaborative drawing, autism spectrum condition, ASC

Procedia PDF Downloads 12
5123 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 285
5122 Synthesis and Functionalization of MnFe₂O₄ Nano−Hollow Spheres for Optical and Catalytic Properties

Authors: Indranil Chakraborty, Kalyan Mandal

Abstract:

Herein, we synthesize MnFe₂O₄ nano−hollow spheres (NHSs) of average diameter 100 nm through a facile template free solvothermal process and carry out a time dependent morphological study to investigate their process of core excavation. Further, a surface engineering of as−synthesized MnFe₂O₄ NHSs has been executed with organic disodium tartrate dihydrate ligand and interestingly, the surface modified MnFe₂O₄ NHSs are found to capable of emerging multicolor fluorescence starting from blue, green to red. The magnetic measurements through vibrating sample magnetometer demonstrate that room temperature superparamagnetic nature of MnFe₂O₄ NHSs remains unaltered after surface modification. Moreover, functionalized MnFe₂O₄ NHSs are found to exhibit excellent reusable photocatalytic efficiency in the degradation of cationic dye, methylene blue with rate constant of 2.64×10−2 min.

Keywords: nano hollow sphere, tartrate modification, multiple fluorescence, catalytic property

Procedia PDF Downloads 173
5121 Characteristics of the Mortars Obtained by Radioactive Recycled Sand

Authors: Claudiu Mazilu, Ion Robu, Radu Deju

Abstract:

At the end of 2011 worldwide there were 124 power reactors shut down, from which: 16 fully decommissioned, 50 power reactors in a decommissioning process, 49 reactors in “safe enclosure mode”, 3 reactors “entombed”, for other 6 reactors it was not yet have specified the decommissioning strategy. The concrete radioactive waste that will be generated from dismantled structures of VVR-S nuclear research reactor from Magurele (e.g.: biological shield of the reactor core and hot cells) represents an estimated amount of about 70 tons. Until now the solid low activity radioactive waste (LLW) was pre-placed in containers and cementation with mortar made from cement and natural fine aggregates, providing a fill ratio of the container of approximately 50 vol. % for concrete. In this paper is presented an innovative technology in which radioactive concrete is crushed and the mortar made from recycled radioactive sand, cement, water and superplasticizer agent is poured in container with radioactive rubble (that is pre-placed in container) for cimentation. Is achieved a radioactive waste package in which the degree of filling of radioactive waste increases substantially. The tests were carried out on non-radioactive material because the radioactive concrete was not available in a good time. Waste concrete with maximum size of 350 mm were crushed in the first stage with a Liebhher type jaw crusher, adjusted to nominal size of 50 mm. Crushed concrete less than 50 mm was sieved in order to obtain useful sort for preplacement, 10 to 50 mm. The rest of the screening > 50 mm obtained from primary crushing of concrete was crushed in the second stage, with different working principles crushers at size < 2.5 mm, in order to produce recycled fine aggregate (sand) for the filler mortar and which fulfills the technical specifications proposed: –jaw crusher, Retsch type, model BB 100; –hammer crusher, Buffalo Shuttle model WA-12-H; presented a series of characteristics of recycled concrete aggregates by predefined class (the granulosity, the granule shape, the absorption of water, behavior to the Los Angeles test, the content of attached mortar etc.), most in comparison with characteristics of natural aggregates. Various mortar recipes were used in order to identify those that meet the proposed specification (flow-rate: 16-50s, no bleeding, min. 30N/mm2 compressive strength of the mortar after 28 days, the proportion of recycled sand used in mortar: min. 900kg/m3) and allow obtaining of the highest fill ratio for mortar. In order to optimize the mortars following compositional factors were varied: aggregate nature, water/cement (W/C) ratio, sand/cement (S/C) ratio, nature and proportion of additive. To confirm the results obtained on a small scale, it made an attempt to fill the mortar in a container that simulates the final storage drums. Was measured the mortar fill ratio (98.9%) compared with the results of laboratory tests and targets set out in the proposed specification. Although fill ratio obtained on the mock-up is lower by 0.8 vol. % compared to that obtained in the laboratory tests (99.7%), the result meets the specification criteria.

Keywords: characteristics, radioactive recycled concrete aggregate, mortars, fill ratio

Procedia PDF Downloads 187
5120 Enzyme Redesign: From Metal-Dependent to Metal-Independent, a Symphony Orchestra without Concertmasters

Authors: Li Na Zhao, Arieh Warshel

Abstract:

The design of enzymes is an extremely challenging task, and this is also true for metalloenzymes. In the case of naturally evolved enzymes, one may consider the active site residues as the musicians in the enzyme orchestra, while the metal can be considered as their concertmaster. Together they catalyze reactions as if they performed a masterpiece written by nature. The Lactonase can be thought as a member of the amidohydrolase family, with two concertmasters, Fe and Zn, at its active site. It catalyzes the quorum sensing signal- N-acyl homoserine lactones (AHLs or N-AHLs)- by hydrolyzing the lactone ring. This process, known as quorum quenching, provides a strategy in the treatment of infectious diseases without introducing selection pressure. However, the activity of lactonase is metal-dependent, and this dependence hampers the clinic usage. In our study, we use the empirical valence bond (EVB) approach to evaluate the catalytic contributions decomposing them to electrostatic and other components.

Keywords: enzyme redesign, empirical valence bond, lactonase, quorum quenching

Procedia PDF Downloads 240
5119 Sensor Data Analysis for a Large Mining Major

Authors: Sudipto Shanker Dasgupta

Abstract:

One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.

Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data

Procedia PDF Downloads 396
5118 The Effects of Family Economic Situation (Poverty) on the Domestic Violence

Authors: Fatemeh Noughani, Seyd Mehdi Sadat

Abstract:

Violence against women as a global problem is not confined to any geographical and cultural area. The thoughts and opinions propagating the violence are seen in many cultural beliefs of societies. However, the shape, type and nature of it is different in different cultures. Also, many Iranian women have experienced different dimensions of domestic violence in their lives. This experience may vary with the family economic situation and poverty. Therefore, this research had studied the effects of family economic situation (poverty) on the increase of domestic violence against women. The sample of this study includes 126 married women older than 8 years old and they were selected by stratified and quota sampling method. The results showed that there is a direct and significant between the family economic situation and employment situation of women and domestic violence against women. More precisely, having economic capital, financial ability, affects the couple’s relationship and will solve their many social problems and perhaps, it seem that in terms of economic violence, the men who have higher economic capital, exert the lowest level of economic violence against their wives.

Keywords: economic situation , domestic violence, poverty, Iran

Procedia PDF Downloads 400