Search results for: cyber physical social systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21727

Search results for: cyber physical social systems

21397 Virtual Metering and Prediction of Heating, Ventilation, and Air Conditioning Systems Energy Consumption by Using Artificial Intelligence

Authors: Pooria Norouzi, Nicholas Tsang, Adam van der Goes, Joseph Yu, Douglas Zheng, Sirine Maleej

Abstract:

In this study, virtual meters will be designed and used for energy balance measurements of an air handling unit (AHU). The method aims to replace traditional physical sensors in heating, ventilation, and air conditioning (HVAC) systems with simulated virtual meters. Due to the inability to manage and monitor these systems, many HVAC systems have a high level of inefficiency and energy wastage. Virtual meters are implemented and applied in an actual HVAC system, and the result confirms the practicality of mathematical sensors for alternative energy measurement. While most residential buildings and offices are commonly not equipped with advanced sensors, adding, exploiting, and monitoring sensors and measurement devices in the existing systems can cost thousands of dollars. The first purpose of this study is to provide an energy consumption rate based on available sensors and without any physical energy meters. It proves the performance of virtual meters in HVAC systems as reliable measurement devices. To demonstrate this concept, mathematical models are created for AHU-07, located in building NE01 of the British Columbia Institute of Technology (BCIT) Burnaby campus. The models will be created and integrated with the system’s historical data and physical spot measurements. The actual measurements will be investigated to prove the models' accuracy. Based on preliminary analysis, the resulting mathematical models are successful in plotting energy consumption patterns, and it is concluded confidently that the results of the virtual meter will be close to the results that physical meters could achieve. In the second part of this study, the use of virtual meters is further assisted by artificial intelligence (AI) in the HVAC systems of building to improve energy management and efficiency. By the data mining approach, virtual meters’ data is recorded as historical data, and HVAC system energy consumption prediction is also implemented in order to harness great energy savings and manage the demand and supply chain effectively. Energy prediction can lead to energy-saving strategies and considerations that can open a window in predictive control in order to reach lower energy consumption. To solve these challenges, the energy prediction could optimize the HVAC system and automates energy consumption to capture savings. This study also investigates AI solutions possibility for autonomous HVAC efficiency that will allow quick and efficient response to energy consumption and cost spikes in the energy market.

Keywords: virtual meters, HVAC, artificial intelligence, energy consumption prediction

Procedia PDF Downloads 79
21396 Personality Traits and Physical Activity among Staff Personnel of University of Southern Mindanao

Authors: Cheeze Janito, Crisly Dawang

Abstract:

It is important to determine the personality traits that exist in the workplace and the contribution of these personality traits in the staff’s daily work routines; a sedentary lifestyle is harmful to one’s health. This study reports the personality traits of the University of Southern Mindanao, Kabacan, Philippines, non-teaching staff, the physical activity involvement of the non-teaching staff, and the big five personality traits that shape the relationship of university non-teaching staff in engaging physical activities. A quantitative method approach, which comprised a three-part questionnaire, was used to collect the data. The fifty non-teaching staff complete the survey. The results revealed that among the big five personality traits, the university non-teaching staff scored higher in agreeableness as revealed, that there was a commonality among the respondents’ traits of consideration to the feelings of the co-workers in observance to not being rude and vividly display of respect to co-workers and workplace and scored least in the personality trait of neuroticism. The study also reported that the university non-teaching staff's main physical activity was house chores as a prime physical exercise in which respondents reported a physical activity frequency of once to twice a week; thus, this study reported that the respondents are less engaged in doing physical activities. Further, the relationship of personality traits and the physical activity of the non-teaching staff gained a p-value of .596 that indicates there is no significant relationship between the two variables, the personality trait and physical activities. This study recommends the tight promotion of staff in engaging in physical activity of at least one hundred fifty minutes of moderate-intensity activity each week. Added to this, the use of different platforms containing physical exercise literacy and the benefits of physical exercise for the holistic development of the university community.

Keywords: university staff, physical fitness, personality traits, physical activity

Procedia PDF Downloads 165
21395 Finding Elves in Play Based Learning

Authors: Chloe L. Southern

Abstract:

If play is deemed to fulfill children’s social, emotional, and physical domains, as well as satisfy their natural curiosity and promote self-reflexivity, it is difficult to understand why play is not prioritized to the same extent for older children. This paper explores and discusses the importance of play-based learning as well as the preliminary implications beyond the realm of kindergarten. To further extend the inquiry, discussions pertaining to play-based learning are looked at through the lens of relevant methodologies and theories. Different education systems are looked at in certain areas of the world that lead to curiosities not only towards their play-based practices and curriculum but what ideologies they have that set them apart.

Keywords: 21ˢᵗ century learning, play-based learning, student-centered learning, transformative learning

Procedia PDF Downloads 51
21394 Book Recommendation Using Query Expansion and Information Retrieval Methods

Authors: Ritesh Kumar, Rajendra Pamula

Abstract:

In this paper, we present our contribution for book recommendation. In our experiment, we combine the results of Sequential Dependence Model (SDM) and exploitation of book information such as reviews, tags and ratings. This social information is assigned by users. For this, we used CLEF-2016 Social Book Search Track Suggestion task. Finally, our proposed method extensively evaluated on CLEF -2015 Social Book Search datasets, and has better performance (nDCG@10) compared to other state-of-the-art systems. Recently we got the good performance in CLEF-2016.

Keywords: sequential dependence model, social information, social book search, query expansion

Procedia PDF Downloads 267
21393 Factors of Major Depressive Disorder (MDD): Prevalence of Social Support on Stress within Parental Depression

Authors: Calvin Chiu, Samar Saade Needham

Abstract:

The factors associated with the development of major depressive disorder (MDD) have been an ongoing area of concern within the field of psychopathology. Among parents, the rise in stress factors for individuals receiving less social support contributes to an increase in MDD cases. Understanding the causal aspects of MDD through the interworking of stress development within social support disparities provides critical insights into preventive measures for depressive symptoms. The present study seeks to assess the impact of social support on stress formation within MDD. Such that single parents lacking social support prompt an increase in stress formation, which proliferates the progression of MDD. Participants in this study were 450 ethnic minority mothers and fathers experiencing health inequities during pregnancy and early childhood. Perceived stress, social support, and depression are assessed by multi-item questionnaires that produce score ranges for general findings. Results indicated that lower social support scores resulted in higher depression scores, and higher perceived stress scores produced higher depression scores. Furthermore, single parents reported higher depression scores. These findings overlap with studies on paternal depression and suggest that MDD is a product of stress accumulation due to declining social support systems. Future studies may specify effective social support systems for decreasing stress accumulation in MDD formation in preventive strategies.

Keywords: major depressive disorder, stress formation, cognitive-behavioral outcomes, deficit-based behaviors

Procedia PDF Downloads 19
21392 Physical Verification Flow on Multiple Foundries

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Muhammad Al Baqir Zinal Abidin, Md Hanif Md Nasir

Abstract:

This paper will discuss how we optimize our physical verification flow in our IC Design Department having various rule decks from multiple foundries. Our ultimate goal is to achieve faster time to tape-out and avoid schedule delay. Currently the physical verification runtimes and memory usage have drastically increased with the increasing number of design rules, design complexity and the size of the chips to be verified. To manage design violations, we use a number of solutions to reduce the amount of violations needed to be checked by physical verification engineers. The most important functions in physical verifications are DRC (design rule check), LVS (layout vs. schematic) and XRC (extraction). Since we have a multiple number of foundries for our design tape-outs, we need a flow that improve the overall turnaround time and ease of use of the physical verification process. The demand for fast turnaround time is even more critical since the physical design is the last stage before sending the layout to the foundries.

Keywords: physical verification, DRC, LVS, XRC, flow, foundry, runset

Procedia PDF Downloads 633
21391 Technology and the Need for Integration in Public Education

Authors: Eric Morettin

Abstract:

Cybersecurity and digital literacy are pressing issues among Canadian citizens, yet formal education does not provide today’s students with the necessary knowledge and skills needed to adapt to these challenging issues within the physical and digital labor-market. Canada’s current education systems do not highlight the importance of these respective fields, aside from using technology for learning management systems and alternative methods of assignment completion. Educators are not properly trained to integrate technology into the compulsory courses within public education, to better prepare their learners in these topics and Canada’s digital economy. ICTC addresses these gaps in education and training through cross-Canadian educational programming in digital literacy and competency, cybersecurity and coding which is bridged with Canada’s provincially regulated K-12 curriculum guidelines. After analyzing Canada’s provincial education, it is apparent that there are gaps in learning related to technology, as well as inconsistent educational outcomes that do not adequately represent the current Canadian and global economies. Presently only New Brunswick, Nova Scotia, Ontario, and British Columbia offer curriculum guidelines for cybersecurity, computer programming, and digital literacy. The remaining provinces do not address these skills in their curriculum guidelines. Moreover, certain courses across some provinces not being updated since the 1990’s. The three territories respectfully take curriculum strands from other provinces and use them as their foundation in education. Yukon uses all British Columbia curriculum. Northwest Territories and Nunavut respectfully use a hybrid of Alberta and Saskatchewan curriculum as their foundation of learning. Education that is provincially regulated does not allow for consistency across the country’s educational outcomes and what Canada’s students will achieve – especially when curriculum outcomes have not been updated to reflect present day society. Through this, ICTC has aligned Canada’s provincially regulated curriculum and created opportunities for focused education in the realm of technology to better serve Canada’s present learners and teachers; while addressing inequalities and applicability within curriculum strands and outcomes across the country. As a result, lessons, units, and formal assessment strategies, have been created to benefit students and teachers in this interdisciplinary, cross-curricular, practice - as well as meeting their compulsory education requirements and developing skills and literacy in cyber education. Teachers can access these lessons and units through ICTC’s website, as well as receive professional development regarding the assessment and implementation of these offerings from ICTC’s education coordinators, whose combines experience exceeds 50 years of teaching in public, private, international, and Indigenous schools. We encourage you to take this opportunity that will benefit students and educators, and will bridge the learning and curriculum gaps in Canadian education to better reflect the ever-changing public, social, and career landscape that all citizens are a part of. Students are the future, and we at ICTC strive to ensure their futures are bright and prosperous.

Keywords: cybersecurity, education, curriculum, teachers

Procedia PDF Downloads 59
21390 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review

Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi

Abstract:

Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.

Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030

Procedia PDF Downloads 13
21389 Context-Aware Point-Of-Interests Recommender Systems Using Integrated Sentiment and Network Analysis

Authors: Ho Yeon Park, Kyoung-Jae Kim

Abstract:

Recently, user’s interests for location-based social network service increases according to the advances of social web and location-based technologies. It may be easy to recommend preferred items if we can use user’s preference, context and social network information simultaneously. In this study, we propose context-aware POI (point-of-interests) recommender systems using location-based network analysis and sentiment analysis which consider context, social network information and implicit user’s preference score. We propose a context-aware POI recommendation system consisting of three sub-modules and an integrated recommendation system of them. First, we will develop a recommendation module based on network analysis. This module combines social network analysis and cluster-indexing collaboration filtering. Next, this study develops a recommendation module using social singular value decomposition (SVD) and implicit SVD. In this research, we will develop a recommendation module that can recommend preference scores based on the frequency of POI visits of user in POI recommendation process by using social and implicit SVD which can reflect implicit feedback in collaborative filtering. We also develop a recommendation module using them that can estimate preference scores based on the recommendation. Finally, this study will propose a recommendation module using opinion mining and emotional analysis using data such as reviews of POIs extracted from location-based social networks. Finally, we will develop an integration algorithm that combines the results of the three recommendation modules proposed in this research. Experimental results show the usefulness of the proposed model in relation to the recommended performance.

Keywords: sentiment analysis, network analysis, recommender systems, point-of-interests, business analytics

Procedia PDF Downloads 224
21388 Physical Activity Participation Levels as Correlates of Cardiorespiratory Fitness of Senior High School Teachers in the Dormaa East District

Authors: Isaac Yeboah, Emmanuel Osei Sarpong

Abstract:

Physical activity (PA) is considered the best preventative tool for maintaining physical health and extending lifespan because it offers a range of benefits. However, for people to benefit from physical activity, it must be done at a level that can enhance fitness, health, and overall well-being. Therefore, this study aimed to determine the link between physical activity participation levels and cardiorespiratory fitness (CRF). The study employed the descriptive correlational design. The census sampling technique included all 190-teaching staff from the two senior high schools in the Dormaa East District. An adapted International Physical Activity Questionnaire (IPAQ) and standardized physical fitness tests were used for data collection. Descriptive statistics of frequency counts and percentages were used to answer the research questions while inferential statistics of Pearson Product Moment Correlation and the independent sample t-test were used to test hypotheses one and two respectively. A moderately negative (r = -.156) relationship existed between physical activity participation levels and CRF. Female teachers demonstrated a statistically significant value (p = .045) than males. The study concluded that the reported physical activity levels of the teachers did not reflect their CRF. The implication is that either the participants overestimated their physical activity participation levels, or the intensity of the activities was not high enough to affect physiological changes. For the teachers' CRF to improve, it was suggested, among other things, that regular physical activity sessions of the appropriate mixes of FITT be organized.

Keywords: physical activity, participation levels, cardiorespiratory fitness, sedentary lifestyle, teachers

Procedia PDF Downloads 50
21387 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities

Authors: Claire Biasco, Thaier Hayajneh

Abstract:

A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.

Keywords: blockchain, IoT, smart city, DAO

Procedia PDF Downloads 84
21386 Smart Mobility Planning Applications in Meeting the Needs of the Urbanization Growth

Authors: Caroline Atef Shoukry Tadros

Abstract:

Massive Urbanization growth threatens the sustainability of cities and the quality of city life. This raised the need for an alternate model of sustainability, so we need to plan the future cities in a smarter way with smarter mobility. Smart Mobility planning applications are solutions that use digital technologies and infrastructure advances to improve the efficiency, sustainability, and inclusiveness of urban transportation systems. They can contribute to meeting the needs of Urbanization growth by addressing the challenges of traffic congestion, pollution, accessibility, and safety in cities. Some example of a Smart Mobility planning application are Mobility-as-a-service: This is a service that integrates different transport modes, such as public transport, shared mobility, and active mobility, into a single platform that allows users to plan, book, and pay for their trips. This can reduce the reliance on private cars, optimize the use of existing infrastructure, and provide more choices and convenience for travelers. MaaS Global is a company that offers mobility-as-a-service solutions in several cities around the world. Traffic flow optimization: This is a solution that uses data analytics, artificial intelligence, and sensors to monitor and manage traffic conditions in real-time. This can reduce congestion, emissions, and travel time, as well as improve road safety and user satisfaction. Waycare is a platform that leverages data from various sources, such as connected vehicles, mobile applications, and road cameras, to provide traffic management agencies with insights and recommendations to optimize traffic flow. Logistics optimization: This is a solution that uses smart algorithms, blockchain, and IoT to improve the efficiency and transparency of the delivery of goods and services in urban areas. This can reduce the costs, emissions, and delays associated with logistics, as well as enhance the customer experience and trust. ShipChain is a blockchain-based platform that connects shippers, carriers, and customers and provides end-to-end visibility and traceability of the shipments. Autonomous vehicles: This is a solution that uses advanced sensors, software, and communication systems to enable vehicles to operate without human intervention. This can improve the safety, accessibility, and productivity of transportation, as well as reduce the need for parking space and infrastructure maintenance. Waymo is a company that develops and operates autonomous vehicles for various purposes, such as ride-hailing, delivery, and trucking. These are some of the ways that Smart Mobility planning applications can contribute to meeting the needs of the Urbanization growth. However, there are also various opportunities and challenges related to the implementation and adoption of these solutions, such as the regulatory, ethical, social, and technical aspects. Therefore, it is important to consider the specific context and needs of each city and its stakeholders when designing and deploying Smart Mobility planning applications.

Keywords: smart mobility planning, smart mobility applications, smart mobility techniques, smart mobility tools, smart transportation, smart cities, urbanization growth, future smart cities, intelligent cities, ICT information and communications technologies, IoT internet of things, sensors, lidar, digital twin, ai artificial intelligence, AR augmented reality, VR virtual reality, robotics, cps cyber physical systems, citizens design science

Procedia PDF Downloads 55
21385 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 355
21384 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 128
21383 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 20
21382 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 73
21381 Coordinated Renewal Planning of Civil Infrastructure Systems

Authors: Hesham Osman

Abstract:

The challenges facing aging urban infrastructure systems require a more holistic and comprehensive approach to their management. The large number of urban infrastructure renewal activities occurring in cities throughout the world leads to social, economic and environmental impacts on the communities in its vicinity. As such, a coordinated effort is required to streamline these activities. This paper presents a framework to enable temporal (time-based) coordination of water, sewer and road intervention activities. Intervention activities include routine maintenance, renewal, and replacement of physical assets. The coordination framework considers 1) Life-cycle costs, 2) Infrastructure level-of-service, and 3) Risk exposure to system operators. The model enables infrastructure asset managers to trade-off options of delaying versus bringing forward intervention activities of one system in order to be executed in conjunction with another co-located system in the right-of-way. The framework relies on a combination of meta-heuristics and goal-based optimization. In order to demonstrate the applicability of the framework, a case study for a major infrastructure corridor in Cairo, Egypt is taken as an example. Results show that the framework can be scaled-up to include other infrastructure systems located in the right-of-way like electricity, gas and telecom, provided that information can be shared among these entities.

Keywords: infrastructure, rehabilitation, construction, optimization

Procedia PDF Downloads 274
21380 Domestic Violence, Well-Being and Women's Inclusion: Evidence from Northern Ireland

Authors: Jessica Leigh Doyle

Abstract:

In recent years there has been increasing academic and policy interest in domestic violence (DV) and in the implications of DV for the physical and psychological well-being of those who experience it. Yet, despite this interest, very few detailed empirical explorations of these issues have been conducted to date. Of the detailed empirical work that does exist, most studies have focused narrowly on physical violence and the impact of physical violence on rates of depression, post-traumatic stress disorder (PTSD) and substance use. This has often been to the exclusion of wider experiences of DV in relation to psychological, sexual and financial abuse, and of broader victim self-perceptions of psychological well-being that include self-esteem, social participation and quality of life as core components. This paper contributes towards filling this gap by examining these issues on the basis of comprehensive empirical evidence from the Northern Ireland context. Using qualitative methods, the paper presents the findings from 63 semi-structured interviews with women victims of DV from across Northern Ireland. The findings discuss the varied types of violence (physical, psychological, sexual, and financial) that women experience, how these experiences shape their broad physical and psychological well-being and capacity to live active and fulfilling lives and the processes of recovery from IPV. The implications of these findings for research and policy are then discussed.

Keywords: domestic violence, gender equality, intimate partner violence, violence against women, well-being

Procedia PDF Downloads 263
21379 Fuzzy Inference System for Risk Assessment Evaluation of Wheat Flour Product Manufacturing Systems

Authors: Yas Barzegaar, Atrin Barzegar

Abstract:

The aim of this research is to develop an intelligent system to analyze the risk level of wheat flour product manufacturing system. The model consists of five Fuzzy Inference Systems in two different layers to analyse the risk of a wheat flour product manufacturing system. The first layer of the model consists of four Fuzzy Inference Systems with three criteria. The output of each one of the Physical, Chemical, Biological and Environmental Failures will be the input of the final manufacturing systems. The proposed model based on Mamdani Fuzzy Inference Systems gives a performance ranking of wheat flour products manufacturing systems. The first step is obtaining data to identify the failure modes from expert’s opinions. The second step is the fuzzification process to convert crisp input to a fuzzy set., then the IF-then fuzzy rule applied through inference engine, and in the final step, the defuzzification process is applied to convert the fuzzy output into real numbers.

Keywords: failure modes, fuzzy rules, fuzzy inference system, risk assessment

Procedia PDF Downloads 72
21378 Joint Physical Custody after Divorce and Child Well-Being

Authors: Katarzyna Kamińska

Abstract:

Joint physical custody means that both parents after divorce or separation have the right and responsibility to take care of the child on the daily basis. In a joint physical custody arrangement, the child spends substantial, but not necessarily equal, time with both parents. Joint physical custody can be symmetric care arrangement or not. However, it is accepted in the jurisprudence that the best interests of the child is served when the child spends at least 35% of the time during a two-week period with each parent. Joint physical custody, also known as joint, dual, or shared residence, is a challenge in contemporary family law. It has its supporters and opponents. On the one hand, joint physical custody is beneficial because it provides children with frequent and continuous contact with a mother and father after their divorce or separation. On the other hand, it isn’t good for children to be shuttled back and forth between two residences. Children need a home base. The conclusion is therefore that joint physical custody can’t be seen as a panacea for all post-divorce or post-separation parenting cases and the court shouldn’t automatically make such a determination. The possibility to award this arrangement requires the court to carefully weigh the pros and cons of each individual case. It is difficult to say that joint physical custody is better than single physical custody in any case. It depends on the circumstances and needs of each family. It appears that an individual approach is going to be much better as opposed to a one-size-fits-all idea.

Keywords: joint physical custody, shared residence, dual residence, the best interests of the child

Procedia PDF Downloads 64
21377 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective

Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg

Abstract:

The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.

Keywords: Industry 4.0., mass customization, production networks, virtual process-chain

Procedia PDF Downloads 254
21376 Comparison of Sedentary Behavior and Physical Activity between Children with Autism Spectrum Disorder and the Controls

Authors: Abdulrahman M. Alhowikan, Nadra E. Elamin, Sarah S. Aldayel, Sara A. AlSiddiqi, Fai S. Alrowais, Laila Y. Al-Ayadhi

Abstract:

Background: A growing body of research has suggested that physical activities (PA) have important implications for improving the performance of ASD children. They revealed that the physiological, cognitive, psychological, and behavioral functioning had improved after performing some physical activities. Methods: We compared the sedentary behavior and physical activities between children with autism spectrum disorder (n=21) and age-matched control group (n=30), using the ActiGraph GT3X+ for the assessments. Results: Our results revealed that the total time spent in sedentary activity and the total sedentary activity counts were highly significant in the control group compared to the ASD group (p < 0.001, p=0.001, respectively). ASD spent a significantly longer time than the controls engaging on vigorous physical activity (VPA) (p=0.017). The results also indicated that there were no significant differences between both groups for the total counts and time spent in light physical activity (LPA) and moderate physical activity (MPA). Conclusion: The finding highlights the importance of physical activity intervention for ASD children, using accurate and precise measurement tools to record all activities.

Keywords: Autism spectrum disorders, motor skills, physical activity, ActiGraph GT3X+, moderate-to vigorous-intensity physical activity

Procedia PDF Downloads 117
21375 Assesment of Quality of Life among Iranian Male Amateur Athletes via WHOQOL-Brief

Authors: Shirko Ahmadi, Ahmad Fallahi, Marco C. Uchida, Gustavo L. Gutierrez

Abstract:

The aims of the present study are to assess and compare the health habits and quality of life (QoL) of Iranian amateur athletes in different sports. A total of 120 male amateur athletes between 17 and 31 years, engaged in 16 kinds of sports which include team (n=44), individual (n=40) and combat sports (n=36) from sports clubs in the west cities of Iran; and also those not involved in any competition in the past. Additionally, this is a cross-sectional, descriptive observational study, which the subjects completed the WHOQOL-brief questionnaire to evaluate QoL. The questionnaire is composed of 26 questions in four domains (physical health, psychological, social and environmental domains), that was applied in the Persian language. Information on the frequency and duration of training sessions were also collected. The Shapiro-Wilk test was used to verify normal distribution, followed by the chi-squared test for proportions and simple analysis of variance for comparisons between groups of sports. Pearson’s correlation was used to assess the relationships between the variables analyzed. According to the findings, those from individual sports obtained highest points in the all domains of QoL; physical domains (87.1 ± 8.1 point), psychological domains (87.6 ± 9.6 point), social domains (89.7 ± 9.2 point), environmental domains (75.5± 10.7 point) and overall QoL score (84.9 ± 9.4 point). Generally, social domains were the highest QoL index (84.3 ± 7.2 points), and environmental domains were the lowest QoL index (68.1 ± 10.8 points), in all of the sports. No correlations were found between QoL domains and time engaged in the sport (r = 0.01; p = 0.93), number of weekly training sessions (r = 0.09; p = 0.37) and session duration (r = -0.06; p= 0.58). Comparison of QoL results with those of the general population revealed higher levels in the physical and psychological components of amateur athletes. In the present study, engaging in sports was associated with higher QoL levels in amateur athletes, particularly in the physical and psychological domains. Moreover, correlations were found between the overall score and domains of QoL.

Keywords: amateur, domains, Iranian, quality of life

Procedia PDF Downloads 133
21374 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 377
21373 Examining Coping Resources and Ways of Strategic Coping for Individuals with Spinal Cord Injury During the COVID-19 Crisis

Authors: Se-Hyuk Park, Hee-Jung Seo

Abstract:

Previous studies have investigated effective coping strategies for excessive stress, positive adaptation, resilience, mental health, and personal growth. However, to the best of the authors' knowledge, little research has been conducted to investigate how Koreans with physical disabilities deal with the COVID-19 pandemic. The purpose of this study was to identify coping strategies and coping resources that Koreans with physical disabilities utilized during the COVID-19 crisis. This study used semi-structured, in-depth interviews with 15 participants. Data were qualitatively analyzed using the constant comparative method with content mapping and content mining questions. We identified three salient themes that were used by participants as coping strategies to deal with various COVID-related challenges: (a) engagement in meaningful activities, (b) improvement of social and emotional support, and (c) experience of resilience. The findings of the present study highlighted that Korean adults with SCI actively engaged in various leisure activities, maintained and developed closer social relationships, and experienced resilience to face COVID-19-related stressors. These coping strategies were noted as a catalyst for physical health as well as psychological well-being of individuals with SCI.

Keywords: spinal cord injury, covid-19 pandemic, coping strategies, coping resources, leisure

Procedia PDF Downloads 13
21372 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 143
21371 An Application of Self-Health Risk Assessment among Populations Living in The Vicinity of a Fiber-Cement Roofing Factory

Authors: Phayong Thepaksorn

Abstract:

The objective of this study was to assess whether living in proximity to a roofing fiber cement factory in southern Thailand was associated with physical, mental, social, and spiritual health domains measured in a self-reported health risk assessment (HRA) questionnaire. A cross-sectional study was conducted among community members divided into two groups: near population (living within 0-2 km of factory) and far population (living within 2-5 km of factory)(N=198). A greater proportion of those living far from the factory (65.34%) reported physical health problems than the near group (51.04 %)(p=0.032). This study has demonstrated that the near population group had higher proportion of participants with positive ratings on mental assessment (30.34%) and social health impacts (28.42%) than far population group (10.59% and 16.67 %, respectively) (p<0.001). The near population group (29.79%) had similar proportion of participants with positive ratings in spiritual health impacts compared with far population group (27.08%). Among females, but not males, this study demonstrated that a higher proportion of the near population had a positive summative score for the self-HRA, which included all four health domain, compared to the far population (p <0.001 for females; p=0.154 for males). In conclusion, this self-HRA of physical, mental, social, and spiritual health domains reflected the risk perceptions of populations living in the vicinity of the roofing fiber cement factory. This type of tool can bring attention to population concerns and complaints in the factory’s surrounding community. Our findings may contribute to future development of self-HRA for HIA development procedure in Thailand.

Keywords: cement dust, health impact assessment, risk assessment, walk-though survey

Procedia PDF Downloads 353
21370 Body of Dialectics: Exploring a Dynamic-Adaptational Model of Physical Self-Integrity and the Pursuit of Happiness in a Hostile World

Authors: Noam Markovitz

Abstract:

People with physical disabilities constitute a very large and simultaneously a diverse group of general population, as the term physical disabilities is extensive and covers a wide range of disabilities. Therefore, individuals with physical disabilities are often faced with a new, threatening and stressful reality leading possibly to a multi-crisis in their lives due to the great changes they experience in somatic, socio-economic, occupational and psychological level. The current study seeks to advance understanding of the complex adaptation to physical disabilities by expanding the dynamic-adaptational model of the pursuit of happiness in a hostile world with a new conception of physical self-integrity. Physical self-integrity incorporates an objective dimension, namely physical self-functioning (PSF), and a subjective dimension, namely physical self-concept (PSC). Both of these dimensions constitute an experience of wholeness in the individual’s identification with her or his physical body. The model guiding this work is dialectical in nature and depicts two systems in the individual’s sense of happiness: subjective well-being (SWB) and meaning in life (MIL). Both systems serve as self-adaptive agents that moderate the complementary system of the hostile-world scenario (HWS), which integrates one’s perceived threats to one’s integrity. Thus, in situations of increased HWS, the moderation may take a form of joint activity in which SWB and MIL are amplified or a form of compensation in which one system produces a stronger effect while the other system produces a weaker effect. The current study investigated PSC in relations to SWB and MIL through pleasantness and meanings that are physically or metaphorically grounded in one’s body. In parallel, PSC also relates to HWS by activating representations of inappropriateness, deformation and vulnerability. In view of possibly dialectical positions of opposing and complementary forces within the current model, the current field study that aims to explore PSC as appearing in an independent, cross-sectional, design addressing the model’s variables in a focal group of people with physical disabilities. This study delineated the participation of the PSC in the adaptational functions of SWB and MIL vis-à-vis HWS-related life adversities. The findings showed that PSC could fully complement the main variables of the pursuit of happiness in a hostile world model. The assumed dialectics in the form of a stronger relationship between SWB and MIL in the face of physical disabilities was not supported. However, it was found that when HWS increased, PSC and MIL were strongly linked, whereas PSC and SWB were weakly linked. This highlights the compensatory role of MIL. From a conceptual viewpoint, the current investigation may clarify the role of PSC as an adaptational agent of the individual’s positive health in complementary senses of bodily wholeness. Methodologically, the advantage of the current investigation is the application of an integrative, model-based approach within a specially focused design with a particular relevance to PSC. Moreover, from an applicative viewpoint, the current investigation may suggest how an innovative model may be translated to therapeutic interventions used by clinicians, counselors and practitioners in improving wellness and psychological well-being, particularly among people with physical disabilities.

Keywords: older adults, physical disabilities, physical self-concept, pursuit of happiness in a hostile-world

Procedia PDF Downloads 123
21369 Sense of Place in Historic City

Authors: Hiba Alkhalaf

Abstract:

Historic cities and places of cultural significance is continuously under the pressure of economic development and social change that threaten its natural and cultural environment. The challenge here is to find a balance between preserving the cultural character while ensuring the socio-economic gains and continuity of its uniqueness. That is by sustaining the use, character, meaning and social interaction associated with the place, in other words the sense of place. The main argument here is what we attempt to conserve is the cultural physical and non-physical dimensions of the historic city. It is based on the proposition that what give the historic city its character is its strong sense of place- whether it is historic or current. When properly identified, its various dimensions (use, meaning and form) would help determine what to sustain and what not by making the development meaningfully related to the uniqueness of the historic place. Accordingly, those socio-economic features within the context of a changing historic environment needed to be clarified. This paper, thus, explores the various perspectives of the role of sense of place within the historic city and its connection to cultural heritage. It also reviews urban conservation practice as it is currently understood in the context of historic city development. It concludes that sense of place lies in complex interrelated relationships between various users of the place and the physical, economic, cultural, political, and environmental contexts in which they interact. This calls for the need to sustain the sense of place as part of the overall urban development and conservation strategies.

Keywords: cultural heritage, historic urban areas, urban development, sense of place

Procedia PDF Downloads 489
21368 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 331