Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1267

Search results for: socially engineered attacks

937 Effects of an Inclusive Educational Model for Students with High Intellectual Capacity and Special Educational Needs: A Case Study in Talentos UdeC, Chile

Authors: Gracia V. Navarro, María C. González, María G. González, María V. González

Abstract:

In Chile, since 2002, there are extracurricular enrichment programs complementary to regular education for students with high intellectual capacity. This paper describes a model for the educational inclusion of students, with special educational needs associated with high intellectual capacity, developed at the University of Concepción and its effects on its students, academics and undergraduate students that collaborate with the program. The Talentos UdeC Program was created in 2003 and is intended for 240 children and youth from 11 to 18 years old, from 15 communes of the Biobio region. The case Talentos UdeC is analyzed from a mixed qualitative study in which those participating in the educational model are considered. The sample was composed of 30 students, 30 academics, and 30 undergraduate students. In the case of students, pre and post program measurements were made to analyze their socio-emotional adaptation, academic motivation and socially responsible behavior. The mentioned variables are measured through questionnaires designed and validated by the University of Concepcion that included: The Socially Responsible Behavior Questionnaire (CCSR); the Academic Motivation Questionnaire (CMA) and the Socio-Emotional Adaptation Questionnaire (CASE). The information obtained by these questionnaires was analyzed through a quantitative analysis. Academics and undergraduate students were interviewed to learn their perception of the effects of the program on themselves, on students and on society. The information obtained is analyzed using qualitative analysis based on the identification of common themes and descriptors for the construction of conceptual categories of answers. Quantitative results show differences in the first three variables analyzed in the students, after their participation for two years in Talentos UdeC. Qualitative results demonstrate perception of effects in the vision of world, project of life and in other areas of the students’ development; perception of effects in a personal, professional and organizational plane by academics and a perception of effects in their personal-social development and training in generic competencies by undergraduates students.

Keywords: educational model, high intellectual capacity, inclusion, special educational needs

Procedia PDF Downloads 190
936 A Vertical Grating Coupler with High Efficiency and Broadband Operation

Authors: Md. Asaduzzaman

Abstract:

A Silicon-on-insulator (SOI) perfectly vertical fibre-to-chip grating coupler is proposed and designed based on engineered subwavelength structures. The high directionality of the coupler is achieved by implementing step gratings to realize asymmetric diffraction and by applying effective index variation with auxiliary ultra-subwavelength gratings. The proposed structure is numerically analysed by using two-dimensional Finite Difference Time Domain (2D FDTD) method and achieves 96% (-0.2 dB) coupling efficiency and 39 nm 1-dB bandwidth. This highly efficient GC is necessary for applications where coupling efficiency between the optical fibre and nanophotonics waveguide is critically important, for instance, experiments of the quantum photonics integrated circuits. Such efficient and broadband perfectly vertical grating couplers are also significantly advantageous in highly dense photonic packaging.

Keywords: diffraction grating, FDTD, grating couplers, nanophotonic

Procedia PDF Downloads 46
935 The Tense Dichotomy Between Shari'ah Compliance and the Goals of an Economic Bank

Authors: Camille Paldi

Abstract:

The tense dichotomy between Shari’ah compliance and the economic goals of an Islamic Bank produces a proliferation of reverse engineered products, which are barely in compliance with Islamic law. The result is basically a hybrid conventional banking system with conventional products in Islamic disguise using Arabic and Islamic terminology. Many Islamic financial professionals and academics advocate for the use of conventional products and devices despite their non-Shari’ah compliance based on commercial necessity and the need to compete. However, this dangerous trend will lead to the demise of the Islamic finance industry. Rather than thoughtlessly following conventional products and practice, Islamic finance professionals should delve into the Shari’ah to find the answers to the current Islamic banking conundrum and lead the industry on the right path of developing Shari’ah based products and using Shari’ah devices to hedge risk.

Keywords: Islamic banking, Shari'ah, finance, investment

Procedia PDF Downloads 324
934 Detecting Hate Speech And Cyberbullying Using Natural Language Processing

Authors: Nádia Pereira, Paula Ferreira, Sofia Francisco, Sofia Oliveira, Sidclay Souza, Paula Paulino, Ana Margarida Veiga Simão

Abstract:

Social media has progressed into a platform for hate speech among its users, and thus, there is an increasing need to develop automatic detection classifiers of offense and conflicts to help decrease the prevalence of such incidents. Online communication can be used to intentionally harm someone, which is why such classifiers could be essential in social networks. A possible application of these classifiers is the automatic detection of cyberbullying. Even though identifying the aggressive language used in online interactions could be important to build cyberbullying datasets, there are other criteria that must be considered. Being able to capture the language, which is indicative of the intent to harm others in a specific context of online interaction is fundamental. Offense and hate speech may be the foundation of online conflicts, which have become commonly used in social media and are an emergent research focus in machine learning and natural language processing. This study presents two Portuguese language offense-related datasets which serve as examples for future research and extend the study of the topic. The first is similar to other offense detection related datasets and is entitled Aggressiveness dataset. The second is a novelty because of the use of the history of the interaction between users and is entitled the Conflicts/Attacks dataset. Both datasets were developed in different phases. Firstly, we performed a content analysis of verbal aggression witnessed by adolescents in situations of cyberbullying. Secondly, we computed frequency analyses from the previous phase to gather lexical and linguistic cues used to identify potentially aggressive conflicts and attacks which were posted on Twitter. Thirdly, thorough annotation of real tweets was performed byindependent postgraduate educational psychologists with experience in cyberbullying research. Lastly, we benchmarked these datasets with other machine learning classifiers.

Keywords: aggression, classifiers, cyberbullying, datasets, hate speech, machine learning

Procedia PDF Downloads 202
933 A Mixed Methodology of the Social and Spatial Fragmentation of the City of Beirut Leading to the Creation of Internal Boundaries

Authors: Hala Obeid

Abstract:

Among the cities that have been touched by hard events and have been experiencing this polemic of existence, one can quote Beirut. A city that defies and confronts itself for its own existence. Beirut materialized all the social complexity; it has also preserved the memory of a society that has been able to build and reflect a certain unique identity. In spite of its glory, Lebanon’s civil war has marked a turning point in Beirut’s history. It has caused many deaths and opposed religious communities. Once this civil war has ended, the reconstruction of the city center, however, saw the spatial exclusion of manual labor, small local commerce, and middle-class residences. The urban functions that characterized the pre-war center were removed, and the city’s spontaneous evolutions were replaced by a historical urban planning, which neglected the city’s memory and identity. The social and spatial fragmentation that has erupted since the war has led to a breakdown of spatial and social boundaries within the city. The aim of this study is to evaluate the impact of fragmentation and boundaries on the city of Beirut in spatial, social, religious and ethnic terms. The method used in this research is what we call the mixed method which is a combination between the quantitative method and the qualitative one. These two approaches, in this case, do not oppose but complement each other in order to study the city of Beirut physically and socially. The main purpose of the qualitative approach is to describe and analyze the social phenomenon of the fragmentation of the city; this method can be summarized by the field observation and study. While the quantitative approach is based on filling out questionnaires that leads to statistics analyzes. Together, these two approaches will mark the course of the research. As a result, Beirut is not only a divided city but is fragmented spatially into many fragments and socially into many groups. This fragmentation is creating immaterial boundaries between fragments and therefore between groups. These urban and social boundaries are specifically religious and ethnic limits. As a conclusion, one of the most important and discussed boundary in Beirut is a spatial and religious boundary called ‘the green line’ or the demarcation line, a true caesura within the city. It marks the opposition of two urban groups and the aggravated fragmentation between them. This line divided Beirut into two compartments: East Beirut (for Christians) and West Beirut (for Muslims). This green line has become an urban void that holds the past in suspension. Finally, to think of Beirut as an urban unit becomes an insoluble problem.

Keywords: Beirut, boundaries, fragmentation, identity

Procedia PDF Downloads 145
932 Functionalized Nanoparticles for Biomedical Applications

Authors: Temesgen Geremew

Abstract:

Functionalized nanoparticles have emerged as a revolutionary class of materials with immense potential in various biomedical applications. These engineered nanoparticles possess unique properties tailored to interact with biological systems, offering unprecedented opportunities in drug delivery, imaging, diagnostics, and therapy. This research delves into the design, synthesis, and characterization of functionalized nanoparticles for targeted biomedical applications. The primary focus lies on developing nanoparticles with precisely controlled size, surface chemistry, and biocompatibility for specific medical purposes. The research will also explore the crucial interaction of these nanoparticles with biological systems, encompassing cellular uptake, biodistribution, and potential toxicity evaluation. The successful development of functionalized nanoparticles holds the promise to revolutionize various aspects of healthcare. This research aspires to contribute significantly to this advancement by providing valuable insights into the design and application of these versatile materials within the ever-evolving field of biomedicine.

Keywords: nanoparticles, biomedicals, cancer, biocompatibility

Procedia PDF Downloads 31
931 Underwater Remotely Operated Vehicle (ROV) Exploration

Authors: M. S. Sukumar

Abstract:

Our objective is to develop a full-fledged system for exploring and studying nature of fossils and to extend this to underwater archaeology and mineral mapping. This includes aerial surveying, imaging techniques, artefact extraction and spectrum analysing techniques. These techniques help in regular monitoring of fossils and also the sensing system. The ROV was designed to complete several tasks which simulate collecting data and samples. Given the time constraints, the ROV was engineered for efficiency and speed in performing tasks. Its other major design consideration was modularity, allowing the team to distribute the building process, to easily test systems as they were completed and troubleshoot and replace systems as necessary. Our design itself had several challenges of on-board waterproofed sensor mounting, waterproofing of motors, ROV stability criteria, camera mounting and hydrophone sound acquisition.

Keywords: remotely operated vehicle (ROV) dragonair, underwater archaeology, full-fledged system, aerial imaging and detection

Procedia PDF Downloads 211
930 Settlement Performance of Granular Column Reinforced Soil

Authors: Muneerah Jeludin

Abstract:

The vibrated column has been widely used over the last three decades to improve the performance of soft ground and engineered compacted fill. The main reason for adopting this technique is that it is economically viable and environmental friendly. The performance of granular column with regards to bearing capacity has been well documented; however, information regarding the settlement behavior of granular columns is still limited. This paper aims to address the findings from a laboratory model study in terms of its settlement improvement. A 300 mm diameter and 400 mm high kaolin clay model was used in this investigation. Columns of various heights were installed in the clay bed using replacement method. The results in relation to load sharing mechanism between the column and surrounding clay just under the footing indicated that in short column, the available shaft resistance was not significant and introduces a potential for end braing failure as opposed to bulging failure in long columns. The settlement improvement factor corroborates well with field observations.

Keywords: ground improvement, model test, reinforced soil, foundation

Procedia PDF Downloads 243
929 Engineered Control of Bacterial Cell-to-Cell Signaling Using Cyclodextrin

Authors: Yuriko Takayama, Norihiro Kato

Abstract:

Quorum sensing (QS) is a cell-to-cell communication system in bacteria to regulate expression of target genes. In gram-negative bacteria, activation on QS is controlled by a concentration increase of N-acylhomoserine lactone (AHL), which can diffuse in and out of the cell. Effective control of QS is expected to avoid virulence factor production in infectious pathogens, biofilm formation, and antibiotic production because various cell functions in gram-negative bacteria are controlled by AHL-mediated QS. In this research, we applied cyclodextrins (CDs) as artificial hosts for the AHL signal to reduce the AHL concentration in the culture broth below its threshold for QS activation. The AHL-receptor complex induced under the high AHL concentration activates transcription of the QS-target gene. Accordingly, artificial reduction of the AHL concentration is one of the effective strategies to inhibit the QS. A hydrophobic cavity of the CD can interact with the acyl-chain of the AHL due to hydrophobic interaction in aqueous media. We studied N-hexanoylhomoserine lactone (C6HSL)-mediated QS in Serratia marcescens; accumulation of C6HSL is responsible for regulation of the expression of pig cluster. Inhibitory effects of added CDs on QS were demonstrated by determination of prodigiosin amount inside cells after reaching stationary phase, because production of prodigiosin depends on the C6HSL-mediated QS. By adding approximately 6 wt% hydroxypropyl-β-CD (HP-β-CD) in Luria-Bertani (LB) medium prior to inoculation of S. maecescens AS-1, the intracellularly accumulated prodigiosin was drastically reduced to 7-10%, which was determined after the extraction of prodigiosin in acidified ethanol. The AHL retention ability of HP-β-CD was also demonstrated by Chromobacterium violacuem CV026 bioassay. The CV026 strain is an AHL-synthase defective mutant that activates QS solely by adding AHLs from outside of cells. A purple pigment violacein is induced by activation of the AHL-mediated QS. We demonstrated that the violacein production was effectively suppressed when the C6HSL standard solution was spotted on a LB agar plate dispersing CV026 cells and HP-β-CD. Physico-chemical analysis was performed to study the affinity between the immobilized CD and added C6HSL using a quartz crystal microbalance (QCM) sensor. The COOH-terminated self-assembled monolayer was prepared on a gold electrode of 27-MHz AT-cut quartz crystal. Mono(6-deoxy-6-N, N-diethylamino)-β-CD was immobilized on the electrode using water-soluble carbodiimide. The C6HSL interaction with the β-CD cavity was studied by injecting the C6HSL solution to a cup-type sensor cell filled with buffer solution. A decrement of resonant frequency (ΔFs) clearly showed the effective C6HSL complexation with immobilized β-CD and its stability constant for MBP-SpnR-C6HSL complex was on the order of 102 M-1. The CD has high potential for engineered control of QS because it is safe for human use.

Keywords: acylhomoserine lactone, cyclodextrin, intracellular signaling, quorum sensing

Procedia PDF Downloads 214
928 Heavy Liquid Metal Coolant – the Key Safety Element in the Complex of New Nuclear Energy Technologies

Authors: A. Orlov, V. Rachkov

Abstract:

The future of Nuclear Energetics is seen in fast reactors with inherent safety working in the closed nuclear fuel cycle. The concept of inherent safety, which lies in deterministic elimination of the most severe accidents due to inherent properties of the reactor rather than through building up engineered barriers, is a cornerstone of success in ensuring safety and economic efficiency of future Nuclear Energetics. The focus of this paper is one of the key elements of inherent safety - the lead coolant of a nuclear reactor. Advantages of lead coolant for reactor application, influence on safety are reviewed. BREST-OD-300 fast reactor, currently being developed in Russia withing the “Proryv” Project utilizes lead coolant and a special set of measures and devices, called technology of lead coolant that ensures safe operation in a wide range of temperatures. Here these technological elements are reviewed, and current progress in their development is discussed.

Keywords: BREST-OD-300. , fast reactor, inherent safety, lead coolant

Procedia PDF Downloads 126
927 Urban Agriculture for Sustainable Cities: Using Wastewater and Urban Wetlands as Resource

Authors: Hussnain Mukhtar, Yu-Pin Lin

Abstract:

This paper deals with the concept of ecologically engineered system for sustainable agriculture production with the view of sustainable cities development. Sustainable cities offer numerous eco-services to its inhabitants, and where, among other issues, wastewater nutrients can be considered to be a valuable resource to be used for a sustainable enhancement of urban agriculture in wetlands. Existing cities can be transferred from being only consumer of food and other agriculture product into important resource conserving and sustainable generators of these products. The review provides the food production capacity through introduction of wastewater into urban wetlands, potential for nutrient recovery and ecological engineering intervention to reduce the risk of food contamination by pathogens. Finally, we discuss the potential nutrients accumulating in our cities, as an important aspect of sustainable urban development.

Keywords: ecological engineering, nutrient recovery, pathogens, urban agriculture, wetlands

Procedia PDF Downloads 233
926 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 114
925 Managing Multiple Change Projects in Supply Chains: A Case Study of a Moroccan Multi-Technical Services Company

Authors: Abdelouahab Errida, Bouchra Lotfi, Elalami Semma

Abstract:

In this paper, we try to address the topic of multiple change management by adopting an engineered research methodology, conducted within a Moroccan company during its implementation of several change projects that aim at improving its supply chain management performance. Firstly, we present the key concepts related to our research, namely change management, multiproject management and supply chain management. Then, we try to assess how the change management and multi-project management are applied in this company. Finally, we try to propose an approach that will help managers in dealing with multiple change projects. This approach proposes to integrate change management, project management and multi-project management for managing change projects according to three organizational levels: executive level, project portfolio level and change project level.

Keywords: change management, multi-project management, project management, change portfolio, supply chain management,

Procedia PDF Downloads 198
924 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 53
923 European Project Meter Matters in Sports: Fostering Criteria for Inclusion through Sport

Authors: Maria Campos, Alain Massart, Hugo Sarmento

Abstract:

The Meter Matters Erasmus Sport European Project (ID: 101050372) explores the field of social inclusion in and through sports with the aim of a) proposing appropriate criteria for co-funding sports programs involving people with intellectual and developmental disabilities and other more vulnerable people, primarily in mainstream sports organizations and b) proposing a model for co-funding social inclusion in and through sports at the national level. This European project (2022-2024) involves 6 partners from 3 countries: Univerza V Ljubljani – coordinator and Drustvo Specialna Olimpiada Slovenije (Slovenia); Magyar Specialis Olimpia Szovetseg and Magyar Testnevelesi Es Sporttudomanyi Egyetem (Hungary) and APPDA Coimbra - Associação Portuguesa para as Perturbações do Desenvolvimento e Autismo and Universidade De Coimbra, Faculty of Sport Sciences and Physical Education (Portugal). Equal involvement of all people in sports activities is, in terms of national and international guidelines, enshrined in some conventions and strategies in the field of sports, as well as human rights, social security, physical and mental health, architecture, environment and public administration. However, there is a gap between the practice and EU guidelines in terms of sustainable support for socially inclusive sports programs in the form of co-funding by state and local (municipal) resources. We observe considerable opacity in the regulation of the field. Given that there are both relevant programs and inclusive legislation and policies, we believe that the reason for the missing article is reflected in the undeveloped criteria for measuring social inclusion in sports. Major sports programs are usually co-funded based on crowds (number of involved athletes) and performance (sports score). In the field of social inclusion in sports, the criteria cannot be the same, as it is a smaller population. Therefore, the goals of inclusion in sports should not be the focused on competitive results but on opening equal opportunities for all, regardless of their psychophysical abilities. In the Meter Matters program, we are searching for criteria for co-funding social inclusion in sports through focus groups with coaches, social workers, psychologists and others professionals involved in inclusive sports programs in regular sports clubs and with athletes and their parents or guardians. Moreover, experts in the field of social inclusion in sports were also interviewed. Based on the proposals for measuring social inclusion in sports, we developed a model for co-funding socially inclusive sports programs.

Keywords: European project, meter matters, inclusion, sport

Procedia PDF Downloads 83
922 Urban Form, Heritage, and Disaster Prevention: What Do They Have in Common?

Authors: Milton Montejano Castillo, Tarsicio Pastrana Salcedo

Abstract:

Based on the hypothesis that disaster risk is constructed socially and historically, this article shows the importance of keeping alive the historical memory of disaster by means of architectural and urban heritage conservation. This is illustrated with three examples of Latin American World Heritage cities where disasters like floods and earthquakes have shaped urban form. Therefore, the study of urban form or ‘Urban Morphology’ is proposed as a tool to understand and analyze urban transformations with the documentation of the occurrence of disasters. Lessons learned from such cities may be useful to reduce disasters risk in contemporary built environments.

Keywords: conservation, disaster risk reduction, urban morphology, World Heritage

Procedia PDF Downloads 511
921 Characterization of Calcium-Signalling Mediated by Human GPR55 Expressed in HEK293 Cells

Authors: Yousuf M. Al Suleimani, Robin Hiley

Abstract:

The endogenous phospholipid lysophosphatidylinositol (LPI) was recently identified as a novel ligand for the G protein-coupled receptor 55 (GPR55) and an inducer of intracellular Ca2+ [Ca2+]i release. This study attempts to characterize Ca2+ signals provoked by LPI in HEK293 cells engineered to stably express human GPR55 and to test cannabinoid ligand activity at GPR55. The study shows that treatment with LPI stimulates a sustained, oscillatory Ca2+ release. The response is characterized by an initial rapid rise, which is mediated by the Gαq-PLC-IP3 pathway, and this is followed by prolonged oscillations that require RhoA activation. Ca2+ oscillations are initiated by intracellular mechanisms and extracellular Ca2+ is only required to replenish Ca2+ lost from the cytoplasm. Analysis of cannabinoid ligand activity at GPR55 revealed no clear effect of the endocannabinoid anandamide, however, rimonabant and the CB1 receptor antagonist AM251 evoked GPR55-mediated [Ca2+]i. Thus, LPI is likely to be a key plasma membrane mediator of signaling events and changes in gene expression through GPR55 activation.

Keywords: lysophosphatidylinositol, calcium, GPR55, cannabinoid

Procedia PDF Downloads 331
920 The Role of Tourism Industry in the Creation of Youth Employment Opportunities in Africa: A Case Study of Nigeria

Authors: Isiya Salihu Shinkafi

Abstract:

The focus of this paper is to elaborate on employment opportunities within the tourism sector and the solutions to youth unemployment in Africa and Nigeria in particular. Youth unemployment creates a monumental social problem to African continent, the world over and Nigeria in particular. The intelligence of this paper was collected from secondary sources using previews researches and analysis of scholars to gather empirical data. The findings revealed that unemployment in Africa and specifically Nigeria among youths were caused by certain factors which constitute a greater challenge to the economy and the existence of the continent. The tourism sector provides the enabling environment to address the different categories of unemployment among the youths. One of the unique characteristics of the tourism industry that makes it a prime sector from which employment can be engineered; especially in the case of the African countries, are its labour intensive characteristics of both experts, skilled, semi-skilled and unskilled labour.

Keywords: tourism industry, employment opportunities, youth employment

Procedia PDF Downloads 473
919 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India

Authors: Sumanta Meher, Gaurav Shukla

Abstract:

The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.

Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India

Procedia PDF Downloads 142
918 Unleashing the Power of Cerebrospinal System for a Better Computer Architecture

Authors: Lakshmi N. Reddi, Akanksha Varma Sagi

Abstract:

Studies on biomimetics are largely developed, deriving inspiration from natural processes in our objective world to develop novel technologies. Recent studies are diverse in nature, making their categorization quite challenging. Based on an exhaustive survey, we developed categorizations based on either the essential elements of nature - air, water, land, fire, and space, or on form/shape, functionality, and process. Such diverse studies as aircraft wings inspired by bird wings, a self-cleaning coating inspired by a lotus petal, wetsuits inspired by beaver fur, and search algorithms inspired by arboreal ant path networks lend themselves to these categorizations. Our categorizations of biomimetic studies allowed us to define a different dimension of biomimetics. This new dimension is not restricted to inspiration from the objective world. It is based on the premise that the biological processes observed in the objective world find their reflections in our human bodies in a variety of ways. For example, the lungs provide the most efficient example for liquid-gas phase exchange, the heart exemplifies a very efficient pumping and circulatory system, and the kidneys epitomize the most effective cleaning system. The main focus of this paper is to bring out the magnificence of the cerebro-spinal system (CSS) insofar as it relates to our current computer architecture. In particular, the paper uses four key measures to analyze the differences between CSS and human- engineered computational systems. These are adaptability, sustainability, energy efficiency, and resilience. We found that the cerebrospinal system reveals some important challenges in the development and evolution of our current computer architectures. In particular, the myriad ways in which the CSS is integrated with other systems/processes (circulatory, respiration, etc) offer useful insights on how the human-engineered computational systems could be made more sustainable, energy-efficient, resilient, and adaptable. In our paper, we highlight the energy consumption differences between CSS and our current computational designs. Apart from the obvious differences in materials used between the two, the systemic nature of how CSS functions provides clues to enhance life-cycles of our current computational systems. The rapid formation and changes in the physiology of dendritic spines and their synaptic plasticity causing memory changes (ex., long-term potentiation and long-term depression) allowed us to formulate differences in the adaptability and resilience of CSS. In addition, the CSS is sustained by integrative functions of various organs, and its robustness comes from its interdependence with the circulatory system. The paper documents and analyzes quantifiable differences between the two in terms of the four measures. Our analyses point out the possibilities in the development of computational systems that are more adaptable, sustainable, energy efficient, and resilient. It concludes with the potential approaches for technological advancement through creation of more interconnected and interdependent systems to replicate the effective operation of cerebro-spinal system.

Keywords: cerebrospinal system, computer architecture, adaptability, sustainability, resilience, energy efficiency

Procedia PDF Downloads 58
917 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 372
916 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 378
915 Bridging the Gap and Widening the Divide

Authors: Lerato Dixon, Thorsten Chmura

Abstract:

This paper explores whether ethnic identity in Zimbabwe leads to discriminatory behaviour and the degree to which a norm-based intervention can shift this discriminatory behaviour. Social Identity Theory suggests that group identity can lead to favouritism towards the in-group and discriminatory behaviour towards the out-group. Agents yield higher utility from maintaining positive self-esteem by confirming with group behaviour. This paper focuses on the two majority ethnic groups in Zimbabwe – the Ndebele and Shona. Racial identities are synonymous with the language spoken. Zimbabwe’s history highlights how identity formation took place. As following independence, political parties became recognised as either Ndebele or Shona-speaking. It is against this backdrop that this study investigates the degree to which norm-based nudge can alter behaviour. This paper uses experimental methods to analyse discriminatory behaviour between two naturally occurring ethnic groups in Zimbabwe. In addition, we investigate if social norm-based interventions can shift discriminatory behaviour to understand if the divide between these two identity groups can be further divided or healed. Participants are randomly assigned into three groups to receive information regarding a social norm. We compare the effect of a proscriptive social norm-based intervention, stating what shouldn't be done and prescriptive social norms as interventions, stating what should be done. Specifically, participants are either shown the socially appropriate (Heal) norm, the socially inappropriateness (Divide) norm regarding interethnic marriages or no norm-based intervention. Following the random assignment into intervention groups, participants take part in the Trust Game. We conjecture that discrimination will shift in accordance with the prevailing social norm. Instead, we find evidence of interethnic discriminatory behaviour. We also find that trust increases when interacting with Ndebele, Shona and Zimbabwean participants following the Heal intervention. However, if the participant is Shona, the Heal intervention decreases trust toward in-groups and Zimbabwean co-players. On the other hand, if the participant is Shona, the Divide treatment significantly increases trust toward Ndebele participants. In summary, we find evidence that norm-based interventions significantly change behaviour. However, the prescriptive norm-based intervention (Heal) decreases trust toward the in-group, out-group and national identity group if the participant is Shona – therefore having an adverse effect. In contrast, the proscriptive Divide treatment increases trust if the participant is Shona towards Ndebele co-players. We conclude that norm-based interventions have a ‘rebound’ effect by altering behaviour in the opposite direction.

Keywords: discrimination, social identity, social norm-based intervention, zimbabwe

Procedia PDF Downloads 223
914 Impact of Pandemics on Cities and Societies

Authors: Deepak Jugran

Abstract:

Purpose: The purpose of this study is to identify how past Pandemics shaped social evolution and cities. Methodology: A historical and comparative analysis of major historical pandemics in human history their origin, transmission route, biological response and the aftereffects. A Comprehensive pre & post pandemic scenario and focuses selectively on major issues and pandemics that have deepest & lasting impact on society with available secondary data. Results: Past pandemics shaped the behavior of human societies and their cities and made them more resilient biologically, intellectually & socially endorsing the theory of “Survival of the fittest” by Sir Charles Darwin. Pandemics & Infectious diseases are here to stay and as a human society, we need to strengthen our collective response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, & especially animals who become carriers for these viruses. Conclusion: Pandemics always resulted in great mortality, but they also improved the overall individual human immunology & collective social response; at the same time, they also improved the public health system of cities, health delivery systems, water, sewage distribution system, institutionalized various welfare reforms and overall collective social response by the societies. It made human beings more resilient biologically, intellectually, and socially hence endorsing the theory of “AGIL” by Prof Talcott Parsons. Pandemics & infectious diseases are here to stay and as humans, we need to strengthen our city response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, especially animals who always acted as carriers for these novel viruses. Pandemics over the years acted like natural storms, mitigated the prevailing social imbalances and laid the foundation for scientific discoveries. We understand that post-Covid-19, institutionalized city, state and national mechanisms will get strengthened and the recommendations issued by the various expert groups which were ignored earlier will now be implemented for reliable anticipation, better preparedness & help to minimize the impact of Pandemics. Our analysis does not intend to present chronological findings of pandemics but rather focuses selectively on major pandemics in history, their causes and how they wiped out an entire city’s population and influenced the societies, their behavior and facilitated social evolution.

Keywords: pandemics, Covid-19, social evolution, cities

Procedia PDF Downloads 83
913 Designing Active Sites on Amicyanin Using Histidine S Plus Cobalt, and Measuring Their Functional Activity

Authors: Han-Bin Kim, Sooim Shin, Moonsung Choi

Abstract:

There is a growing interest in introducing a desired functional group on enzymes in the field of protein engineering. In here, various redox centers were newly created using histidine tag, which is widely used for protein purification, plus cobalt in one of cupredoxins, amicyanin. The coordination of Cobalt-His tag and reactivity of the Co²⁺ loaded His-tag also were characterized. 3xHis-tag, 6xHis-tag, and 9xHis-tag were introduced on amicyanin by site-directed mutagenesis, and then Co²⁺ was loaded on each His-tagged amicyanin. The spectral changes at 330 nm corresponding to cobalt binding on His-tag site indicated the binding ratio of 3xHis-tag, 6xHis-tag, and 9xHis-tag to cobalt as 1:1, 1:2, 1:3 respectively. Based on kinetic studies of binding cobalt to 3xHis-tag, 6xHis-tag, and 9xHis-tagged amicyanin, the nature of the sites was elucidated. In addition, internal electron transfer properties between Cu¹⁺ site and engineered site of amicyanin were determined. These results provide insight into improvement of metal coordination and alternation of the redox properties of metal as a new catalytic site on proteins.

Keywords: amicyanin, cobalt, histidine, protein engineering

Procedia PDF Downloads 143
912 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 295
911 Anticandidal and Antibacterial Silver and Silver(Core)-Gold(Shell) Bimetallic Nanoparticles by Fusarium graminearum

Authors: Dipali Nagaonkar, Mahendra Rai

Abstract:

Nanotechnology has experienced significant developments in engineered nanomaterials in the core-shell arrangement. Nanomaterials having nanolayers of silver and gold are of primary interest due to their wide applications in catalytical and biomedical fields. Further, mycosynthesis of nanoparticles has been proved as a sustainable synthetic approach of nanobiotechnology. In this context, we have synthesized silver and silver (core)-gold (shell) bimetallic nanoparticles using a fungal extract of Fusarium graminearum by sequential reduction. The core-shell deposition of nanoparticles was confirmed by the red shift in the surface plasmon resonance from 434 nm to 530 nm with the aid of the UV-Visible spectrophotometer. The mean particle size of Ag and Ag-Au nanoparticles was confirmed by nanoparticle tracking analysis as 37 nm and 50 nm respectively. Quite polydispersed and spherical nanoparticles are evident by TEM analysis. These mycosynthesized bimetallic nanoparticles were tested against some pathogenic bacteria and Candida sp. The antimicrobial analysis confirmed enhanced anticandidal and antibacterial potential of bimetallic nanoparticles over their monometallic counterparts.

Keywords: bimetallic nanoparticles, core-shell arrangement, mycosynthesis, sequential reduction

Procedia PDF Downloads 546
910 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 111
909 Analysis of Q-Learning on Artificial Neural Networks for Robot Control Using Live Video Feed

Authors: Nihal Murali, Kunal Gupta, Surekha Bhanot

Abstract:

Training of artificial neural networks (ANNs) using reinforcement learning (RL) techniques is being widely discussed in the robot learning literature. The high model complexity of ANNs along with the model-free nature of RL algorithms provides a desirable combination for many robotics applications. There is a huge need for algorithms that generalize using raw sensory inputs, such as vision, without any hand-engineered features or domain heuristics. In this paper, the standard control problem of line following robot was used as a test-bed, and an ANN controller for the robot was trained on images from a live video feed using Q-learning. A virtual agent was first trained in simulation environment and then deployed onto a robot’s hardware. The robot successfully learns to traverse a wide range of curves and displays excellent generalization ability. Qualitative analysis of the evolution of policies, performance and weights of the network provide insights into the nature and convergence of the learning algorithm.

Keywords: artificial neural networks, q-learning, reinforcement learning, robot learning

Procedia PDF Downloads 351
908 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 466