Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1278

Search results for: socially engineered attacks

948 Belonging in South Africa: Networks among African Immigrants and South African Natives

Authors: Efe Mary Isike

Abstract:

The variety of relationships between migrants and host communities is an enduring theme of migration studies. On one extreme, there are numerous examples of hostility towards ‘strangers’ who are either ejected from society or denied access to jobs, housing, education, healthcare and other aspects of normal life. More moderate treatments of those identified as different include expectations of assimilation in which host communities expect socially marginalized groups to conform to norms that they define. Both exclusion and assimilation attempt to manage the problem of difference by removing it. South Africa experienced great influx of African immigrants who worked in mines and farms under harsh and exploitative conditions before and after the institutionalization of apartheid. Although these labour migrants contributed a great deal to the economic development of South Africa, they were not given citizenship status. The formal democratization in 1994 came with dreams and expectations of a more inclusive South Africa, where black South Africans hoped to maximize their potential in a more free, fair and equal society. In the same vein, it also opened spaces for an influx of especially African immigrants into the country which set the stage for a new form of contest for belonging between South African citizens and African migrant settlers. One major manifestation of this contest was the violent xenophobic attacks against African immigrants which predate that of May 2008 and has continued with lower intensity across the country since then. While it is doubtless possible to find abundant evidence of antagonism in the relations between South Africans and African immigrants, the purpose of this study is to investigate the everyday realities of migrants in ordinary places who interact with a variety of people through their livelihood activities, marriages and social relationships, moving around towns and cities, in their residential areas, in faith-based organizations and other elements of everyday life. Rather than assuming all relations are hostile, this study intends to look at the breadth of everyday relationships within a specific context. Based on the foregoing, the main task of this study is to holistically examine and explain the nature of interactions between African migrants and South African citizens by analysing the social network ties that connect them in the specific case of Umhlathuze municipality. It will also investigate the variety of networks that exists between African migrants and South Africans and examine the nature of the linkages in the various networks identified between these two groups in Umhlathuze Municipality. Apart from a review of relevant literature, policies and other official documents, this paper will employ a purposive sample survey and in-depth interview of African immigrants and South Africans within their networks in selected suburbs in KwaZulu-Natal.

Keywords: migration, networks, development, host communities

Procedia PDF Downloads 264
947 RNA Interference Technology as a Veritable Tool for Crop Improvement and Breeding for Biotic Stress Resistance

Authors: M. Yusuf

Abstract:

The recent discovery of the phenomenon of RNA interference has led to its application in various aspects of plant improvement. Crops can be modified by engineering novel RNA interference pathways that create small RNA molecules to alter gene expression in crops or plant pests. RNA interference can generate new crop quality traits or provide protection against insects, nematodes and pathogens without introducing new proteins into food and feed products. This is an advantage in contrast with conventional procedures of gene transfer. RNA interference has been used to develop crop varieties resistant to diseases, pathogens and insects. Male sterility has been engineered in plants using RNA interference. Better quality crops have been developed through the application of RNA interference etc. The objective of this paper is to highlight the application of RNA interference in crop improvement and to project its potential future use to solve problems of agricultural production in relation to plant breeding.

Keywords: RNA interference, application, crop Improvement, agricultural production

Procedia PDF Downloads 404
946 Effects of an Inclusive Educational Model for Students with High Intellectual Capacity and Special Educational Needs: A Case Study in Talentos UdeC, Chile

Authors: Gracia V. Navarro, María C. González, María G. González, María V. González

Abstract:

In Chile, since 2002, there are extracurricular enrichment programs complementary to regular education for students with high intellectual capacity. This paper describes a model for the educational inclusion of students, with special educational needs associated with high intellectual capacity, developed at the University of Concepción and its effects on its students, academics and undergraduate students that collaborate with the program. The Talentos UdeC Program was created in 2003 and is intended for 240 children and youth from 11 to 18 years old, from 15 communes of the Biobio region. The case Talentos UdeC is analyzed from a mixed qualitative study in which those participating in the educational model are considered. The sample was composed of 30 students, 30 academics, and 30 undergraduate students. In the case of students, pre and post program measurements were made to analyze their socio-emotional adaptation, academic motivation and socially responsible behavior. The mentioned variables are measured through questionnaires designed and validated by the University of Concepcion that included: The Socially Responsible Behavior Questionnaire (CCSR); the Academic Motivation Questionnaire (CMA) and the Socio-Emotional Adaptation Questionnaire (CASE). The information obtained by these questionnaires was analyzed through a quantitative analysis. Academics and undergraduate students were interviewed to learn their perception of the effects of the program on themselves, on students and on society. The information obtained is analyzed using qualitative analysis based on the identification of common themes and descriptors for the construction of conceptual categories of answers. Quantitative results show differences in the first three variables analyzed in the students, after their participation for two years in Talentos UdeC. Qualitative results demonstrate perception of effects in the vision of world, project of life and in other areas of the students’ development; perception of effects in a personal, professional and organizational plane by academics and a perception of effects in their personal-social development and training in generic competencies by undergraduates students.

Keywords: educational model, high intellectual capacity, inclusion, special educational needs

Procedia PDF Downloads 197
945 A Vertical Grating Coupler with High Efficiency and Broadband Operation

Authors: Md. Asaduzzaman

Abstract:

A Silicon-on-insulator (SOI) perfectly vertical fibre-to-chip grating coupler is proposed and designed based on engineered subwavelength structures. The high directionality of the coupler is achieved by implementing step gratings to realize asymmetric diffraction and by applying effective index variation with auxiliary ultra-subwavelength gratings. The proposed structure is numerically analysed by using two-dimensional Finite Difference Time Domain (2D FDTD) method and achieves 96% (-0.2 dB) coupling efficiency and 39 nm 1-dB bandwidth. This highly efficient GC is necessary for applications where coupling efficiency between the optical fibre and nanophotonics waveguide is critically important, for instance, experiments of the quantum photonics integrated circuits. Such efficient and broadband perfectly vertical grating couplers are also significantly advantageous in highly dense photonic packaging.

Keywords: diffraction grating, FDTD, grating couplers, nanophotonic

Procedia PDF Downloads 54
944 The Tense Dichotomy Between Shari'ah Compliance and the Goals of an Economic Bank

Authors: Camille Paldi

Abstract:

The tense dichotomy between Shari’ah compliance and the economic goals of an Islamic Bank produces a proliferation of reverse engineered products, which are barely in compliance with Islamic law. The result is basically a hybrid conventional banking system with conventional products in Islamic disguise using Arabic and Islamic terminology. Many Islamic financial professionals and academics advocate for the use of conventional products and devices despite their non-Shari’ah compliance based on commercial necessity and the need to compete. However, this dangerous trend will lead to the demise of the Islamic finance industry. Rather than thoughtlessly following conventional products and practice, Islamic finance professionals should delve into the Shari’ah to find the answers to the current Islamic banking conundrum and lead the industry on the right path of developing Shari’ah based products and using Shari’ah devices to hedge risk.

Keywords: Islamic banking, Shari'ah, finance, investment

Procedia PDF Downloads 330
943 Detecting Hate Speech And Cyberbullying Using Natural Language Processing

Authors: Nádia Pereira, Paula Ferreira, Sofia Francisco, Sofia Oliveira, Sidclay Souza, Paula Paulino, Ana Margarida Veiga Simão

Abstract:

Social media has progressed into a platform for hate speech among its users, and thus, there is an increasing need to develop automatic detection classifiers of offense and conflicts to help decrease the prevalence of such incidents. Online communication can be used to intentionally harm someone, which is why such classifiers could be essential in social networks. A possible application of these classifiers is the automatic detection of cyberbullying. Even though identifying the aggressive language used in online interactions could be important to build cyberbullying datasets, there are other criteria that must be considered. Being able to capture the language, which is indicative of the intent to harm others in a specific context of online interaction is fundamental. Offense and hate speech may be the foundation of online conflicts, which have become commonly used in social media and are an emergent research focus in machine learning and natural language processing. This study presents two Portuguese language offense-related datasets which serve as examples for future research and extend the study of the topic. The first is similar to other offense detection related datasets and is entitled Aggressiveness dataset. The second is a novelty because of the use of the history of the interaction between users and is entitled the Conflicts/Attacks dataset. Both datasets were developed in different phases. Firstly, we performed a content analysis of verbal aggression witnessed by adolescents in situations of cyberbullying. Secondly, we computed frequency analyses from the previous phase to gather lexical and linguistic cues used to identify potentially aggressive conflicts and attacks which were posted on Twitter. Thirdly, thorough annotation of real tweets was performed byindependent postgraduate educational psychologists with experience in cyberbullying research. Lastly, we benchmarked these datasets with other machine learning classifiers.

Keywords: aggression, classifiers, cyberbullying, datasets, hate speech, machine learning

Procedia PDF Downloads 209
942 A Mixed Methodology of the Social and Spatial Fragmentation of the City of Beirut Leading to the Creation of Internal Boundaries

Authors: Hala Obeid

Abstract:

Among the cities that have been touched by hard events and have been experiencing this polemic of existence, one can quote Beirut. A city that defies and confronts itself for its own existence. Beirut materialized all the social complexity; it has also preserved the memory of a society that has been able to build and reflect a certain unique identity. In spite of its glory, Lebanon’s civil war has marked a turning point in Beirut’s history. It has caused many deaths and opposed religious communities. Once this civil war has ended, the reconstruction of the city center, however, saw the spatial exclusion of manual labor, small local commerce, and middle-class residences. The urban functions that characterized the pre-war center were removed, and the city’s spontaneous evolutions were replaced by a historical urban planning, which neglected the city’s memory and identity. The social and spatial fragmentation that has erupted since the war has led to a breakdown of spatial and social boundaries within the city. The aim of this study is to evaluate the impact of fragmentation and boundaries on the city of Beirut in spatial, social, religious and ethnic terms. The method used in this research is what we call the mixed method which is a combination between the quantitative method and the qualitative one. These two approaches, in this case, do not oppose but complement each other in order to study the city of Beirut physically and socially. The main purpose of the qualitative approach is to describe and analyze the social phenomenon of the fragmentation of the city; this method can be summarized by the field observation and study. While the quantitative approach is based on filling out questionnaires that leads to statistics analyzes. Together, these two approaches will mark the course of the research. As a result, Beirut is not only a divided city but is fragmented spatially into many fragments and socially into many groups. This fragmentation is creating immaterial boundaries between fragments and therefore between groups. These urban and social boundaries are specifically religious and ethnic limits. As a conclusion, one of the most important and discussed boundary in Beirut is a spatial and religious boundary called ‘the green line’ or the demarcation line, a true caesura within the city. It marks the opposition of two urban groups and the aggravated fragmentation between them. This line divided Beirut into two compartments: East Beirut (for Christians) and West Beirut (for Muslims). This green line has become an urban void that holds the past in suspension. Finally, to think of Beirut as an urban unit becomes an insoluble problem.

Keywords: Beirut, boundaries, fragmentation, identity

Procedia PDF Downloads 150
941 Functionalized Nanoparticles for Biomedical Applications

Authors: Temesgen Geremew

Abstract:

Functionalized nanoparticles have emerged as a revolutionary class of materials with immense potential in various biomedical applications. These engineered nanoparticles possess unique properties tailored to interact with biological systems, offering unprecedented opportunities in drug delivery, imaging, diagnostics, and therapy. This research delves into the design, synthesis, and characterization of functionalized nanoparticles for targeted biomedical applications. The primary focus lies on developing nanoparticles with precisely controlled size, surface chemistry, and biocompatibility for specific medical purposes. The research will also explore the crucial interaction of these nanoparticles with biological systems, encompassing cellular uptake, biodistribution, and potential toxicity evaluation. The successful development of functionalized nanoparticles holds the promise to revolutionize various aspects of healthcare. This research aspires to contribute significantly to this advancement by providing valuable insights into the design and application of these versatile materials within the ever-evolving field of biomedicine.

Keywords: nanoparticles, biomedicals, cancer, biocompatibility

Procedia PDF Downloads 46
940 Underwater Remotely Operated Vehicle (ROV) Exploration

Authors: M. S. Sukumar

Abstract:

Our objective is to develop a full-fledged system for exploring and studying nature of fossils and to extend this to underwater archaeology and mineral mapping. This includes aerial surveying, imaging techniques, artefact extraction and spectrum analysing techniques. These techniques help in regular monitoring of fossils and also the sensing system. The ROV was designed to complete several tasks which simulate collecting data and samples. Given the time constraints, the ROV was engineered for efficiency and speed in performing tasks. Its other major design consideration was modularity, allowing the team to distribute the building process, to easily test systems as they were completed and troubleshoot and replace systems as necessary. Our design itself had several challenges of on-board waterproofed sensor mounting, waterproofing of motors, ROV stability criteria, camera mounting and hydrophone sound acquisition.

Keywords: remotely operated vehicle (ROV) dragonair, underwater archaeology, full-fledged system, aerial imaging and detection

Procedia PDF Downloads 218
939 Settlement Performance of Granular Column Reinforced Soil

Authors: Muneerah Jeludin

Abstract:

The vibrated column has been widely used over the last three decades to improve the performance of soft ground and engineered compacted fill. The main reason for adopting this technique is that it is economically viable and environmental friendly. The performance of granular column with regards to bearing capacity has been well documented; however, information regarding the settlement behavior of granular columns is still limited. This paper aims to address the findings from a laboratory model study in terms of its settlement improvement. A 300 mm diameter and 400 mm high kaolin clay model was used in this investigation. Columns of various heights were installed in the clay bed using replacement method. The results in relation to load sharing mechanism between the column and surrounding clay just under the footing indicated that in short column, the available shaft resistance was not significant and introduces a potential for end braing failure as opposed to bulging failure in long columns. The settlement improvement factor corroborates well with field observations.

Keywords: ground improvement, model test, reinforced soil, foundation

Procedia PDF Downloads 250
938 Engineered Control of Bacterial Cell-to-Cell Signaling Using Cyclodextrin

Authors: Yuriko Takayama, Norihiro Kato

Abstract:

Quorum sensing (QS) is a cell-to-cell communication system in bacteria to regulate expression of target genes. In gram-negative bacteria, activation on QS is controlled by a concentration increase of N-acylhomoserine lactone (AHL), which can diffuse in and out of the cell. Effective control of QS is expected to avoid virulence factor production in infectious pathogens, biofilm formation, and antibiotic production because various cell functions in gram-negative bacteria are controlled by AHL-mediated QS. In this research, we applied cyclodextrins (CDs) as artificial hosts for the AHL signal to reduce the AHL concentration in the culture broth below its threshold for QS activation. The AHL-receptor complex induced under the high AHL concentration activates transcription of the QS-target gene. Accordingly, artificial reduction of the AHL concentration is one of the effective strategies to inhibit the QS. A hydrophobic cavity of the CD can interact with the acyl-chain of the AHL due to hydrophobic interaction in aqueous media. We studied N-hexanoylhomoserine lactone (C6HSL)-mediated QS in Serratia marcescens; accumulation of C6HSL is responsible for regulation of the expression of pig cluster. Inhibitory effects of added CDs on QS were demonstrated by determination of prodigiosin amount inside cells after reaching stationary phase, because production of prodigiosin depends on the C6HSL-mediated QS. By adding approximately 6 wt% hydroxypropyl-β-CD (HP-β-CD) in Luria-Bertani (LB) medium prior to inoculation of S. maecescens AS-1, the intracellularly accumulated prodigiosin was drastically reduced to 7-10%, which was determined after the extraction of prodigiosin in acidified ethanol. The AHL retention ability of HP-β-CD was also demonstrated by Chromobacterium violacuem CV026 bioassay. The CV026 strain is an AHL-synthase defective mutant that activates QS solely by adding AHLs from outside of cells. A purple pigment violacein is induced by activation of the AHL-mediated QS. We demonstrated that the violacein production was effectively suppressed when the C6HSL standard solution was spotted on a LB agar plate dispersing CV026 cells and HP-β-CD. Physico-chemical analysis was performed to study the affinity between the immobilized CD and added C6HSL using a quartz crystal microbalance (QCM) sensor. The COOH-terminated self-assembled monolayer was prepared on a gold electrode of 27-MHz AT-cut quartz crystal. Mono(6-deoxy-6-N, N-diethylamino)-β-CD was immobilized on the electrode using water-soluble carbodiimide. The C6HSL interaction with the β-CD cavity was studied by injecting the C6HSL solution to a cup-type sensor cell filled with buffer solution. A decrement of resonant frequency (ΔFs) clearly showed the effective C6HSL complexation with immobilized β-CD and its stability constant for MBP-SpnR-C6HSL complex was on the order of 102 M-1. The CD has high potential for engineered control of QS because it is safe for human use.

Keywords: acylhomoserine lactone, cyclodextrin, intracellular signaling, quorum sensing

Procedia PDF Downloads 220
937 Heavy Liquid Metal Coolant – the Key Safety Element in the Complex of New Nuclear Energy Technologies

Authors: A. Orlov, V. Rachkov

Abstract:

The future of Nuclear Energetics is seen in fast reactors with inherent safety working in the closed nuclear fuel cycle. The concept of inherent safety, which lies in deterministic elimination of the most severe accidents due to inherent properties of the reactor rather than through building up engineered barriers, is a cornerstone of success in ensuring safety and economic efficiency of future Nuclear Energetics. The focus of this paper is one of the key elements of inherent safety - the lead coolant of a nuclear reactor. Advantages of lead coolant for reactor application, influence on safety are reviewed. BREST-OD-300 fast reactor, currently being developed in Russia withing the “Proryv” Project utilizes lead coolant and a special set of measures and devices, called technology of lead coolant that ensures safe operation in a wide range of temperatures. Here these technological elements are reviewed, and current progress in their development is discussed.

Keywords: BREST-OD-300. , fast reactor, inherent safety, lead coolant

Procedia PDF Downloads 131
936 Urban Agriculture for Sustainable Cities: Using Wastewater and Urban Wetlands as Resource

Authors: Hussnain Mukhtar, Yu-Pin Lin

Abstract:

This paper deals with the concept of ecologically engineered system for sustainable agriculture production with the view of sustainable cities development. Sustainable cities offer numerous eco-services to its inhabitants, and where, among other issues, wastewater nutrients can be considered to be a valuable resource to be used for a sustainable enhancement of urban agriculture in wetlands. Existing cities can be transferred from being only consumer of food and other agriculture product into important resource conserving and sustainable generators of these products. The review provides the food production capacity through introduction of wastewater into urban wetlands, potential for nutrient recovery and ecological engineering intervention to reduce the risk of food contamination by pathogens. Finally, we discuss the potential nutrients accumulating in our cities, as an important aspect of sustainable urban development.

Keywords: ecological engineering, nutrient recovery, pathogens, urban agriculture, wetlands

Procedia PDF Downloads 241
935 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 122
934 Managing Multiple Change Projects in Supply Chains: A Case Study of a Moroccan Multi-Technical Services Company

Authors: Abdelouahab Errida, Bouchra Lotfi, Elalami Semma

Abstract:

In this paper, we try to address the topic of multiple change management by adopting an engineered research methodology, conducted within a Moroccan company during its implementation of several change projects that aim at improving its supply chain management performance. Firstly, we present the key concepts related to our research, namely change management, multiproject management and supply chain management. Then, we try to assess how the change management and multi-project management are applied in this company. Finally, we try to propose an approach that will help managers in dealing with multiple change projects. This approach proposes to integrate change management, project management and multi-project management for managing change projects according to three organizational levels: executive level, project portfolio level and change project level.

Keywords: change management, multi-project management, project management, change portfolio, supply chain management,

Procedia PDF Downloads 213
933 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 65
932 European Project Meter Matters in Sports: Fostering Criteria for Inclusion through Sport

Authors: Maria Campos, Alain Massart, Hugo Sarmento

Abstract:

The Meter Matters Erasmus Sport European Project (ID: 101050372) explores the field of social inclusion in and through sports with the aim of a) proposing appropriate criteria for co-funding sports programs involving people with intellectual and developmental disabilities and other more vulnerable people, primarily in mainstream sports organizations and b) proposing a model for co-funding social inclusion in and through sports at the national level. This European project (2022-2024) involves 6 partners from 3 countries: Univerza V Ljubljani – coordinator and Drustvo Specialna Olimpiada Slovenije (Slovenia); Magyar Specialis Olimpia Szovetseg and Magyar Testnevelesi Es Sporttudomanyi Egyetem (Hungary) and APPDA Coimbra - Associação Portuguesa para as Perturbações do Desenvolvimento e Autismo and Universidade De Coimbra, Faculty of Sport Sciences and Physical Education (Portugal). Equal involvement of all people in sports activities is, in terms of national and international guidelines, enshrined in some conventions and strategies in the field of sports, as well as human rights, social security, physical and mental health, architecture, environment and public administration. However, there is a gap between the practice and EU guidelines in terms of sustainable support for socially inclusive sports programs in the form of co-funding by state and local (municipal) resources. We observe considerable opacity in the regulation of the field. Given that there are both relevant programs and inclusive legislation and policies, we believe that the reason for the missing article is reflected in the undeveloped criteria for measuring social inclusion in sports. Major sports programs are usually co-funded based on crowds (number of involved athletes) and performance (sports score). In the field of social inclusion in sports, the criteria cannot be the same, as it is a smaller population. Therefore, the goals of inclusion in sports should not be the focused on competitive results but on opening equal opportunities for all, regardless of their psychophysical abilities. In the Meter Matters program, we are searching for criteria for co-funding social inclusion in sports through focus groups with coaches, social workers, psychologists and others professionals involved in inclusive sports programs in regular sports clubs and with athletes and their parents or guardians. Moreover, experts in the field of social inclusion in sports were also interviewed. Based on the proposals for measuring social inclusion in sports, we developed a model for co-funding socially inclusive sports programs.

Keywords: European project, meter matters, inclusion, sport

Procedia PDF Downloads 94
931 Urban Form, Heritage, and Disaster Prevention: What Do They Have in Common?

Authors: Milton Montejano Castillo, Tarsicio Pastrana Salcedo

Abstract:

Based on the hypothesis that disaster risk is constructed socially and historically, this article shows the importance of keeping alive the historical memory of disaster by means of architectural and urban heritage conservation. This is illustrated with three examples of Latin American World Heritage cities where disasters like floods and earthquakes have shaped urban form. Therefore, the study of urban form or ‘Urban Morphology’ is proposed as a tool to understand and analyze urban transformations with the documentation of the occurrence of disasters. Lessons learned from such cities may be useful to reduce disasters risk in contemporary built environments.

Keywords: conservation, disaster risk reduction, urban morphology, World Heritage

Procedia PDF Downloads 530
930 Characterization of Calcium-Signalling Mediated by Human GPR55 Expressed in HEK293 Cells

Authors: Yousuf M. Al Suleimani, Robin Hiley

Abstract:

The endogenous phospholipid lysophosphatidylinositol (LPI) was recently identified as a novel ligand for the G protein-coupled receptor 55 (GPR55) and an inducer of intracellular Ca2+ [Ca2+]i release. This study attempts to characterize Ca2+ signals provoked by LPI in HEK293 cells engineered to stably express human GPR55 and to test cannabinoid ligand activity at GPR55. The study shows that treatment with LPI stimulates a sustained, oscillatory Ca2+ release. The response is characterized by an initial rapid rise, which is mediated by the Gαq-PLC-IP3 pathway, and this is followed by prolonged oscillations that require RhoA activation. Ca2+ oscillations are initiated by intracellular mechanisms and extracellular Ca2+ is only required to replenish Ca2+ lost from the cytoplasm. Analysis of cannabinoid ligand activity at GPR55 revealed no clear effect of the endocannabinoid anandamide, however, rimonabant and the CB1 receptor antagonist AM251 evoked GPR55-mediated [Ca2+]i. Thus, LPI is likely to be a key plasma membrane mediator of signaling events and changes in gene expression through GPR55 activation.

Keywords: lysophosphatidylinositol, calcium, GPR55, cannabinoid

Procedia PDF Downloads 339
929 The Role of Tourism Industry in the Creation of Youth Employment Opportunities in Africa: A Case Study of Nigeria

Authors: Isiya Salihu Shinkafi

Abstract:

The focus of this paper is to elaborate on employment opportunities within the tourism sector and the solutions to youth unemployment in Africa and Nigeria in particular. Youth unemployment creates a monumental social problem to African continent, the world over and Nigeria in particular. The intelligence of this paper was collected from secondary sources using previews researches and analysis of scholars to gather empirical data. The findings revealed that unemployment in Africa and specifically Nigeria among youths were caused by certain factors which constitute a greater challenge to the economy and the existence of the continent. The tourism sector provides the enabling environment to address the different categories of unemployment among the youths. One of the unique characteristics of the tourism industry that makes it a prime sector from which employment can be engineered; especially in the case of the African countries, are its labour intensive characteristics of both experts, skilled, semi-skilled and unskilled labour.

Keywords: tourism industry, employment opportunities, youth employment

Procedia PDF Downloads 483
928 Unleashing the Power of Cerebrospinal System for a Better Computer Architecture

Authors: Lakshmi N. Reddi, Akanksha Varma Sagi

Abstract:

Studies on biomimetics are largely developed, deriving inspiration from natural processes in our objective world to develop novel technologies. Recent studies are diverse in nature, making their categorization quite challenging. Based on an exhaustive survey, we developed categorizations based on either the essential elements of nature - air, water, land, fire, and space, or on form/shape, functionality, and process. Such diverse studies as aircraft wings inspired by bird wings, a self-cleaning coating inspired by a lotus petal, wetsuits inspired by beaver fur, and search algorithms inspired by arboreal ant path networks lend themselves to these categorizations. Our categorizations of biomimetic studies allowed us to define a different dimension of biomimetics. This new dimension is not restricted to inspiration from the objective world. It is based on the premise that the biological processes observed in the objective world find their reflections in our human bodies in a variety of ways. For example, the lungs provide the most efficient example for liquid-gas phase exchange, the heart exemplifies a very efficient pumping and circulatory system, and the kidneys epitomize the most effective cleaning system. The main focus of this paper is to bring out the magnificence of the cerebro-spinal system (CSS) insofar as it relates to our current computer architecture. In particular, the paper uses four key measures to analyze the differences between CSS and human- engineered computational systems. These are adaptability, sustainability, energy efficiency, and resilience. We found that the cerebrospinal system reveals some important challenges in the development and evolution of our current computer architectures. In particular, the myriad ways in which the CSS is integrated with other systems/processes (circulatory, respiration, etc) offer useful insights on how the human-engineered computational systems could be made more sustainable, energy-efficient, resilient, and adaptable. In our paper, we highlight the energy consumption differences between CSS and our current computational designs. Apart from the obvious differences in materials used between the two, the systemic nature of how CSS functions provides clues to enhance life-cycles of our current computational systems. The rapid formation and changes in the physiology of dendritic spines and their synaptic plasticity causing memory changes (ex., long-term potentiation and long-term depression) allowed us to formulate differences in the adaptability and resilience of CSS. In addition, the CSS is sustained by integrative functions of various organs, and its robustness comes from its interdependence with the circulatory system. The paper documents and analyzes quantifiable differences between the two in terms of the four measures. Our analyses point out the possibilities in the development of computational systems that are more adaptable, sustainable, energy efficient, and resilient. It concludes with the potential approaches for technological advancement through creation of more interconnected and interdependent systems to replicate the effective operation of cerebro-spinal system.

Keywords: cerebrospinal system, computer architecture, adaptability, sustainability, resilience, energy efficiency

Procedia PDF Downloads 73
927 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India

Authors: Sumanta Meher, Gaurav Shukla

Abstract:

The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.

Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India

Procedia PDF Downloads 149
926 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 384
925 Bridging the Gap and Widening the Divide

Authors: Lerato Dixon, Thorsten Chmura

Abstract:

This paper explores whether ethnic identity in Zimbabwe leads to discriminatory behaviour and the degree to which a norm-based intervention can shift this discriminatory behaviour. Social Identity Theory suggests that group identity can lead to favouritism towards the in-group and discriminatory behaviour towards the out-group. Agents yield higher utility from maintaining positive self-esteem by confirming with group behaviour. This paper focuses on the two majority ethnic groups in Zimbabwe – the Ndebele and Shona. Racial identities are synonymous with the language spoken. Zimbabwe’s history highlights how identity formation took place. As following independence, political parties became recognised as either Ndebele or Shona-speaking. It is against this backdrop that this study investigates the degree to which norm-based nudge can alter behaviour. This paper uses experimental methods to analyse discriminatory behaviour between two naturally occurring ethnic groups in Zimbabwe. In addition, we investigate if social norm-based interventions can shift discriminatory behaviour to understand if the divide between these two identity groups can be further divided or healed. Participants are randomly assigned into three groups to receive information regarding a social norm. We compare the effect of a proscriptive social norm-based intervention, stating what shouldn't be done and prescriptive social norms as interventions, stating what should be done. Specifically, participants are either shown the socially appropriate (Heal) norm, the socially inappropriateness (Divide) norm regarding interethnic marriages or no norm-based intervention. Following the random assignment into intervention groups, participants take part in the Trust Game. We conjecture that discrimination will shift in accordance with the prevailing social norm. Instead, we find evidence of interethnic discriminatory behaviour. We also find that trust increases when interacting with Ndebele, Shona and Zimbabwean participants following the Heal intervention. However, if the participant is Shona, the Heal intervention decreases trust toward in-groups and Zimbabwean co-players. On the other hand, if the participant is Shona, the Divide treatment significantly increases trust toward Ndebele participants. In summary, we find evidence that norm-based interventions significantly change behaviour. However, the prescriptive norm-based intervention (Heal) decreases trust toward the in-group, out-group and national identity group if the participant is Shona – therefore having an adverse effect. In contrast, the proscriptive Divide treatment increases trust if the participant is Shona towards Ndebele co-players. We conclude that norm-based interventions have a ‘rebound’ effect by altering behaviour in the opposite direction.

Keywords: discrimination, social identity, social norm-based intervention, zimbabwe

Procedia PDF Downloads 234
924 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 385
923 Designing Active Sites on Amicyanin Using Histidine S Plus Cobalt, and Measuring Their Functional Activity

Authors: Han-Bin Kim, Sooim Shin, Moonsung Choi

Abstract:

There is a growing interest in introducing a desired functional group on enzymes in the field of protein engineering. In here, various redox centers were newly created using histidine tag, which is widely used for protein purification, plus cobalt in one of cupredoxins, amicyanin. The coordination of Cobalt-His tag and reactivity of the Co²⁺ loaded His-tag also were characterized. 3xHis-tag, 6xHis-tag, and 9xHis-tag were introduced on amicyanin by site-directed mutagenesis, and then Co²⁺ was loaded on each His-tagged amicyanin. The spectral changes at 330 nm corresponding to cobalt binding on His-tag site indicated the binding ratio of 3xHis-tag, 6xHis-tag, and 9xHis-tag to cobalt as 1:1, 1:2, 1:3 respectively. Based on kinetic studies of binding cobalt to 3xHis-tag, 6xHis-tag, and 9xHis-tagged amicyanin, the nature of the sites was elucidated. In addition, internal electron transfer properties between Cu¹⁺ site and engineered site of amicyanin were determined. These results provide insight into improvement of metal coordination and alternation of the redox properties of metal as a new catalytic site on proteins.

Keywords: amicyanin, cobalt, histidine, protein engineering

Procedia PDF Downloads 148
922 Impact of Pandemics on Cities and Societies

Authors: Deepak Jugran

Abstract:

Purpose: The purpose of this study is to identify how past Pandemics shaped social evolution and cities. Methodology: A historical and comparative analysis of major historical pandemics in human history their origin, transmission route, biological response and the aftereffects. A Comprehensive pre & post pandemic scenario and focuses selectively on major issues and pandemics that have deepest & lasting impact on society with available secondary data. Results: Past pandemics shaped the behavior of human societies and their cities and made them more resilient biologically, intellectually & socially endorsing the theory of “Survival of the fittest” by Sir Charles Darwin. Pandemics & Infectious diseases are here to stay and as a human society, we need to strengthen our collective response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, & especially animals who become carriers for these viruses. Conclusion: Pandemics always resulted in great mortality, but they also improved the overall individual human immunology & collective social response; at the same time, they also improved the public health system of cities, health delivery systems, water, sewage distribution system, institutionalized various welfare reforms and overall collective social response by the societies. It made human beings more resilient biologically, intellectually, and socially hence endorsing the theory of “AGIL” by Prof Talcott Parsons. Pandemics & infectious diseases are here to stay and as humans, we need to strengthen our city response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, especially animals who always acted as carriers for these novel viruses. Pandemics over the years acted like natural storms, mitigated the prevailing social imbalances and laid the foundation for scientific discoveries. We understand that post-Covid-19, institutionalized city, state and national mechanisms will get strengthened and the recommendations issued by the various expert groups which were ignored earlier will now be implemented for reliable anticipation, better preparedness & help to minimize the impact of Pandemics. Our analysis does not intend to present chronological findings of pandemics but rather focuses selectively on major pandemics in history, their causes and how they wiped out an entire city’s population and influenced the societies, their behavior and facilitated social evolution.

Keywords: pandemics, Covid-19, social evolution, cities

Procedia PDF Downloads 93
921 Anticandidal and Antibacterial Silver and Silver(Core)-Gold(Shell) Bimetallic Nanoparticles by Fusarium graminearum

Authors: Dipali Nagaonkar, Mahendra Rai

Abstract:

Nanotechnology has experienced significant developments in engineered nanomaterials in the core-shell arrangement. Nanomaterials having nanolayers of silver and gold are of primary interest due to their wide applications in catalytical and biomedical fields. Further, mycosynthesis of nanoparticles has been proved as a sustainable synthetic approach of nanobiotechnology. In this context, we have synthesized silver and silver (core)-gold (shell) bimetallic nanoparticles using a fungal extract of Fusarium graminearum by sequential reduction. The core-shell deposition of nanoparticles was confirmed by the red shift in the surface plasmon resonance from 434 nm to 530 nm with the aid of the UV-Visible spectrophotometer. The mean particle size of Ag and Ag-Au nanoparticles was confirmed by nanoparticle tracking analysis as 37 nm and 50 nm respectively. Quite polydispersed and spherical nanoparticles are evident by TEM analysis. These mycosynthesized bimetallic nanoparticles were tested against some pathogenic bacteria and Candida sp. The antimicrobial analysis confirmed enhanced anticandidal and antibacterial potential of bimetallic nanoparticles over their monometallic counterparts.

Keywords: bimetallic nanoparticles, core-shell arrangement, mycosynthesis, sequential reduction

Procedia PDF Downloads 553
920 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 304
919 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 124