Search results for: privacy concerns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2274

Search results for: privacy concerns

1914 Architecture for Hearing Impaired: A Study on Conducive Learning Environments for Deaf Children with Reference to Sri Lanka

Authors: Champa Gunawardana, Anishka Hettiarachchi

Abstract:

Conducive Architecture for learning environments is an area of interest for many scholars around the world. Loss of sense of hearing leads to the assumption that deaf students are visual learners. Comprehending favorable non-hearing attributes of architecture can lead to effective, rich and friendly learning environments for hearing impaired. The objective of the current qualitative investigation is to explore the nature and parameters of a sense of place of deaf children to support optimal learning. The investigation was conducted with hearing-impaired children (age: between 8-19, Gender: 15 male and 15 female) of Yashodhara deaf and blind school at Balangoda, Sri Lanka. A sensory ethnography study was adopted to identify the nature of perception and the parameters of most preferred and least preferred spaces of the learning environment. The common perceptions behind most preferred places in the learning environment were found as being calm and quiet, sense of freedom, volumes characterized by openness and spaciousness, sense of safety, wide spaces, privacy and belongingness, less crowded, undisturbed, availability of natural light and ventilation, sense of comfort and the view of green colour in the surroundings. On the other hand, the least preferred spaces were found to be perceived as dark, gloomy, warm, crowded, lack of freedom, smells (bad), unsafe and having glare. Perception of space by deaf considering the hierarchy of sensory modalities involved was identified as; light - color perception (34 %), sight - visual perception (32%), touch - haptic perception (26%), smell - olfactory perception (7%) and sound – auditory perception (1%) respectively. Sense of freedom (32%) and sense of comfort (23%) were the predominant psychological parameters leading to an optimal sense of place perceived by hearing impaired. Privacy (16%), rhythm (14%), belonging (9%) and safety (6%) were found as secondary factors. Open and wide flowing spaces without visual barriers, transparent doors and windows or open port holes to ease their communication, comfortable volumes, naturally ventilated spaces, natural lighting or diffused artificial lighting conditions without glare, sloping walkways, wider stairways, walkways and corridors with ample distance for signing were identified as positive characteristics of the learning environment investigated.

Keywords: deaf, visual learning environment, perception, sensory ethnography

Procedia PDF Downloads 230
1913 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 19
1912 Net Regularity and Its Ethical Implications on Internet Stake Holders

Authors: Nourhan Elshenawi

Abstract:

Net Neutrality (NN) is the principle of treating all online data the same without any prioritization of some over others. A research gap in current scholarship about “violations of NN” and the subsequent ethical concerns paves the way for the following research question: To what extent violations of NN entail ethical concerns and implications for Internet stakeholders? To answer this question, NR is examined using the two major action-based ethical theories, Kantian and Utilitarian, across the relevant Internet stakeholders. First some necessary IT background is provided that shapes how the Internet works and who the key stakeholders are. Following the IT background, the relationship between the stakeholders, users, Internet Service Providers (ISPs) and content providers is discussed and illustrated. Then some violations of NN that are currently occurring is covered, without attracting any attention from the general public from an ethical perspective, as a new term Net Regularity (NR). Afterwards, the current scholarship on NN and its violations are discussed, that are mainly from an economic and sociopolitical perspectives to highlight the lack of ethical discussions on the issue. Before moving on to the ethical analysis however, websites are presented as digital entities that are affected by NR and their happiness is measured using functionalism. The analysis concludes that NR is prone to an unethical treatment of Internet stakeholders in the perspective of both theories. Finally, the current Digital Divide in the world is presented to be able to better illustrate the implications of NR. The implications present the new Internet divide that will take place between individuals within society. Through answering the research question using ethical analysis, it attempts to shed some light on the issue of NR and what kind of society it would lead to. NR would not just lead to a divided society, but divided individuals that are separated by something greater than distance, the Internet.

Keywords: digital divide, digital entities, digital ontology, internet ethics, internet law, net neutrality, internet service providers, websites as beings

Procedia PDF Downloads 274
1911 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 443
1910 Revisiting Ecotourism Development Strategy of Cuc Phuong National Park in Vietnam: Considering Residents’ Perception and Attitudes

Authors: Bui Duc Sinh

Abstract:

Ecotourism in national parks seemed to be one of the options in the conservation of the natural resources and to improve the living condition of local communities. However, ecotourism development will be useless if it lacks the perception and support of local communities and appropriate ecotourism strategies. The aims of this study were to measure residents’ perception and satisfaction towards ecotourism impacts and their attitudes for ecotourism development in Cuc Phuong National Park; to assess the current ecotourism strategies based on ecotourism criteria and then to provide recommendations on ecotourism development strategies. The primary data were collected through personal observations, in-depth interviews with residents and national park staffs, and from surveys on households in all of the five communes in the Cuc Phuong National Park. The results depicted that local communities were aware of ecotourism impacts and had positive attitudes toward ecotourism development, and were satisfied of ecotourism development. However, higher perception rate was found on specific groups such as the young, the high income and educated, and those with jobs related to ecotourism. The study revealed the issues of concerns about the current ecotourism development strategies in Cuc Phuong National Park. The major hindrances for ecotourism development were lack of local participation and unattractive ecotourism services. It was also suggested that Cuc Phuong National Park should use ecotourism criteria to implement ecotourism activities sustainably and to harmonize the sharing of benefits amongst the stakeholders. The approaches proposed were to: create local employment through reengineering, improve the ecotourism quality, appropriate tourism benefits to the stakeholders, and carry out education and training programs. Furthermore, the results of the study helped tour operators and tourism promoters aware the real concerns, issues on current ecotourism activities in Cuc Phuong National Park.

Keywords: ecotourism, ecotourism impact, local community, national park

Procedia PDF Downloads 339
1909 Big Data Strategy for Telco: Network Transformation

Authors: F. Amin, S. Feizi

Abstract:

Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.

Keywords: big data, next generation networks, network transformation, strategy

Procedia PDF Downloads 360
1908 Partnering With Key Stakeholders for Successful Implementation of Inhaled Analgesia for Specific Emergency Department Presentations

Authors: Sarah Hazelwood, Janice Hay

Abstract:

Methoxyflurane is an inhaled analgesic administered via a disposable inhaler, which has been used in Australia for 40 years for the management of pain in children & adults. However, there is a lack of data for methoxyflurane as a frontline analgesic medication within the emergency department (ED). This study will investigate the usefulness of methoxyflurane in a private inner-city ED. The study concluded that the inclusion of all key stakeholders in the prescribing, administering & use of this new process led to comprehensive uptake & vastly positive outcomes for consumer & health professionals. Method: A 12-week prospective pilot study was completed utilizing patients presenting to the ED in pain (numeric pain rating score > 4) that fit the requirement of methoxyflurane use (as outlined in the Australian Prescriber information package). Nurses completed a formatted spreadsheet for each interaction where methoxyflurane was used. Patient demographics, day, time, initial numeric pain score, analgesic response time, the reason for use, staff concern (free text), & patient feedback (free text), & discharge time was documented. When clinical concern was raised, the researcher retrieved & reviewed patient notes. Results: 140 methoxyflurane inhalers were used. 60% of patients were 31 years of age & over (n=82) with 16% aged 70+. The gender split; 51% male: 49% female. Trauma-related pain (57%) saw the highest use of administration, with the evening hours (1500-2259) seeing the greatest numbers used (39%). Tuesday, Thursday & Sunday shared the highest daily use throughout the study. A minimum numerical pain score of 4/10 (n=13, 9%), with the ranges of 5 - 7/10 (moderate pain) being given by almost 50% of patients. Only 3 instances of pain scores increased post use of methoxyflurane (all other entries showed pain score < initial rating). Patients & staff noted obvious analgesic response within 3 minutes (n= 96, 81%, of administration). Nurses documented a change in patient vital signs for 4 of the 15 patient-related concerns; the remaining concerns were due to “gagging” on the taste, or “having a coughing episode”; one patient tried to leave the department before the procedure was attended (very euphoric state). Upon review of the staff concerns – no adverse events occurred & return to therapeutic vitals occurred within 10 minutes. Length of stay for patients was compared with similar presentations (such as dislocated shoulder or ankle fracture) & saw an average 40-minute decrease in time to discharge. Methoxyflurane treatment was rated “positively” by > 80% of patients – with remaining feedback related to mild & transient concerns. Staff similarly noted a positive response to methoxyflurane as an analgesic & as an added tool for frontline analgesic purposes. Conclusion: Methoxyflurane should be used on suitable patient presentations requiring immediate, short term pain relief. As a highly portable, non-narcotic avenue to treat pain this study showed obvious therapeutic benefit, positive feedback, & a shorter length of stay in the ED. By partnering with key stake holders, this study determined methoxyflurane use decreased work load, decreased wait time to analgesia, and increased patient satisfaction.

Keywords: analgesia, benefits, emergency, methoxyflurane

Procedia PDF Downloads 123
1907 Adjusting Mind and Heart to Ovarian Cancer: Correlational Study on Italian Women

Authors: Chiara Cosentino, Carlo Pruneti, Carla Merisio, Domenico Sgromo

Abstract:

Introduction – Psychoneuroimmunology as approach clearly showed how psychological features can influence health through specific physiological pathways linked to the stress reaction. This can be true also in cancer, in its latter conceptualization seen as a chronic disease. Therefore, it is still not clear how the psychological features can combine with a physiological specific path, for a better adjustment to cancer. The aim of this study is identifying how in Italian survivors, perceived social support, body image, coping and quality of life correlate with or influence Heart Rate Variability (HRV), the physiological parameter that can mirror a condition of chronic stress or a good relaxing capability. Method - The study had an exploratory transversal design. The final sample was made of 38 ovarian cancer survivors aged from 29 to 80 (M= 56,08; SD=12,76) following a program for Ovarian Cancer at the Oncological Clinic, University Hospital of Parma, Italy. Participants were asked to fill: Multidimensional Scale of Perceived Social Support (MSPSS); Derridford Appearance Scale-59 (DAS-59); Mental Adjustment to Cancer (MAC); Quality of Life Questionnaire (EORTC). For each participant was recorded Short-Term HRV (5 minutes) using emWavePro. Results– Data showed many interesting correlations within the psychological features. EORTC scores have a significant correlation with DAS-59 (r =-.327 p <.05), MSPSS (r =.411 p<.05), and MAC scores, in particular with the strategy Fatalism (r =.364 p<.05). A good social support improves HRV (F(1,33)= 4.27 p<.05). Perceiving themselves as effective in their environment, preserving a good role functioning (EORTC), positively affects HRV (F(1,33)=9.810 p<.001). Women admitting concerns towards body image seem prone to emotive disclosure, reducing emotional distress and improving HRV (β=.453); emotional avoidance worsens HRV (β=-.391). Discussion and conclusion - Results showed a strong relationship between body image and Quality of Life. These data suggest that higher concerns on body image, in particular, the negative self-concept linked to appearance, was linked to the worst functioning in everyday life. The relation between the negative self-concept and a reduction in emotional functioning is understandable in terms of possible distress deriving from the perception of body appearance. The relationship between a high perceived social support and a better functioning in everyday life was also confirmed. In this sample fatalism, was associated with a better physical, role and emotional functioning. In these women, the presence of a good support may activate the physiological Social Engagement System improving their HRV. Perceiving themselves effective in their environment, preserving a good role functioning, also positively affects HRV, probably following the same physiological pathway. A higher presence of concerns about appearance contributes to a higher HRV. Probably women admitting more body concerns are prone to a better emotive disclosure. This could reduce emotional distress improving HRV and global health. This study reached preliminary demonstration of an ‘Integrated Model of Defense’ in these cancer survivors. In these model, psychological features interact building a better quality of life and a condition of psychological well-being that is associated and influence HRV, then the physiological condition.

Keywords: cancer survivors, heart rate variability, ovarian cancer, psychophysiological adjustment

Procedia PDF Downloads 188
1906 Analysis on South Korean Early Childhood Education Teachers’ Stage of Concerns about Software Education According to the Concern-Based Adoption Model

Authors: Sun-Mi Park, Ji-Hyun Jung, Min-Jung Kang

Abstract:

Software (SW) education is scheduled to be included in the National curriculum in South Korea by 2018. However, Korean national kindergarten curriculum has been excepted from the revision of the entire Korean national school curriculum including software education. Even though the SW education has not been considered a part of current national kindergarten curriculum, there is a growing interest of adopting software education into the ECE practice. Teachers might be a key element in introducing and implementing new educational change such as SW education. In preparation for the adoption of SW education in ECE, it might be necessary to figure out ECE teachers’ perception and attitudes toward early childhood software education. For this study, 219 ECE teachers’ concern level in SW education was surveyed by using the Stages of Concern Questionnaire (SoCQ). As a result, the teachers' concern level in SW education is the highest at stage 0-Unconcerned and is high level in stage 1-informational, stage 2-personal, and stage 3-management concern. Thus, a non-user pattern was mostly indicated. However, compared to a typical non-user pattern, the personal and informative concern level is slightly high. The 'tailing up' phenomenon toward stage 6-refocusing was shown. Therefore, the pattern aspect close to critical non-user ever appeared to some extent. In addition, a significant difference in concern level was shown at all stages depending on the awareness of necessity. Teachers with SW training experience showed higher intensity only at stage 0. There was statistically significant difference in stage 0 and 6 depending on the future implementation decision. These results will be utilized as a resource in building ECE teachers’ support system according to his or her concern level of SW education.

Keywords: concerns-based adoption model (CBAM), early childhood education teachers, software education, Stages of Concern (SoC)

Procedia PDF Downloads 207
1905 Qualitative Inquiry on Existential Concerns and Well-Being among the Youth of Higher Education Institutions in Ethiopia: Case Study of Addis Ababa University

Authors: Ezgiamn Abraha Hagos

Abstract:

Higher education is important for college students to develop their authentic identity by means of getting exposure to diverse ideas and experiences. However, current college students are not successfully achieving a satisfying sense of meaning and purpose in their lives, which often places them in a state of existential vacuum. Thus, this study uncovers the existential concerns of youth in higher education by means of assessing their view on meaningful life and integration of it as a guide into their lives and challenges faced in doing so. Data were procured from thirty undergraduate students of Addis Ababa University, Ethiopia via interview, naïve sketch method, and content analysis of selected magazines and newspapers. Data were analyzed using organization, immersion, generating themes, coding, offering interpretation as well as checking the data. Relationship, education, and belief were found to be main sources of meaning. But, many of the study participants failed to articulate their meaning in life explicitly and identified to be in a state of drifting. Moreover, hopelessness, economic problems and quality of training impinge their sense of meaning in life negatively. The content analysis principally embodied the youth in higher education as a group of people confronted with rafts of challenges such as debauchery, moral crisis, self-destructive behaviors and hankering for support and direction. Thus, crafting the asset-based approach and counseling services that will prepare the youth for the future and develop holistically in terms of body and mind are tremendously vital.

Keywords: higher education institutions; meaning in life; youth

Procedia PDF Downloads 109
1904 The Study of Implications on Modern Businesses Performances by Digital Communities: Case of Data Leak

Authors: Asim Majeed, Anwar Ul Haq, Ayesha Asim, Mike Lloyd-Williams, Arshad Jamal, Usman Butt

Abstract:

This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.

Keywords: Digital, communities, performance, dissemination, implications, data, exploitation

Procedia PDF Downloads 402
1903 A Descriptive Study on Micro Living and Its Importance over Large Houses by Understanding Various Scenarios and Case Studies

Authors: Belal Neazi

Abstract:

'Larger Houses Consume More Resources’ – both in construction and during operation. The most important aspect of smaller homes is that it uses less electricity and fuel for construction and maintenance. Here, an urban interpretation of the contemporary minimal existence movement is explained. In an attempt to restrict urban decay and to encourage inner-city renewal, the Tiny House principles are interpreted as alternative ways of dwelling in urban neighbourhoods. These tiny houses are usually pretty different from each other in interior planning, but almost similar in size. The disadvantage of large homes came up when people were asked to vacate as they were not able to pay the massive amount of mortgages. This made them reconsider their housing situation and discover the ideas of minimalism and the general rising inclination in environmental awareness that serve as the basis for the tiny house movement. One of the largest benefits of inhabiting a tiny house is the decrease in carbon footprint. Also, to increase social behaviour and freedom. It’s better for the environmental concern, financial concerns, and desire for more time and freedom. Examples of the tiny house village which are sustaining homeless population and the use of different reclaimed materials for the construction of these tiny houses are explained in the paper. It is proposed in the paper, that these houses will reflect the diversity while proposing an alternative model for the rehabilitation of decaying row-homes and the renewal of fading communities. The core objective is to design small or micro spaces for the economically backward people of the place and increase their social behaviour and freedom. Also, it’s better for the environmental concern, financial concerns, and desire for more time and freedom.

Keywords: city renewal, environmental concern, micro-living, tiny house

Procedia PDF Downloads 182
1902 Revolutionizing Accounting: Unleashing the Power of Artificial Intelligence

Authors: Sogand Barghi

Abstract:

The integration of artificial intelligence (AI) in accounting practices is reshaping the landscape of financial management. This paper explores the innovative applications of AI in the realm of accounting, emphasizing its transformative impact on efficiency, accuracy, decision-making, and financial insights. By harnessing AI's capabilities in data analysis, pattern recognition, and automation, accounting professionals can redefine their roles, elevate strategic decision-making, and unlock unparalleled value for businesses. This paper delves into AI-driven solutions such as automated data entry, fraud detection, predictive analytics, and intelligent financial reporting, highlighting their potential to revolutionize the accounting profession. Artificial intelligence has swiftly emerged as a game-changer across industries, and accounting is no exception. This paper seeks to illuminate the profound ways in which AI is reshaping accounting practices, transcending conventional boundaries, and propelling the profession toward a new era of efficiency and insight-driven decision-making. One of the most impactful applications of AI in accounting is automation. Tasks that were once labor-intensive and time-consuming, such as data entry and reconciliation, can now be streamlined through AI-driven algorithms. This not only reduces the risk of errors but also allows accountants to allocate their valuable time to more strategic and analytical tasks. AI's ability to analyze vast amounts of data in real time enables it to detect irregularities and anomalies that might go unnoticed by traditional methods. Fraud detection algorithms can continuously monitor financial transactions, flagging any suspicious patterns and thereby bolstering financial security. AI-driven predictive analytics can forecast future financial trends based on historical data and market variables. This empowers organizations to make informed decisions, optimize resource allocation, and develop proactive strategies that enhance profitability and sustainability. Traditional financial reporting often involves extensive manual effort and data manipulation. With AI, reporting becomes more intelligent and intuitive. Automated report generation not only saves time but also ensures accuracy and consistency in financial statements. While the potential benefits of AI in accounting are undeniable, there are challenges to address. Data privacy and security concerns, the need for continuous learning to keep up with evolving AI technologies, and potential biases within algorithms demand careful attention. The convergence of AI and accounting marks a pivotal juncture in the evolution of financial management. By harnessing the capabilities of AI, accounting professionals can transcend routine tasks, becoming strategic advisors and data-driven decision-makers. The applications discussed in this paper underline the transformative power of AI, setting the stage for an accounting landscape that is smarter, more efficient, and more insightful than ever before. The future of accounting is here, and it's driven by artificial intelligence.

Keywords: artificial intelligence, accounting, automation, predictive analytics, financial reporting

Procedia PDF Downloads 71
1901 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 540
1900 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 152
1899 Analysis of Municipal Solid Waste Management in Nigeria

Authors: Anisa Gumel

Abstract:

This study examines the present condition of solid waste management in Nigeria. The author explores the challenges and opportunities affecting municipal solid waste management in "Nigeria" and determines the most profound challenges by analysing the interdependence and interrelationship among identified variables. In this study, multiple stakeholders, including 15 waste management professionals interviewed online, were utilised to identify the difficulties and opportunities affecting municipal solid waste in Nigeria. The interviews were transcribed and coded using NVivo to produce pertinent variables. An online survey of Nigerian internet and social media users was done to validate statements made by experts on the identified variable. In addition, a panel of five experts participated in a focus group discussion to discover the most influential factors that influence municipal solid waste management in Nigeria by analysing the interrelationships as well as the driving and reliant power of variables. The results show significant factors affecting municipal solid waste in Nigeria, including inadequate funding, lack of knowledge, and absence of legislation, as well as behavioural, financial, technological, and legal concerns grouped into five categories. Some claims stated by experts in the interview are supported by the survey data, while others are not. In addition, the focus group reveals patterns, correlations, and driving forces between variables that have been analysed. This study will provide decision-makers with a roadmap for resolving important waste management concerns in Nigeria and managing scarce resources effectively. It will also help non-governmental organisations combat malaria in Nigeria and other underdeveloped nations. In addition, the work contributes to the literature for future scholars to consult.

Keywords: municipal solid waste, stakeholders, public, experts

Procedia PDF Downloads 80
1898 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 100
1897 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 153
1896 Phase Changing Dicationic Polymeric Ionic Liquid with CO2 Capture Abilities

Authors: Swati Sundararajan, Asit B. Samui, Prashant S. Kulkarni

Abstract:

Polymeric ionic liquids combine the properties of ionic liquids and polymers into a single material which has gained massive interest in the recent years. These ionic liquids offer several advantages such as high phase change enthalpy, wide temperature range, chemical and thermal stability, non-volatility and the ability to make them task-specific. Separation of CO2 is an area of critical importance due to the concerns over greenhouse gasses leading to global warming. Thermal energy storage materials, also known as phase change materials absorb latent heat during fusion process and release the absorbed energy to the surrounding environment during crystallization. These materials retain this property over a number of cycles and therefore, are useful for bridging the gap between energy requirement and use. In an effort to develop materials, which will help in minimizing the growing energy demand and environmental concerns, a series of dicationic poly(ethylene glycol) based polymeric ionic liquids were synthesized. One part of an acrylate of poly(ethylene glycol) was reacted with imidazolium quarternizing agent and the second part was reacted with triazolium quarternizing agent. These two different monomers were then copolymerized to prepare dicationic polymeric ionic liquid. These materials were characterized for solid-liquid phase transition and the enthalpy by using differential scanning calorimetry. The CO2 capture studies were performed on a fabricated setup with varying pressure range from 1-20 atm. The findings regarding the prepared materials, having potential dual applications in the fields of thermal energy storage and CO2 capture, will be discussed in the presentation.

Keywords: CO2 capture, phase change materials, polyethylene glycol, polymeric ionic liquids, thermal energy storage

Procedia PDF Downloads 254
1895 A New Source on Ottoman Self-Narratives: Kulakzade Mahmud Pasha’s Dream Diary

Authors: Semra Çörekçi̇

Abstract:

In this study, a new source on Ottoman Self-narratives, Kulakzâde Mahmud Paşa’s Düşname (Dreambook), will be introduced to illustrate how dreams can provide a ground for historical analysis. The manuscript looks like a private notebook of an Ottoman official, Mahmud Pasha, who lived and operated in Rumelia in the early eighteenth century. It provides insight into the ordinary and daily concerns of a bureaucrat who had the knowledge and tools to record them in writing. On the one side of the notebook, Mahmud Pasha recorded his travels and appointments in 1730-1731. He wrote places that he reached and stayed every day. On the reverse side, the same author kept a record of his dreams and named that part of his notebook, Düşname. He recorded his dreams on a daily basis in writing and therefore they were well-preserved in a dream diary. This study aims at drawing the social, cultural and psychic life of an early modern Ottoman bureaucrat. It will uncover the ways and means whereby he interpreted his environment, as well as how he made meaning of his dreams considering the social milieu and historical context within which he lived. The first part will focus on 'official dreams' uncovering how his official life and ambitions coincide with his spiritual life. Related to this, connection between anxiety and dream narratives will be evaluated as dreams in which the mundane concerns of securing a post occupied the most central place in the construction of his narrative. A further point will be made by questioning Mahmud Pasha’s possible Sufi connections and his familiarity with the tradition of dream interpretation. Also, considering Mahmud Pasha’s inclusion of other’s dreams in his Düşnâme, the issue of dream-telling will be questioned in order to reveal how dreams were interconnected and how they created a space for social gathering.

Keywords: Ottoman self-narratives, dreams, diary, Ottoman cultural history

Procedia PDF Downloads 250
1894 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 484
1893 An Engineering Review of Grouting in Soil Improvement Applications

Authors: Mohamad Kazem Zamani, Meldi Suhatril

Abstract:

Soil improvement is one of the main concerns of each civil engineer who is working at soil mechanics and geotechnics. Grouting has been used as a powerful treatment for soil improving. In this paper, we have tried to review the grouting application base on grouts which is used and also we have tried to give a general view of grout applications and where and when can be used.

Keywords: cementious grouting, chemical grouting, soil improvement, civil engineering

Procedia PDF Downloads 518
1892 Exploring De-Fi through 3 Case Studies: Transparency, Social Impact, and Regulation

Authors: Dhaksha Vivekanandan

Abstract:

DeFi is a network that avoids reliance on financial intermediaries through its peer-to-peer financial network. DeFi operates outside of government control; hence it is important for us to understand its impacts. This study employs a literature review to understand DeFi and its emergence, as well as its implications on transparency, social impact, and regulation. Further, 3 case studies are analysed within the context of these categories. DeFi’s provision of increased transparency poses environmental and storage costs and can lead to user privacy being endangered. DeFi allows for the provision of entrepreneurial incentives and protection against monetary censorship and capital control. Despite DeFi's transparency issues and volatility costs, it has huge potential to reduce poverty; however, regulation surrounding DeFi still requires further tightening by governments.

Keywords: DeFi, transparency, regulation, social impact

Procedia PDF Downloads 83
1891 Ethnic Entrepreneurships: Minority Ethnic Students in UiTM Sabah and UMS Perceptions towards Entrepreneurialism Business Interest

Authors: Lizinis Cassendra Frederick Dony, Dewi Binti Tajuddin, Jirom Jeremy Frederick Dony, Andrew Nicholas

Abstract:

Unemployed graduates have become among the world major concerns lately. 70% of Malaysian graduates are jobless. Due to this concerns, this paper aims to identify major factors influencing Sabah minority ethnic favorable in the entrepreneurialism business interest. Hence, extensive introductory entrepreneurship syllabus clusters development beginning from the early childhood, primary, secondary and university students. This may induce interest appeal and to develop focus group of self-employment. The study focus on 7 indicators consist of demographic profiles variable (DP), social norms (SN), attitude (A), self-efficacy (SE) and business management skills (BMS) with reference to university students’ entrepreneurial intention. This study also partially mediates the relationship between product attractiveness (PA) and the minority ethnic entrepreneurialism business interest (MEEBI), by testifying their direct and indirect relationships. Hence, this study provides new perception towards improving the graduates’ characteristic, capabilities to exploit the business opportunities in the market. Furthermore, this paper will assess the relationship with the product attractiveness(PA) as a mediator. The study encompasses on the type of Sabah minority ethnic (ME) and nature of family own business (FOB) background with the 280 samples students in UiTM Sabah and UMS. The descriptive and random sampling method of research which revealed that majority of the respondents agreed that FOB and entrepreneurship education had positively influenced the ethnic students’ involvement in the entrepreneurial process and career development either full-time or part-time basis.

Keywords: Demographic profile (DP), soci, unemployed graduates, Malaysian minority

Procedia PDF Downloads 421
1890 Enablers and Inhibitors of Effective Waste Management Measures in Informal Settlements in South Africa: A Case of Alaska

Authors: Lynda C. Mbadugha, Bankole Awuzie, Kwanda Khumalo, Lindokuhle Matsebula, Masenoke Kgaditsi

Abstract:

Inadequate waste management remains a fundamental issue in the majority of cities around the globe, but it becomes a threat when it concerns informal settlements. Although studies have evaluated the performance of waste management measures, only a few have addressed that with a focus on South African informal settlements and the reasons for their apparent ineffectiveness in such locations. However, there may be evidence of variations in the extant problems due to the uniqueness of each location and the factors influencing the performance. Thus, there is a knowledge deficit regarding implementing waste management measures in South African informal settlements. This study seeks to evaluate the efficacy of waste management measures in the Alaska informal settlement in South Africa to assess the previously collected data of other areas using the degree of correlation. The research investigated a real-world scenario in the specified location using a case study approach and multiple data sources. The findings described various waste management practices used in Alaska's informal settlements; however, a correlation was found between the performance of these measures and those already used. The observed differences are primarily attributable to the physical characteristics of the locations, the lack of understanding of the environmental and health consequences of careless waste disposal, and the negative attitudes of the residents toward waste management practices. This study elucidates waste management implementation in informal settlements. It contributes to the relevant bodies of knowledge by describing these practices in South Africa. This paper's practical value emphasizes the general waste management characteristics of South Africa's informal settlements to facilitate the planning and provision of necessary interventions. The study concludes that the enablers and inhibitors are mainly political, behavioral, and environmental concerns.

Keywords: factors, informal settlement, performance, waste management

Procedia PDF Downloads 93
1889 Information Communication Technology (ICT) Using Management in Nursing College under the Praboromarajchanok Institute

Authors: Suphaphon Udomluck, Pannathorn Chachvarat

Abstract:

Information Communication Technology (ICT) using management is essential for effective decision making in organization. The Concerns Based Adoption Model (CBAM) was employed as the conceptual framework. The purposes of the study were to assess the situation of Information Communication Technology (ICT) using management in College of Nursing under the Praboromarajchanok Institute. The samples were multi – stage sampling of 10 colleges of nursing that participated include directors, vice directors, head of learning groups, teachers, system administrator and responsible for ICT. The total participants were 280; the instrument used were questionnaires that include 4 parts, general information, Information Communication Technology (ICT) using management, the Stage of concern Questionnaires (SoC), and the Levels of Use (LoU) ICT Questionnaires respectively. Reliability coefficients were tested; alpha coefficients were 0.967for Information Communication Technology (ICT) using management, 0.884 for SoC and 0.945 for LoU. The data were analyzed by frequency, percentage, mean, standard deviation, Pearson Product Moment Correlation and Multiple Regression. They were founded as follows: The high level overall score of Information Communication Technology (ICT) using management and issue were administration, hardware, software, and people. The overall score of the Stage of concern (SoC)ICTis at high level and the overall score of the Levels of Use (LoU) ICTis at moderate. The Information Communication Technology (ICT) using management had the positive relationship with the Stage of concern (SoC)ICTand the Levels of Use (LoU) ICT(p < .01). The results of Multiple Regression revealed that administration hardwear, software and people ware could predict SoC of ICT (18.5%) and LoU of ICT (20.8%).The factors that were significantly influenced by SoCs were people ware. The factors that were significantly influenced by LoU of ICT were administration hardware and people ware.

Keywords: information communication technology (ICT), management, the concerns-based adoption model (CBAM), stage of concern(SoC), the levels of use(LoU)

Procedia PDF Downloads 318
1888 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 519
1887 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 383
1886 Abnormality Detection of Persons Living Alone Using Daily Life Patterns Obtained from Sensors

Authors: Ippei Kamihira, Takashi Nakajima, Taiyo Matsumura, Hikaru Miura, Takashi Ono

Abstract:

In this research, the goal was construction of a system by which multiple sensors were used to observe the daily life behavior of persons living alone (while respecting their privacy). Using this information to judge such conditions as a bad physical condition or falling in the home, etc., so that these abnormal conditions can be made known to relatives and third parties. The daily life patterns of persons living alone are expressed by the number of responses of sensors each time that a set time period has elapsed. By comparing data for the prior two weeks, it was possible to judge a situation as 'normal' when the person was in a good physical condition or as 'abnormal' when the person was in a bad physical condition.

Keywords: sensors, elderly living alone, abnormality detection, iifestyle habit

Procedia PDF Downloads 253
1885 Hypersonic Flow of CO2-N2 Mixture around a Spacecraft during the Atmospheric Reentry

Authors: Zineddine Bouyahiaoui, Rabah Haoui

Abstract:

The aim of this work is to analyze a flow around the axisymmetric blunt body taken into account the chemical and vibrational nonequilibrium flow. This work concerns the entry of spacecraft in the atmosphere of the planet Mars. Since the equations involved are non-linear partial derivatives, the volume method is the only way to solve this problem. The choice of the mesh and the CFL is a condition for the convergence to have the stationary solution.

Keywords: blunt body, finite volume, hypersonic flow, viscous flow

Procedia PDF Downloads 234