Search results for: privacy preservation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1068

Search results for: privacy preservation

708 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud

Authors: Somayeh Sobati Moghadam

Abstract:

Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.

Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy

Procedia PDF Downloads 264
707 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 151
706 Cultural Resources Management of the Early Hospitals in Jordan between: 1890-1950

Authors: Jawdat Goussous, Samer Abu Ghazaleh

Abstract:

Heritage is closely linked with the national identity and because Jordan is a rich country of heritage where many civilizations had lived from early beginning of history ,therefore the conservation of this heritage is national task that gives many benefits as correlation between local inhabitance and enhance the linked with spirit of place . This study takes into account the most important concentration on some of old hospitals in Jordan ,which were constructed between 1890-1950 ,looking in their historical and architectural heritage values gained by their architectural distinguished ,longevity and their linked with events that happened in the region. then Focus on the study and analysis of some of them in terms of conservation methodology that have been followed to conserve the early hospitals such as preservation ,maintenance ,adaptive reuse , And their positive effects on these buildings, emphasize the importance of these buildings because of their historical and architectural values.

Keywords: evangelical missionary, early hospitals, medical services, renovation

Procedia PDF Downloads 452
705 The Interior Design Proposals of Buildings for Tourism Purposes

Authors: Şebnem Ertaş

Abstract:

“Architecture” is one component of sustainable cultural tourism. The sustainability of architecture is possible through preservation and restoration activities. In Turkey, which has an important place in the world’s cultural heritage, several studies focused on the sustainability of the cultural heritage were done in terms of the principles of “preserve-use-sustain”. Within the scope of this study, a methodology will be proposed in order to obtain the development of different scenarios supporting sustainable tourism. Sille is an ancient village located on the Spice Road and Silk Road dating back to the Ottoman and Seljuk eras. However, in recent years it is protected as an archeological site. In the “Alternative Project Phase”, the streets and buildings which bring dynamism to trade are determined; among these, 10 major buildings in Hacı Ali Ağa Street are studied.

Keywords: cultural tourism, interior design, sustainability of architecture, Sille

Procedia PDF Downloads 389
704 Assessing the Values and Destruction Degree of Archaeological Sites in Taiwan

Authors: Yung-Chung Chuang

Abstract:

Current situation and accumulated development of archaeological sites have very high impacts on the preservation value of the site. This research set 3 archaeological sites in Taiwan as study areas. Assessment of the degree of destruction of cultural layers due to land use change and geomorphological change were conducted with aerial photographs (1976-1978; 2016-2017) and digital aerial survey technology on 2D and 3D geographic information system platforms. The results showed that the archaeological sites were all seriously influenced due to the high land use intensity between 1976-2017. Geomorphological changes caused by human cultivation and engineering construction were main causes of site destruction, especially in private lands. Therefore, urban planning methods for land acquisition or land regulation are necessary.

Keywords: archaeological sites, accumulated development, destruction of cultural layers, geomorphological changes

Procedia PDF Downloads 205
703 Analytical Study on Threats to Wetland Ecosystems and Their Solutions in the Framework of the Ramsar Convention

Authors: Ehsan Daryadel, Farhad Talaie

Abstract:

Wetlands are one of the most important ecosystems on Earth. Nevertheless, various challenges threaten these ecosystems and disrupt their ecological character. Among these, the effects of human-based threats are more devastating. Following mass degradation of wetlands during 1970s, the Ramsar Convention on Wetlands (Ramsar, Iran, 1971) was concluded to conserve wetlands of international importance and prevent destruction and degradation of such ecosystems through wise use of wetlands as a mean to achieve sustainable development in all over the world. Therefore, in this paper, efforts have been made to analyze threats to wetlands and then investigate solutions in the framework of the Ramsar Convention. Finally, in order to operate these mechanisms, this study concludes that all states should in turn make their best effort to improve and restore global wetlands through preservation of environmental standards and close contribution and also through taking joint measures with other states effectively.

Keywords: Ramsar Convention, threats, wetland wcosystems, wise use

Procedia PDF Downloads 395
702 Drying Modeling of Banana Using Cellular Automata

Authors: M. Fathi, Z. Farhaninejad, M. Shahedi, M. Sadeghi

Abstract:

Drying is one of the oldest preservation methods for food and agriculture products. Appropriate control of operation can be obtained by modeling. Limitation of continues models for complex boundary condition and non-regular geometries leading to appearance of discrete novel methods such as cellular automata, which provides a platform for obtaining fast predictions by rule-based mathematics. In this research a one D dimensional CA was used for simulating thin layer drying of banana. Banana slices were dried with a convectional air dryer and experimental data were recorded for validating of final model. The model was programmed by MATLAB, run for 70000 iterations and von-Neumann neighborhood. The validation results showed a good accordance between experimental and predicted data (R=0.99). Cellular automata are capable to reproduce the expected pattern of drying and have a powerful potential for solving physical problems with reasonable accuracy and low calculating resources.

Keywords: banana, cellular automata, drying, modeling

Procedia PDF Downloads 433
701 Improved Estimation Strategies of Sensitive Characteristics Using Scrambled Response Techniques in Successive Sampling

Authors: S. Suman, G. N. Singh

Abstract:

This research work is an effort to analyse the consequences of scrambled response technique to estimate the current population mean in two-occasion successive sampling when the characteristic of interest is sensitive in nature. The generalized estimation procedures have been proposed using sensitive auxiliary variables under additive and multiplicative scramble models. The properties of resultant estimators have been deeply examined. Simulation, as well as empirical studies, are carried out to evaluate the performances of the proposed estimators with respect to other competent estimators. The results of our studies suggest that the proposed estimation procedures are highly effective under the presence of non-response situation. The result of this study also suggests that additive scrambled response model is a better choice in the perspective of cost of the survey and privacy of the respondents.

Keywords: scrambled response, sensitive characteristic, successive sampling, optimum replacement strategy

Procedia PDF Downloads 173
700 Examining the Challenges of Teaching Traditional Dance in Contemporary India

Authors: Aadya Kaktikar

Abstract:

The role of a traditional dance teacher in India revolves around teaching movements and postures that have been a part of the movement vocabulary of dancers from before the 2nd century BC. These movements inscribe on the mind and body of the dancer a complex web of philosophy, culture history, and religion. However, this repository of tradition sits in a fast globalizing India creating a cultural space which is in a constant flux, where identities and meanings are being constantly challenged. The guru-shishya parampara, the traditional way of learning dance, sits uneasily with a modern education space in India. The traditional dance teacher is caught in the cross-currents of tradition and modernity, of preservation and exploration. This paper explores conflicting views on what dance ought to mean and how it should be taught. The paper explores the tensions of the social, economic and cultural spaces that the traditional dance teacher navigates.

Keywords: pedagogy, dance education, dance curriculum, teacher training

Procedia PDF Downloads 316
699 Recycled Waste Glass Powder as a Partial Cement Replacement in Polymer-Modified Mortars

Authors: Nikol Žižková

Abstract:

The aim of this study was to observe the behavior of polymer-modified cement mortars with regard to the use of a pozzolanic admixture. Polymer-modified mortars (PMMs) containing various types of waste glass (waste packing glass and fluorescent tube glass) were produced always with 20% of cement substituted with a pozzolanic-active material. Ethylene/vinyl acetate copolymer (EVA) was used for polymeric modification. The findings confirm the possibility of using the waste glass examined herein as a partial substitute for cement in the production of PMM, which contributes to the preservation of non-renewable raw material resources and to the efficiency of waste glass material reuse.

Keywords: recycled waste glass, polymer-modified mortars, pozzolanic admixture, ethylene/vinyl acetate copolymer

Procedia PDF Downloads 248
698 The Synopsis of the AI-Powered Therapy Web Platform ‘Free AI Therapist'

Authors: Arwa Alnowaiser, Hala Shoukri

Abstract:

The ‘FreeAITherapist’ is an artificial intelligence application that uses the power of AI to offer advice and mental health counseling to its users through its chatbot services. The AI therapist is designed to understand users' issues, concerns, and problems and respond appropriately; it provides empathy and guidance and uses evidence-based therapeutic techniques. With its user-friendly platform, it ensures accessibility for individuals in need, regardless of their geographical location. This website was created in direct response to the growing demand for mental health support, aiming to provide a cost-effective and confidential solution. Through promising confidentiality, it considers user privacy and data security. The ‘FreeAITherapist’ strives to bridge the gap in mental health services, offering a reliable resource for individuals seeking guidance and counseling to improve their overall well-being.

Keywords: artificial intelligence, mental health, AI therapist, website, counseling

Procedia PDF Downloads 37
697 Privacy Rights of Children in the Social Media Sphere: The Benefits and Challenges Under the EU and US Legislative Framework

Authors: Anna Citterbergova

Abstract:

This study explores the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, namely the GDPR (2018) and COPPA (2000). Considering that children are online for the majority of their free time, one cannot overlook the negative side effects that may be associated with online participation, which may put children’s wellbeing and their fundamental rights at risk. The question of whether the current relevant legislative framework in relation to the responsibilities of the internet service providers (ISPs) are adequate safeguards and guarantees to children’s personal data protection has been an evolving debate both in the US and in the EU. From a children’s rights perspective, processors of personal data have certain obligations that must meet the international human rights principles (e. g. the CRC, ECHR), which require taking into account the best interest of the child. Accordingly, the need to protect children’s privacy online remains strong and relevant with the expansion of the number and importance of social media platforms to human life. At the same time, the landscape of the internet is rapidly evolving, and commercial interests are taking a more targeted approach in seeking children’s data. Therefore, it is essential to constantly evaluate the ongoing and evolving newly adopted market policies of ISPs that may misuse the gap in the current letter of the law. Previous studies in the field have already pointed out that both GDPR and COPPA may theoretically not be sufficient in protecting children’s personal data. With the focus on social media platforms, this study uses the doctrinal-descriptive method to identifiy the mechanisms enshrined in the GDPR and COPPA designed to protect children’s personal data. In its second part, the study includes a data gathering phase by the national data protection authorities responsible for monitoring and supervision of the GDPR in relation to children’s personal data protection who monitor the enforcement of the data protection rules throughout the European Union an contribute to their consistent application. These gathered primary source of data will later be used to outline the series of benefits and challenges to children’s persona lata protection faced by these institutes and the analysis that aims to suggest if and/or how to hold ISPs accountable while striking a fair balance between the commercial rights and the right to protection of the personal data of children. The preliminary results can be divided into two categories. First, conclusions in the doctrinal-descriptive part of the study. Second, specific cases and situations from the practice of national data protection authorities. While for the first part, concrete conclusions can already be presented, the second part is currently still in the data gathering phase. The result of this research is a comprehensive analysis on the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, based on doctrinal-descriptive approach and original empirical data.

Keywords: personal data of children, personal data protection, GDPR, COPPA, ISPs, social media

Procedia PDF Downloads 92
696 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 318
695 Horizontal Dimension of Constitutional Social Rights

Authors: Monika Florczak-Wątor

Abstract:

The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularization of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them.

Keywords: social rights, private relations, horizontality, constitutional rights

Procedia PDF Downloads 321
694 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage

Authors: L. Ramirez, E. Guillén, J. Sánchez

Abstract:

Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.

Keywords: analytics, telemedicine, internet of things, cloud computing

Procedia PDF Downloads 322
693 Water Safety Strategies by Service: A Study of Implementation Studies

Authors: Prince Amartey

Abstract:

Water is critical to public health, quality of life, environmental preservation, economic activity, and long-term growth. In this environment, it is critical to ensure the ongoing improvement of all processes and practices that contribute to the quality and safety of water. Water safety plans (WSPs) developed by water companies are an essential public policy instrument for achieving these objectives. This manuscript examines international evidence of water safety planning adoption and implementation and reports on the current situation in Portugal as part of the necessary adaptation of the national legal framework to the publication of the Directive on water quality for human consumption. The goal is to take lessons from various successful WSP projects throughout the world while writing new legislation in Ghana and elsewhere. According to the findings, four crucial aspects and key factors of success in establishing and implementing WSPs exist commitment from leadership, technical proficiency, administration, and cooperation among agencies.

Keywords: safe drinking, risk, policy, implementation

Procedia PDF Downloads 81
692 CookIT: A Web Portal for the Preservation and Dissemination of Traditional Italian Recipes

Authors: M. T. Artese, G. Ciocca, I. Gagliardi

Abstract:

Food is a social and cultural aspect of every individual. Food products, processing, and traditions have been identified as cultural objects carrying history and identity of social groups. Traditional recipes are passed down from one generation to the other, often to strengthen the link with the territory. The paper presents CookIT, a web portal developed to collect Italian traditional recipes related to regional cuisine, with the purpose to disseminate the knowledge of typical Italian recipes and the Mediterranean diet which is a significant part of Italian cuisine. The system designed is completed with multimodal means of browsing and data retrieval. Stored recipes can be retrieved integrating and combining a number of different methods and keys, while the results are displayed using classical styles, such as list and mosaic, and also using maps and graphs, with which users can play using available keys for interaction.

Keywords: collaborative portal, Italian cuisine, intangible cultural heritage, traditional recipes, searching and browsing

Procedia PDF Downloads 146
691 Healthcare Data Mining Innovations

Authors: Eugenia Jilinguirian

Abstract:

In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.

Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database

Procedia PDF Downloads 61
690 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 81
689 Mathematical Modeling of Carotenoids and Polyphenols Content of Faba Beans (Vicia faba L.) during Microwave Treatments

Authors: Ridha Fethi Mechlouch, Ahlem Ayadi, Ammar Ben Brahim

Abstract:

Given the importance of the preservation of polyphenols and carotenoids during thermal processing, we attempted in this study to investigate the variation of these two parameters in faba beans during microwave treatment using different power densities (1; 2; and 3W/g), then to perform a mathematical modeling by using non-linear regression analysis to evaluate the models constants. The variation of the carotenoids and polyphenols ratio of faba beans and the models are tested to validate the experimental results. Exponential models were found to be suitable to describe the variation of caratenoid ratio (R²= 0.945, 0.927 and 0.946) for power densities (1; 2; and 3W/g) respectively, and polyphenol ratio (R²= 0.931, 0.989 and 0.982) for power densities (1; 2; and 3W/g) respectively. The effect of microwave power density Pd(W/g) on the coefficient k of models were also investigated. The coefficient is highly correlated (R² = 1) and can be expressed as a polynomial function.

Keywords: microwave treatment, power density, carotenoid, polyphenol, modeling

Procedia PDF Downloads 255
688 The Economic Limitations of Defining Data Ownership Rights

Authors: Kacper Tomasz Kröber-Mulawa

Abstract:

This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.

Keywords: antitrust, data, data ownership, digital economy, property rights

Procedia PDF Downloads 75
687 Foreseen the Future: Human Factors Integration in European Horizon Projects

Authors: José Manuel Palma, Paula Pereira, Margarida Tomás

Abstract:

Foreseen the future: Human factors integration in European Horizon Projects The development of new technology as artificial intelligence, smart sensing, robotics, cobotics or intelligent machinery must integrate human factors to address the need to optimize systems and processes, thereby contributing to the creation of a safe and accident-free work environment. Human Factors Integration (HFI) consistently pose a challenge for organizations when applied to daily operations. AGILEHAND and FORTIS projects are grounded in the development of cutting-edge technology - industry 4.0 and 5.0. AGILEHAND aims to create advanced technologies for autonomously sort, handle, and package soft and deformable products, whereas FORTIS focuses on developing a comprehensive Human-Robot Interaction (HRI) solution. Both projects employ different approaches to explore HFI. AGILEHAND is mainly empirical, involving a comparison between the current and future work conditions reality, coupled with an understanding of best practices and the enhancement of safety aspects, primarily through management. FORTIS applies HFI throughout the project, developing a human-centric approach that includes understanding human behavior, perceiving activities, and facilitating contextual human-robot information exchange. it intervention is holistic, merging technology with the physical and social contexts, based on a total safety culture model. In AGILEHAND we will identify safety emergent risks, challenges, their causes and how to overcome them by resorting to interviews, questionnaires, literature review and case studies. Findings and results will be presented in “Strategies for Workers’ Skills Development, Health and Safety, Communication and Engagement” Handbook. The FORTIS project will implement continuous monitoring and guidance of activities, with a critical focus on early detection and elimination (or mitigation) of risks associated with the new technology, as well as guidance to adhere correctly with European Union safety and privacy regulations, ensuring HFI, thereby contributing to an optimized safe work environment. To achieve this, we will embed safety by design, and apply questionnaires, perform site visits, provide risk assessments, and closely track progress while suggesting and recommending best practices. The outcomes of these measures will be compiled in the project deliverable titled “Human Safety and Privacy Measures”. These projects received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND) and No 101135707 (FORTIS).

Keywords: human factors integration, automation, digitalization, human robot interaction, industry 4.0 and 5.0

Procedia PDF Downloads 54
686 The Digital Divide: Examining the Use and Access to E-Health Based Technologies by Millennials and Older Adults

Authors: Delana Theiventhiran, Wally J. Bartfay

Abstract:

Background and Significance: As the Internet is becoming the epitome of modern communications, there are many pragmatic reasons why the digital divide matters in terms of accessing and using E-health based technologies. With the rise of technology usage globally, those in the older adult generation may not be as familiar and comfortable with technology usage and are thus put at a disadvantage compared to other generations such as millennials when examining and using E-health based platforms and technology. Currently, little is known about how older adults and millennials access and use e-health based technologies. Methods: A systemic review of the literature was undertaken employing the following three databases: (i) PubMed, (ii) ERIC, and (iii) CINAHL; employing the search term 'digital divide and generations' to identify potential articles. To extract required data from the studies, a data abstraction tool was created to obtain the following information: (a) author, (b) year of publication, (c) sample size, (d) country of origin, (e) design/methods, (f) major findings/outcomes obtained. Inclusion criteria included publication dates between the years of Jan 2009 to Aug 2018, written in the English language, target populations of older adults aged 65 and above and millennials, and peer reviewed quantitative studies only. Major Findings: PubMed provided 505 potential articles, where 23 of those articles met the inclusion criteria. Specifically, ERIC provided 53 potential articles, where no articles met criteria following data extraction. CINAHL provided 14 potential articles, where eight articles met criteria following data extraction. Conclusion: Practically speaking, identifying how newer E-health based technologies can be integrated into society and identifying why there is a gap with digital technology will help reduce the impact on generations and individuals who are not as familiar with technology and Internet usage. The largest concern of all is how to prepare older adults for new and emerging E-health technologies. Currently, there is a dearth of literature in this area because it is a newer area of research and little is known about it. The benefits and consequences of technology being integrated into daily living are being investigated as a newer area of research. Several of the articles (N=11) indicated that age is one of the larger factors contributing to the digital divide. Similarly, many of the examined articles (N=5) identify that privacy concerns were one of the main deterrents of technology usage for elderly individuals aged 65 and above. The older adult generation feels that privacy is one of the major concerns, especially in regards to how data is collected, used and possibly sold to third party groups by various websites. Additionally, access to technology, the Internet, and infrastructure also plays a large part in the way that individuals are able to receive and use information. Lastly, a change in the way that healthcare is currently used, received and distributed would also help attribute to the change to ensure that no generation is left behind in a technologically advanced society.

Keywords: digital divide, e-health, millennials, older adults

Procedia PDF Downloads 167
685 Presentation of the Model of Reliability of the Signaling System with Emphasis on Determining Best Time Schedule for Repairments and Preventive Maintenance in the Iranian Railway

Authors: Maziar Yazdani, Ahmad Khodaee, Fatemeh Hajizadeh

Abstract:

The purpose of this research was analysis of the reliability of the signaling system in the railway and planning repair and maintenance of its subsystems. For this purpose, it will be endeavored to introduce practical strategies for activities control and appropriate planning for repair and preventive maintenance by statistical modeling of reliability. Therefore, modeling, evaluation, and promotion of reliability of the signaling system appear very critical. Among the key goals of the railway is provision of quality service for passengers and this purpose is gained by increasing reliability, availability, maintainability and safety of (RAMS). In this research, data were analyzed, and the reliability of the subsystems and entire system was calculated and with emphasis on preservation of performance of each of the subsystems with a reliability of 80%, a plan for repair and preventive maintenance of the subsystems of the signaling system was introduced.

Keywords: reliability, modeling reliability, plan for repair and preventive maintenance, signaling system

Procedia PDF Downloads 177
684 The Importance of Sustainable Urban Development and Its Impacts on Turkey’s Urban Environmental Laws

Authors: Azadeh Rezafar, Sevkiye Sence Turk

Abstract:

Rapid population growth in urban areas and extinction danger of natural resources in order to meet the food needs of these population, has revealed the need for sustainability. It did not last long that city planners realized the importance of an equal access to natural resources with protecting and managing them in cities, in accordance with the concept of sustainable development. Like in other countries The Turkish Government is aware of the importance of the sustainable development in their cities. The government issued new laws for protection of environmental assets and so that the preservation of natural ecology. The main objective of this article is to emphasis the importance of the sustainable development in the context of the developing world by giving special information about the method of the Turkish Government for protecting nature with approval of difference laws in this area.

Keywords: population growth, sustainable development, Turkey, Turkish Urban Environmental Laws

Procedia PDF Downloads 342
683 Sustainable Strategies for Post-Disaster Shelters: Case Study-Based Review and Future Prospects

Authors: Fangwen Ni, Hongpeng Xu

Abstract:

When disasters occur, it is important to provide temporary shelters to protect victims from their environment and to comfort them with privacy and dignity. However, the commonly used shelters like tents and shanties can not ensure a comfortable condition. Furthermore, the demand for more energy and less pollution has become a major challenge. Focusing on the sustainable of temporary shelters, this study intends to clarify the essential role of temporary shelters before the reconstruction work is done. The paper also identifies the main problems from three aspects including spatial layout, thermal comfort and utilization of passive technology. Moreover, it expounds the passive strategies of ecological design by case study and simulation. It is found that the living condition of shelters can be improved from the perspective of architectural space, ventilation theory and construction techniques. Regardless of being temporary, these shelters are crucial elements in emergency situations and should be taken more seriously.

Keywords: architectural space, construction technique, sustainable strategy, temporary shelter

Procedia PDF Downloads 267
682 From Oral to Written: Translating the Dawot (Epic Poem), Revitalizing Appreciation for Indigenous Literature

Authors: Genevieve Jorolan-Quintero

Abstract:

The recording as well as the preservation of indigenous literature is an important task as it deals with a significant heritage of pre-colonial culture. The beliefs and traditions of a people are reflected in their oral narratives, such as the folk epic, which must be written down to insure their preservation. The epic poem for instance, known as dawot among the Mandaya, one of the indigenous communities in the southern region of the Philippines, narrates the customs, the ways of life, and the adventures of an ancient people. Nabayra, an expert on Philippine folkloric studies, stresses that still extant after centuries of unknown origin, the dawot was handed down to the magdadawot (bard) by word of mouth, forming the greatest bulk of Mandaya oral tradition. Unhampered by modern means of communication to distract her/him, the magdadawot has a sharp memory of the intricacies of the ancient art of chanting the panayday (verses) of the epic poem. The dawot has several hullubaton (episodes), each of which takes several nights to chant . The language used in these oral traditions is archaic Mandaya, no longer spoken or clearly understood by the present generation. There is urgency to the task of recording and writing down what remain of the epic poem since the singers and storytellers who have retained the memory and the skill of chanting and narrating the dawot and other forms of oral tradition in their original forms are getting fewer. The few who are gifted and skilled to transmit these ancient arts and wisdom are old and dying. Unlike the other Philippine epics (i.e. the Darangen, the Ulahingan, the Hinilawod, etc.), the Mandaya epic is yet to be recognized and given its rightful place among the recorded epics in Philippine Folk Literature. The general aim of this study was to put together and preserve an intangible heritage, the Mandaya hullubaton (episodes of the dawot), in order to preserve and promote appreciation for the oral traditions and cultural legacy of the Mandaya. It was able to record, transcribe, and translate four hullubaton of the folk epic into two languages, Visayan and English to insure understanding of their contents and significance among non-Mandaya audiences. Evident in the contents of the episodes are the cultural practices, ideals, life values, and traditions of the ancient Mandaya. While the conquests and adventures of the Mandaya heroes Lumungtad, Dilam, and Gambong highlight heroic virtues, the role of the Mandaya matriarch in family affairs is likewise stressed. The recording and the translation of the hullubaton and the dawot into commonly spoken languages will not only promote knowledge and understanding about their culture, but will also stimulate in the members of this cultural community a sense of pride for their literature and culture. Knowledge about indigenous cultural system and philosophy derived from their oral literature will serve as a springboard to further comparative researches dealing with indigenous mores and belief systems among the different tribes in the Philippines, in Asia, in Africa, and other countries in the world.

Keywords: Dawot, epic poem, Mandaya, Philippine folk literature

Procedia PDF Downloads 420
681 Design of Residential Geothermal Cooling System in Kuwait

Authors: Tebah KH A AlFouzan, Meznah Dahlous Ali Alkreebani, Fatemah Salem Dekheel Alrasheedi, Hanadi Bandar Rughayan AlNomas, Muneerah Mohammad Sulaiman ALOjairi

Abstract:

Article spotlights the heat transfer process based beneath the earth’s surface. The process starts by exchanging the heat found in the building as fluid in the pipes absorbs it, then transports it down the soil consuming cool temperature exchange, recirculating, and rebounding to deliver cool air. This system is a renewable energy that is reliable and sustainable. The analysis showed the disposal of fossil fuels, energy preservation, 400% efficiency, long lifespan, and lower maintenance. Investigation displays the system’s types of design, whether open or closed loop and piping layout. Finally, the geothermal cooling study presents the challenges of creating a prototype in Kuwait, as constraints are applicable due to geography.

Keywords: cooling system, engineering, geothermal cooling, natural ventilation, renewable energy

Procedia PDF Downloads 77
680 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 132
679 Environmental and Space Travel

Authors: Alimohammad

Abstract:

Man's entry into space is one of the most important results of developments and advances made in information technology. But this human step, like many of his other actions, is not free of danger, as space pollution today has become a major problem for the global community. Paying attention to the issue of preserving the space environment is in the interest of all governments and mankind, and ignoring it can increase the possibility of conflict between countries. What many space powers still do not pay attention to is the freedom to explore and exploit space should be limited by banning pollution of the space environment. Therefore, freedom and prohibition are complementary and should not be considered conflicting concepts. The legal system created by the current space treaties for the effective preservation of the space environment has failed. Customary international law also does not have an effective provision and guarantee of sufficient executions in order to prevent damage to the environment. Considering the responsibility of each generation in the healthy transfer of the environment to the next generation and considering the sustainable development concept, the space environment must also be passed on to future generations in a healthy and undamaged manner. As a result, many environmental policies related to Earth should also be applied to the space environment..

Keywords: law, space, environment, responsibility

Procedia PDF Downloads 77