Search results for: scope of cyber attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2007

Search results for: scope of cyber attacks

1647 Making Social Accountability Initiatives Work in the Performance of Local Self-Governing Institutions: District-Level Analysis in Rural Assam, India

Authors: Pankaj Kumar Kalita

Abstract:

Ineffectiveness of formal institutional mechanisms such as official audit to improve public service delivery has been a serious concern to scholars working on governance reforms in developing countries. Scholars argue that public service delivery in local self-governing institutions can be improved through application of informal mechanisms such as social accountability. Social accountability has been reinforced with the engagement of citizens and civic organizations in the process of service delivery to reduce the governance gap in developing countries. However, there are challenges that may impede the scope of establishing social accountability initiatives in the performance of local self-governing institutions. This study makes an attempt to investigate the factors that may impede the scope of establishing social accountability, particularly in culturally heterogeneous societies like India. While analyzing the implementation of two rural development schemes by Panchayats, the local self-governing institutions functioning in rural Assam in India, this study argues that the scope of establishing social accountability in the performance of local self-governing institutions, particularly in culturally heterogeneous societies in developing countries will be impeded by the absence of inter-caste and inter-religion networks. Data has been collected from five selected districts of Assam using in-depth interview method and survey method. The study further contributes to the debates on 'good governance' and citizen-centric approaches in developing countries.

Keywords: citizen engagement, local self-governing institutions, networks, social accountability

Procedia PDF Downloads 315
1646 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics

Authors: Varun K, Pramod B. Balareddy

Abstract:

Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.

Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient

Procedia PDF Downloads 255
1645 Numerical Study of Steel Structures Responses to External Explosions

Authors: Mohammad Abdallah

Abstract:

Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.

Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level

Procedia PDF Downloads 359
1644 Toward an Understanding of the Neurofunctional Dissociation between Animal and Tool Concepts: A Graph Theoretical Analysis

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from Mc Rae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-world, resilience to damage

Procedia PDF Downloads 543
1643 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis

Authors: R. Rama Kishore, Sunesh

Abstract:

This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.

Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy

Procedia PDF Downloads 251
1642 ASEAN Limited Centrality in Connectivity: Managing the China-Japan Infrastructure Competition

Authors: Barbora Valockova

Abstract:

Scholars recommend the establishment of a multilateral coordination mechanism by ASEAN, such as an infrastructure forum, to contain the China-Japan infrastructure financing competition in the region. However, they do not systematically investigate the reasons for its absence. This paper aims to fill the gap by addressing the following question: Why has ASEAN been unable to set up any multilateral coordination mechanism to soften the China-Japan infrastructure financing competition? This paper argues that ASEAN has not been able to set up such a mechanism due to its limited centrality in connectivity. This limited centrality decreases ASEAN’s ability to manage the China-Japan competition in a more comprehensive and coordinated way. Rather, ASEAN acts as a scope setter in connectivity, although this is not completely ineffective. This paper is divided into four sections. The first section explores the key tenets of the concept of ASEAN centrality in connectivity, which is under-examined in the current literature. The second section examines the extent to which ASEAN limited centrality in connectivity is being respected by China and Japan. The third section analyses how various stakeholders, such as ASEAN member states, their leaders and bureaucracy, and foreign private companies prevent ASEAN from attaining stronger centrality. The last section concludes and offers recommendations. Data is gathered using primary sources (official ASEAN, Chinese, and Japanese documents, interviews, etc.) and secondary material. By providing a nuanced analysis of ASEAN centrality in connectivity and developing a new operationalization of the concept, this paper aims to contribute to the international relations literature on ASEAN centrality. Initial findings suggest that while ASEAN limited centrality in connectivity has some effectiveness, it is not sufficient for setting up a multilateral coordination mechanism. While it represents a solid departure point, any potential possessed by ASEAN to evolve beyond a scope setter in connectivity is hampered by stakeholders involved in infrastructure development. While these players and their interactions can have both positive and negative effects on the scope set by ASEAN, it is unlikely that they would allow ASEAN to become the real central player. There can be no stronger ASEAN centrality in connectivity without ASEAN unity and neutrality. However, the last two factors are difficult to attain in the context of infrastructure development since ASEAN member states and stakeholders all have their styles and preferences. All other things being equal, these circumstances favor a loose, vague, and quasi-prescriptive arrangement among the relevant stakeholders.

Keywords: ASEAN centrality, China-Japan infrastructure competition, connectivity, scope setter

Procedia PDF Downloads 191
1641 Digital Individual Benefit Statement: The Use of a Triangulation Methodology to Design a Digital Platform for Switzerland

Authors: Catherine Equey Balzli

Abstract:

Old age retirement pensions are an important concern among the Swiss but estimating one’s income after retirement is difficult due to the Swiss insurance system’s complexity. This project’s aim is to prepare for developing a digital platform that will allow individuals to plan for retirement in a simplified manner. The main objective of the platform will be to give individuals the tools to check that their savings and retirement benefits will allow them to continue the lifestyle to which they are accustomed once they are retired. The research results from qualitative (focus group) and quantitative (survey) methodologies, recommend the scope and functionalities for a digital platform to be developed. A main outcome is the need to limit the platform’s scope to old-age pension only (excluding survivors’ or disability pensions, for instance). Furthermore, an outcome regarding the functionalities is the proposition of scenarios such as early retirement, changes to income, or modifications to personal status. The development of the digital platform will be a subsequent project.

Keywords: benefit statement, digital platform, retirement financial planning, social insurance

Procedia PDF Downloads 107
1640 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients

Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure

Abstract:

Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.

Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software

Procedia PDF Downloads 60
1639 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 239
1638 The Standard of Reasonableness in Fundamental Rights Adjudication under the Indian Constitution

Authors: Nandita Narayan

Abstract:

In most constitutional democracies, courts have been the gatekeepers of fundamental rights. The task of determining whether a violation is in fact justified, therefore, is judicial. Any state action, legislative or administrative, has to be tested by the application of two standards – first, the action must be within the scope of the authority conferred by law and, second, it must be reasonable. If any action, within the scope of the authority conferred by law is found to be unreasonable, it will be struck down as unconstitutional or ultra vires. This paper seeks to analyse the varying standards of reasonableness adopted by the Supreme Court of India where there is a violation of fundamental rights by state action. This is sought to be done by scrutinising case laws and classifying the legality of the violation under one of three levels of judicial scrutiny—strict, intermediate, or weak. The paper concludes by proving that there is an irregularity in the standards adopted, thus resulting in undue discretionary power of the judiciary which strikes at the very concept of reasonableness and ultimately becomes arbitrary in nature. This conclusion is reached by the comparison of reasonableness review of fundamental rights in other jurisdictions such as the USA and Canada.

Keywords: constitutional law, judicial review, fundamental rights, reasonableness, India

Procedia PDF Downloads 141
1637 A Study of the Carbon Footprint from a Liquid Silicone Rubber Compounding Facility in Malaysia

Authors: Q. R. Cheah, Y. F. Tan

Abstract:

In modern times, the push for a low carbon footprint entails achieving carbon neutrality as a goal for future generations. One possible step towards carbon footprint reduction is the use of more durable materials with longer lifespans, for example, silicone data cableswhich show at least double the lifespan of similar plastic products. By having greater durability and longer lifespans, silicone data cables can reduce the amount of trash produced as compared to plastics. Furthermore, silicone products don’t produce micro contamination harmful to the ocean. Every year the electronics industry produces an estimated 5 billion data cables for USB type C and lightning data cables for tablets and mobile phone devices. Material usage for outer jacketing is 6 to 12 grams per meter. Tests show that the product lifespan of a silicone data cable over plastic can be doubled due to greater durability. This can save at least 40,000 tonnes of material a year just on the outer jacketing of the data cable. The facility in this study specialises in compounding of liquid silicone rubber (LSR) material for the extrusion process in jacketing for the silicone data cable. This study analyses the carbon emissions from the facility, which is presently capable of producing more than 1,000 tonnes of LSR annually. This study uses guidelines from the World Business Council for Sustainable Development (WBCSD) and World Resources Institute (WRI) to define the boundaries of the scope. The scope of emissions is defined as 1. Emissions from operations owned or controlled by the reporting company, 2. Emissions from the generation of purchased or acquired energy such as electricity, steam, heating, or cooling consumed by the reporting company, and 3. All other indirect emissions occurring in the value chain of the reporting company, including both upstream and downstream emissions. As the study is limited to the compounding facility, the system boundaries definition according to GHG protocol is cradle-to-gate instead of cradle-to-grave exercises. Malaysia’s present electricity generation scenario was also used, where natural gas and coal constitute the bulk of emissions. Calculations show the LSR produced for the silicone data cable with high fire retardant capability has scope 1 emissions of 0.82kg CO2/kg, scope 2 emissions of 0.87kg CO2/kg, and scope 3 emissions of 2.76kg CO2/kg, with a total product carbon footprint of 4.45kg CO2/kg. This total product carbon footprint (Cradle-to-gate) is comparable to the industry and to plastic materials per tonne of material. Although per tonne emission is comparable to plastic material, due to greater durability and longer lifespan, there can be significantly reduced use of LSR material. Suggestions to reduce the calculated product carbon footprint in the scope of emissions involve 1. Incorporating the recycling of factory silicone waste into operations, 2. Using green renewable energy for external electricity sources and 3. Sourcing eco-friendly raw materials with low GHG emissions.

Keywords: carbon footprint, liquid silicone rubber, silicone data cable, Malaysia facility

Procedia PDF Downloads 91
1636 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices

Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez

Abstract:

Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.

Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration

Procedia PDF Downloads 135
1635 Delegation or Assignment: Registered Nurses’ Ambiguity in Interpreting Their Scope of Practice in Long Term Care Settings

Authors: D. Mulligan, D. Casey

Abstract:

Introductory Statement: Delegation is when a registered nurse (RN) transfers a task or activity that is normally within their scope of practice to another person (delegatee). RN delegation is common practice with unregistered staff, e.g., student nurses and health care assistants (HCAs). As the role of the HCA is increasingly embedded as a direct care and support role, especially in long-term residential care for older adults, there is RN uncertainty as to their role as a delegator. The assignment is when a task is transferred to a person that is within the role specification of the delegatee. RNs in long-term care (LTC) for older people are increasingly working in teams where there are less RNs and more HCAs providing direct care to the residents. The RN is responsible and accountable for their decision to delegate and assign tasks to HCAs. In an interpretive, multiple case studies to explore how delegation of tasks by RNs to HCAs occurred in long-term care settings in Ireland the importance of the RN understanding their scope of practice emerged. Methodology: Focus group interviews and individual interviews were undertaken as part of a multiple case study. Both cases, anonymized as Case A and Case B, were within the public health service in Ireland. The case study sites were long-term care settings for older adults located in different social care divisions, and in different geographical areas. Four focus group interviews with staff nurses and three individual interviews with CNMs were undertaken. The interactive data analysis approach was the analytical framework used, with within-case and cross-case analysis. The theoretical lens of organizational role theory, applying the role episode model (REM), was used to understand, interpret, and explain the findings. Study Findings: RNs and CNMs understood the role of the nurse regulator and the scope of practice. RNs understood that the RN was accountable for the care and support provided to residents. However, RNs and CNM2s could not describe delegation in the context of their scope of practice. In both cases, the RNs did not have a standardized process for assessing HCA competence to undertake nursing tasks or interventions. RNs did not routinely supervise HCAs. Tasks were assigned and not delegated. There were differences between the cases in relation to understanding which nursing tasks required delegation. HCAs in Case A undertook clinical vital sign assessments and documentation. HCAs in Case B did not routinely undertake these activities. Delegation and assignment were influenced by the organizational factors, e.g., model of care, absence of delegation policies, inadequate RN education on delegation, and a lack of RN and HCA role clarity. Concluding Statement: Nurse staffing levels and skill mix in long-term care settings continue to change with more HCAs providing more direct care and support. With decreasing RN staffing levels RNs will be required to delegate and assign more direct care to HCAs. There is a requirement to distinguish between RN assignment and delegation at policy, regulation, and organizational levels.

Keywords: assignment, delegation, registered nurse, scope of practice

Procedia PDF Downloads 151
1634 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 203
1633 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 276
1632 Sociolinguistics and Language Change

Authors: Banazzouz Halima

Abstract:

Throughout the ages, language has been viewed not only as a simple code of communicating information but rather as the most powerful and versatile medium of maintaining relationships with other people. While,by the end of the 18th century, such matters of scientific investigation concerning the study of human language began to occur under the scope of “Linguistics” generally defined as the scientific study of language. Linguistics, thus, provides a growing body of scientific knowledge about language which can guide the activity of the language teacher and student as well. Moreover,as times passed, the linguistic development engaged language in a broadly practiced academic discipline having relationship with other sciences such as: psychology, sociology, anthropology etc. Therefore, “Sociolinguistics” was given birth during the 1960’s. In fact, the given abstract is mainly linguistic, inserted under the scope of “Sociolinguistics” and by far it highlights on the process of linguistic variation and language change to show that all languages change through time and linguistic systems may vary from one speech community to another providing there is a sense of vitality where people of different parts of the globe may mutually and intelligibly communicate and comprehend each other.

Keywords: language change-sociolinguistics, social context-speech community, vitality of language, linguistic variation, urban dialectology, urban dialectology

Procedia PDF Downloads 625
1631 Play Based Practices in Early Childhood Curriculum: The Contribution of High Scope, Modern School Movement and Pedagogy of Participation

Authors: Dalila Lino

Abstract:

The power of play for learning and development in early childhood education is beyond question. The main goal of this study is to analyse how three contemporary early childhood pedagogical approaches, the High Scope, the Modern School Movement (MEM) and the Pedagogy of Participation integrate play in their curriculum development. From this main goal the following objectives emerged: (i) to characterize how play is integrated in the daily routine of the pedagogical approaches under study; (ii) to analyse the teachers’ role during children’s playing situations; (iii) to identify the types of play that children are more often involved. The methodology used is the qualitative approach and is situated under the interpretative paradigm. Data is collected through semi-structured interviews to 30 preschool teachers and through observations of typical daily routines. The participants are 30 Portuguese preschool classrooms attending children from 3 to 6 years and working with the High Scope curriculum (10 classrooms), the MEM (10 classrooms) and the Pedagogy of Participation (10 classrooms). The qualitative method of content analysis was used to analyse the data. To ensure confidentiality, no information is disclosed without participants' consent, and the interviews were transcribed and sent to the participants for a final revision. The results show that there are differences how play is integrated and promoted in the three pedagogical approaches. The teachers’ role when children are at play varies according the pedagogical approach adopted, and also according to the teachers’ understanding about the meaning of play. The study highlights the key role that early childhood curriculum models have to promote opportunities for children to play, and therefore to be involved in meaningful learning.

Keywords: curriculum models, early childhood education, pedagogy, play

Procedia PDF Downloads 204
1630 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study

Authors: Abass Braimah, Maha Hussein Abdallah

Abstract:

The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.

Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis

Procedia PDF Downloads 179
1629 An Integrative Model of Job Characteristics Key Attitudes and Intention to Leave Among Faculty in Higher Education

Authors: Bhavna Malik

Abstract:

The study is build on a theoretical framework that links characteristics of job, key attitudes and intention to leave, why faculty may be disengaging from institutional service. The literature indicates that job characteristics, key attitudes and intention to leave are very important for effective organizational functioning. In general, the literature showed that some job characteristics might be the antecedents of job satisfaction and the aggregate variable job scope was positively associated with organizational commitment, and these key attitudes predicted intention to leave negatively. The present study attempted to propose a new integrative model of the relationships among job characteristics, key attitudes, and intention to leave. The main purpose of the present study is to examine the effects of job characteristics on intention to leave. While examining the role of job characteristics, the mediating roles of key attitudes were taken into account in order to better understand how job characteristics affect the exhibition of intention to leave. The secondary purpose is to investigate the effects of job characteristics on key attitudes, and the effects of key attitudes on intention to leave. Job characteristics of remuneration, resource for professional activities, career opportunities were positively associated with the work attitude of job satisfaction. The aggregate job scope was positively associated with the work attitude of organizational commitment although no single job characteristic was significantly associated with organizational commitment. Commitment, however, did not significantly affect time spent on institutional service. Two job characteristics—time spent on research and time spent on teaching—were negatively associated with this behavior. In general, the literature showed that some job characteristics might be the antecedents of job satisfaction and the aggregate variable job scope was positively associated with organizational commitment, and these key attiudes predicted intention to leave negatively. In turn, job satisfaction and organizational commitment were negatively associated with the intention to leave. In addition to these, organizational commitment was negatively associated with the intention to leave. However, no significant direct association was found between job characteristics and intention to leave.

Keywords: Job Characteristics Model, job satisfaction, organizational commitment, intention to leave

Procedia PDF Downloads 483
1628 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 332
1627 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 410
1626 Understanding the Interplay between Consumer Knowledge, Trust and Relationship Satisfaction in Financial Services

Authors: Torben Hansen, Lars Gronholdt, Alexander Josiassen, Anne Martensen

Abstract:

Consumers often exhibit a bias in their knowledge; they often think that they know more or less than they do. The concept of 'knowledge over/underconfidence' (O/U) has in previous studies been used to investigate such knowledge bias. O/U appears as a combination of subjective and objective knowledge. Subjective knowledge relates to consumers’ perception of their knowledge, while objective knowledge relates to consumers’ absolute knowledge measured by objective standards. This separation leads to three scenarios: The consumer can either be knowledge calibrated (subjective and objective knowledge are similar), overconfident (subjective knowledge exceeds objective knowledge) or underconfident (objective knowledge exceeds subjective knowledge). Knowledge O/U is a highly useful concept in understanding consumer choice behavior. For example, knowledge overconfident individuals are likely to exaggerate their ability to make right choices, are more likely to opt out of necessary information search, spend less time to carry out a specific task than less knowledge confident consumers, and are more likely to show high financial trading volumes. Through the use of financial services as a case study, this study contributes to previous research by examining how consumer knowledge O/U affects two types of trust (broad-scope trust and narrow-scope trust) and consumer relationship satisfaction. Trust does not only concern consumer trust in individual companies (i.e., narrow.-scope confidence NST), but also concerns consumer confidence in the broader business context in which consumers plan and implement their behavior (i.e., broad scope trust, BST). NST is defined as "the expectation that the service provider can be relied on to deliver on its promises’, while BST is defined as ‘the expectation that companies within a particular business type can generally be relied on to deliver on their promises.’ This study expands our understanding of the interplay between consumer knowledge bias, consumer trust, and relationship marketing in two main ways: First, it is demonstrated that the more knowledge O/U a consumer becomes, the higher/lower NST and levels of relationship satisfaction will be. Second, it is demonstrated that BST has a negative moderating effect on the relationship between knowledge O/U and satisfaction, such that knowledge O/U has a higher positive/negative effect on relationship satisfaction when BST is low vs. high. The data for this study comprises 756 mutual fund investors. Trust is particularly important in consumers’ mutual fund behavior because mutual funds have important responsibilities in providing financial advice and in managing consumers’ funds.

Keywords: knowledge, cognitive bias, trust, customer-seller relationships, financial services

Procedia PDF Downloads 296
1625 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 179
1624 Utilisation of Sports and Games for Psychosocial Rehabilitation of Internally Displaced Persons in Maiduguri, Nigeria

Authors: Stephen Hamafyelto, Hussaini Garba, Mary Pindar Ndahi

Abstract:

The study was carried out with the intent to mitigate the trauma experienced by victims of insurgent attacks by the so-called Boko Haram militants in Borno state of Nigeria. The area was ridden by the crisis over the past 9 years. As a result, many people were killed, maimed and raped. Some others suffered all manner of inhuman treatment at the hands of their captors. The extent to which this dehumanized treatment has gone and impacted on the people in this area has left most of them traumatised. Victims who survived the attacks have been resettled in camps provided by government where their needs have been cared for. This can never be the same with their natural habitats. Many interventions have also been done by government, non-governmental organisations and corporate and individual bodies. In this regard, social needs of the victims have been the immediate concerns of most organisations, where food, shelter, and clothing were provided. However, there is little that has been done to rehabilitate these victims psychosocially. In this regard, sports and games including the victims’ local games were used to provide psychosocial rehabilitation of victims. The intent was to bring them back to social reality, social inclusion, and stable emotions and peer integration. Descriptive statistics and Multivariate analysis were done. No statistically significant difference was found among male and female children and adults in terms of psychosocial rehabilitation using sports and games.

Keywords: social reality, social inclusion, emotional intellegence, peer model

Procedia PDF Downloads 203
1623 Evaluation of Pesticide Residues in Honey from Cocoa and Forest Ecosystems in Ghana

Authors: Richard G. Boakye, Dara A Stanley, Mathavan Vickneswaran, Blanaid White

Abstract:

The cultivation of cocoa (Theobroma cocoa), an important cash crop that contributes immensely towards the economic growth of several Western African countries, depends almost entirely on pesticide application owing to the plant’s vulnerability to pest and disease attacks. However, the extent to which pesticides inputted for cocoa cultivation impact bees and bee products has rarely received attention in research. Through this study, the effects of pesticides applied for cocoa cultivation on honey in Ghana were examined by evaluating honey samples from cocoa and forest ecosystems in Ghana. An analysis of five honey samples from each land use type confirmed pesticide contaminants from these land use types at measured concentrations for acetamiprid (0.051mg/kg); imidacloprid (0.004-0.02 mg/kg), thiamethoxam (0.013-0.017 mg/kg); indoxacarb (0.004-0.045 mg/kg) and sulfoxaflor (0.004-0.026 mg/kg). None of the observed pesticide concentrations exceeded EU maximum residue levels, indicating no compromise of the honey quality for human consumption. However, from the results, it could be inferred that toxic effects on bees may not be ruled out because observed concentrations largely exceeded the threshold of 0.001 mg/kg at which sublethal effects on bees have previously been reported. One of the most remarkable results to emerge from this study is the detection of imidacloprid in all honey samples analyzed, with sulfoxaflor and thiamethoxam also being detected in 93% and 73% of the honey samples, respectively. This suggests the probable prevalence of pesticide use in the landscape. However, the conclusions reached in this study should be interpreted within the scope of pesticide applications within Bia West District and not necessarily extended to other cocoa-producing districts in Ghana. Future studies should therefore include multiple cocoa-growing districts and other non-cocoa farming landscapes. Such an approach can give a broader outlook on pesticide residues in honey produced in Ghana.

Keywords: honey, cocoa, pesticides, bees, land use, landscape, residues, Ghana

Procedia PDF Downloads 77
1622 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 78
1621 Recent Developments and Expectations in the Legal Expenses Insurance in Turkey

Authors: İbrahim Arslan, Mücahit Ünal

Abstract:

An important issue to ensure justice is to simplify the right to seek justice. But there is a cost of seeking justice in civil law. It costs at least, attorneys' fees and judicial expenses during the beginning and in case of losing a trial. Indeed, most of the people refrain from seeking justice because of these expenses. Therefore, it is not inappropriate to say that the removal of obstacles staying on the way of seeking justice will increase the belief in justice. Legal expenses insurance is a private law contract of insurance in which the insurer is obliged to pay premiums of the insured, to provide the necessary services for the protection of legal interests of the insured person within the agreed scope. This type of insurance is being practiced in the Western world for a long time. The special rights, duties and obligations of the parties to a legal expenses insurance contract shall be governed by the Turkish Commercial Code (TCC) and the contractual agreements which are regularly closed in the form of general terms and conditions. If the number of the legal expenses insurance contracts concluded increase this will definitely improve the percentage of seeking justice before the courts. The general terms and conditions applicable in Turkey generally include litigation costs, referee fees, guarantee fund , enforcement costs , appeal costs borne decision corrections costs. In addition, besides the insured, other family members or the people specified in the policy are protected in the scope of personal/family legal expenses insurance. The commercial law disputes fall outside the scope of coverage in this insurance branch. The insured person chooses his own lawyer and the insurer is not allowed to give advice during the selection of a lawyer. In April 2015, the Prime Minister announced of a new era in the field of legal expenses insurance in Turkey and this announcement excited the insurance industry and legal community.

Keywords: insurance, in the Turkish law on legal protection insurance, legal protection insurance, legal protection

Procedia PDF Downloads 355
1620 A Critical Study on Unprecedented Employment Discrimination and Growth of Contractual Labour Engaged by Rail Industry in India

Authors: Munmunlisa Mohanty, K. D. Raju

Abstract:

Rail industry is one of the model employers in India has separate national legislation (Railways Act 1989) to regulate its vast employment structure, functioning across the country. Indian Railway is not only the premier transport industry of the country; indeed, it is Asia’s most extensive rail network organisation and the world’s second-largest industry functioning under one management. With the growth of globalization of industrial products, the scope of anti-employment discrimination is no more confined to gender aspect only; instead, it extended to the unregularized classification of labour force applicable in the various industrial establishments in India. And the Indian Rail Industry inadvertently enhanced such discriminatory employment trends by engaging contractual labour in an unprecedented manner. The engagement of contractual labour by rail industry vanished the core “Employer-Employee” relationship between rail management and contractual labour who employed through the contractor. This employment trend reduces the cost of production and supervision, discourages the contractual labour from forming unions, and reduces its collective bargaining capacity. So, the primary intention of this paper is to highlight the increasing discriminatory employment scope for contractual labour engaged by Indian Railways. This paper critically analyses the diminishing perspective of anti-employment opportunity practiced by Indian Railways towards contractual labour and demands an urgent outlook on the probable scope of anti-employment discrimination against contractual labour engaged by Indian Railways. The researcher used doctrinal methodology where primary materials (Railways Act, Contract Labour Act and Occupational, health and Safety Code, 2020) and secondary data (CAG Report 2018, Railways Employment Regulation Rules, ILO Report etc.) are used for the paper.

Keywords: anti-employment, CAG Report, contractual labour, discrimination, Indian Railway, principal employer

Procedia PDF Downloads 165
1619 Quantification of GHGs Emissions from Electricity and Diesel Fuel Consumption in Basalt Mining Industry in Thailand

Authors: S. Kittipongvises, A. Dubsok

Abstract:

The mineral and mining industry is necessary for countries to have an adequate and reliable supply of materials to meet their socio-economic development. Despite its importance, the environmental impacts from mineral exploration are hugely significant. This study aimed to investigate and quantify the amount of GHGs emissions emitted from both electricity and diesel vehicle fuel consumption in basalt mining in Thailand. Plant A, located in the northeastern region of Thailand, was selected as a case study. Results indicated that total GHGs emissions from basalt mining and operation (Plant A) were approximately 2,501,086 kgCO2e and 1,997,412 kgCO2e in 2014 and 2015, respectively. The estimated carbon intensity ranged between 1.824 kgCO2e to 2.284 kgCO2e per ton of rock product. Scope 1 (direct emissions) was the dominant driver of its total GHGs compared to scope 2 (indirect emissions). As such, transport related combustion of diesel fuels generated the highest GHGs emission (65%) compared to emissions from purchased electricity (35%). Some of the potential implications for mining entities were also presented.

Keywords: basalt mining, diesel fuel, electricity, GHGs emissions, Thailand

Procedia PDF Downloads 262
1618 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 128