Search results for: safety and security
1938 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking
Authors: Handie Pramana Putra, Ani Dijah Rahajoe
Abstract:
The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.Keywords: database, data analysis, DPNE, extended data flow, e-commerce
Procedia PDF Downloads 601937 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 1991936 Group Boundaries against and Due to Identity Threat
Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas
Abstract:
Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.Keywords: group boundaries, identity threat, prejudice, superordinate groups
Procedia PDF Downloads 4171935 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance
Authors: Kyle Phillips, Ndiko Ludidi
Abstract:
Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22
Procedia PDF Downloads 4731934 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump
Authors: Merieleen Engtipi
Abstract:
India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.Keywords: energy demand, energy cooperation, fossil fuels, technology transfer
Procedia PDF Downloads 2571933 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 441932 Comparison of Two Maintenance Policies for a Two-Unit Series System Considering General Repair
Authors: Seyedvahid Najafi, Viliam Makis
Abstract:
In recent years, maintenance optimization has attracted special attention due to the growth of industrial systems complexity. Maintenance costs are high for many systems, and preventive maintenance is effective when it increases operations' reliability and safety at a reduced cost. The novelty of this research is to consider general repair in the modeling of multi-unit series systems and solve the maintenance problem for such systems using the semi-Markov decision process (SMDP) framework. We propose an opportunistic maintenance policy for a series system composed of two main units. Unit 1, which is more expensive than unit 2, is subjected to condition monitoring, and its deterioration is modeled using a gamma process. Unit 1 hazard rate is estimated by the proportional hazards model (PHM), and two hazard rate control limits are considered as the thresholds of maintenance interventions for unit 1. Maintenance is performed on unit 2, considering an age control limit. The objective is to find the optimal control limits and minimize the long-run expected average cost per unit time. The proposed algorithm is applied to a numerical example to compare the effectiveness of the proposed policy (policy Ⅰ) with policy Ⅱ, which is similar to policy Ⅰ, but instead of general repair, replacement is performed. Results show that policy Ⅰ leads to lower average cost compared with policy Ⅱ.Keywords: condition-based maintenance, proportional hazards model, semi-Markov decision process, two-unit series systems
Procedia PDF Downloads 1291931 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands
Authors: Francis Sichimba
Abstract:
Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.Keywords: attachment, care, grand-parenting involvement, social economic status
Procedia PDF Downloads 7211930 A Multidimensional Genetic Algorithm Applicable for Our VRP Variant Dealing with the Problems of Infrastructure Defaults SVRDP-CMTW: “Safety Vehicle Routing Diagnosis Problem with Control and Modified Time Windows”
Authors: Ben Mansour Mouin, Elloumi Abdelkarim
Abstract:
We will discuss the problem of routing a fleet of different vehicles from a central depot to different types of infrastructure-defaults with dynamic maintenance requests, modified time windows, and control of default maintained. For this reason, we propose a modified metaheuristicto to solve our mathematical model. SVRDP-CMTW is a variant VRP of an optimal vehicle plan that facilitates the maintenance task of different types of infrastructure-defaults. This task will be monitored after the maintenance, based on its priorities, the degree of danger associated with each default, and the neighborhood at the black-spots. We will present, in this paper, a multidimensional genetic algorithm “MGA” by detailing its characteristics, proposed mechanisms, and roles in our work. The coding of this algorithm represents the necessary parameters that characterize each infrastructure-default with the objective of minimizing a combination of cost, distance and maintenance times while satisfying the priority levels of the most urgent defaults. The developed algorithm will allow the dynamic integration of newly detected defaults at the execution time. This result will be displayed in our programmed interactive system at the routing time. This multidimensional genetic algorithm replaces N genetic algorithm to solve P different type problems of infrastructure defaults (instead of N algorithm for P problem we can solve in one multidimensional algorithm simultaneously who can solve all these problemsatonce).Keywords: mathematical model, VRP, multidimensional genetic algorithm, metaheuristics
Procedia PDF Downloads 2021929 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 1681928 A Systematic Review Examining the Experimental methodology behind in vivo testing of hiatus hernia and Diaphragmatic Hernia Mesh
Authors: Whitehead-Clarke T., Beynon V., Banks J., Karanjia R., Mudera V., Windsor A., Kureshi A.
Abstract:
Introduction: Mesh implants are regularly used to help repair both hiatus hernias (HH) and diaphragmatic hernias (DH). In vivo studies are used to test not only mesh safety but increasingly comparative efficacy. Our work examines the field of in vivo mesh testing for HH and DH models to establish current practices and standards. Method: This systematic review was registered with PROSPERO. Medline and Embase databases were searched for relevant in vivo studies. 44 articles were identified and underwent abstract review, where 22 were excluded. 4 further studies were excluded after full text review – leaving 18 to undergo data extraction. Results: Of 18 studies identified, 9 used an in vivo HH model and 9 a DH model. 5 studies undertook mechanical testing on tissue samples – all uniaxial in nature. Testing strip widths ranged from 1-20mm (median 3mm). Testing speeds varied from 1.5-60mm/minute. Upon histology, the most commonly assessed structural and cellular factors were neovascularization and macrophages, respectively (n=9 each). Structural analysis was mostly qualitative, where cellular analysis was equally likely to be quantitative. 11 studies assessed adhesion formation, of which 8 used one of four scoring systems. 8 studies measured mesh shrinkage. Discussion: In vivo studies assessing mesh for HH and DH repair are uncommon. Within this relatively young field, we encourage surgical and materials testing institutions to discuss its standardisation.Keywords: hiatus, diaphragmatic, hernia, mesh, materials testing, in vivo
Procedia PDF Downloads 2191927 Defect Classification of Hydrogen Fuel Pressure Vessels using Deep Learning
Authors: Dongju Kim, Youngjoo Suh, Hyojin Kim, Gyeongyeong Kim
Abstract:
Acoustic Emission Testing (AET) is widely used to test the structural integrity of an operational hydrogen storage container, and clustering algorithms are frequently used in pattern recognition methods to interpret AET results. However, the interpretation of AET results can vary from user to user as the tuning of the relevant parameters relies on the user's experience and knowledge of AET. Therefore, it is necessary to use a deep learning model to identify patterns in acoustic emission (AE) signal data that can be used to classify defects instead. In this paper, a deep learning-based model for classifying the types of defects in hydrogen storage tanks, using AE sensor waveforms, is proposed. As hydrogen storage tanks are commonly constructed using carbon fiber reinforced polymer composite (CFRP), a defect classification dataset is collected through a tensile test on a specimen of CFRP with an AE sensor attached. The performance of the classification model, using one-dimensional convolutional neural network (1-D CNN) and synthetic minority oversampling technique (SMOTE) data augmentation, achieved 91.09% accuracy for each defect. It is expected that the deep learning classification model in this paper, used with AET, will help in evaluating the operational safety of hydrogen storage containers.Keywords: acoustic emission testing, carbon fiber reinforced polymer composite, one-dimensional convolutional neural network, smote data augmentation
Procedia PDF Downloads 991926 Post Injury Experiences of New Immigrant Workers
Authors: Janki Shankar, Shu Ping Chen
Abstract:
Background: New immigrants are one of most vulnerable sections of the Canadian society. Unable to gain entry into Canada’s strictly regulated professions and trades, several skilled and qualified new immigrants take up precarious jobs without adequate occupational health and safety training, thereby increasing their risk of sustaining occupational injury and illness compared to Canadian born workers. Access to timely and appropriate support is critical for injured new immigrant workers who face additional challenges compared to Canadian born workers in accessing information and support post-injury. The purpose of our study was to explore the post-injury experiences and support needs of new immigrant workers who have sustained work-related injuries. Methods: Using an interpretive research approach and semi structured face to face qualitative interviews, 27 new immigrant workers from a range of industries operating in two cities in a province in Canada were interviewed. All had sustained work-related injuries and reported these to their work supervisors. A constant comparative approach was used to identify key themes across the worker experiences. Results: Findings reveal several factors that can shape the experiences of new immigrant workers and influence their return-to-work outcomes. Conclusion: Based on the insights of study participants, policies, practices, and potential interventions informed by their needs and preferences are proposed that can improve return to work outcomes for these workers.Keywords: new immigrant workers, post-injury experiences, return to work outcomes, qualified
Procedia PDF Downloads 1041925 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 1491924 Canadian Business Leaders’ Phenomenological Online Education Expansion
Authors: Amna Khaliq
Abstract:
This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.Keywords: strategic leadership, Canada, education, technology
Procedia PDF Downloads 681923 Behavior of Pet Packaging on Quality Characteristics of an Algerian Virgin Olive Oil Under Various Conditions of Storage
Authors: Hamitri-Guerfi Fatiha, Mekimene Lekhder, Madani Khodir, Youyou Ahcene
Abstract:
Virgin olive oil is appreciated by consumers, the quality of the oil is regulated by the international olive oil council depends on its chemical composition, so, the correct packing conditions are a prerequisite to preserve oil color, flavor, and nutriments, from production to consumption. The contact of food with various materials of packaging, since the production, until their consumption constitutes one of the essential aspects of food safety (directive 76/833/CEE). In Algeria, plastic bottles, although, they are economic and light are largely used at packaging olive oil but not used in other countries. This is due to migration phenomena that can occur from these materials. Thus, the goal of this work is to examine the physicochemical behavior of the couple packaging plastic-oil during their exposure to three temperatures corresponding to the conditions of storage applied in Algeria. Like, it is difficult to compare blowers of bottles which are heavy engineering, it comes out from this study that the effect of heat, the absorption of water, the constraints of storage of acidity, as well as the composition of oil, the PET bottles showed a remarkable structural instability, this defect of quality was confirmed by the analysis of morphology by electronic scan microscopy. These bottles present a total migration significantly higher than the threshold of acceptance. Moreover, a metal contamination of oil by its packaging was confirmed by the spectroscopy of atomic absorption and a microanalysis. The differences observed between the results of the microanalysis applied and the mechanical characterizations of the various bottles are reported, showing the reality of the container-contents exchanges.Keywords: interaction, stability, pet, virgin olive oil
Procedia PDF Downloads 4631922 Tobephobia: Fear of Failure in Education Caused by School Violence and Drug Abuse
Authors: Prakash Singh
Abstract:
Schools throughout the world are facing increasing challenges in dealing with school violence and drug abuse by pupils. Therefore, the question of the fear of failure to meet the aims and objectives of education inevitably surfaces as it places increasing and challenging demands on educators and all other stakeholders to address this malaise. Multiple studies on the construct tobephobia (TBP) simply define TBP as the fear of failure in education. This study is a continuation of the exploratory studies on the manifestation of fear in education. The primary purpose of this study was to establish how TBP, caused by school violence and drug abuse affects teaching and learning in our schools. The qualitative research method was used for this study. Teachers admitted that they fear for their safety at school. Working in a fearful situation places a high rate of stress and anxiety on them. Tobephobic educators spend most of their time worrying about their fear of violence and drug abuse by pupils and are too frightened to carry out their normal duties. They prefer to stay in familiar surroundings for fear of being attacked by inebriated learners. This study, therefore, contributes to our understanding of the effects of TBP in our schools caused by school violence and drug abuse. Also, this study supplements the evidence accumulated over the past fifteen years that TBP is not a figment of someone’s imagination; it is a gruesome reality affecting the very foundation of our educational system globally to provide quality and equal education to all our learners in a harmonious, collegial school environment.Keywords: tobephobia, tobephobic educators, fear of failure in education, school violence, drug abuse
Procedia PDF Downloads 4941921 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study
Authors: Eman Mohamed Ali Elalwani
Abstract:
The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation
Procedia PDF Downloads 1321920 Evaluation of Planned and Organically Transformed Public Spaces in Urban Indian Market Places: A Case of Bhopal City, India
Authors: Piyush Hajela
Abstract:
Public spaces within Indian markets are vibrant, colorful and contain dimensions that make them attractive and therefore act as popular gathering spaces. Most of these public spaces emerge as squares, plazas of varied shapes and sizes spread at different locations within the market. These public spaces grow organically and are discovered by the people themselves as they respond positively to the collective human senses. On the other hand, there are the planned and designed public spaces as well that are less active. This research evaluates both the planned and the organically transformed public spaces in Indian markets from an Urban Design point of view. The purpose of such research is to provide a basis for design solutions to ensure the success of designed public spaces. The evaluation is done for identified Attributes, namely Comfort, Protection, Familiarity, Activities, Form, Legibility, Engagement, Safety, Accessibility, Environment and Transformations by which a Public Space attains its recognition. The evaluation is based on a rating done for forty-four parameters falling under eleven attributes of public space. An opinion survey of professionals is conducted for their priorities of attributes while designing Public spaces. A comparison is made to rank these attributes between Planned and Organically transformed Public spaces and, opinion of the professionals. After dues analysis, the research suggests the learning from the organically transformed Public spaces for ensuring the success of designed public spaces. The suggestions may be in the form of Design decisions or administrative regulations, or both for achieving the desirables.Keywords: assessment, attributes, engagement, interaction
Procedia PDF Downloads 2151919 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor
Authors: Ibrahim Makram Ibrahim Salib
Abstract:
Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income
Procedia PDF Downloads 791918 Research on Resilience-Oriented Disintegration in System-of-System
Authors: Hang Yang, Jiahao Liu, Jichao Li, Kewei Yang, Minghao Li, Bingfeng Ge
Abstract:
The system-of-systems (SoS) are utilized to characterize networks formed by integrating individual complex systems that demonstrate interdependence and interconnectedness. Research on the disintegration issue in SoS is significant in improving network survivability, maintaining network security, and optimizing SoS architecture. Accordingly, this study proposes an integrated framework called resilience-oriented disintegration in SoS (SoSRD), for modeling and solving the issue of SoS disintegration. Firstly, a SoS disintegration index (SoSDI) is presented to evaluate the disintegration effect of SoS. This index provides a practical description of the disintegration process and is the first integration of the network disintegration model and resilience models. Subsequently, we propose a resilience-oriented disintegration method based on reinforcement learning (RDRL) to enhance the efficiency of SoS disintegration. This method is not restricted by the problem scenario as well as considering the coexistence of disintegration (node/link removal) and recovery (node/link addition) during the process of SoS disintegration. Finally, the effectiveness and superiority of the proposed SoSRD are demonstrated through a case study. We demonstrate that our proposed framework outperforms existing indexes and methods in both node and link disintegration scenarios, providing a fresh perspective on network disintegration. The findings provide crucial insights into dismantling harmful SoS and designing a more resilient SoS.Keywords: system-of-systems, disintegration index, resilience, reinforcement learning
Procedia PDF Downloads 231917 Judicial Independence and Preservation of the Rule of Law in Africa: The Case of South Africa
Authors: Mbuzeni Mathenjwa
Abstract:
Upon their independence, most African countries adopted constitutions that proclaim respect for the rule of law. The decision to constitutionalise the rule of law is basically informed by the countries’ experience during the colonial era which was characterised by discrimination on various grounds including race, gender and religion. Despite the promise to be bound by and adhere to the rule of law, disrespect for the rule of law has become a norm in the African continent. This is evident from the reported incidence of abuse of power, failure to perform obligations imposed by law and flagrant disregard of the law by the Executive including the heads of states in the continent. In some African countries including South Africa, the courts of law have been approached to rule on the legality of the decisions of the executives, taken contrary to the prescripts of the law. South African Courts have laid down a number of decisions wherein they found that the conduct of the executive contravenes the rule of law. Consequently decisions of the executive have been declared invalid by courts. In this regard courts have become a safety net in preserving the rule of law in. Accordingly, this paper discusses the role of the courts in preserving the rule of law in Africa. This it does by explaining the notion of judicial independence and the doctrine of the rule of law. The explanation on the notion of judicial independence is relevant because only an independent judiciary can effectively review and set aside the decision of the executive including the president of a country. Furthermore, a comparative overview of the enforcement of the rule of law in African countries is done. The methods used for this research is literature review, and study of legislation and case law in selected African countries relating to the independence of the judiciary and the rule of law. Finally, a conclusion is drawn on the role of the independent judiciary to preserve the rule of law in Africa.Keywords: Africa, constitutions, independence, judiciary
Procedia PDF Downloads 2941916 Adverse Effects of Natural Pesticides on Human and Animals: An Experimental Analysis
Authors: Abdel-Tawab H. Mossa
Abstract:
Synthetic pesticides are widely used in large-scale worldwide for control pests in agriculture and public health sectors in both developed and developing countries. Although the positive role of pesticides, they have many adverse toxic effects on humans, animals, and the ecosystem. Therefore, in the last few years, scientists have been searching for new active compounds from natural resources as an alternative to synthetic pesticides. Currently, many commercial natural pesticides are available commercially worldwide. These products are recommended for uses in organic farmers and considered as safe pesticides. This paper focuses on the adverse effects of natural pesticides on mammals. Available commercial pesticides in the market contain essential oils (e.g. pepper, cinnamon, and garlic), plant extracts, microorganism (e.g. bacteria, fungi or their toxin), mineral oils and some active compounds from natural recourses e.g. spinosad, neem, pyrethrum, rotenone, abamectin and other active compounds from essential oils (EOs). Some EOs components, e.g., thujone, pulegone, and thymol have high acute toxicity (LD50) is 87.5, 150 and 980 mg/kg. B.wt on mice, respectively. Natural pesticides such as spinosad, pyrethrum, neem, abamectin, and others have toxicological effects to mammals and ecosystem. These compounds were found to cause hematotoxicity, hepato-renal toxicity, biochemical alteration, reproductive toxicity, genotoxicity, and mutagenicity. It caused adverse effects on the ecosystem. Therefore, natural pesticides in general not safe and have high acute toxicity and can induce adverse effects at long-term exposure.Keywords: natural pesticides, toxicity, safety, genotoxicity, ecosystem, biochemical
Procedia PDF Downloads 1811915 Effective Validation Model and Use of Mobile-Health Apps for Elderly People
Authors: Leonardo Ramirez Lopez, Edward Guillen Pinto, Carlos Ramos Linares
Abstract:
The controversy brought about by the increasing use of mHealth apps and their effectiveness for disease prevention and diagnosis calls for immediate control. Although a critical topic in research areas such as medicine, engineering, economics, among others, this issue lacks reliable implementation models. However, projects such as Open Web Application Security Project (OWASP) and various studies have helped to create useful and reliable apps. This research is conducted under a quality model to optimize two mHealth apps for older adults. Results analysis on the use of two physical activity monitoring apps - AcTiv (physical activity) and SMCa (energy expenditure) - is positive and ideal. Through a theoretical and practical analysis, precision calculations and personal information control of older adults for disease prevention and diagnosis were performed. Finally, apps are validated by a physician and, as a result, they may be used as health monitoring tools in physical performance centers or any other physical activity. The results obtained provide an effective validation model for this type of mobile apps, which, in turn, may be applied by other software developers that along with medical staff would offer digital healthcare tools for elderly people.Keywords: model, validation, effective, healthcare, elderly people, mobile app
Procedia PDF Downloads 2211914 Understanding the Selectional Preferences of the Twitter Mentions Network
Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das
Abstract:
Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.Keywords: information diffusion, personality and values, social network analysis, twitter mentions network
Procedia PDF Downloads 3811913 Clinical Impact of Delirium and Antipsychotic Therapy: 10-Year Experience from a Referral Coronary Care Unit
Authors: Niyada Naksuk, Thoetchai Peeraphatdit, Vitaly Herasevich, Peter A. Brady, Suraj Kapa, Samuel J. Asirvatham
Abstract:
Introduction: Little is known about the safety of antipsychotic therapy for delirium in the coronary care unit (CCU). Our aim was to examine the effect of delirium and antipsychotic therapy among CCU patients. Methods: Pre-study Confusion Assessment Method-Intensive Care Unit (CAM–ICU) criteria were implemented in screening consecutive patients admitted to Mayo Clinic, Rochester, the USA from 2004 through 2013. Death status was prospectively ascertained. Results: Of 11,079 study patients, the incidence of delirium was 8.3% (n=925). Delirium was associated with an increased risk of in-hospital mortality (adjusted OR 1.49; 95% CI, 1.08-2.08; P=.02) and one-year mortality among patients who survived from CCU admission (adjusted HR 1.46; 95% CI, 1.12-1.87; P=.005). A total of 792 doses of haloperidol (5 IQR [3-10] mg/day) or quetiapine (25 IQR [13-50] mg/day) were given to 244 patients with delirium. The clinical characteristics of patients with delirium who did and did not receive antipsychotic therapy were not different (baseline corrected QT [QTc] interval 460±61 ms vs. 457±58 ms, respectively; P = 0.57). In comparison to baseline, mean QTc intervals after the first and third doses of the antipsychotics were not significantly prolonged in haloperidol (448±56, 458±57, and 450±50 ms, respectively) or quetiapine groups (459±54, 467±68, and 462±46 ms, respectively) (P > 0.05 for all). Additionally, in-hospital mortality (adjusted OR 0.67; 95% CI, 0.42-1.04; P=.07), ventricular arrhythmia (adjusted OR 0.87; 95% CI, 0.17-3.62; P=.85) and one-year mortality among the hospital survivors (adjusted HR 0.86; 95% CI 0.62-1.17; P = 0.34) were not different in patients with delirium irrespective of whether or not they received antipsychotics. Conclusions: In patients admitted to the CCU, delirium was associated with an increase in both in-hospital and one-year mortality. Low doses of haloperidol and quetiapine appeared to be safe, without an increase in risk of sudden cardiac death, in-hospital mortality, or one-year mortality in carefully monitored patients.Keywords: arrhythmias, haloperidol, mortality, qtc interval, quetiapine
Procedia PDF Downloads 3771912 Endoscopic Treatment of Patients with Large Bile Duct Stones
Authors: Yuri Teterin, Lomali Generdukaev, Dmitry Blagovestnov, Peter Yartcev
Abstract:
Introduction: Under the definition "large biliary stones," we referred to stones over 1.5 cm, in which standard transpapillary litho extraction techniques were unsuccessful. Electrohydraulic and laser contact lithotripsy under SpyGlass control have been actively applied for the last decade in order to improve endoscopic treatment results. Aims and Methods: Between January 2019 and July 2022, the N.V. Sklifosovsky Research Institute of Emergency Care treated 706 patients diagnosed with choledocholithiasis who underwent biliary stones removed from the common bile duct. Of them, in 57 (8, 1%) patients, the use of a Dormia basket or Biliary stone extraction balloon was technically unsuccessful due to the size of the stones (more than 15 mm in diameter), which required their destruction. Mechanical lithotripsy was used in 35 patients, and electrohydraulic and laser lithotripsy under SpyGlass direct visualization system - in 26 patients. Results: The efficiency of mechanical lithotripsy was 72%. Complications in this group were observed in 2 patients. In both cases, on day one after lithotripsy, acute pancreatitis developed, which resolved on day three with conservative therapy (Clavin-Dindo type 2). The efficiency of contact lithotripsy was in 100% of patients. Complications were not observed in this group. Bilirubin level in this group normalized on the 3rd-4th day. Conclusion: Our study showed the efficacy and safety of electrohydraulic and laser lithotripsy under SpyGlass control in a well-defined group of patients with large bile duct stones.Keywords: contact lithotripsy, choledocholithiasis, SpyGlass, cholangioscopy, laser, electrohydraulic system, ERCP
Procedia PDF Downloads 861911 In Vitro Antibacterial Effect of Hydroalcoholic Extract of Lawsonia Inermis, Malva Sylvestris and Boswellia Serrata on Aggregatibacter Actinomycetemcomitans
Authors: Surena V.
Abstract:
Background and Aim: Periodontal diseases are among the most common infectious diseases all around the world, even in developed countries. Considering the increased rate of microbial resistance to antibiotics and the chemical side effects of antibiotics and antiseptics used for the treatment of periodontal disease, there is a need for an alternative antimicrobial agent with fewer complications. Medicinal herbs have recently become popular as antimicrobial and preventive agents. This study aimed to assess the antibacterial effects of hydroalcoholic extracts of Lawsonia inermis, Malva sylvestris and Boswellia serrata on Aggregatibacter actinomycetemcomitans (A. actinomycetemcomitans). Materials and Methods: Hydroalcoholic extracts of the three medicinal plants were obtained by the maceration technique and A. actinomycetemcomitans was cultured. The antimicrobial efficacy of the three medicinal plants was compared with that of 0.2% chlorhexidine (CHX) according to the CLSI protocol using agar disc diffusion and broth microdilution techniques. All tests were repeated three times. Results: Hydroalcoholic extracts of all three plants had antimicrobial activity against A. actinomycetemcomitans. The minimum inhibitory concentration (MIC) of Lawsonia inermis, Malva sylvestris, and Boswellia serrata was 78.1, 156.2, and 1666 µg/mL with no significant difference between them. The MIC of CHX was 3.33 µg/mL, which was significantly higher than that of Boswellia serrata extract. Conclusion: Given that, further in vivo studies confirm other properties of these extracts and their safety in terms of cytotoxicity and mutagenicity, hydroalcoholic extracts of Lawsonia inermis and Malva sylvestris may be used in mouthwashes or local delivery systems to affect periodontal biofilm.Keywords: actinobacilus actinomycetem commitans, lawsonia inermis, malva sylvestris, boswellia serrata
Procedia PDF Downloads 621910 Challenges and Opportunities for M-Government Implementation in Saudi Arabia
Authors: A. Alssbaiheen, S. Love
Abstract:
Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities
Procedia PDF Downloads 4681909 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems
Authors: Adeniyi Onasanya, Maher Elshakankiri
Abstract:
In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services
Procedia PDF Downloads 180