Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6007

Search results for: security service

1867 The Views of Teachers, Students and Parents on the FATIH Project

Authors: Şemsettin Şahin, Ahmet Oğuz Aktürk, İsmail Çelik

Abstract:

This study investigated the views of teachers, students and students' parents on the FATIH (Movement of Enhancing Opportunities and Improving Technology) Project, which was put into service by the Ministry of National Education in cooperation with the Ministry of Transportation in Turkey in November 2010 for the purpose of increasing students' success and planned to be completed within 5 years. The study group consisted of teachers employed in a pilot school in the province of Karaman in central Turkey included within the scope of the FATIH Project, students attending this school and parents whose children are students in that school. The research data were collected through forms developed by the researchers to determine the views of teachers, students and students' parents on the FATIH Project. The descriptive analysis method, one of the qualitative research methods, was used in the study. An analysis of the data revealed that a large majority of the teachers and the students believed that if computers were used to serve their set purpose, then they could make considerable contributions to education. A large majority of the students' parents, on the other hand, regard the use of computers in education as a great opportunity for the students. The views of the teachers, students and students' parents on the FATIH Project usually overlap. Most of the participants in the study pointed out that the FATIH Project was intended to use technology effectively in education. Moreover, each individual participant described their role in the FATIH Project in accordance with their relative position and stated that they could perform whatever was expected of them for the effective and efficient use and progress of the project. The views of the participants regarding the FATİH Project vary according to the kind of the participants.

Keywords: education, FATIH project, technology, students

Procedia PDF Downloads 420
1866 Canadian Business Leaders’ Phenomenological Online Education Expansion

Authors: Amna Khaliq

Abstract:

This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.

Keywords: strategic leadership, Canada, education, technology

Procedia PDF Downloads 46
1865 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 104
1864 Study on Environmental Capacity System of the Aged Care Villages Influenced by Tourists

Authors: Yuan Fang, Wang-Ming Li, Yi-Chen Ruan

Abstract:

Rural healthy old-age care for urban elderly who go to surrounding villages on vacation is a new mode of old-age care in developed coastal areas of China. Such villages that receive urban elderly can be called old-caring villages. Due to the popularity of healthy old-age care in rural areas, more and more urban elderly people participate in the ranks of rural old-age care, resulting in excessive number of tourists in some old-caring villages, exceeding the carrying capacity of the village. Excessive passenger flow may damage the ecological environment, social environment, and facilities environment of the village, and even affect the development potential of the village pension industry. On the basis of on-site investigation and questionnaire survey, this paper summarizes the willingness and behavioral characteristics of the urban elderly population and finds that it will have a certain impact on the old-caring villages in the process of pension vacation in the aspects of ecology, construction, society, and economy. According to the influence of tourists, the paper constructs a system of capacity restriction factors of the old-caring villages, which includes four types: ecological environment capacity, policy environment capacity, perceived congestion capacity, and village service capacity, and fourteen specific indicators. It will provide a theoretical basis for reasonable control of the development scale of the old-caring villages.

Keywords: old-caring villages, restriction factors system, tourists' influence, environmental capacity

Procedia PDF Downloads 128
1863 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor

Authors: Ibrahim Makram Ibrahim Salib

Abstract:

Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.

Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income

Procedia PDF Downloads 45
1862 Leadership Development of Professional Ethiopian Women in Science, Technology, Engineering, and Mathematics: Insights Gained through an Onsite Culturally Embedded Workshop

Authors: Araceli Martinez Ortiz, Gillian Bayne, Solomon Abraham

Abstract:

This paper describes research led by faculty from three American universities and four Ethiopian universities on the delivery of professional leadership development for early-career female Ethiopian university instructors in the Science, Technology, Engineering, and Mathematics (STEM) fields. The objective was to carry out a case study focused on the impact of an innovative intervention program designed to assist in the empowerment and leadership development related to teaching effectiveness, scholarly activity participation, and professional service participation by female instructors. This research was conducted utilizing a case study methodology for the weeklong intervention and a survey to capture the voices of the leadership program participants. The data regarding insights into the challenges and opportunities for women in these fields is presented. The research effort project expands upon existing linkages between universities to support professional development and research effort in this region of the world. Findings indicate the positive reception of this kind of professional development by the participating women. Survey data also reflects the particular cultural challenges professional women in STEM education face in Ethiopia as well as the global challenges of balancing family expectations with career development.

Keywords: Ethiopian women, STEM leadership, professional development, gender equity

Procedia PDF Downloads 89
1861 Effective Validation Model and Use of Mobile-Health Apps for Elderly People

Authors: Leonardo Ramirez Lopez, Edward Guillen Pinto, Carlos Ramos Linares

Abstract:

The controversy brought about by the increasing use of mHealth apps and their effectiveness for disease prevention and diagnosis calls for immediate control. Although a critical topic in research areas such as medicine, engineering, economics, among others, this issue lacks reliable implementation models. However, projects such as Open Web Application Security Project (OWASP) and various studies have helped to create useful and reliable apps. This research is conducted under a quality model to optimize two mHealth apps for older adults. Results analysis on the use of two physical activity monitoring apps - AcTiv (physical activity) and SMCa (energy expenditure) - is positive and ideal. Through a theoretical and practical analysis, precision calculations and personal information control of older adults for disease prevention and diagnosis were performed. Finally, apps are validated by a physician and, as a result, they may be used as health monitoring tools in physical performance centers or any other physical activity. The results obtained provide an effective validation model for this type of mobile apps, which, in turn, may be applied by other software developers that along with medical staff would offer digital healthcare tools for elderly people.

Keywords: model, validation, effective, healthcare, elderly people, mobile app

Procedia PDF Downloads 199
1860 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 355
1859 Care and Support for Infants and Toddlers with Special Needs

Authors: Florence A. Undiyaundeye, Aniashie Akpanke

Abstract:

Early identification of developmental disorders in infants and toddlers is critical for the well being of children. It is also an integral function of the primary care medical provider and the early care given in the home or crèche. This paper is focused at providing information on special need infants and toddlers and strategies to support them in developmental concern to cope with the challenges in and out of the classroom and to interact with their peers without stigmatization and inferiority complex. The target children are from birth through three years of age. There is a strong recommendation for developmental surveillance to be incorporated at every well child preventive care program in training and practical stage of formal school settings. The paper posits that any concerns raised during surveillance should be promptly addressed with standardized developmental screening by appropriate health service providers. In addition screening tests should be administered regularly at age 9+, 19+ and 30 months of these infants. The paper also establishes that the early identification of these developmental challenges of the infants and toddlers should lead to further developmental and medical evaluation, diagnosis and treatment, including early developmental school intervention, control and teaching and learning integration and inclusion for proper career build up. Children diagnosed with developmental disorders should be identified as children with special needs so that management is initiated and its underlying etiology may also drive a range of treatment of the child, to parents. Conselling and school integration as applicable to the child’s specific need and care for sustenance in societal functioning.

Keywords: care, special need, support, infants and toddlers, management and developmental disorders

Procedia PDF Downloads 368
1858 Importance of Occupational Safety and Health in Dam Construction Site

Authors: Naci Büyükkaraciğan, Yildirim Akyol

Abstract:

Large plants that covering the back and accumulate water of a river valley for energy production, drinking, irrigation water supply, economic benefits that serve many purposes, such as regulation of flood protection, are called dams. Place, in which unites in order to achieve an optimum balance between manpower for Lowest cost and economic as belonging to that structure to create machines, materials and construction of the project, is called as the site. Dam construction sites are combined sites in together in many businesses. Therefore, there can be found in the many workers and machines are many accidents in this type of construction sites. The necessity of systematic and scientific studies due to various reasons arises in order to be protected from conditions that could damage the health, During the execution of the work on construction sites. Occupational health and safety of the study, called the case, also in the European Union has begun to be addressed by weight since the 1980s. In particular, issued in 1989 89/391/EEC on occupational health and safety directive, occupational health and adopted the Directive within the framework of the security field, and then exposed to a large number of individual directive within this framework on the basis of the directive. Turkey's Law No. 6331 entered into force in June 2012 on the subject. In this study, measures related to the construction site of the dam should be taken with occupational safety and health have been examined and tried to put forward recommendations on the subject.

Keywords: civil engineering, dam, occupational safety and health, site organizations

Procedia PDF Downloads 314
1857 Incidence of Cancer in Patients with Alzheimer's Disease: A 11-Year Nationwide Population-Based Study

Authors: Jun Hong Lee

Abstract:

Background: Alzheimer`s disease (AD) I: creases with age and is characterized by the premature progressive loss of neuronal cell. In contrast, cancer cells have inappropriate cell proliferation and resistance to cell death. Objective: We evaluated the association between cancer and AD and also examined the specific types of cancer. Patients and Methods/Material and Methods: This retrospective, nationwide, longitudinal study used National Health Insurance Service – Senior cohort (NHIS-Senior) 2002-2013, which was released by the KNHIS in 2016, comprising 550,000 random subjects who were selected from over than 60. The study included a cohort of 4,408 patients who were first diagnoses as AD between 2003 and 2005. To match each dementia patient, 19,150 subjects were selected from the database by Propensity Score Matching. Results: We enrolled 4,790 patients for analysis in this cohort and the prevalence of AD was higher in female (19.29%) than in male (17.71%). A higher prevalence of AD was observed in the 70-84 year age group and in the higher income status group. A total of 540 cancers occurred within the observation interval. Overall cancer was less frequent in those with AD (12.25%) than in the control (18.46%), with HR 0.704 (95% Confidence Intervals (CIs)=0.0.64-0.775, p-Value < 0.0001). Conclusion: Our data showed a decreased incidence of overall cancers in patients with AD similar to previous studies. Patients with AD had a significantly decreased risk of colon & rectum, lung and stomach cancer. This finding lower than but consistent with Western countries. We need further investigation of genetic evidence linking AD to cancer.

Keywords: Alzheimer, cancer, nationwide, longitudinal study

Procedia PDF Downloads 160
1856 Leader Personality Traits and Constructive Voice Behavior: Mediating Roles of Empowering Leadership and Leader-Member Exchange

Authors: Umamaheswara Rao Jada, Susmita Mukhopadhyay

Abstract:

Employee voice behavior has emerged as an important topic in relation to understanding the paybacks within the organizations. Organizations are expecting employees to contribute in the form of suggestions and ideas that not only help an organization to grow but also survive the turbulent times. Leadership in the organization enables and arouses an individual to offer constructive ideas. The significant impact of leadership is undeniable in a context of creating an environment that promotes a free flow of thoughts and ideas in the organization which in turn is significantly influenced by the personality of the leader. Therefore our study aims at examining the underlying factors which influence employee constructive voice behavior in connection with leader’s personality, empowering form of leadership and leader-member exchange in the organization sequentially. A standardized survey questionnaire was used to collect sample of 272 service executives in India. Smart PLS 2.0 was used to test hypothesis and explore the mediation effect. The result shows that the leader personality traits of agreeableness and conscientiousness were positively related to empowering leadership, whereas neuroticism was unrelated to empowering leadership. Empowering leadership influenced followers’ constructive voice behavior significantly. Furthermore, the relationship was partially mediated by leader member exchange relationship. Theoretical and practical implications of the findings, as well as directions for the future line of research, have been presented in the study.

Keywords: constructive voice, empowering leadership, leader member exchange (LMX), leader personality traits

Procedia PDF Downloads 280
1855 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems

Authors: Adeniyi Onasanya, Maher Elshakankiri

Abstract:

In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.

Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services

Procedia PDF Downloads 155
1854 Corrosion Resistance Evaluation of Reinforcing Bars: A Comparative Study of Fusion Bonded Epoxy Coated, Cement Polymer Composite Coated and Dual Zinc Epoxy Coated Rebar for Application in Reinforced Concrete Structures

Authors: Harshit Agrawal, Salman Muhammad

Abstract:

Degradation to reinforced concrete (RC), primarily due to corrosion of embedded reinforcement, has been a major cause of concern worldwide. Among several ways to control corrosion, the use of coated reinforcement has gained significant interest in field applications. However, the choice of proper coating material and the effect of damage over coating are yet to be addressed for effective application of coated reinforcements. The present study aims to investigate and compare the performance of three different types of coated reinforcements —Fusion-Bonded Epoxy Coating (FBEC), Cement Polymer Composite Coating (CPCC), and Dual Zinc-Epoxy Coating (DZEC) —in concrete structures. The aim is to assess their corrosion resistance, durability, and overall effectiveness as coated reinforcement materials both in undamaged and simulated damaged conditions. Through accelerated corrosion tests, electrochemical analysis, and exposure to aggressive marine environments, the study evaluates the long-term performance of each coating system. This research serves as a crucial guide for engineers and construction professionals in selecting the most suitable corrosion protection for reinforced concrete, thereby enhancing the durability and sustainability of infrastructure.

Keywords: corrosion, reinforced concrete, coated reinforcement, seawater exposure, electrochemical analysis, service life, corrosion prevention

Procedia PDF Downloads 56
1853 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 572
1852 The Virtual Container Yard: Identifying the Persuasive Factors in Container Interchange

Authors: L. Edirisinghe, Zhihong Jin, A. W. Wijeratne, R. Mudunkotuwa

Abstract:

The virtual container yard is an effective solution to the container inventory imbalance problem which is a global issue. It causes substantial cost to carriers, which inadvertently adds to the prices of consumer goods. The virtual container yard is rooted in the fundamentals of container interchange between carriers. If carriers opt to interchange their excess containers with those who are deficit, a substantial part of the empty reposition cost could be eliminated. Unlike in other types of ships, cargo cannot be directly loaded to a container ship. Slots and containers are supplementary components; thus, without containers, a carrier cannot ship cargo if the containers are not available and vice versa. Few decades ago, carriers recognized slot (the unit of space in a container ship) interchange as a viable solution for the imbalance of shipping space. Carriers interchange slots among them and it also increases the advantage of scale of economies in container shipping. Some of these service agreements between mega carriers have provisions to interchange containers too. However, the interchange mechanism is still not popular among carriers for containers. This is the paradox that prevails in the liner shipping industry. At present, carriers reposition their excess empty containers to areas where they are in demand. This research applied factor analysis statistical method. The paper reveals that five major components may influence the virtual container yard namely organisation, practice and culture, legal and environment, international nature, and marketing. There are 12 variables that may impact the virtual container yard, and these are explained in the paper.

Keywords: virtual container yard, shipping, imbalance, management, inventory

Procedia PDF Downloads 171
1851 Managing Crowds at Sports Mega Events: Examining the Impact of ‘Fan Parks’ at International Football Tournaments between 2002 and 2016

Authors: Joel Rookwood

Abstract:

Sports mega events have become increasingly significant in sporting, political and economic terms, with analysis often focusing on issues including resource expenditure, development, legacy and sustainability. Transnational tournaments can inspire interest from a variety of demographics, and the operational management of such events can involve contributions from a range of personnel. In addition to television audiences events also attract attending spectators, and in football contexts the temporary migration of fans from potentially rival nations and teams can present event organising committees and security personnel with various challenges in relation to crowd management. The behaviour, interaction and control of supporters has previously led to incidents of disorder and hooliganism, with damage to property as well as injuries and deaths proving significant consequences. The Heysel tragedy at the 1985 European Cup final in Brussels is a notable example, where 39 fans died following crowd disorder and mismanagement. Football disasters and disorder, particularly in the context of international competition, have inspired responses from police, law makers, event organisers, clubs and associations, including stadium improvements, legislative developments and crowd management practice to improve the effectiveness of spectator safety. The growth and internationalisation of fandom and developments in event management and tourism have seen various responses to the evolving challenges associated with hosting large numbers of visiting spectators at mega events. In football contexts ‘fan parks’ are a notable example. Since the first widespread introduction in European football competitions at the 2006 World Cup finals in Germany, these facilities have become a staple element of such mega events. This qualitative, longitudinal, multi-continent research draws on extensive semi-structured interview and observation data. As a frame of reference, this work considers football events staged before and after the development of fan parks. Research was undertaken at four World Cup finals (Japan 2002, Germany 2006, South Africa 2010 and Brazil 2014), four European Championships (Portugal 2004, Switzerland/Austria 2008, Poland/Ukraine 2012 and France 2016), four other confederation tournaments (Ghana 2008, Qatar 2011, USA 2011 and Chile 2015), and four European club finals (Istanbul 2005, Athens 2007, Rome 2009 and Basle 2016). This work found that these parks are typically temporarily erected, specifically located zones where supporters congregate together irrespective of allegiances to watch matches on large screens, and partake in other forms of organised on-site entertainment. Such facilities can also allow organisers to control the behaviour, confine the movement and monitor the alcohol consumption of supporters. This represents a notable shift in policy from previous football tournaments, when the widely assumed causal link between alcohol and hooliganism which frequently shaped legislative and police responses to disorder, also dissuaded some authorities from permitting fans to consume alcohol in and around stadia. It also reflects changing attitudes towards modern football fans. The work also found that in certain contexts supporters have increasingly engaged with such provision which impacts fan behaviour, but that this is relative to factors including location, facilities, management and security.

Keywords: event, facility, fan, management, park

Procedia PDF Downloads 300
1850 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 137
1849 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 102
1848 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 27
1847 Learning a Bayesian Network for Situation-Aware Smart Home Service: A Case Study with a Robot Vacuum Cleaner

Authors: Eu Tteum Ha, Seyoung Kim, Jeongmin Kim, Kwang Ryel Ryu

Abstract:

The smart home environment backed up by IoT (internet of things) technologies enables intelligent services based on the awareness of the situation a user is currently in. One of the convenient sensors for recognizing the situations within a home is the smart meter that can monitor the status of each electrical appliance in real time. This paper aims at learning a Bayesian network that models the causal relationship between the user situations and the status of the electrical appliances. Using such a network, we can infer the current situation based on the observed status of the appliances. However, learning the conditional probability tables (CPTs) of the network requires many training examples that cannot be obtained unless the user situations are closely monitored by any means. This paper proposes a method for learning the CPT entries of the network relying only on the user feedbacks generated occasionally. In our case study with a robot vacuum cleaner, the feedback comes in whenever the user gives an order to the robot adversely from its preprogrammed setting. Given a network with randomly initialized CPT entries, our proposed method uses this feedback information to adjust relevant CPT entries in the direction of increasing the probability of recognizing the desired situations. Simulation experiments show that our method can rapidly improve the recognition performance of the Bayesian network using a relatively small number of feedbacks.

Keywords: Bayesian network, IoT, learning, situation -awareness, smart home

Procedia PDF Downloads 503
1846 Insecurity as a Challenge to Nutritional Status of Children and Mothers in Dansadau, Maru Local Government Area Zamfara State, North Western Nigeria

Authors: Mohammed Hussaini

Abstract:

This paper discusses insecurity as a challenge to the nutritional Status of children and mothers in Dansadau, Maru Local Government area of Zamfara state, Northwestern Nigeria. A Descriptive survey design was used in the study. Objectives of the study were formulated to guide the study. 20 Health workers and 100 mothers were used as population of the study; the instrument validation for data collection was interview. The interview structure was validated by 3 experts, the data collected was analyzed and presented using descriptive standard score (Z-score). The study revealed that, Nutritional Status of children and mothers in Northwest Nigeria specifically Zamfara state is low. This mostly affect children and mother as a result of serious insecurity challenge in the region, consisting of banditry and kidnapping, killing of farmers, destruction of farmland, burning of farm products. The study recommended that the focus is on implementing strong communication strategies to enhance short-term relief initiatives, both governmental and non-governmental organizations should actively play a role in initiating lasting change, especially when tackling issues of insecurity and effectively addressing the rise of armed banditry and other security concerns requires a sophisticated and nuanced strategy.

Keywords: insecurity, malnutrition, children, mothers

Procedia PDF Downloads 38
1845 Study of the Economic Development of Border Areas Malinau District

Authors: Indri Nilam Sari, Aris Subagiyo, Nindya Sari

Abstract:

Malinau Regency border area is an area which is based on the RTRWN and the development priority. But, in real border area Malinau Regency placed as backyard from Indonesian area and caused development lag that is fairly large compared by town area in Malinau Regency. This research aimed to know the condition of the gap in the Malinau Regency border and its influence on the development of the border region as well as knowing the problems related to the economy development of society in the area of the border district of Malinau. Methods of analysis are used in namely descriptive analysis that represent analysis of land use and analysis of movement activities of the population, level analysis facility and infrastructure, economy analysis that represent top commodity determination analysis (LQ and Growth Share) and accessibility. The results of the study showed that the condition of the Malinau Regency border come within the gap as seen from the contributions of infrastructure repair facilities and accessibility advocates, communities, scattered seed commodities come within the borders and human resources with the condition of the most Upstream Bahau town in the backwaters of the town more. There are a few problems that cause the condition area of the border experiencing inequality, lack of human resources, poor infrastructure, lack of accessibility and low levels of security so that it brings development recommendations was the development of the flagship commodities and infrastructure as well as supporting community economic infrastructure, as well as human resources.

Keywords: border, economy, development, Malinau

Procedia PDF Downloads 433
1844 Greed and Grievance Revisisted: The Case of ISIL

Authors: Amjed Rasheed

Abstract:

Rebellions are driven by several incentives. They do not often occur because of historical grievances or political exclusion. They can be driven by the desire to control over natural resources, or by both. In the case of the Islamic State (ISIL), greed and grievance are both drive this radical group to operate in Iraq and Syria. This article aims to show that grievance was the trigger to the emergence of ISIL. It also aims to demonstrate that ISIL is using oil as a tool, to implements its political ends, than a purpose per se. In other words, the emergence of ISIL is based on socio-political conditions, which are domestically driven, and oil is not ISIL’s aim but a source of revenue to finance its activities. This paper applies conflict analysis methodology to analyse the conflict in Iraq and Syria, with a specific highlight to ISIL. By doing so, it gives ahistorical background on emergence of ISIL. It also provides an insightful explanation on the main dynamics and the tactics this organisation applies. It also delivers a sufficient explanation on how it recruits its members, both local and international. It concludes that tackling ISIL needs a more sophisticated approach than the one Obama administration has adopted. It is more a political issue to be tackled by political means, than a military one to be tackled by military means. The current war is an Intra-Sunni war, and therefore, Sunni states have to be on board to crackdown ISIL. Besides, the article finishes with the argument that democratisation is not necessarily the key answer to bring stability to the region, but a sort of governance that provides security and material needs to individuals.

Keywords: ISIL, Iraq, domestic politics, Islamic radicalisation

Procedia PDF Downloads 347
1843 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict

Authors: Zhao Xinlei

Abstract:

The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.

Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition

Procedia PDF Downloads 61
1842 A Rhetorical History of Legalization of Sex Reassignment Surgery in Taiwan: 'Transing-Nationalism' and Its Discursive Formation as the Case

Authors: Hsiao-Yung Wang

Abstract:

This essay aims to examine how the discursive formation of the 'transing-nationalism' (which is extended and slightly modified from 'homonationalism') had been constructed in the Taiwanese news media before the legalization of 'sex reassignment surgery (SRS)' in 1988. Samples for rhetorical analysis were selected from two mainstream newspapers, including China Times, and United Daily. The time frame for sample selection is from August 1953 (when the first transgender case was reported) to 1988, while the SRS was legalized in Taiwan. To enhance understanding of media representation as contextualized-based, the author refers to the representative of spatial rhetoric Mikhail Bakhtin for his late study on 'emergence' and 'visualization of time' in Bildungsroman; thereby categorizing the media discourse of transgender into two critical period: (1) transgender as 'misrecognized' and 'included' into the rhetoric of modern medical space; (2) transgender as 'institutionalized' into discourse of protection and salvation by the reified sympathy of nation-state. These two periods and relevant spatial rhetoric were of no immediate concern on the vital interest of transgender individuals; therefore constructed the imagery of transgender for the service of nationalism rather than gender consciousness or human right rhetoric. Based on the research findings, this essay concludes that 'queer multiplicity' should be regarded as not only the guideline for the amendment of the gendered policies and laws but the rhetorical resources for the mobilization of transgender movement in Taiwan from now on.

Keywords: Bakhtin, legalization, rhetoric, sex reassignment surgery, transgender, transing-nationalism

Procedia PDF Downloads 159
1841 An Interior Design Project Interventions about Changing Student Beliefs about Poverty, Homelessness, and Community Service

Authors: Alireza Derambakhsh

Abstract:

The reason for this study was to inspect undergraduate interior design student state of mind toward destitution, vagrancy, and group administration. An auxiliary intention was to figure out whether introduction to plan ventures for the individuals who have encountered hardship would change student convictions. All first year recruits (n = 18), sophomore (n = 26), junior (n = 17), and senior (n = 25) interior design undergraduate students at a public university completed a questionnaire in light of a few current scales. Amid the semester, the sophomores dealt with assignments that were intended to provide exposure to different socio-economic groups. Students finished three projects. Initially, the outline of a makeshift destitute asylum. Second, a re-model of a childcare focus office and gathering region that gives administrations to low-salary families, and third, the outline of a low-wage, private home. In these ventures, students were obliged to direct broad data assembling so they could better comprehend the issues connected with destitution. Toward the end of the semester, the sophomores finished the survey again and were asked extra inquiries in regards to the class and projects. Students’ sentiments towards the poor were more individualistic when contrasted with the white collar class, yet when the working class correlation was uprooted, some of their mentality gave a more unpredictable comprehension of destitution and vagrancy. The semester-long intercession fundamentally moved students' understanding that underscored auxiliary and multifaceted reason.

Keywords: interior design, destitution, vagrancy, group administration

Procedia PDF Downloads 408
1840 Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya

Authors: Osama Sassi, Manal Eltorki, Iftikhar Ahmad

Abstract:

Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection.

Keywords: corrosion mitigation on gas transmission pipelines, pipeline integrity management, corrosion management of gas pipelines, prevention and inspection of corrosion

Procedia PDF Downloads 51
1839 Trend Analysis of Africa’s Entrepreneurial Framework Conditions

Authors: Sheng-Hung Chen, Grace Mmametena Mahlangu, Hui-Cheng Wang

Abstract:

This study aims to explore the trends of the Entrepreneurial Framework Conditions (EFCs) in the five African regions. The Global Entrepreneur Monitor (GEM) is the primary source of data. The data drawn were organized into a panel (2000-2021) and obtained from the National Expert Survey (NES) databases as harmonized by the (GEM). The Methodology used is descriptive and uses mainly charts and tables; this is in line with the approach used by the GEM. The GEM draws its data from the National Expert Survey (NES). The survey by the NES is administered to experts in each country. The GEM collects entrepreneurship data specific to each country. It provides information about entrepreneurial ecosystems and their impact on entrepreneurship. The secondary source is from the literature review. This study focuses on the following GEM indicators: Financing for Entrepreneurs, Government support and Policies, Taxes and Bureaucracy, Government programs, Basic School Entrepreneurial Education and Training, Post school Entrepreneurial Education and Training, R&D Transfer, Commercial And Professional Infrastructure, Internal Market Dynamics, Internal Market Openness, Physical and Service Infrastructure, and Cultural And Social Norms, based on GEM Report 2020/21. The limitation of the study is the lack of updated data from some countries. Countries have to fund their own regional studies; African countries do not regularly participate due to a lack of resources.

Keywords: trend analysis, entrepreneurial framework conditions (EFCs), African region, government programs

Procedia PDF Downloads 51
1838 Access to the Community and Needed Supports among People with Physical Disabilities Receiving Long-Term Services and Supports in the United States

Authors: Stephanie Giordano, Eric Lam, Rosa Plasencia

Abstract:

An important piece of active aging is ensuring people have the right support to meet individual needs. Using NCI-AD data, we will look at measures of satisfaction with community access and needed services among people with physical disabilities receiving LTSS in the US. National Core Indicators—Aging and Disabilities (NCI-AD) is a voluntary effort by State Medicaid, aging, and disability agencies across the US to measure and track their own performance. NCI-AD uses a standardized survey – the Adult Consumer Survey (ACS), to hear directly from people receiving services about the quality of services and supports they receive. Data from the 2018-19 ACS found that compared to people without a physical disability, those with a physical disability were more likely to make choices about the services they receive, including when and how often they receive those services. Yet people with a physical disability were less likely to report they get enough assistance with everyday activities (e.g., shopping, housework, and taking medications) and self-care (e.g., dressing or bathing) and more likely to report that services and supports do not fully meet their needs and goals. A further breakdown by age shows that people 40-65 years old with a physical disability experienced even greater barriers to being as active in the community as they would like to be, indicating a need to better support people as they age with or into a disability. We will explore how these and other outcomes were affected by COVID-19, take a closer look at outcomes by demographics (e.g., race/ethnicity, gender, and mental health diagnoses) and discuss implications on the future needs of service systems.

Keywords: quality-of-life, long-term services and supports, person-centered, community

Procedia PDF Downloads 88