Search results for: cyber villages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 658

Search results for: cyber villages

268 Risk Management Strategy for Protecting Cultural Heritage: Case Study of the Institute of Egypt

Authors: Amany A. Ragheb, Ghada Ragheb, Abd ElRahman A.

Abstract:

Egypt has a countless heritage of mansions, castles, cities, towns, villages, industrial and manufacturing sites. This richness of heritage provides endless and matchless prospects for culture. Despite being famous worldwide, Egypt’s heritage still is in constant need of protection. Political conflicts and religious revolutions form a direct threat to buildings in various areas, historic, archaeological sites, and religious monuments. Egypt has witnessed two revolutions in less than 60 years; both had an impact on its architectural heritage. In this paper, the authors aim to review legal and policy framework to protect the cultural heritage and present the risk management strategy for cultural heritage in conflict. Through a review of selected international models of devastated architectural heritage in conflict zones and highlighting some of their changes, we can learn from the experiences of other countries to assist towards the development of a methodology to halt the plundering of architectural heritage. Finally, the paper makes an effort to enhance the formulation of a risk management strategy for protection and conservation of cultural heritage, through which to end the plundering of Egypt’s architectural legacy in the Egyptian community (revolutions, 1952 and 2011); and by presenting to its surrounding community the benefits derived from maintaining it.

Keywords: cultural heritage, legal regulation, risk management, preservation

Procedia PDF Downloads 375
267 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 245
266 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 329
265 An Overview of Onshore and Offshore Wind Turbines

Authors: Mohammad Borhani, Afshin Danehkar

Abstract:

With the increase in population and the upward trend of energy demand, mankind has thought of using suppliers that guarantee a stable supply of energy, unlike fossil fuels, which, in addition to the widespread emission of greenhouse gases that one of the main factors in the destruction of the ozone layer and it will be finished in a short time in the not-so-distant future. In this regard, one of the sustainable ways of energy supply is the use of wind converters. That convert wind energy into electricity. For this reason, this research focused on wind turbines and their installation conditions. The main classification of wind turbines is based on the axis of rotation, which is divided into two groups: horizontal axis and vertical axis; each of these two types, with the advancement of technology in man-made environments such as cities, villages, airports, and other human environments can be installed and operated. The main difference between offshore and onshore wind turbines is their installation and foundation. Which are usually divided into five types; including of Monopile Wind Turbines, Jacket Wind Turbines, Tripile Wind Turbines, Gravity-Based Wind Turbines, and Floating Offshore Wind Turbines. For installation in a wind power plant requires an arrangement that produces electric power, the distance between the turbines is usually between 5 or 7 times the diameter of the rotor and if perpendicular to the wind direction be If they are 3 to 5 times the diameter of the rotor, they will be more efficient.

Keywords: wind farms, Savonius, Darrieus, offshore wind turbine, renewable energy

Procedia PDF Downloads 78
264 Community Base Peacebuilding in Fragile Context

Authors: Nizar Ahmad

Abstract:

Peace without community participation will remain a vision, so, this study presents the contribution and efforts made by community base organization in views of local conflict affect population in Pakhtun society. A four conflict affected villages of Malakad Division were selected and a sample size of 278 household respondents were determined through online survey system software out of total 982 households. A Chi-square test was applied to ascertain association between various communication base organizations factors with state of peace in the area. It was found that provision of humanitarian aid, rehabilitation of displaced population, rebuilding of trust in government and peace festivals by communication organization had significant association with state of peace in the area. In contrast provision of training, peace education monitoring and reporting of human rights violation in war zone by local organization was non-significantly related to the state of peace in the area. Community base organization play an active role in building peace in the area but lack capacity, linkages with external actors and outside support. National and international organization actors working in the area of peace and conflict resolution need to focus on the capacity, networking and peace initiatives of local organizations working in fragile context.

Keywords: community base peacebuilding, conflict resolution, terrorism, violence

Procedia PDF Downloads 254
263 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 224
262 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018

Authors: Aneta Ostaszewska

Abstract:

The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.

Keywords: women, black protests, communitas, experience, Poland, abortion law

Procedia PDF Downloads 348
261 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter

Authors: Yvonne Dedzo

Abstract:

Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.

Keywords: social medida, citizen journalist, niche authorities, selective processes theory

Procedia PDF Downloads 40
260 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 83
259 An Archaeological Approach to Dating Polities and Architectural Ingenuity in Ijebu, South Western Nigeria

Authors: Olanrewaju B. Lasisi

Abstract:

The position of Ijebu-Ode, the historical capital of the Ijebu Kingdom, at the center of gravity of Ijebu land is enclosed by the 180-km-long earthwork and suggests a centrally controlled project. This paper reflects on the first stratigraphic drawing of the banks and ditches of this earthwork, and place its construction mechanism in a chronological framework. Nine radiocarbon dates obtained at the site suggest that the earthwork was built in the late 14th or early 15th century. This suggests a relationship with the Ijebu Kingdom, which pre-existed the opening of the Atlantic trade but first became visible only in the Portuguese records in the 1480s. In June 2017, more earthworks were found but within the core of Ijebu Land. This most recent finding points to an extension of territory from the center to the outlying villages. One central question about this discovery of monumental architectures that was functional around the 14th century or before is in its mode of construction. Apparently, iron tools must have been used in the construction of ‘a 20m deep ditch that runs 180km in circumference.’ Thus, the discovery of iron-working sites around the vicinity of the earthwork is a pointer to this building process that is up till now shrouded in mystery. By comparing the chronology of Ijebu earthworks with the evidence of Iron working in south western Nigeria around the first half of the first millennium AD, it can be thought that the rise in polity triggered the knowledge of metallurgy in the region.

Keywords: archaeology, earthworks, Ijebu, metallurgy

Procedia PDF Downloads 207
258 Social Inclusion Challenges in Indigenous Communities: Case of the Baka Pygmies Community of Cameroon

Authors: Igor Michel Gachig, Samanta Tiague

Abstract:

Baka ‘Pygmies’ is an indigenous community living in the rainforest region of Cameroon. This community is known to be poor and marginalized from the political, economic and social life, regardless of sedentarization and development efforts. In fact, the social exclusion of ‘Pygmy’ people prevents them from gaining basic citizen’s rights, among which access to education, land, healthcare, employment and justice. In this study, social interactions, behaviors, and perceptions were considered. An interview guide and focus group discussions were used to collect data. A sample size of 97 was used, with 60 Baka Pygmies and 37 Bantus from two Baka-Bantu settlements/villages of the south region of Cameroon. The data were classified in terms of homogenous, exhaustive and exclusive categories. This classification has enabled factors explaining social exclusion in the Baka community to be highlighted using content analysis. The study shows that (i) limited access to education, natural resources and care in modern healthcare organizations, and (ii) different views on the development expectations and integration approaches both highlight the social exclusion in the Baka ‘Pygmies’ community. Therefore, an effective and adequate social integration of ‘Pygmies’ based on cultural peculiarities and identity, as well as reduction of disparities and improvement of their access to education should be of major concern to the government and policy makers.

Keywords: development, indigenous people, integration, social exclusion

Procedia PDF Downloads 110
257 Expand Rabies Post-Exposure Prophylaxis to Where It Is Needed the Most

Authors: Henry Wilde, Thiravat Hemachudha

Abstract:

Human rabies deaths are underreported worldwide at 55,000 annual cases; more than of dengue and Japanese encephalitis. Almost half are children. A recent study from the Philippines of nearly 2,000 rabies deaths revealed that none of had received incomplete or no post exposure prophylaxis. Coming from a canine rabies endemic country, this is not unique. There are two major barriers to reducing human rabies deaths: 1) the large number of unvaccinated dogs and 2) post-exposure prophylaxis (PEP) that is not available, incomplete, not affordable, or not within reach for bite victims travel means. Only the first barrier, inadequate vaccination of dogs, is now being seriously addressed. It is also often not done effectively or sustainably. Rabies PEP has evolved as a complex, prolonged process, usually delegated to centers in larger cities. It is virtually unavailable in villages or small communities where most dog bites occur, victims are poor and usually unable to travel a long distance multiple times to receive PEP. Reseacrh that led to better understanding of the pathophysiology of rabies and immune responses to potent vaccines and immunoglobulin have allowed shortening and making PEP more evidence based. This knowledge needs to be adopted and applied so that PEP can be rendered safely and affordably where needed the most: by village health care workers who have long performed more complex services after appropriate training. Recent research makes this an important and long neglected goal that is now within our means to implement.

Keywords: rabies, post-exposure prophylaxis, availability, immunoglobulin

Procedia PDF Downloads 242
256 Does One Size Fit All: Immigrant Youths, Bullying and Peer-Aggression

Authors: Shila Khayambashi

Abstract:

For the past few decades, Western researchers studied different youth issues, such as bullying, peer-aggression, depression, self-harm, and suicide, in a formulated and standardized manner. These researchers have grounded their studies upon a series of introduced characteristics and traits, which pragmatically defined the action of the individuals involved in these activities (Olweus, 1994). The phenomena of bullying and peer-aggression have touched the lives of many immigrant youths, as well. However, in the case of these immigrant young adults, the Police investigated, and later dismissed, the victims’ involvement in drugs and gangs’ activities, instead of questioning the possibility of the peer-aggression. This paper argues that neither government officials nor school personnel has ever investigated any cyber-documentation which would clarify these youth’s untimely deaths or search for any indication of peer-aggression at school. Through my ongoing research, I will problematize the Eurocentric definition of bullying and its limitations. I question the assumed universality of these definitions’ characteristics and their lack of minority representation. This research questions explicitly the positionality of the displaced youth within the promised multiculturality of Canada. I will ask: Does one size fit all, considering the bio-psycho-socio-economic differences between the Eastern and the Western worlds? More importantly, how does the epidemy of the communicative devices, like smartphones, and communicative apps, like Twitter and Snapchats, facilitate or hinder peer-aggression for the displaced youths?

Keywords: Bullying , Immigrant youths, Peer aggression, Minority population

Procedia PDF Downloads 115
255 The Pitfalls of Empowerment Initiatives in India: Overcoming Male Resistance to Women Empowerment Through Community Outreach, TVET, and Improved Sanitation

Authors: Christopher Coley, Srividya Sheshadri, Rao R. Bhavani

Abstract:

Empowering marginalized populations, especially women, with greater economic, social, and other leadership roles has been shown to have a profound effect on entire communities. There are discernible links between sustainable development, poverty reduction, and skill training for empowerment; however, one of the major challenges with implementing empowerment programs is to establish an understanding within the community that investing in women’s education carries the potential of high return for everyone. Effective strategies that can both empower women, and overcome the complex social issues normally faced, need to be developed and shared across stakeholders. Amrita University’s AMMACHI Labs, a research lab engaged in women empowerment through Technical Vocational Education and Training (TVET), has launched a new initiative, WE: Sanitation, a project aiming to train women to build their own toilets and promote healthy sanitation practices in rural villages across India. While in some cases, the community has come together and toilets are being built, there has been resistance by the community, especially men, in many places. This paper will explore the experiences of field workers and the initial results of the WE: Sanitation project, including observations on the trends of community dynamics, raise important questions for the direction of development work in general, and especially for sanitation projects in rural India.

Keywords: community-based development, gender dynamics, Indian sanitation, women empowerment, TVET

Procedia PDF Downloads 358
254 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 123
253 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 235
252 Comparing Groundwater Fluoride Level with WHO Guidelines and Classifying At-Risk Age Groups; Based on Health Risk Assessment

Authors: Samaneh Abolli, Kamyar Yaghmaeian, Ali Arab Aradani, Mahmood Alimohammadi

Abstract:

The main route of fluoride uptake is drinking water. Fluoride absorption in the acceptable range (0.5-1.5 mg L-¹) is suitable for the body, but it's too much consumption can have irreversible health effects. To compare fluoride concentration with the WHO guidelines, 112 water samples were taken from groundwater aquifers in 22 villages of Garmsar County, the central part of Iran, during 2018 to 2019.Fluoride concentration was measured by the SPANDS method, and its non-carcinogenic impacts were calculated using EDI and HQ. The statistical population was divided into four categories of infant, children, teenagers, and adults. Linear regression and Spearman rank correlation coefficient tests were used to investigate the relationships between the well's depth and fluoride concentration in the water samples. The annual mean concentrations of fluoride in 2018 and2019 were 0.75 and 0.64 mg -¹ and, the fluoride mean concentration in the samples classifying the cold and hot seasons of the studied years was 0.709 and 0.689 mg L-¹, respectively. The amount of fluoride in 27% of the samples in both years was less than the acceptable minimum (0.5 mg L-¹). Also, 11% of the samples in2018 (6 samples) had fluoride levels higher than 1.5 mg L-¹. The HQ showed that the children were vulnerable; teenagers and adults were in the next ranks, respectively. Statistical tests showed a reverse and significant correlation (R2 = 0.02, < 0.0001) between well depth and fluoride content. The border between the usefulness/harmfulness of fluoride is very narrow and requires extensive studies.

Keywords: fluoride, groundwater, health risk assessment, hazard quotient, Garmsar

Procedia PDF Downloads 45
251 Typhoon Disaster Risk Assessment of Mountain Village: A Case Study of Shanlin District in Kaohsiung

Authors: T. C. Hsu, H. L. Lin

Abstract:

Taiwan is mountainous country, 70% of land is covered with mountains. Because of extreme climate, the mountain villages with sensitive and fragile environment often get easily affected by inundation and debris flow from typhoon which brings huge rainfall. Due to inappropriate development, overuse and fewer access roads, occurrence of disaster becomes more frequent through downpour and rescue actions are postponed. However, risk map is generally established through administrative boundaries, the difference of urban and rural area is ignored. The neglect of mountain village characteristics eventually underestimates the importance of factors related to vulnerability and reduces the effectiveness. In disaster management, there are different strategies and actions at each stage. According to different tasks, there will be different risk indices and weights to analyze disaster risk for each stage and then it will contribute to confront threat and reduce impact appropriately on right time. Risk map is important in mitigation, but also in response stage because some factors such as road network will be changed by disaster. This study will use risk assessment to establish risk map of Shanlin District which is mountain village in Kaohsiung as a case study in mitigation and response stage through Analytic Hierarchy Process (AHP). AHP helps to recognize the composition and weights of risk factors in mountain village by experts’ opinions through survey design and is combined with present potential hazard map to produce risk map.

Keywords: risk assessment, mountain village, risk map, analytic hierarchy process

Procedia PDF Downloads 373
250 Climate Adaptability of Vernacular Courtyards in Jiangnan Area, Southeast China

Authors: Yu Bingqing

Abstract:

Courtyards with suitable scale can effectively modify the microclimate and improve thermal comfort. To comprehend the thermal environment of courtyards with different scales in various areas of Jiangnan, this study conducts field research in three traditional villages: (1) Chunman-ting House in Guanlu Village, Huangshan City, Anhui Province, (2) Heqin-tang House in Lizhai Village, Xianju County, Taizhou City, Zhejiang Province, and (3) Langai-Qirui House in Baima-zhai Village, Fengcheng City, Jiangxi Province. First, based on the collected data, the article analyzes the relationship between the thermal environment and the depth-to-height ratio of the courtyard. Second, it employs the Envi-met software to perform numerical simulations, analyzing thermal comfort in various courtyards with different depth-to-height ratios. Finally, it uses the simulation results to deduce the courtyard models suitable for hot summers and cold winters in the Jiangnan area. The result of this study can improve the thermal comfort of vernacular courtyards in the Jiangnan area by adopting a suitable scale for future protection and regeneration. The transformation and utilization of the climate-responsive courtyard model can also become a reference for modern architectural design.

Keywords: vernacular courtyards, thermal environment, depth-to-height ratio, climate adaptability,Southeast China

Procedia PDF Downloads 20
249 An Assessment of Radio-Based Education about Female Genital Cutting and Health and Human Rights Issues in Douentza, Mali

Authors: Juliet Sorensen, Megan Schliep

Abstract:

Introduction: After a multidisciplinary assessment of health and human rights issues in central Mali, a musical album was created in 2014 in Douentza, Mali to provide health information on female genital mutilation/cutting (FGM/C), malaria, HIV/AIDS, girls’ education, breastfeeding, and sanitation. The objective of this study was to assess the impact of this album. Methods: A mixed-methods assessment was conducted with 149 individuals across 10 villages in Douentza Cercle. Analyses focused on the association of radio listening habits, age, sex, ethnicity and education with a public health knowledge score. Results: Over 90% of respondents reported daily radio listening, many listening five or more hours per day. Potential risks of FGM/C cited by participants included death (59%), difficulty in childbirth (48%), sterility (34%), and fistula (33%); when asked about their level of control over FGM/C, 28% stated they would never cut their daughters. Being a listener for 1-5 hours per day was associated with a 11.5% higher score of 'public health knowledge' compared to those listening only a little or not at all (p < 0.01). Education (marginal versus no formal education) was associated with 7.6% increased score (p < 0.01). Conclusion: Radio appears to be a significant part of community members’ daily routines and may be a valuable medium for transmitting information, particularly for lower literacy individuals.

Keywords: female genital cutting, public health and social justice education, radio, Mali

Procedia PDF Downloads 257
248 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 382
247 Development of a Research Platform to Revitalize People-Forest Relationship Through a Cycle of Architectural Embodiments

Authors: Hande Ünlü, Yu Morishita

Abstract:

The total area of forest land in Japan accounts for 67% of the national land; however, despite this wealth and hundred years history of silviculture, today Japanese forestry faces socio-economic stagnation in forestry. While the growing gap in the people-forest relationship causes the depopulation of many forest villages, this paper introduces a methodology aiming to develop a place-specific approach in revitalizing this relationship. The paper focuses on a case study from Taiki town in the Hokkaido region to analyze the place's specific socio-economic requirements through interviews and workshops with the local experts, researchers, and stakeholders. Based on the analyzed facts, a master outline of design requirements is developed to produce locally sourced architectural embodiments that aim to act as a unifying element between the forests and the people of Taiki town. In parallel, the proposed methodology aims to generate a cycle of research feed and a researcher retreat, a definition given by Memu Earth Lab to the researchers' stay at Memu in Taiki town for a defined period to analyze local resources, for the continuous improvement of the introduced methodology to revitalize the interaction between people and forest through architecture.

Keywords: architecture, Japanese forestry, local timber, people-forest relationship, research platform

Procedia PDF Downloads 155
246 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 206
245 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 343
244 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 77
243 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 103
242 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 480
241 Absence of Secured Bathing Spaces and Its Effect on Women: An Exploratory Qualitative Study of Rural Odisha, India

Authors: Minaj Ranjita Singh, Meghna Mukherjee, Abhijeet Jadhav

Abstract:

This is an exploratory qualitative study with an objective to understand the bathing practices followed by rural women and its consequences. Access to safe bathing spaces in rural India is a neglected issue due to which women are affected in various ways. Today, government policies are largely focused towards the building of toilets, but no importance has been given to the construction of bathrooms. Both qualitative and quantitative data were collected using in-depth interviews and focused group discussions with rural women in six villages of Odisha, India. The study was approved by an Institutional Research and Ethics Committee, and informed consent was taken from participants. For most of the participants, the access to water, bathing space and toilet was compromised posing various challenges in their daily lives. Women's daily schedule, hygiene practices, dignity, and health are greatly affected due to this lack. Since bathing in the open has been an ancient practice, the community's perception is benign towards the hardship of women. Lack of exposure to concealed bathing, necessary funds, and competing priorities are some of the household level factors which never let them think about having bathrooms and the lack of water supply, proper drainage system, subsidy or financial support are the governance and policy related factors which prevent their access to secured bathing spaces.

Keywords: bathrooms, dignity, exploratory, rural, qualitative, women's health, women

Procedia PDF Downloads 159
240 Ethnobotanical Survey of Vegetable Plants Traditionally Used in Kalasin Thailand

Authors: Aree Thongpukdee, Chockpisit Thepsithar, Chuthalak Thammaso

Abstract:

Use of plants grown in local area for edible has a long tradition in different culture. The indigenous knowledge such as usage of plants as vegetables by local people is risk to disappear when no records are done. In order to conserve and transfer this valuable heritage to the new generation, ethnobotanical study should be investigated and documented. The survey of vegetable plants traditionally used was carried out in the year 2012. Information was accumulated via questionnaires and oral interviewing from 100 people living in 36 villages of 9 districts in Amphoe Huai Mek, Kalasin, Thailand. Local plant names, utilized parts and preparation methods of the plants were recorded. Each mentioned plant species were collected and voucher specimens were prepared. A total of 55 vegetable plant species belonging to 34 families and 54 genera were identified. The plant habits were tree, shrub, herb, climber, and shrubby fern at 21.82%, 18.18%, 38.18%, 20.00% and 1.82% respectively. The most encountered vegetable plant families were Leguminosae (20%), Cucurbitaceae (7.27%), Apiaceae (5.45%), whereas families with 3.64% uses were Araceae, Bignoniaceae, Lamiaceae, Passifloraceae, Piperaceae and Solanaceae. The most common consumptions were fresh or brief boiled young shoot or young leaf as side dishes of ‘jaeo, laab, namprik, pon’ or curries. Most locally known vegetables included 45% of the studied plants which grow along road side, backyard garden, hedgerow, open forest and rice field.

Keywords: vegetable plants, ethnobotanical survey, Kalasin, Thailand

Procedia PDF Downloads 287
239 Evolution of Minangkabau ‘Induk’ House and its influence on the Architecture

Authors: Noor Hayati Binti Ismail, Mastor Bin Surat, Raja Nafida Binti Raja Shahminan, Shahrul Kamil Bin Yunus

Abstract:

This study is to look the changes, development and evolution taking place in the Minangkabau house. Minangkabau traditional house is a part of the assets of Indonesia's culture and history. In addition to custom house, traditional Minangkabau building also serves as a place to live within the context of human habitats but has slowly through the changes. Luhak Nan Tigo of Luhak Tanah Datar, Agam And Luhak 50 Kota are holding the Minangkabau. ‘Induk’ house is the sole home, Main house or an older home for a gathering place doing activities together. The 'Genius Loci' refers to the unique aspects of the history, the value of a place, culturally and socially. Main house has the aspect of Minangkabau is a house occupied by custom rules that practice matrilineal kinship system and tendency to move out from the community. The study involves several villages and traditional houses at Padang, Bukit Tinggi, Kampar Kiri in Indonesia and Rembau, kuala Pilah, tampin in Negeri Sembilan has been selected to serve as a research field. These factors were the occurrence of evolution Minangkabau house from the ‘induk’, kampar and Negeri Sembilan. In this regard, the identity and uniqueness of the house increasingly difficult to sustain as well as lack of clarity can be understood by the people of the present generation.

Keywords: evolution, Genius loci, ‘Induk’ house, matrilineal kinship

Procedia PDF Downloads 446