Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1267

Search results for: socially engineered attacks

877 Review of the Safety of Discharge on the First Postoperative Day Following Carotid Surgery: A Retrospective Analysis

Authors: John Yahng, Hansraj Riteesh Bookun

Abstract:

Objective: This was a retrospective cross-sectional study evaluating the safety of discharge on the first postoperative day following carotid surgery - principally carotid endarterectomy. Methods: Between January 2010 to October 2017, 252 patients with mean age of 72 years, underwent carotid surgery by seven surgeons. Their medical records were consulted and their operative as well as complication timelines were databased. Descriptive statistics were used to analyse pooled responses and our indicator variables. The statistical package used was STATA 13. Results: There were 183 males (73%) and the comorbid burden was as follows: ischaemic heart disease (54%), diabetes (38%), hypertension (92%), stage 4 kidney impairment (5%) and current or ex-smoking (77%). The main indications were transient ischaemic attacks (42%), stroke (31%), asymptomatic carotid disease (16%) and amaurosis fugax (8%). 247 carotid endarterectomies (109 with patch arterioplasty, 88 with eversion and transection technique, 50 with endarterectomy only) were performed. 2 carotid bypasses, 1 embolectomy, 1 thrombectomy with patch arterioplasty and 1 excision of a carotid body tumour were also performed. 92% of the cases were performed under general anaesthesia. A shunt was used in 29% of cases. The mean length of stay was 5.1 ± 3.7days with the range of 2 to 22 days. No patient was discharged on day 1. The mean time from admission to surgery was 1.4 ± 2.8 days, ranging from 0 to 19 days. The mean time from surgery to discharge was 2.7 ± 2.0 days with the of range 0 to 14 days. 36 complications were encountered over this period, with 12 failed repairs (5 major strokes, 2 minor strokes, 3 transient ischaemic attacks, 1 cerebral bleed, 1 occluded graft), 11 bleeding episodes requiring a return to the operating theatre, 5 adverse cardiac events, 3 cranial nerve injuries, 2 respiratory complications, 2 wound complications and 1 acute kidney injury. There were no deaths. 17 complications occurred on postoperative day 0, 11 on postoperative day 1, 6 on postoperative day 2 and 2 on postoperative day 3. 78% of all complications happened before the second postoperative day. Out of the complications which occurred on the second or third postoperative day, 4 (1.6%) were bleeding episodes, 1 (0.4%) failed repair , 1 respiratory complication (0.4%) and 1 wound complication (0.4%). Conclusion: Although it has been common practice to discharge patients on the second postoperative day following carotid endarterectomy, we find here that discharge on the first operative day is safe. The overall complication rate is low and most complications are captured before the second postoperative day. We suggest that patients having an uneventful first 24 hours post surgery be discharged on the first day. This should reduce hospital length of stay and the health economic burden.

Keywords: carotid, complication, discharge, surgery

Procedia PDF Downloads 146
876 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 270
875 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 403
874 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 196
873 Female Autism Spectrum Disorder and Understanding Rigid Repetitive Behaviors

Authors: Erin Micali, Katerina Tolstikova, Cheryl Maykel, Elizabeth Harwood

Abstract:

Female ASD is seldomly studied separately from males. Further, females with ASD are disproportionately underrepresented in the research at a rate of 3:1 (male to female). As such, much of the current understanding about female rigid repetitive behaviors (RRBs) stems from research’s understanding of male RRBs. This can be detrimental to understanding female ASD because this understanding of female RRBs largely discounts female camouflaging and the possibility that females present their autistic symptoms differently. Current literature suggests that females with ASD engage in fewer RRBs than males with ASD and when females do engage in RRBs, they are likely to engage in more subtle, less overt obsessions and repetitive behaviors than males. Method: The current study utilized a mixed methods research design to identify the type and frequency of RRBs that females with ASD engaged in by using a cross-sectional design. The researcher recruited only females to be part of the present study with the criteria they be at least age six and not have co-occurring cognitive impairment. Results: The researcher collected previous testing data (Autism Diagnostic Interview-Revised (ADI-R), Child or Adolescent/Adult Sensory Profile-2, Autism/ Empathy Quotient, Yale Brown Obsessive Compulsive Checklist, Rigid Repetitive Behavior Checklist (evaluator created list), and demographic questionnaire) from 25 total participants. The participants ages ranged from six to 52. The participants were 96% Caucasion and 4% Latin American. Qualitative analysis found the current participant pool engaged in six RRB themes including repetitive behaviors, socially restrictive behaviors, repetitive speech, difficulty with transition, obsessive behaviors, and restricted interests. The current dataset engaged in socially restrictive behaviors and restrictive interests most frequently. Within the main themes 40 subthemes were isolated, defined, and analyzed. Further, preliminary quantitative analysis was run to determine if age impacted camouflaging behaviors and overall presentation of RRBs. Within this dataset this was not founded. Further qualitative data will be run to determine if this dataset engaged in more overt or subtle RRBs to confirm or rebuff previous research. The researcher intends to run SPSS analysis to determine if there was statistical difference between each RRB theme and overall presentation. Secondly, each participant will be analyzed for presentation of RRB, age, and previous diagnoses. Conclusion: The present study aimed to assist in diagnostic clarity. This was achieved by collecting data from a female only participant pool across the lifespan. Current data aided in clarity of the type of RRBs engage in. A limited sample size was a barrier in this study.

Keywords: autism spectrum disorder, camouflaging, rigid repetitive behaviors, gender disparity

Procedia PDF Downloads 109
872 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 477
871 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 58
870 The Research on Human Resource Management Problem of Turkish Fast Food Company

Authors: Mai Maitiaili Tuerdi

Abstract:

Turkey is one of the countries in which fast food service is growing increasingly in the world. The emergence of KFC and McDonald's to Turkish market is affecting every aspects of local fast-food services. The Turkey's famous catering companies named "Simit Sarayi" and "Güllüoğlu" are famous for accepting the Western fast food management service and skills in order to increase their market share. Also, they have created their unique management skills in this field. In this paper, through empirical and comparative study method we will analyze the famous Turkish local fast-food companies and western human resource management. We will argue how to create and adapt the human resource management while the company is economically and socially growing.

Keywords: human resources management, Turkey, fast food, management

Procedia PDF Downloads 319
869 The Factors to Determine the Content About Gender and Sexuality Education Among Adolescents in China

Authors: Yixiao Tang

Abstract:

The risks of adolescents being exposed to sexually transmitted diseases (STDs) and participating in unsafe sexual practices are increasing. There is the necessity and significance of providing adolescents with appropriate sex education, considering they are at the stage of life exploration and risk-taking. However, in delivering sex education, the contents and instruction methods are usually discussed with contextual differences. In the Chinese context, the socially prejudiced perceptions of homosexuality can be attributed to the traditional Chinese Confucian philosophy, which has been dominating Chinese education for thousands of years. In China, students rarely receive adequate information about HIV, STDs, the use of contraceptives, pregnancies, and other sexually related topics in their formal education. Underlying the Confucian cultural background, this essay will analyze the variables that determine the subject matter of sex education for adolescents and then discuss how this cultural form affects social views and policy on sex education.

Keywords: homosexuality education, adolescent, China, education policy

Procedia PDF Downloads 51
868 Arab and Arab-American Writers as Mediators between Arab and American Cultures in Response to Contemporary Media Representation of Arabs

Authors: Mansoor Mohammed Abdu Al-Gabali

Abstract:

This paper addresses the growing interest among non-Arab individuals in understanding the realities of Arab peoples and their cultures. The global media, particularly after the September 11 attacks, has contributed to negative and misrepresentative portrayals of Arabs. The paper aims to critically analyze various representations of identity, culture, and politics in the works of three contemporary Arab and Arab-American women writers. By exploring the perspectives and attitudes of these writers, the paper aims to challenge and rectify the misrepresentation created by the media and foster mutual understanding between Arab and American societies. Research Aim: The aim of this research is to examine the writings of Arab and Arab-American women in order to highlight the strengths and awareness of Arab cultures. It seeks to show how these writers create spaces for responding to the misrepresentation perpetuated by the media. The research contributes to bridging the gaps between Arab and American societies and fostering better mutual understanding. Methodology: This paper adopts a multidisciplinary approach, drawing on theoretical concepts from cultural studies. It also utilizes an inductive historical methodology to trace the works under study. The combination of these approaches allows for a comprehensive analysis of the representations of Arab peoples and cultures. Findings: The paper argues that the writings of Arab and Arab-American women demonstrate a multiplicity of perspectives and attitudes toward contemporary issues. It highlights the richness and diversity of their writing, as well as the connections they make between different periods of history and various sites of representation. The paper concludes that these writings transcend personal stories to incorporate broader national and global dialogues, emphasizing the commonalities shared by humanity and the socially contextualized issues that deserve respect. Theoretical Importance: This research holds theoretical importance in the field of cultural studies. It builds upon the works of scholars such as Jack Shaeen and Evelyn Alsultany, that have documented and critiqued the negative media representations of Arabs. By examining the writings of Arab and Arab-American women, this paper contributes to the theoretical understanding of cultural responses to media misrepresentation and the creation of spaces for mutual understanding. Data Collection and Analysis Procedures: The data collection for this research involved a thorough examination and analysis of the selected works by Elmaz Abinader, Diana Abu-Jaber, and Rajaa Al-Sanea. These works were scrutinized to identify the unique ways in which they tackled contemporary issues prevalent in Arab and Arab-American societies. Through close textual analysis and the application of cultural theories, the researchers were able to discern the underlying themes and messages conveyed in the writings. Question Addressed: The primary question addressed in this research is, "How do the writings of Arab and Arab-American women respond to the misrepresentation of Arab cultures in the media?" By exploring this question, the paper aims to shed light on the strengths and awareness of Arab cultures and to promote a more comprehensive understanding between Arabs and non-Arabs. Conclusion: This research concludes that the writings of Arab and Arab-American women serve as mediators between Arab and American cultures in response to the misrepresentation created by the media. These writings go beyond personal narratives, addressing broader social and cultural issues and seeking to highlight the commonalities shared by all human beings. The paper emphasizes the need for mutual respect and understanding in order to bridge the gaps between Arab and American societies and rectify the negative images that have been perpetuated in the media.

Keywords: Arabs, films, media, negotiation

Procedia PDF Downloads 49
867 Female Tenderness in Children’s Literature: A Content Analysis of Gender Depiction in Greek Preschool Picture Books

Authors: Theopoula Karanikolaou

Abstract:

During recent decades an increasing number of studies indicate the negative impact of gender stereotypes in various aspects of society as well as in everyday life. At the same time, children’s literature is considered an important factor of gender-role socialization as it provides young readers with socially accepted gender behavioral models. Using a content analysis approach, this research examines the female representations in Greek children’s literature published from 2009 to 2019. Results indicate that female characters are depicted as sensitive and tender both in texts and illustrations, traits that are almost absent in the male characters of the sample. Highlighting the emotional aspect of female characters in contrast with the restrained male attitude reproduces gender biases. Stereotypical gender representation in children’s literature cultivates further discrimination among men and women.

Keywords: children's literature, female representation, gender socialization, gender studies

Procedia PDF Downloads 58
866 Rediscovering English for Academic Purposes in the Context of the UN’s Sustainable Developmental Goals

Authors: Sally Abu Sabaa, Lindsey Gutt

Abstract:

In an attempt to use education as a way of raising a socially responsible and engaged global citizen, the YU-Bridge program, the largest and fastest pathway program of its kind in North America, has embarked on the journey of integrating general themes from the UN’s sustainable developmental goals (SDGs) in its English for Academic Purposes (EAP) curriculum. The purpose of this initiative was to redefine the general philosophy of education in the middle of a pandemic and align with York University’s University Academic Plan that was released in summer 2020 framed around the SDGs. The YUB program attracts international students from all over the world but mainly from China, and its goal is to enable students to achieve the minimum language requirement to join their undergraduate courses at York University. However, along with measuring outcomes, objectives, and the students’ GPA, instructors and academics are always seeking innovation of the YUB curriculum to adapt to the ever growing challenges of academics in the university context, in order to focus more on subject matter that students will be exposed to in their undergraduate studies. However, with the sudden change that has happened globally with the advance of the COVID-19 pandemic, and other natural disasters like the increase in forest fires and floods, rethinking the philosophy and goal of education was a must. Accordingly, the SDGs became the solid pillars upon which we, academics and administrators of the program, could build a new curriculum and shift our perspective from simply ESL education to education with moral and ethical goals. The preliminary implementation of this initiative was supported by an institutional-wide consultation with EAP instructors who have diverse experiences, disciplines, and interests. Along with brainstorming sessions and mini-pilot projects preceding the integration of the SDGs in the YUB-EAP curriculum, those meetings led to creating a general outline of a curriculum and an assessment framework that has the SDGs at its core with the medium of ESL used for language instruction. Accordingly, a community of knowledge exchange was spontaneously created and facilitated by instructors. This has led to knowledge, resources, and teaching pedagogies being shared and examined further. In addition, experiences and reactions of students are being shared, leading to constructive discussions about opportunities and challenges with the integration of the SDGs. The discussions have branched out to discussions about cultural and political barriers along with a thirst for knowledge and engagement, which has resulted in increased engagement not only on the part of the students but the instructors as well. Later in the program, two surveys will be conducted: one for the students and one for the instructors to measure the level of engagement of each in this initiative as well as to elicit suggestions for further development. This paper will describe this fundamental step into using ESL methodology as a mode of disseminating essential ethical and socially correct knowledge for all learners in the 21st Century, the students’ reactions, and the teachers’ involvement and reflections.

Keywords: EAP, curriculum, education, global citizen

Procedia PDF Downloads 163
865 The Impact of Neighborhood Effects on the Economic Mobility of the Inhabitants of Three Segregated Communities in Salvador (Brazil)

Authors: Stephan Treuke

Abstract:

The paper analyses the neighbourhood effects on the economic mobility of the inhabitants of three segregated communities of Salvador (Brazil), in other words, the socio-economic advantages and disadvantages affecting the lives of poor people due to their embeddedness in specific socio-residential contexts. Recent studies performed in Brazilian metropolis have concentrated on the structural dimensions of negative externalities in order to explain neighbourhood-level variations in a field of different phenomena (delinquency, violence, access to the labour market and education) in spatial isolated and socially homogeneous slum areas (favelas). However, major disagreement remains whether the contiguity between residents of poor neighbourhoods and higher-class condominio-dwellers provides structures of opportunities or whether it fosters socio-spatial stigmatization. Based on a set of interviews, investigating the variability of interpersonal networks and their activation in the struggle for economic inclusion, the study confirms that the proximity of Nordeste de Amaralina to middle-/upper-class communities affects positively the access to labour opportunities. Nevertheless, residential stigmatization, as well as structures of social segmentation, annihilate these potentials. The lack of exposition to individuals and groups extrapolating from the favela’s social, educational and cultural context restricts the structures of opportunities to local level. Therefore, residents´ interpersonal networks reveal a high degree of redundancy and localism, based on bonding ties connecting family and neighbourhood members. The resilience of segregational structures in Plataforma contributes to the naturalization of social distance patters. It’s embeddedness in a socially homogeneous residential area (Subúrbio Ferroviário), growing informally and beyond official urban politics, encourages the construction of isotopic patterns of sociability, sharing the same values, social preferences, perspectives and behaviour models. Whereas it’s spatial isolation correlates with the scarcity of economic opportunities, the social heterogeneity of Fazenda Grande II interviewees and the socialising effects of public institutions mitigate the negative repercussions of segregation. The networks’ composition admits a higher degree of heterophilia and a greater proportion of bridging ties accounting for the access to broader information actives and facilitating economic mobility. The variability observed within the three different scenarios urges to reflect about the responsability of urban politics when it comes to the prevention or consolidation of the social segregation process in Salvador. Instead of promoting the local development of the favela Plataforma, public housing programs priorize technocratic habitational solutions without providing the residents’ socio-economic integration. The impact of negative externalities related to the homogeneously poor neighbourhood is potencialized in peripheral areas, turning its’ inhabitants socially invisible, thus being isolated from other social groups. The example of Nordeste de Amaralina portrays the failing interest of urban politics to bridge the social distances structuring the brazilian society’s rigid stratification model, founded on mecanisms of segmentation (unequal access to labour market and education system, public transport, social security and law protection) and generating permanent conflicts between the two socioeconomically distant groups living in geographic contiguity. Finally, in the case of Fazenda Grande II, the public investments in both housing projects and complementary infrastructure (e.g. schools, hospitals, community center, police stations, recreation areas) contributes to the residents’ socio-economic inclusion.

Keywords: economic mobility, neighborhood effects, Salvador, segregation

Procedia PDF Downloads 255
864 Cellulose Acetate Nanofiber Modification for Regulating Astrocyte Activity via Simple Heat Treatment

Authors: Sang-Myung Jung, Jeong Hyun Ju, Gwang Heum Yoon, Hwa Sung Shin

Abstract:

Central nervous system (CNS) consists of neuronal cell and supporting cells. Astrocytes are the most common supporting cells and play roles in metabolism between neurons and blood vessel. For this function, engineered astrocytes have been studied as a therapeutic source for CNS injury. In neural tissue engineering, nanofiber has been suggested as an effective scaffold for providing structure and mechanical properties influencing physiology. Cellulose acetate (CA) has been investigated for material to fabricate scaffold because of its biocompatibility, biodegradability and fine thermal stability. In this research, CA nanofiber was modified via heat treatment and its effect on astrocyte activity was evaluated. Adhesion and viability of astrocyte were increased in proportion to stiffness. Additionally, expression of GFAP, a marker of astrocyte activation, was increased via stiffness of scaffold. This research suggests a simple modification method to change stiffness of CA nanofiber and shows cellular behavior affecting stiffness of three-dimensional scaffold independently. For the results, we highlight that the stiffness is a factor to regulate astrocyte activity.

Keywords: astrocyte, cellulose acetate, cell therapy, stiffness of scaffold

Procedia PDF Downloads 453
863 Flexural Properties of RC Beams Strengthened with A Composite Reinforcement Layer: FRP Grid and ECC

Authors: Yu-Zhou Zheng, Wen-Wei Wang

Abstract:

In this paper, a new strengthening technique for reinforced concrete (RC) beams is proposed by combining Basalt Fibre Reinforced Polymer (BFRP) grid and Engineered Cementitious Composites (ECC) as a composite reinforcement layer (CRL). Five RC beams externally bonded with the CRL at the soffit and one control RC beam was tested to investigate their flexural behaviour. The thickness of BFRP grids (i.e., 1mm, 3mm and 5mm) and the sizes of CRL in test program were selected as the test parameters, while the thickness of CRL was fixed approximately at 30mm. The test results showed that there is no debonding of CRL to occur obviously in the strengthened beams. The final failure modes were the concrete crushing or the rupture of BFRP grids, indicating that the proposed technique is effective in suppressing the debonding of externally bonded materials and fully utilizing the material strengths. Compared with the non-strengthened beam, the increments of crack loading for strengthened beams were 58%~97%, 15%~35% for yield loading and 4%~33% for the ultimate loading, respectively. An analytical model is also presented to predict the full-range load-deflection responses of the strengthened beams and validated through comparisons with the test results.

Keywords: basalt fiber-reinforced polymer (BFRP) grid, ECC, RC beams, strengthening

Procedia PDF Downloads 314
862 The Role of Context in Interpreting Emotional Body Language in Robots

Authors: Jekaterina Novikova, Leon Watts

Abstract:

In the emerging world of human-robot interaction, people and robots will interact socially in real-world situations. This paper presents the results of an experimental study probing the interaction between situational context and emotional body language in robots. 34 people rated video clips of robots performing expressive behaviours in different situational contexts both for emotional expressivity on Valence-Arousal-Dominance dimensions and by selecting a specific emotional term from a list of suggestions. Results showed that a contextual information enhanced a recognition of emotional body language of a robot, although it did not override emotional signals provided by robot expressions. Results are discussed in terms of design guidelines on how an emotional body language of a robot can be used by roboticists developing social robots.

Keywords: social robotics, non-verbal communication, situational context, artificial emotions, body language

Procedia PDF Downloads 265
861 Exploring Fear in Moral Life: Implications for Education

Authors: Liz Jackson

Abstract:

Fear is usually considered as a basic emotion. In society, it is normally cast as undesirable, but also as partly unavoidable. Fear can be said to underlie courage or be required for courage, or it can be understood as its foil. Fear is not normally promoted (intentionally) in education, or treated as something that should be cultivated in schools or in society. However, fear is a basic, to some extent unavoidable emotion, related to truly fearsome things in the world. Fear is also understood to underlie anxiety. Fear is seen as basically disruptive to education, while from a psychological view it is an ordinary state. that cannot be avoided altogether. Despite calls to diminish this negative and mixed feeling in education and society, it can be regarded as socially and personally valuable, and psychologically functional in some situations. One should not take for granted the goodness of fear. However, it can be productive to explore its moral worth, and uses and abuses. Such uncomfortable feelings and experiences can be cultivated and explored via educational and other societal influences, in ways that can benefit a person and their relations with others in the world, while they can also be detrimental.

Keywords: virtue ethics, philosophy of education, moral philosophy, fear

Procedia PDF Downloads 119
860 Comparative International Law and Feminist Legal Studies, Uniting to Make a Difference in Addressing the Disempowerment of Women

Authors: Isaac Kfir

Abstract:

In thinking about the role of the law and its impact on socially constructed norms and identities, scholars have come to explore a multitude of issues to do with equality, empowerment, and views. The aim of this contribution is threefold. Firstly, offer a descriptive framework of feminist legal studies (FLS) through a review of the evolution of the field in the context of equality, rights, and justice. Secondly, encourage those working on equality, rights, and justice in respect to ‘women’s issues’ to engage in international comparative legal studies. Third, to highlight that those seeking solutions to disempowerment and discrimination must recognize that they need to contend with claims that one is seeking to undermine cultural norms. Therefore, one effective way for feminists to address this situation is by relying more on the international legal mechanism, which reflects basic legal tenets as to the universality of equality, rights, and justice, that can then help shape the domestic setting.

Keywords: international comparative law, feminist legal studies, equality, rights, justice

Procedia PDF Downloads 248
859 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 403
858 Zonal and Sequential Extraction Design for Large Flat Space to Achieve Perpetual Tenability

Authors: Mingjun Xu, Man Pun Wan

Abstract:

This study proposed an effective smoke control strategy for the large flat space with a low ceiling to achieve the requirement of perpetual tenability. For the large flat space with a low ceiling, the depth of the smoke reservoir is very shallow, and it is difficult to perpetually constrain the smoke within a limited space. A series of numerical tests were conducted to determine the smoke strategy. A zonal design i.e., the fire zone and two adjacent zones was proposed and validated to be effective in controlling smoke. Once a fire happens in a compartment space, the Engineered Smoke Control (ESC) system will be activated in three zones i.e., the fire zone, in which the fire happened, and two adjacent zones. The smoke can be perpetually constrained within the three smoke zones. To further improve the extraction efficiency, sequential activation of the ESC system within the 3 zones turned out to be more efficient than simultaneous activation. Additionally, the proposed zonal and sequential extraction design can reduce the mechanical extraction flow rate by up to 40.7 % as compared to the conventional method, which is much more economical than that of the conventional method.

Keywords: performance-based design, perpetual tenability, smoke control, fire plume

Procedia PDF Downloads 45
857 Heat Transfer Analysis of Helical Grooved Passages near the Leading Edge Region in Gas Turbine Blade

Authors: Harishkumar Kamath, Chandrakant R. Kini, N. Yagnesh Sharma

Abstract:

Gas turbines are highly effective engineered prime movers for converting energy from thermal form (combustion stage) to mechanical form – are widely used for propulsion and power generation systems. One method of increasing both the power output and thermal efficiency is to increase the temperature of the gas entering the turbine. In the advanced gas turbines of today, the turbine inlet temperature can be as high as 1500°C; however, this temperature exceeds the melting temperature of the metal blade. With modern gas turbines operating at extremely high temperatures, it is necessary to implement various cooling methods, so the turbine blades and vanes endure in the path of the hot gases. Merely passing coolant air through the blade does not provide adequate cooling; therefore, it is necessary to implement techniques that will further enhance the heat transfer from the blade walls. It is seen that by incorporating helical grooved passages into the leading edge built on turbulence and higher flow rates through the passages, the blade can be cooled effectively. It seen from the analysis helical grooved passages with diameter 5 mm, helical pitch of 50 mm and 8 starts results in better cooling of turbine blade and gives the best thermal performance.

Keywords: blade cooling, helical grooves, leading edge, numerical analysis

Procedia PDF Downloads 237
856 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer

Authors: Chao Wu

Abstract:

Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.

Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS

Procedia PDF Downloads 88
855 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 7
854 The Expression of the Social Experience in Film Narration: Cinematic ‘Free Indirect Discourse’ in the Dancing Hawk (1977) by Grzegorz Krolikiewicz

Authors: Robert Birkholc

Abstract:

One of the basic issues related to the creation of characters in media, such as literature and film, is the representation of the characters' thoughts, emotions, and perceptions. This paper is devoted to the social perspective (or the focalization) expressed in film narration. The aim of the paper is to show how social point of view of the hero –conditioned by his origin and the environment from which he comes– can be created by using non-verbal, purely audiovisual means of expression. The issue will be considered on the example of the little-known polish movie The Dancing Hawk (1977) by Grzegorz Królikiewicz, based on the novel by Julian Kawalec. The thesis of the paper is that the polish director uses a narrative figure, which is somewhat analogous to literary form of free indirect discourse. In literature, free indirect discourse is formally ‘spoken’ by the external narrator, but the narration is clearly filtered through the language and thoughts of the character. According to some scholars (such as Roy Pascal), the narrator in this form of speech does not cite the character's words, but uses his way of thinking and imitates his perspective – sometimes with a deep irony. Free indirect discourse is frequently used in Julian Kawalec’s novel. Through the linguistic stylization, the author tries to convey the socially determined perspective of a peasant who migrates to the big city after the Second World War. Grzegorz Królikiewicz expresses the same social experience by pure cinematic form in the adaptation of the book. Both Kawalec and Królikiewicz show the consequences of so-called ‘social advancement’ in Poland after 1945, when the communist party took over political power. On the example of the fate of the main character, Michał Toporny, the director presents the experience of peasants who left their villages and had to adapt to new, urban space. However, the paper is not focused on the historical topic itself, but on the audiovisual form of the movie. Although Królikiewicz doesn’t use frequently POV shots, the narration of The Dancing Hawk is filtered through the sensations of the main character, who feels uprooted and alienated in the new social space. The director captures the hero's feelings through very complex audiovisual procedures – high or low points of view (representing the ‘social position’), grotesque soundtrack, expressionist scenery, and associative editing. In this way, he manages to create the world from the perspective of a socially maladjusted and internally split subject. The Dancing Hawk is a successful attempt to adapt the subjective narration of the book to the ‘language’ of the cinema. Mieke Bal’s notion of focalization helps to describe ‘free indirect discourse’ as a transmedial figure of representing of the characters’ perceptions. However, the polysemiotic medium of the film also significantly transforms this figure of representation. The paper shows both the similarities and differences between literary and cinematic ‘free indirect discourse.’

Keywords: film and literature, free indirect discourse, social experience, subjective narration

Procedia PDF Downloads 105
853 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 241
852 Policy and Strategy to Combatting Terrorism in Indonesia: Analysis Socio Juridical Counter and Contra Terrorism

Authors: Dini Dewi Heniarti

Abstract:

In the past decades, Indonesia has suffered severe terrorist attacks, faced major terrorism challenges and has made impressive progress in countering it. The trend of terrorist groups operating in Indonesia is to focus on ‘soft’ targets. Indonesia has made notable progress in strengthening the legal regime against terrorism, in conformity with the international treaties against terrorism. Further measures are however needed to complete the legal regime building processes. This paper will demonstrate analyze socio yuridical contra and counter terrorism by Indonesia Government.

Keywords: policy, strategy, combatting terrorism, socio juridical, counter and contra terrorism

Procedia PDF Downloads 401
851 Dialect as a Means of Identification among Hausa Speakers

Authors: Hassan Sabo

Abstract:

Language is a system of conventionally spoken, manual and written symbols by human beings that members of a certain social group and participants in its culture express themselves. Communication, expression of identity and imaginative expression are among the functions of language. Dialect is a form of language, or a regional variety of language that is spoken in a particular geographical setting by a particular group of people. Hausa is one of the major languages in Africa, in terms of large number of people for whom it is the first language. Hausa is one of the western Chadic groups of languages. It constitutes one of the five or six branches of Afro-Asiatic family. The predominant Hausa speakers are in Nigeria and they live in different geographical locations which resulted to variety of dialects within the Hausa language apart of the standard Hausa language, the Hausa language has a variety of dialect that distinguish from one another by such features as phonology, grammar and vocabulary. This study intends to examine such features that serve as means of identification among Hausa speakers who are set off from others, geographically or socially.

Keywords: dialect, features, geographical location, Hausa language

Procedia PDF Downloads 169
850 A Review of Material and Methods Used in Liner Layers in Various Landfills

Authors: S. Taghvamanesh

Abstract:

Modern landfills are highly engineered containment systems that are designed to reduce the environmental and human health impacts of solid waste (trash). In modern landfills, waste is contained by a liner system. The primary goal of the liner system is to isolate the landfill contents from the environment, thereby protecting the soil and groundwater from pollution caused by the leachate of a landfill. Landfill leachate is the most serious threat to groundwater. Therefore, it is necessary to design a system that prevents the penetration of this dangerous substance into the environment. These layers are made up of two basic elements: clay and geosynthetics. Hydraulic conductivity and flexibility are two desirable properties of these materials. There are three different types of liner systems that will be discussed in this paper. According to available data, the current article analyzed materials and methods for constructing liner layers made of distinct leachates, including various harmful components and heavy metals from all around the world. Also, this study attempted to gather data on leachates for each of the sites discussed. In conclusion, every landfill requires a specific type of liner, which depends on the type of leachate that it produces daily. It should also be emphasized that, based on available data, this article focused on the number of landfills that each country or continent possesses.

Keywords: landfill, liner layer, impervious layer, barrier layer

Procedia PDF Downloads 55
849 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 260
848 Disaster and Emergency Management in Nigeria: The Case of Chibok School Girls Abducted by Boko Haram Insurgents

Authors: Aidelunuoghene Sunday Ojeifo

Abstract:

More than a decade ago, the Islamist Terrorist group called Boko Haram has caused terrible violence in the north-eastern part of Nigeria. The group’s use of suicide attacks is a dreadful trait of international terrorist violence. It is certainly not in doubt that Boko Haram is the biggest headache of the Nigerian Government right now. The objective of this paper is to answer four fundamental questions about the extremist group: Who is Boko Haram? Why does the group rebel? How has the Nigerian state responded to the emergency and disaster in which more than 200 schoolgirls were abducted from their school in Chibok? Is there any assistance from other nations of the world to help Nigeria out of the grips of this cruel dilemma?

Keywords: Boko Haram, disaster, hazards, vulnerability, insurgents

Procedia PDF Downloads 355