Search results for: computer crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2731

Search results for: computer crime

2221 Investigation of the Physical Computing in Computational Thinking Practices, Computer Programming Concepts and Self-Efficacy for Crosscutting Ideas in STEM Content Environments

Authors: Sarantos Psycharis

Abstract:

Physical Computing, as an instructional model, is applied in the framework of the Engineering Pedagogy to teach “transversal/cross-cutting ideas” in a STEM content approach. Labview and Arduino were used in order to connect the physical world with real data in the framework of the so called Computational Experiment. Tertiary prospective engineering educators were engaged during their course and Computational Thinking (CT) concepts were registered before and after the intervention across didactic activities using validated questionnaires for the relationship between self-efficacy, computer programming, and CT concepts when STEM content epistemology is implemented in alignment with the Computational Pedagogy model. Results show a significant change in students’ responses for self-efficacy for CT before and after the instruction. Results also indicate a significant relation between the responses in the different CT concepts/practices. According to the findings, STEM content epistemology combined with Physical Computing should be a good candidate as a learning and teaching approach in university settings that enhances students’ engagement in CT concepts/practices.

Keywords: arduino, computational thinking, computer programming, Labview, self-efficacy, STEM

Procedia PDF Downloads 99
2220 Political Economy of Ungoverned Spaces and Rural Armed Banditry in Nigeria

Authors: Collins Ogbu, Godwin Johnny Akpan, James NDA Jacob

Abstract:

The debilitating outcomes of violent conflict, consummated by rural armed banditry have nonetheless, occasioned the need for the mapping of crime zones in Nigeria. As a step towards understanding the scourge of armed bandits, ungoverned spaces have been uncovered as the most dominant excuse for rural crimes and fierce confrontations. From the creeks of the Niger Delta to the forest of Sambisa, Small Arms and Light Weapons (SALW) have proliferated to the vagaries of national insecurity. While the trends present indications of State fragility, the paucity of governance in these so-called ungoverned spaces has persistently reflected a Hobbesian state of nature, where the fittest survives. This study, therefore, interrogates the demographic implications of these ungoverned spaces by specifically identifying the most immediate features of the characters in the areas under investigation. The Farmers-Herders Crises, Niger-Delta Militancy, Boko-Haram Insurgency, Armed Robbery, Kidnapping and Cattle Rustling all define the major focus. In undertaking this study, anecdotal sources will be relied on, while extant information on the concept of ungoverned spaces will be content-analyzed. It is hoped that the knowledge gathered, as a result, will ultimately aid in proffering a dependable panacea to the crises of rural armed banditry in Nigeria.

Keywords: ungoverned spaces, rural armed banditry, state fragility, conflicts

Procedia PDF Downloads 166
2219 The Project Evaluation to Develop the Competencies, Capabilities, and Skills in Repairing Computers of People in Jompluak Local Municipality, Bang Khonthi District, Samut Songkram Province

Authors: Wilailuk Meepracha

Abstract:

The results of the study on the project evaluation to develop the competencies, capabilities, and skills in repairing computers of people in Jompluak Local Municipality, Bang Khonthi District, Samut Songkram Province showed that the overall result was good (4.33). When considering on each aspect, it was found that the highest one was on process evaluation (4.60) followed by product evaluation (4.50) and the least one was on feeding factor (3.97). When considering in details, it was found that: 1) the context aspect was high (4.23) with the highest item on the arrangement of the training situation (4.67) followed by the appropriateness of the target (4.30) and the least aspect was on the project cooperation (3.73). 2) The evaluation of average overall primary factor or feeding factor showed high value (4.23) while the highest aspect was on the capability of the trainers (4.47) followed by the suitable venue (4.33) while the least aspect was on the insufficient budget (3.47). 3) The average result of process evaluation was very high (4.60). The highest aspect was on the follow-op supervision (4.70) followed by responsibility of each project staffs (4.50) while the least aspect was on the present situation and the problems of the community (4.40). 4) The overall result of the product evaluation was very high (4.50). The highest aspect was on the diversity of the activities and the community integration (4.67) followed by project target achievement (4.63) while the least aspect was on continuation and regularity of the activities (4.33). The trainees reported high satisfaction on the project management at very high level (43.33%) while 40% reported high level and 16.67% reported moderate level. Suggestions for the project were on the additional number of the computer sets (37.78%) followed by longer training period especially on computer skills (43.48%).

Keywords: project evaluation, competency development, the capability on computer repairing and computer skills

Procedia PDF Downloads 290
2218 Computer Based Model for Collaborative Research as a Panacea for National Development in Third World Countries

Authors: M. A. Rahman, A. O. Enikuomehin

Abstract:

Sharing commitment to reach a common goal in research by harnessing available resources from two or more parties can simply be referred to as collaborative research. Asides from avoiding duplication of research, the benefits often accrued from such research alliances include time economy as well as expenses reduction in completing such studies. Likewise, it provides an avenue to produce a wider horizon of scientific knowledge sequel to gathering of skills, knowledge and resources. In institutions of higher learning and research institutes, it often gives scholars an opportunity to strengthen the teaching and research capacity of their various institutions. Between industries and institutions, collaborative research breeds promising relationship that could be geared towards addressing different research problems such as producing and enhancing industrial-based products and services, including technological transfer. For Nigeria to take advantage of this collaboration, different issues like licensing of technology, intellectual property right, confidentiality, and funding among others, which could arise during this collaborative research programme, are identified in this paper. An important tool required to achieve this height in developing economy is the use of appropriate computer model. The paper highlights the costs of the collaborations and likewise stresses the need for evaluating the effectiveness and efficiency of such collaborative research activities and proposes an appropriate computer model to assist in this regard.

Keywords: collaborative research, developing country, computerization, model

Procedia PDF Downloads 319
2217 Helping Older Users Staying Connected

Authors: Q. Raza

Abstract:

Getting old is inevitable, tasks which were once simple are now a daily struggle. This paper is a study of how older users interact with web application based upon a series of experiments. The experiments conducted involved 12 participants and the experiments were split into two parts. The first set gives the users a feel of current social networks and the second set take into considerations from the participants and the results of the two are compared. This paper goes in detail on the psychological aspects such as social exclusion, Metacognition memory and Therapeutic memories and how this relates to users becoming isolated from society, social networking can be the roof on a foundation of successful computer interaction. The purpose of this paper is to carry out a study and to propose new ideas to help users to be able to use social networking sites easily and efficiently.

Keywords: cognitive psychology, special memory, social networking and human computer interaction

Procedia PDF Downloads 426
2216 UAV Based Visual Object Tracking

Authors: Vaibhav Dalmia, Manoj Phirke, Renith G

Abstract:

With the wide adoption of UAVs (unmanned aerial vehicles) in various industries by the government as well as private corporations for solving computer vision tasks it’s necessary that their potential is analyzed completely. Recent advances in Deep Learning have also left us with a plethora of algorithms to solve different computer vision tasks. This study provides a comprehensive survey on solving the Visual Object Tracking problem and explains the tradeoffs involved in building a real-time yet reasonably accurate object tracking system for UAVs by looking at existing methods and evaluating them on the aerial datasets. Finally, the best trackers suitable for UAV-based applications are provided.

Keywords: deep learning, drones, single object tracking, visual object tracking, UAVs

Procedia PDF Downloads 139
2215 The Role of Virtual Geographic Environment (VGEs)

Authors: Min Chen, Hui Lin

Abstract:

VGEs are a kind of typical web- and computer-based geographic environment, with aims of merging geographic knowledge, computer technology, virtual reality technology, network technology, and geographic information technology, to provide a digital mirror of physical geographic environments to allow users to ‘feel it in person’ by a means for augmenting the senses and to ‘know it beyond reality’ through geographic phenomena simulation and collaborative geographic experiments. Many achievements have appeared in this field, but further evolution should be explored. With the exploration of the conception of VGEs, and some examples, this article illustrated the role of VGEs and their contribution to currently GIScience. Based on the above analysis, questions are proposed for discussing about the future way of VGEs.

Keywords: virtual geographic environments (VGEs), GIScience, virtual reality, geographic information systems

Procedia PDF Downloads 562
2214 Heroin and Opiates Metabolites Tracing by Gas-Chromatography Isotope Ratio Mass Spectrometry

Authors: Yao-Te Yen, Chao-Hsin Cheng, Meng-Shun Huang, Shan-Zong Cyue

Abstract:

'Poppy-seed defense' has been a serious problem all over the world, that is because the opiates metabolites in urine are difficult to distinguish where they come from precisely. In this research, a powerful analytic method has been developed to trace the opiates metabolites in urine by Gas-Chromatography Isotope Ratio Mass Spectrometry (GC-IRMS). In order to eliminate the interference of synthesis to heroin or metabolism through human body, opiates metabolites in urine and sized heroin were hydrolyzed to morphine. Morphine is the key compound for tracing between opiates metabolites and seized heroin in this research. By matching δ13C and δ15N values through morphine, it is successful to distinguish the opiates metabolites coming from heroin or medicine. We tested seven heroin abuser’s metabolites and seized heroin in crime sites, the result showed that opiates metabolites coming from seized heroin, the variation of δ13C and δ15N for morphine are within 0.2 and 2.5‰, respectively. The variation of δ13C and δ15N for morphine are reasonable with the result of matrix match experiments. Above all, the uncertainty of 'Poppy-seed defense' can be solved easily by this analytic method, it provides the direct evidence for judge to make accurate conviction without hesitation.

Keywords: poppy-seed defense, heroin, opiates metabolites, isotope ratio mass spectrometry

Procedia PDF Downloads 225
2213 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 129
2212 Tourism Potentials of Ikogosi Warm Spring in Nigeria

Authors: A.I. Adeyemo

Abstract:

Ikogosi warm spring results from a complex mechanical and chemical forces that generates internal heat in the rocks forming a warm and cold water at the same geographical location at the same time. From time immemorial, the local community had thought, it to be the work of a deity, and they were worshipping the spring. This complex phenomenon has been a source of tourist attraction to both local and international tourists over the years. 450 copies of a structured questionnaire were given out, and a total of 500 respondents were interviewed. The result showed that ikogosi warm spring impacts the community positively by providing employment to the teeming youths, and it provides income to traders. The result shows that 66% of the respondents confirmed that it increased their income and that transportation business increased more than 73%.the level of enlightenment and socialization increased greatly in the community. However, it also impacted the community negatively as it increased crime rates such as stealing, kidnapping, prostitution, and unwanted pregnancy among the secondary school girls and the other teenagers. Generally, 50% of the respondents reported that tourism in the warm spring results in insecurity in the community. IT also increased environmental problems such as noise and waste pollutions; the continuous movement on the land results in soil compartment leading to erosion, and leaching, which also results in loss of soil fertility. It was concluded that if the potentials of the spring are fully tapped, it will be a good avenue for income generation to the country.

Keywords: community, Ikogosi, revenue, warm spring

Procedia PDF Downloads 143
2211 Juvenile Justice in Maryland: The Evidence Based Approach to Youth with History of Victimization and Trauma

Authors: Gabriela Wasileski, Debra L. Stanley

Abstract:

Maryland efforts to decrease the juvenile criminality and recidivism shifts towards evidence based sentencing. While in theory the evidence based sentencing has an impact on the reduction of juvenile delinquency and drug abuse; the assessment of juveniles’ risk and needs usually lacks crucial information about juvenile’s prior victimization. The Maryland Comprehensive Assessment and Service Planning (MCASP) Initiative is the primary tool for developing and delivering a treatment service plan for juveniles at risk. Even though it consists of evidence-based screening and assessment instruments very little is currently known regarding the effectiveness and the impact of the assessment in general. In keeping with Maryland’s priority to develop successful evidence-based recidivism reduction programs, this study examined results of assessments based on MCASP using a representative sample of the juveniles at risk and their assessment results. Specifically, it examined: (1) the results of the assessments in an electronic database (2) areas of need that are more frequent among delinquent youth in a system/agency, (3) the overall progress of youth in an agency’s care (4) the impact of child victimization and trauma experiences reported in the assessment. The project will identify challenges regarding the use of MCASP in Maryland, and will provide a knowledge base to support future research and practices.

Keywords: Juvenile Justice, assessment of risk and need, victimization and crime, recidivism

Procedia PDF Downloads 301
2210 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 73
2209 Hand Symbol Recognition Using Canny Edge Algorithm and Convolutional Neural Network

Authors: Harshit Mittal, Neeraj Garg

Abstract:

Hand symbol recognition is a pivotal component in the domain of computer vision, with far-reaching applications spanning sign language interpretation, human-computer interaction, and accessibility. This research paper discusses the approach with the integration of the Canny Edge algorithm and convolutional neural network. The significance of this study lies in its potential to enhance communication and accessibility for individuals with hearing impairments or those engaged in gesture-based interactions with technology. In the experiment mentioned, the data is manually collected by the authors from the webcam using Python codes, to increase the dataset augmentation, is applied to original images, which makes the model more compatible and advanced. Further, the dataset of about 6000 coloured images distributed equally in 5 classes (i.e., 1, 2, 3, 4, 5) are pre-processed first to gray images and then by the Canny Edge algorithm with threshold 1 and 2 as 150 each. After successful data building, this data is trained on the Convolutional Neural Network model, giving accuracy: 0.97834, precision: 0.97841, recall: 0.9783, and F1 score: 0.97832. For user purposes, a block of codes is built in Python to enable a window for hand symbol recognition. This research, at its core, seeks to advance the field of computer vision by providing an advanced perspective on hand sign recognition. By leveraging the capabilities of the Canny Edge algorithm and convolutional neural network, this study contributes to the ongoing efforts to create more accurate, efficient, and accessible solutions for individuals with diverse communication needs.

Keywords: hand symbol recognition, computer vision, Canny edge algorithm, convolutional neural network

Procedia PDF Downloads 46
2208 Optimal Operation of a Photovoltaic Induction Motor Drive Water Pumping System

Authors: Nelson K. Lujara

Abstract:

The performance characteristics of a photovoltaic induction motor drive water pumping system with and without maximum power tracker is analyzed and presented. The analysis is done through determination and assessment of critical loss components in the system using computer aided design (CAD) tools for optimal operation of the system. The results can be used to formulate a well-calibrated computer aided design package of photovoltaic water pumping systems based on the induction motor drive. The results allow the design engineer to pre-determine the flow rate and efficiency of the system to suit particular application.

Keywords: photovoltaic, water pumping, losses, induction motor

Procedia PDF Downloads 284
2207 Effects of Computer-Mediated Dictionaries on Reading Comprehension and Vocabulary Acquisition

Authors: Mohamed Amin Mekheimer

Abstract:

This study aimed to investigate the effects of paper-based monolingual, pop-up and type-in electronic dictionaries on improving reading comprehension and incidental vocabulary acquisition and retention in an EFL context. It tapped into how computer-mediated dictionaries may have facilitated/impeded reading comprehension and vocabulary acquisition. Findings showed differential effects produced by the three treatments compared with the control group. Specifically, it revealed that the pop-up dictionary condition had the shortest average vocabulary searching time, vocabulary and text reading time, yet with less than the type-in dictionary group but more than the book dictionary group in terms of frequent dictionary 'look-ups' (p<.0001). In addition, ANOVA analyses also showed that text reading time differed significantly across all four treatments, and so did reading comprehension. Vocabulary acquisition was reported as enhanced in the three treatments rather than in the control group, but still with insignificant differences across the three treatments, yet with more differential effects in favour of the pop-up condition. Data also assert that participants preferred the pop-up e-dictionary more than the type-in and paper-based groups. Explanations of the findings vis-à-vis the cognitive load theory were presented. Pedagogical implications and suggestions for further research were forwarded at the end.

Keywords: computer-mediated dictionaries, type-in dictionaries, pop-up dictionaries, reading comprehension, vocabulary acquisition

Procedia PDF Downloads 418
2206 Computer Aided Analysis of Breast Based Diagnostic Problems from Mammograms Using Image Processing and Deep Learning Methods

Authors: Ali Berkan Ural

Abstract:

This paper presents the analysis, evaluation, and pre-diagnosis of early stage breast based diagnostic problems (breast cancer, nodulesorlumps) by Computer Aided Diagnosing (CAD) system from mammogram radiological images. According to the statistics, the time factor is crucial to discover the disease in the patient (especially in women) as possible as early and fast. In the study, a new algorithm is developed using advanced image processing and deep learning method to detect and classify the problem at earlystagewithmoreaccuracy. This system first works with image processing methods (Image acquisition, Noiseremoval, Region Growing Segmentation, Morphological Operations, Breast BorderExtraction, Advanced Segmentation, ObtainingRegion Of Interests (ROIs), etc.) and segments the area of interest of the breast and then analyzes these partly obtained area for cancer detection/lumps in order to diagnosis the disease. After segmentation, with using the Spectrogramimages, 5 different deep learning based methods (specified Convolutional Neural Network (CNN) basedAlexNet, ResNet50, VGG16, DenseNet, Xception) are applied to classify the breast based problems.

Keywords: computer aided diagnosis, breast cancer, region growing, segmentation, deep learning

Procedia PDF Downloads 76
2205 User Experience Measurement of User Interfaces

Authors: Mohammad Hashemi, John Herbert

Abstract:

Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviours and profiles. It monitors the use of the mouse and use of UI elements with accurate time measurement. It does this in real-time and does so unobtrusively and efficiently allowing the user to work as normal with the application. This real-time accurate measurement of the user's interaction provides valuable data and insight into the use of the UI, and is also the basis for analysis of the user's QoE.

Keywords: user modelling, user interface experience, quality of experience, user experience, human and computer interaction

Procedia PDF Downloads 487
2204 Attempt Survivor Families’ Views on Criminalizing Attempted Suicide in Ghana

Authors: Joseph Osafo, Winifred Asare-Doku, Charity Akotia

Abstract:

Decriminalizing suicide is one of the major goals of suicide prevention worldwide. In Ghana, suicide is legally prescribed and there is a wide-spread societal condemnation of the act, the survivor and families share the stigma. Evidence and advocacy continue to mount towards pressuring the government, the legal fraternity and lawmakers to consider decriminalizing the act. However, within this discourse, the views of families of attempt survivors are absent. The purpose of this study was to explore from relatives of suicide attempters their reactions towards the criminality of suicide attempt in the country. A total of 10 relatives of suicide attempters were interviewed using a semi-structured interview guide. Thematic analysis was used to analyze the data. We found that there were divergent views from families on decriminalizing suicide. We generated two major themes; Out-group bias versus In-group bias. Half of the participants opined that suicide attempt should not be decriminalized and others advocated for help and mental health care for victims of the suicide attempt. It was generally observed that although all 10 participants were cognizant that suicide attempt is a crime in Ghana, they preferred their relatives were spared from prosecution. The findings indicate incongruity, especially when participants want their relatives to avoid jail term but want the law that criminalizes suicide to remain. Findings are explained using the Fundamental Attribution Error and the concept of Kin selection. Implications for public education on decriminalization and advocacy are addressed.

Keywords: decriminalization, families, Ghana suicide, suicide attempt

Procedia PDF Downloads 495
2203 Facial Expression Recognition Using Sparse Gaussian Conditional Random Field

Authors: Mohammadamin Abbasnejad

Abstract:

The analysis of expression and facial Action Units (AUs) detection are very important tasks in fields of computer vision and Human Computer Interaction (HCI) due to the wide range of applications in human life. Many works have been done during the past few years which has their own advantages and disadvantages. In this work, we present a new model based on Gaussian Conditional Random Field. We solve our objective problem using ADMM and we show how well the proposed model works. We train and test our work on two facial expression datasets, CK+, and RU-FACS. Experimental evaluation shows that our proposed approach outperform state of the art expression recognition.

Keywords: Gaussian Conditional Random Field, ADMM, convergence, gradient descent

Procedia PDF Downloads 339
2202 The Influences of Green Infrastructure Develop on Urban Renewals for Real Essence and Non-Real Essence Economic Value

Authors: Chao Jen-Chih, Hsu Kuo-Wei

Abstract:

Climate change and natural disasters take effect on urban development. It has been discussed urban renewals can prevent natural disasters. Integrating green infrastructure and urban renewals may have great effect on adapting the impact of climate change. To highlight the economic value of green infrastructure development on urban renewals, some strategies need to be carry on to reduce environmental impact. A number of urban renewals studies has been conducted on right transfer, financial risk, urban renewal policy, and public participation. Little research has been devoted on the subject of the economic value of green infrastructure development on urban renewals. The purpose of this study is to investigate the affecting factors on the economic value of green infrastructure development on urban renewals. This study will present the benefits of green infrastructure development and summarize the critical factors of green infrastructure develop on urban renewals for real essence and non-real essence on economic value from literature. Our results indicate that factors of housing price, land value, floor area incentive, and facilitation of the construction industry affect the outcome of real essence economic value. Factors of enhancement of urban disaster prevention, improvement of urban environment and landscape, crime reduction, climate control, pollution reduction, biological diversity, health impacts, and leisure space affects the outcome of non-real essence economic value.

Keywords: economic value, green infrastructure, urban renewals, urban development

Procedia PDF Downloads 397
2201 iPAD as a Communication Tool for Disabled Seniors: A Case Study

Authors: Vojtěch Gybas, Libor Klubal, Kateřina Kostolányová

Abstract:

This case study responds to the current trends in ICT. Mobile Touch iPads can provide very good assistance to disabled seniors. The intuitive tablet environment, the possibility of the formation environment and its portability, has a very positive effect on the use of particular communication. For comparison, using a conventional PC/notebook, word processor, keyboard and computer mouse compared to the iPad and selected applications. The results of this case study show that the use of mobile touch devices iPad for seniors with mental retardation is a great benefit. These devices do not require high demands on graphomotorics like a standard PC devices.

Keywords: ICT, iPad, handicapped seniors, communication, computer/notebook, applications, text editor

Procedia PDF Downloads 306
2200 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 103
2199 An Interactive Platform Displaying Mixed Reality Media

Authors: Alfred Chen, Cheng Chieh Hsu, Yu-Pin Ma, Meng-Jie Lin, Fu Pai Chiu, Yi-Yan Sie

Abstract:

This study is attempted to construct a human-computer interactive platform system that has mainly consisted of an augmented hardware system, a software system, a display table, and mixed media. This system has provided with human-computer interaction services through an interactive platform for the tourism industry. A well designed interactive platform, integrating of augmented reality and mixed media, has potential to enhance museum display quality and diversity. Besides, it will create a comprehensive and creative display mode for most museums and historical heritages. Therefore, it is essential to let public understand what the platform is, how it functions, and most importantly how one builds an interactive augmented platform. Hence the authors try to elaborate the construction process of the platform in detail. Thus, there are three issues to be considered, i.e.1) the theory and application of augmented reality, 2) the hardware and software applied, and 3) the mixed media presented. In order to describe how the platform works, Courtesy Door of Tainan Confucius Temple has been selected as case study in this study. As a result, a developed interactive platform has been presented by showing the physical entity object, along with virtual mixing media such as text, images, animation, and video. This platform will result in providing diversified and effective information that will be delivered to the users.

Keywords: human-computer interaction, mixed reality, mixed media, tourism

Procedia PDF Downloads 472
2198 Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model

Authors: Dojoon Jung, Kiwoong Moon, Joong Lee

Abstract:

The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage.

Keywords: human height, CCTV footage, 2D/3D matching, 3D human body model

Procedia PDF Downloads 238
2197 Development of a Computer Based, Nutrition and Fitness Programme and Its Effect on Nutritional Status and Fitness of Obese Adults

Authors: Richa Soni, Vibha Bhatnagar, N. K. Jain

Abstract:

This study was conducted to develop a computer mediated programme for weight management and physical fitness and examining its efficacy in reducing weight and improving physical fitness in obese adults. A user friendly, computer based programme was developed to provide a simple, quick, easy and user-friendly method of assessing energy balance at individual level. The programme had four main sections viz. personal Profile, know about your weight, fitness and food exchange list. The computer programme was developed to provide facilities of creating individual profile, tracking meal and physical activities, suggesting nutritional and exercise requirements, planning calorie specific menus, keeping food diaries and revising the diet and exercise plans if needed. The programme was also providing information on obesity, underweight, physical fitness. An exhaustive food exchange list was also given in the programme to assist user to make right food choice decisions. The developed programme was evaluated by a panel of 15 experts comprising endocrinologists, nutritionists and diet counselors. Suggestions given by the experts were paned down and the entire programme was modified in light of suggestions given by the panel members and was reevaluated by the same panel of experts. For assessing the impact of the programme 22 obese subjects were selected purposively and randomly assigned to intervention group (n=12) and no information control group. (n=10). The programme group was asked to strictly follow the programme for one month. Significant reduction in the intake of energy, fat and carbohydrates was observed while intake of fruits, green leafy vegetables was increased. The programme was also found to be effective in reducing body weight, body fat percent and body fat mass whereas total body water and physical fitness scores improved significantly. There was no significant alteration observed in any parameters in the control group.

Keywords: body composition, body weight, computer programme, physical fitness

Procedia PDF Downloads 271
2196 Mining Educational Data to Support Students’ Major Selection

Authors: Kunyanuth Kularbphettong, Cholticha Tongsiri

Abstract:

This paper aims to create the model for student in choosing an emphasized track of student majoring in computer science at Suan Sunandha Rajabhat University. The objective of this research is to develop the suggested system using data mining technique to analyze knowledge and conduct decision rules. Such relationships can be used to demonstrate the reasonableness of student choosing a track as well as to support his/her decision and the system is verified by experts in the field. The sampling is from student of computer science based on the system and the questionnaire to see the satisfaction. The system result is found to be satisfactory by both experts and student as well.

Keywords: data mining technique, the decision support system, knowledge and decision rules, education

Procedia PDF Downloads 408
2195 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation

Authors: Xiaoyu Stephanie Ren

Abstract:

With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.

Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law

Procedia PDF Downloads 146
2194 Exploring Challenges Faced by Small Business Owners on Poverty Reduction in Rural Eastern Cape, South Africa

Authors: Akinwale Olusola Mokayode, Emaanuel Adu, Seriki Idowu Ibrahim

Abstract:

Small business can serve as a tool for poverty reduction in South Africa, but it requires adequate support and development for its continuous sustenance in spite of rigorous challenges, especially in the rural environment. This study explored the challenges faced by the small business owners in the rural Eastern Cape Province of South Africa. The objective of the study is to identify the challenges faced by small business owners in the case study area and to examine the effects of those challenges on poverty rate. Survey research design was adopted, with the distribution of structured questionnaire for data collection through a simple random sampling method. Descriptive and inferential statistics was used to analyse the data. Findings showed that small business owners face various challenges in their commercial operations. It was also made clearer that these challenges have effects on the poverty rate as well as crime rate. In conclusion, in other for small businesses to be effective instrument to tackle poverty, certain measure must be taken into considerations. This therefore necessitates recommendation from the researcher that potential and current business owners must seek valuable advice from the more experienced business tycoon and seek information about the business assistance programmes provided by government and private sectors.

Keywords: eastern cape, poverty, poverty reduction, rural, small business, sustainable livelihood

Procedia PDF Downloads 473
2193 Proactive Approach to Innovation Management

Authors: Andrus Pedai, Igor Astrov

Abstract:

The focus of this paper is to compare common approaches for Systems of Innovation (SI) and identify proactive alternatives for driving the innovation. Proactive approaches will also consider short and medium term perspectives with developments in the field of Computer Technology and Artificial Intelligence. Concerning computer technology and large connected information systems, it is reasonable to predict that during current or the next century, intelligence and innovation will be separated from the constraints of human-driven management. After this happens, humans will no longer be driving the innovation and there is possibility that SI for new intelligent systems will set its own targets and exclude humans. Over long time scale, these developments could result in a scenario, which will lead to the development of larger, cross galactic (universal) proactive SI and Intelligence.

Keywords: artificial intelligence, DARPA, Moore’s law, proactive innovation, singularity, systems of innovation

Procedia PDF Downloads 464
2192 Vision-Based Hand Segmentation Techniques for Human-Computer Interaction

Authors: M. Jebali, M. Jemni

Abstract:

This work is the part of vision based hand gesture recognition system for Natural Human Computer Interface. Hand tracking and segmentation are the primary steps for any hand gesture recognition system. The aim of this paper is to develop robust and efficient hand segmentation algorithm such as an input to another system which attempt to bring the HCI performance nearby the human-human interaction, by modeling an intelligent sign language recognition system based on prediction in the context of dialogue between the system (avatar) and the interlocutor. For the purpose of hand segmentation, an overcoming occlusion approach has been proposed for superior results for detection of hand from an image.

Keywords: HCI, sign language recognition, object tracking, hand segmentation

Procedia PDF Downloads 394