Search results for: content moderation policies and limited access to information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22263

Search results for: content moderation policies and limited access to information

21753 Key Frame Based Video Summarization via Dependency Optimization

Authors: Janya Sainui

Abstract:

As a rapid growth of digital videos and data communications, video summarization that provides a shorter version of the video for fast video browsing and retrieval is necessary. Key frame extraction is one of the mechanisms to generate video summary. In general, the extracted key frames should both represent the entire video content and contain minimum redundancy. However, most of the existing approaches heuristically select key frames; hence, the selected key frames may not be the most different frames and/or not cover the entire content of a video. In this paper, we propose a method of video summarization which provides the reasonable objective functions for selecting key frames. In particular, we apply a statistical dependency measure called quadratic mutual informaion as our objective functions for maximizing the coverage of the entire video content as well as minimizing the redundancy among selected key frames. The proposed key frame extraction algorithm finds key frames as an optimization problem. Through experiments, we demonstrate the success of the proposed video summarization approach that produces video summary with better coverage of the entire video content while less redundancy among key frames comparing to the state-of-the-art approaches.

Keywords: video summarization, key frame extraction, dependency measure, quadratic mutual information

Procedia PDF Downloads 250
21752 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 622
21751 The Need for Selective Credit Policy Implementation: Case of Croatia

Authors: Drago Jakovcevic, Mihovil Andelinovic, Igor Husak

Abstract:

The aim of this paper is to explore the economic circumstances in which the selective credit policy, the least used instrument of four types of instruments on disposal to central banks, should be used. The most significant example includes the use of selective credit policies in response to the emergence of the global financial crisis by the FED. Specifics of the potential use of selective credit policies as the instigator of economic growth in Croatia, a small open economy, are determined by high euroization of financial system, fixed exchange rate and long-term trend growth of external debt that is related to the need to maintain high levels of foreign reserves. In such conditions, the classic forms of selective credit policies are unsuitable for the introduction. Several alternative approaches to implement selective credit policies are examined in this paper. Also, thorough analysis of distribution of selective monetary policy loans among economic sectors in Croatia is conducted in order to minimize the risk of investing funds and maximize the return, in order to influence the GDP growth.

Keywords: global crisis, selective credit policy, small open economy, Croatia

Procedia PDF Downloads 416
21750 Bedouin Dialects: Language Use and Identity Perceptions of Bedouin-Speaking University Students in North-Western Saudi Arabia and Implications for Language Vitality

Authors: Hend Albalawi

Abstract:

Amid the dynamic use of the Arabic language worldwide, Saudi Arabia employs Modern Standard Arabic (MSA) as its formal, official language, whereas other dialects of Arabic are common in informal situations. Such trends not only maintain the powerful, state-supported status of MSA but are liable to also affect the use and status of other varieties, including Bedouin dialects, and prompt code-mixing behaviour among their speakers. Exposure to MSA and English in education in Saudi Arabia may also be liable to reduce the vitality of Bedouin dialects in the country, particularly among current generations of educated Bedouin speakers. Therefore, the proposed research will involve examining the perceived vitality of Bedouin dialects in Saudi language policies prescribing MSA as the official national language of Saudi Arabia and requiring university students to complete English-language coursework in the national education system. It will also entail identifying Bedouin speakers’ attitudes towards the use of Bedouin dialects in order to assess the need, if any, to implement policies in Saudi Arabia that can enhance the use of those dialects amid the competing use of MSA and English in the country. Empirical data collected from questionnaires and semi-structured interviews that purport patterns of the everyday use of languages among Bedouin-speaking university students in Tabuk, as well as the content of language policy documents, can clarify whether policy-based pressure to use MSA and English in mainstream educational and social activities in Saudi Arabia has jeopardised the language vitality of Bedouin dialects in north-west Saudi Arabia. The findings of the research can thus ultimately contribute to the development of policies to support and enhance the use of Bedouin dialects and, in turn, their language vitality.

Keywords: attitudes, Bedouin dialects, language policy, vitality

Procedia PDF Downloads 102
21749 From De Soto’s Solution to Urban Disaster: The Effects of Land Titling Policies on the Development of Cities of the Global South in the Case of Lima Peru

Authors: Jitka Molnarova

Abstract:

Based on De Soto’s idea that a formal land title can provide a secure home and access to credit to poor urban families, a large number of developing countries accepted the formalization of informal settlements as the ultimate solution for their housing crises and struggles with poverty. After two decades of implementation, very little is known about the effects this policy has on the quality of the neighborhoods it produces and on the development of cities in general. Using the capital of Peru -where the solution originated- as a case study, this paper illustrates the negative outcomes this policy has on urban development arguing that land titling encourages 1) expansion of the city often to areas of high physical risk, 2) production of precarious housing on unserviced land, and 3) practices of illegal land trafficking. The evidence is based on interviews with community leaders and officials working at the Cooperation for Formalization of Informal Property (COFOPRI), comparison of satellite images documenting the expansion of Lima in the past twenty years, and a technical evaluation of dozens of houses that have been or are in the process of being granted a land title.

Keywords: COFOPRI, De Soto, housing policies, land titling, land trafficking, Lima, Peru, precarious housing, urban expansion

Procedia PDF Downloads 163
21748 Industrial Policy Directions in Georgia

Authors: Nino Grigolaia

Abstract:

Introduction - The paper discusses the role of industrial policy in the development of the economy in the country. The main challenges on the way to the implementation of industrial policy are analyzed: the long-term period of industrial policy, the risk of changes in priorities, the limited scope and external shocks. Methodology - Various research methods are used in the paper. The methods of induction, deduction, analysis, synthesis, analogy, correlation and statistical observation are used. Main Findings - Based on the analysis of the current situation in Georgia, the obstacles to the country's industrialization and its supporting factors are identified. Also, the challenges of the country's core industrial policies are revealed. Specific industry development strategies, ways of state support and main directions of new industrial policies are identified. Conclusion - The paper concludes that the development of the industrial sector is critical for the future growth and development of the Georgian economy, which will accelerate the industrialization and structural transformation processes, reduce the trade deficit, increase the exports and create more jobs in the country. The listed changes will guarantee the improvement of the socio-economic situation of the population. Accordingly, it is revealed that the study of industrial policy in Georgia is still actual. Based on the analysis, relevant conclusions in the field of industrialization of the country are developed and recommendations are proposed.

Keywords: industrialization , industrial policy, industrialization of the economy, Georgia priorities

Procedia PDF Downloads 165
21747 Factors Impacting Science and Mathematics Teachers’ Competencies in TPACK in STEM Context

Authors: Nasser Mansour, Ziad Said, Abdullah Abu-Tineh

Abstract:

STEM teachers face the challenge of possessing expertise not only in their subject disciplines but also in the pedagogical knowledge required for integrated STEM lessons. However, research reveals a lack of pedagogical competencies related to project-based learning (PBL) in the STEM context. To bridge this gap, the study examines teachers' competencies and self-efficacy in TPACK (Technological Pedagogical Content Knowledge) and its specific integration with PBL and STEM content. Data from 245 specialized science and math teachers were collected using a questionnaire. The study emphasizes the importance of addressing gender disparities, supporting formal teacher education, and recognizing the expertise and experiences of STEM teachers in effective technology integration. The findings indicate that gender plays a role in self-efficacy beliefs, with females exhibiting higher confidence in pedagogical knowledge and males demonstrating higher confidence in technological knowledge. Teaching experience and workload factors have a limited impact on teachers' Technological Pedagogical Content Knowledge (TPACK). These findings enhance our understanding of contextual factors impacting science and math teachers' self-efficacy in utilizing TPACK for STEM and PBL. They inform the development of targeted interventions, professional development programs, and support systems to enhance teachers' competencies and self-efficacy in TPACK for teaching science and Mathematics through STEM and PBL.

Keywords: technological pedagogical content knowledge, TPACK, STEM, project-based learning, PBL, self-efficacy, mathematics, science

Procedia PDF Downloads 44
21746 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 58
21745 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 166
21744 Surveying Apps in Dam Excavation

Authors: Ali Mohammadi

Abstract:

Whenever there is a need to dig the ground, the presence of a surveyor is required to control the map. In projects such as dams and tunnels, these controls are more important because any mistakes can increase the cost. Also, time is great importance in These projects have and one of the ways to reduce the drilling time is to use techniques that can reduce the mapping time in these projects. Nowadays, with the existence of mobile phones, we can design apps that perform calculations and drawing for us on the mobile phone. Also, if we have a device that requires a computer to access its information, by designing an app, we can transfer its information to the mobile phone and use it, so we will not need to go to the office.

Keywords: app, tunnel, excavation, dam

Procedia PDF Downloads 35
21743 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 280
21742 Changing Human Resources Policies in Companies after the COVID-19 Pandemic

Authors: Murat Çolak, Elifnaz Tanyıldızı

Abstract:

Today, human mobility with globalization has increased the interaction between countries significantly; although this contact has advanced societies in terms of civilization, it has also increased the likelihood of pandemics. The coronavirus (COVID-19) pandemic, which caused the most loss of life among them, turned into a global epidemic by covering the whole world in a short time. While there was an explosion in demand in some businesses around the world, some businesses temporarily stopped or had to stop their activities. The businesses affected by the crisis had to adapt to the new legal regulations but had to make changes in matters such as their working styles, human resources practices, and policies. One of the measures taken into account is the reduction of the workforce. The current COVID-19 crisis has posed serious challenges for many organizations and has generated an unprecedented wave of termination notices. This study examined examples of companies affected by the pandemic process and changed their working policies after the pandemic. This study aims to reveal the impact of the global COVID-19 pandemic on human resources policies and employees and how these situations will affect businesses in the future.

Keywords: human resource management, crisis management, COVID-19, business function

Procedia PDF Downloads 74
21741 Cultural Policies, Globalisation of Arts, and Impact on Cultural Heritage: A Contextual Analysis of France

Authors: Nasser AlShawaaf

Abstract:

While previous researchers have attempted to explain art museums commercialisation with reference to cultural policies, they have overlooked the phenomenon of globalisation. This study examines the causes and effects of globalisation of art museums in France. Building on arts literature, we show that the cultural policies of the French government since 1980s of cultural democratisation, cultural decentralisation, and implementing market principles on the cultural sector are leading to arts globalisation. Although globalisation is producing economic benefits and enhancing cultural reach, however, the damages include artistic values and creativity, cultural heritage and representation, and the museum itself. Art museums and host cities could overcome negative consequences through a hybrid collection display and develop local collections gradually.

Keywords: cultural policy, cultural decentralisation, cultural globalisation, art museums, contextual analysis, France

Procedia PDF Downloads 87
21740 Study Variation of Blade Angle on the Performance of the Undershot Waterwheel on the Pico Scale

Authors: Warjito, Kevin Geraldo, Budiarso, Muhammad Mizan, Rafi Adhi Pranata, Farhan Rizqi Syahnakri

Abstract:

According to data from 2021, the number of households in Indonesia that have access to on-grid electricity is claimed to have reached 99.28%, which means that around 0.7% of Indonesia's population (1.95 million people) still have no proper access to electricity and 38.1% of it comes from remote areas in Nusa Tenggara Timur. Remote areas are classified as areas with a small population of 30 to 60 families, have limited infrastructure, have scarce access to electricity and clean water, have a relatively weak economy, are behind in access to technological innovation, and earn a living mostly as farmers or fishermen. These people still need electricity but can’t afford the high cost of electricity from national on-grid sources. To overcome this, it is proposed that a hydroelectric power plant driven by a pico-hydro turbine with an undershot water wheel will be a suitable pico-hydro turbine technology because of the design, materials and installation of the turbine that is believed to be easier (i.e., operational and maintenance) and cheaper (i.e., investment and operating costs) than any other type. The comparative study of the angle of the undershot water wheel blades will be discussed comprehensively. This study will look into the best variation of curved blades on an undershot water wheel that produces maximum hydraulic efficiency. In this study, the blade angles were varied by 180 ̊, 160 ̊, and 140 ̊. Two methods of analysis will be used, which are analytical and numerical methods. The analytical method will be based on calculations of the amount of torque and rotational speed of the turbine, which is used to obtain the input and output power of the turbine. Whereas the numerical method will use the ANSYS application to simulate the flow during the collision with the designed turbine blades. It can be concluded, based on the analytical and numerical methods, that the best angle for the blade is 140 ̊, with an efficiency of 43.52% for the analytical method and 37.15% for the numerical method.

Keywords: pico hydro, undershot waterwheel, blade angle, computational fluid dynamics

Procedia PDF Downloads 60
21739 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: college entrance examination, higher education, education policy, education equality

Procedia PDF Downloads 356
21738 Information Literacy Initiatives in India in Present Era Age

Authors: Darshan Lal

Abstract:

The paper describes the concept of Information literacy. It is a critical component of this information age. Information literacy is the vital process in modern changing world. Information Literacy initiatives in India was also discussed. Paper also discussed Information literacy programmes for LIS professionals. Information literacy makes person capable to recognize when information is needed and how to locate, evaluate and use effectively of the needed information.

Keywords: information literacy, information communication technology (ICT), information literacy programmes

Procedia PDF Downloads 344
21737 Small-Scale Mining Policies in Ghana: Miners' Knowledge, Attitudes and Practices

Authors: Franklin Nantui Mabe, Robert Osei

Abstract:

Activities and operations of artisanal small scale mining (ASM) have recently appealed to the attention of policymakers, researchers, and the general public in Ghana. This stems from the negative impacts of ASM operations on the environment and livelihoods of local inhabitants, as well as the disregard for available ASM mining policies. This study, therefore, investigates whether or not artisanal small-scale miners have enough knowledge of the mining policies and their implementations. The study adopted the Knowledge, Attitudes, and Practices (KAP) framework approach to design the research, collect and analyze primary data. The most aware ASM policy provision is the one that mandates the government to reserve demarcated ASM areas for Ghanaians, whilst the least aware provision is the one that admonishes the government to promote co-operative saving among ASM. The awareness index is lower than the attitude index towards the policy provisions. In terms of practices, miners continued to use bad practices with the associated negative impacts on the environment and rural livelihoods. It is therefore important for the government through mineral commission, district, municipal and metropolitan assemblies to intensify the education on the ASM policies. These could be done with the help of ASM associations. The current systems where a cluster of districts have a single Mineral Commission Office should be restructured to make sure that each mining district has an office.

Keywords: mining policies, KAP, awareness, artisanal small-scale mining

Procedia PDF Downloads 162
21736 Climate Change Impacts, Vulnerability, and Adaptation among Rural Households in Ethiopia

Authors: Birtukan Atinkut Asmare

Abstract:

Climate change disproportionately affects many Africans who heavily rely on climate-exposed sectors such as rain-fed agriculture and fishing, rendering them highly vulnerable. Gender plays a significant role, as men and women experience unequal impacts and vulnerabilities due to gender norms, labor divisions, resource access, and power dynamics. Drawing on an integrated framework, this study sheds light on the gendered impacts of climate change on household’s livelihood, their vulnerability, and adaptation in rural Ethiopia's Lake Tana Basin. This study utilized mixed research methods, integrating diverse qualitative techniques such as focus group discussions, key informant interviews, and field observations, along with quantitative data gathered through household surveys. The findings reveal that women-headed households were more vulnerable to climate change than male-headed households. Flood was the major climate-induced hazards in the area that threatened the lives and livelihoods of households. In response to climate change, households undertook different adaptation measures such as agroforestry practices, crop diversification, seasonal migration, petty trading, charcoal and fuel wood sales. However, the adaptation strategies were slightly varied based on the gender of the household head. Women-headed households specifically engaged in fuelwood collection and selling and petty trading activities. The main constraints for adaptation were limited access to technologies, extension services, information, and financial services. Therefore, this research urges attention from research, policy, and advisory services on rural households who are trying to survive in the face of climate change.

Keywords: agriculture, climate change impacts, ethiopia, gender

Procedia PDF Downloads 42
21735 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 281
21734 Economics and Management Information Systems: Institute of Management and Technology Enugu a Case Study

Authors: Cletus Agbowo

Abstract:

Standard principles, rules, regulations, norms and guides are necessities in practice especially in the Economics and management information system Institute of management of and technology (IMT) Enugu a case sturdy as presented by the presenter. Without mincing words, the fundamental bottle neck of management is economics, how to select to engage merger productivity resources to achieve uncountable objectives without tears. Management information system inevitably become bound up in organizational politics because the influence access to a key resource – namely information. Economics and management information can effect who does what to whom, when, where and how in an organization. In great institutions like the Institute of Management and Technology (IMT) Enugu a case study many new information systems require changes in personnel, individual routines that can be painful for those involved and require retraining and additional effort may or may not be compensated. In a nut shell, because management information system potentially change an organization’s structure, culture, business processes, and strategy, there is often considerable resistance to them when they are introduced. The case study have many schools, departments, divisions and units which needs research on economics and management information systems. A system can be defined as a set of interrelated components and / or elements, which reacts with input to produce output. A department in an organization is a system. The researcher is faced to itemize the practical challenges encountered and solution adopted by the Institute Management and Enugu state government.

Keywords: economics, information, management, productivity, regulations

Procedia PDF Downloads 356
21733 Heterogeneity, Asymmetry and Extreme Risk Perception; Dynamic Evolution Detection From Implied Risk Neutral Density

Authors: Abderrahmen Aloulou, Younes Boujelbene

Abstract:

The current paper displays a new method of extracting information content from options prices by eliminating biases caused by daily variation of contract maturity. Based on Kernel regression tool, this non-parametric technique serves to obtain a spectrum of interpolated options with constant maturity horizons from negotiated optional contracts on the S&P TSX 60 index. This method makes it plausible to compare daily risk neutral densities from which extracting time continuous indicators allows the detection traders attitudes’ evolution, such as, belief homogeneity, asymmetry and extreme Risk Perception. Our findings indicate that the applied method contribute to develop effective trading strategies and to adjust monetary policies through controlling trader’s reactions to economic and monetary news.

Keywords: risk neutral densities, kernel, constant maturity horizons, homogeneity, asymmetry and extreme risk perception

Procedia PDF Downloads 465
21732 Advancing Early Intervention Strategies for United States Adolescents and Young Adults with Schizophrenia in the Post-COVID-19 Era

Authors: Peggy M. Randon, Lisa Randon

Abstract:

Introduction: The post-COVID-19 era has presented unique challenges for addressing complex mental health issues, particularly due to exacerbated stress, increased social isolation, and disrupted continuity of care. This article outlines relevant health disparities and policy implications within the context of the United States while maintaining international relevance. Methods: A comprehensive literature review (including studies, reports, and policy documents) was conducted to examine concerns related to childhood-onset schizophrenia and the impact on patients and their families. Qualitative and quantitative data were synthesized to provide insights into the complex etiology of schizophrenia, the effects of the pandemic, and the challenges faced by socioeconomically disadvantaged populations. Case studies were employed to illustrate real-world examples and areas requiring policy reform. Results: Early intervention in childhood is crucial for preventing or mitigating the long-term impact of complex psychotic disorders, particularly schizophrenia. A comprehensive understanding of the genetic, environmental, and physiological factors contributing to the development of schizophrenia is essential. The COVID-19 pandemic worsened symptoms and disrupted treatment for many adolescent patients with schizophrenia, emphasizing the need for adaptive interventions and the utilization of virtual platforms. Health disparities, including stigma, financial constraints, and language or cultural barriers, further limit access to care, especially for socioeconomically disadvantaged populations. Policy implications: Current US health policies inadequately support patients with schizophrenia. The limited availability of longitudinal care, insufficient resources for families, and stigmatization represent ongoing policy challenges. Addressing these issues necessitates increased research funding, improved access to affordable treatment plans, and cultural competency training for healthcare providers. Public awareness campaigns are crucial to promote knowledge, awareness, and acceptance of mental health disorders. Conclusion: The unique challenges faced by children and families in the US affected by schizophrenia and other psychotic disorders have yet to be adequately addressed on institutional and systemic levels. The relevance of findings to an international audience is emphasized by examining the complex factors contributing to the onset of psychotic disorders and their global policy implications. The broad impact of the COVID-19 pandemic on mental health underscores the need for adaptive interventions and global responses. Addressing policy challenges, improving access to care, and reducing the stigma associated with mental health disorders are crucial steps toward enhancing the lives of adolescents and young adults with schizophrenia and their family members. The implementation of virtual platforms can help overcome barriers and ensure equitable access to support and resources for all patients, enabling them to lead healthy and fulfilling lives.

Keywords: childhood, schizophrenia, policy, United, States, health, disparities

Procedia PDF Downloads 58
21731 Attentional Engagement for Movie

Authors: Wuon-Shik Kim, Hyoung-Min Choi, Jeonggeon Woo, Sun Jung Kwon, SeungHee Lee

Abstract:

The research on attentional engagement (AE) in movies using physiological signals is rare and controversial. Therefore, whether physiological responses can be applied to evaluate AE in actual movies is unclear. To clarify this, we measured electrocardiogram and electroencephalogram (EEG) of 16 Japanese university students as they watched the American movie Iron Man. After the viewing, we evaluated the subjective AE and affection levels for 11 film content segments in Iron Man. Based on self-reports for AE, we selected two film content segments as stimuli: Film Content 9 describing Tony Stark (the main character) flying through the night sky (with the highest AE score) and Film Content 1, describing Tony Stark and his colleagues telling indecent jokes (with the lowest score). We divided these two content segments into two time intervals, respectively. Results indicated that the Film Content by Interval interaction for HR was significant, at F (1, 11)=35.64, p<.001, η2=.76; while HR in Film Content 1 decreased, that of in Film Content 9 increased. In Film Content 9, the main effects of the Interval for respiratory sinus arrhythmia (RSA) (F (1, 11)=5.91, p<.05, η2=.35) and for the attention index of EEG (F (1, 11)=5.23, p<.05, η2=.37) were significant. The increase in the RSA was significant (p<.05) as well, whereas that of the EEG attention index was nearly significant (p=.069). In conclusion, while RSA increases, HR decreases when people direct their attention toward normal films. However, while paying attention to a film evoking excitement, HR as well as RSA can increase.

Keywords: attentional engagement, electroencephalogram, movie, respiratory sinus arrhythmia

Procedia PDF Downloads 347
21730 The Optimal Irrigation in the Mitidja Plain

Authors: Gherbi Khadidja

Abstract:

In the Mediterranean region, water resources are limited and very unevenly distributed in space and time. The main objective of this project is the development of a wireless network for the management of water resources in northern Algeria, the Mitidja plain, which helps farmers to irrigate in the most optimized way and solve the problem of water shortage in the region. Therefore, we will develop an aid tool that can modernize and replace some traditional techniques, according to the real needs of the crops and according to the soil conditions as well as the climatic conditions (soil moisture, precipitation, characteristics of the unsaturated zone), These data are collected in real-time by sensors and analyzed by an algorithm and displayed on a mobile application and the website. The results are essential information and alerts with recommendations for action to farmers to ensure the sustainability of the agricultural sector under water shortage conditions. In the first part: We want to set up a wireless sensor network, for precise management of water resources, by presenting another type of equipment that allows us to measure the water content of the soil, such as the Watermark probe connected to the sensor via the acquisition card and an Arduino Uno, which allows collecting the captured data and then program them transmitted via a GSM module that will send these data to a web site and store them in a database for a later study. In a second part: We want to display the results on a website or a mobile application using the database to remotely manage our smart irrigation system, which allows the farmer to use this technology and offers the possibility to the growers to access remotely via wireless communication to see the field conditions and the irrigation operation, at home or at the office. The tool to be developed will be based on satellite imagery as regards land use and soil moisture. These tools will make it possible to follow the evolution of the needs of the cultures in time, but also to time, and also to predict the impact on water resources. According to the references consulted, if such a tool is used, it can reduce irrigation volumes by up to up to 40%, which represents more than 100 million m3 of savings per year for the Mitidja. This volume is equivalent to a medium-size dam.

Keywords: optimal irrigation, soil moisture, smart irrigation, water management

Procedia PDF Downloads 89
21729 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 234
21728 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 110
21727 Bridging the Digital Divide in India: Issus and Challenges

Authors: Parveen Kumar

Abstract:

The cope the rapid change of technology and to control the ephemeral rate of information generation, librarians along with their professional colleagues need to equip themselves as per the requirement of the electronic information society. E-learning is purely based on computer and communication technologies. The terminologies like computer based learning. It is the delivery of content via all electronic media through internet, internet, Extranets television broadcast, CD-Rom documents, etc. E-learning poses lot of issues in the transformation of literature or knowledge from the conventional medium to ICT based format and web based services.

Keywords: e-learning, digital libraries, online learning, electronic information society

Procedia PDF Downloads 491
21726 Policy Initiatives That Increase Mass-Market Participation of Fuel Cell Electric Vehicles

Authors: Usman Asif, Klaus Schmidt

Abstract:

In recent years, the development of alternate fuel vehicles has helped to reduce carbon emissions worldwide. As the number of vehicles will continue to increase in the future, the energy demand will also increase. Therefore, we must consider automotive technologies that are efficient and less harmful to the environment in the long run. Battery Electric Vehicles (BEVs) have gained popularity in recent years because of their lower maintenance, lower fuel costs, and lower carbon emissions. Nevertheless, BEVs show several disadvantages, such as slow charging times and lower range than traditional combustion-powered vehicles. These factors keep many people from switching to BEVs. The authors of this research believe that these limitations can be overcome by using fuel cell technology. Fuel cell technology converts chemical energy into electrical energy from hydrogen power and therefore serves as fuel to power the motor and thus replacing heavy lithium batteries that are expensive and hard to recycle. Also, in contrast to battery-powered electric vehicle technology, Fuel Cell Electric Vehicles (FCEVs) offer higher ranges and lower fuel-up times and therefore are more competitive with electric vehicles. However, FCEVs have not gained the same popularity as electric vehicles due to stringent legal frameworks, underdeveloped infrastructure, high fuel transport, and storage costs plus the expense of fuel cell technology itself. This research will focus on the legal frameworks for hydrogen-powered vehicles, and how a change in these policies may affect and improve hydrogen fueling infrastructure and lower hydrogen transport and storage costs. These policies may also facilitate reductions in fuel cell technology costs. In order to attain a better framework, a number of countries have developed conceptual roadmaps. These roadmaps have set out a series of objectives to increase the access of FCEVs to their respective markets. This research will specifically focus on policies in Japan, Europe, and the USA in their attempt to shape the automotive industry of the future. The researchers also suggest additional policies that may help to accelerate the advancement of FCEVs to mass-markets. The approach was to provide a solid literature review using resources from around the globe. After a subsequent analysis and synthesis of this review, the authors concluded that in spite of existing legal challenges that have hindered the advancement of fuel-cell technology in the automobile industry in the past, new initiatives that enhance and advance the very same technology in the future are underway.

Keywords: fuel cell electric vehicles, fuel cell technology, legal frameworks, policies and regulations

Procedia PDF Downloads 95
21725 Application of Hyperbinomial Distribution in Developing a Modified p-Chart

Authors: Shourav Ahmed, M. Gulam Kibria, Kais Zaman

Abstract:

Control charts graphically verify variation in quality parameters. Attribute type control charts deal with quality parameters that can only hold two states, e.g., good or bad, yes or no, etc. At present, p-control chart is most commonly used to deal with attribute type data. In construction of p-control chart using binomial distribution, the value of proportion non-conforming must be known or estimated from limited sample information. As the probability distribution of fraction non-conforming (p) is considered in hyperbinomial distribution unlike a constant value in case of binomial distribution, it reduces the risk of false detection. In this study, a statistical control chart is proposed based on hyperbinomial distribution when prior estimate of proportion non-conforming is unavailable and is estimated from limited sample information. We developed the control limits of the proposed modified p-chart using the mean and variance of hyperbinomial distribution. The proposed modified p-chart can also utilize additional sample information when they are available. The study also validates the use of modified p-chart by comparing with the result obtained using cumulative distribution function of hyperbinomial distribution. The study clearly indicates that the use of hyperbinomial distribution in construction of p-control chart yields much accurate estimate of quality parameters than using binomial distribution.

Keywords: binomial distribution, control charts, cumulative distribution function, hyper binomial distribution

Procedia PDF Downloads 252
21724 Queering the (In)Formal Economy: Spatial Recovery and Anti-vending Local Policies in the Global South

Authors: Lorena Munoz

Abstract:

Since the 1990s cities in the global south have implemented revanchist neoliberal urban regeneration policies that cater to urban elites based on “recovering” public space for capital accumulation purposes. These policies often work to reify street vending as survival strategies of ‘last resort’ for marginalized people and as an unorganized, unsystematic economic activities that needs to be disciplined, incorporated and institutionalized into the formal economy. This paper suggests, that by moving away from frameworks that reify formal/informal spheres of the economy, we are able to disrupt and rethink normative understandings of economic practices categorized as ‘informal’. Through queering economies, informal workers center their own understandings of self-value and legitimacy informing their economic lives and contributions to urban life. As such, queering the economy opens up possibilities of rethinking urban redevelopment policies that incorporate rather than remove street vendors, as their economic practices are incorporated into the everyday fabric and aesthetic of urban life.

Keywords: queering economies, street vendors, immigrant economies, race and nationality

Procedia PDF Downloads 63