Search results for: cyber liability insurance
274 Does One Size Fit All: Immigrant Youths, Bullying and Peer-Aggression
Authors: Shila Khayambashi
Abstract:
For the past few decades, Western researchers studied different youth issues, such as bullying, peer-aggression, depression, self-harm, and suicide, in a formulated and standardized manner. These researchers have grounded their studies upon a series of introduced characteristics and traits, which pragmatically defined the action of the individuals involved in these activities (Olweus, 1994). The phenomena of bullying and peer-aggression have touched the lives of many immigrant youths, as well. However, in the case of these immigrant young adults, the Police investigated, and later dismissed, the victims’ involvement in drugs and gangs’ activities, instead of questioning the possibility of the peer-aggression. This paper argues that neither government officials nor school personnel has ever investigated any cyber-documentation which would clarify these youth’s untimely deaths or search for any indication of peer-aggression at school. Through my ongoing research, I will problematize the Eurocentric definition of bullying and its limitations. I question the assumed universality of these definitions’ characteristics and their lack of minority representation. This research questions explicitly the positionality of the displaced youth within the promised multiculturality of Canada. I will ask: Does one size fit all, considering the bio-psycho-socio-economic differences between the Eastern and the Western worlds? More importantly, how does the epidemy of the communicative devices, like smartphones, and communicative apps, like Twitter and Snapchats, facilitate or hinder peer-aggression for the displaced youths?Keywords: Bullying , Immigrant youths, Peer aggression, Minority population
Procedia PDF Downloads 133273 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 146272 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 267271 Review on Future Economic Potential Stems from Global Electronic Waste Generation and Sustainable Recycling Practices.
Authors: Shamim Ahsan
Abstract:
Abstract Global digital advances associated with consumer’s strong inclination for the state of art digital technologies is causing overwhelming social and environmental challenges for global community. During recent years not only economic advances of electronic industries has taken place at steadfast rate, also the generation of e-waste outshined the growth of any other types of wastes. The estimated global e-waste volume is expected to reach 65.4 million tons annually by 2017. Formal recycling practices in developed countries are stemming economic liability, opening paths for illegal trafficking to developing countries. Informal crude management of large volume of e-waste is transforming into an emergent environmental and health challenge in. Contrariwise, in several studies formal and informal recycling of e-waste has also exhibited potentials for economic returns both in developed and developing countries. Some research on China illustrated that from large volume of e-wastes generation there are recycling potential in evolving from ∼16 (10−22) billion US$ in 2010, to an anticipated ∼73.4 (44.5−103.4) billion US$ by 2030. While in another study, researcher found from an economic analysis of 14 common categories of waste electric and electronic equipment (WEEE) the overall worth is calculated as €2.15 billion to European markets, with a potential rise to €3.67 billion as volumes increase. These economic returns and environmental protection approaches are feasible only when sustainable policy options are embraced with stricter regulatory mechanism. This study will critically review current researches to stipulate how global e-waste generation and sustainable e-waste recycling practices demonstrate future economic development potential in terms of both quantity and processing capacity, also triggering complex some environmental challenges.Keywords: E-Waste, , Generation, , Economic Potential, Recycling
Procedia PDF Downloads 306270 Impact of Increased Radiology Staffing on After-Hours Radiology Reporting Efficiency and Quality
Authors: Peregrine James Dalziel, Philip Vu Tran
Abstract:
Objective / Introduction: Demand for radiology services from Emergency Departments (ED) continues to increase with greater demands placed on radiology staff providing reports for the management of complex cases. Queuing theory indicates that wide variability of process time with the random nature of request arrival increases the probability of significant queues. This can lead to delays in the time-to-availability of radiology reports (TTA-RR) and potentially impaired ED patient flow. In addition, greater “cognitive workload” of greater volume may lead to reduced productivity and increased errors. We sought to quantify the potential ED flow improvements obtainable from increased radiology providers serving 3 public hospitals in Melbourne Australia. We sought to assess the potential productivity gains, quality improvement and the cost-effectiveness of increased labor inputs. Methods & Materials: The Western Health Medical Imaging Department moved from single resident coverage on weekend days 8:30 am-10:30 pm to a limited period of 2 resident coverage 1 pm-6 pm on both weekend days. The TTA-RR for weekend CT scans was calculated from the PACs database for the 8 month period symmetrically around the date of staffing change. A multivariate linear regression model was developed to isolate the improvement in TTA-RR, between the two 4-months periods. Daily and hourly scan volume at the time of each CT scan was calculated to assess the impact of varying department workload. To assess any improvement in report quality/errors a random sample of 200 studies was assessed to compare the average number of clinically significant over-read addendums to reports between the 2 periods. Cost-effectiveness was assessed by comparing the marginal cost of additional staffing against a conservative estimate of the economic benefit of improved ED patient throughput using the Australian national insurance rebate for private ED attendance as a revenue proxy. Results: The primary resident on call and the type of scan accounted for most of the explained variability in time to report availability (R2=0.29). Increasing daily volume and hourly volume was associated with increased TTA-RR (1.5m (p<0.01) and 4.8m (p<0.01) respectively per additional scan ordered within each time frame. Reports were available 25.9 minutes sooner on average in the 4 months post-implementation of double coverage (p<0.01) with additional 23.6 minutes improvement when 2 residents were on-site concomitantly (p<0.01). The aggregate average improvement in TTA-RR was 24.8 hours per weekend day This represents the increased decision-making time available to ED physicians and potential improvement in ED bed utilisation. 5% of reports from the intervention period contained clinically significant addendums vs 7% in the single resident period but this was not statistically significant (p=0.7). The marginal cost was less than the anticipated economic benefit based assuming a 50% capture of improved TTA-RR inpatient disposition and using the lowest available national insurance rebate as a proxy for economic benefit. Conclusion: TTA-RR improved significantly during the period of increased staff availability, both during the specific period of increased staffing and throughout the day. Increased labor utilisation is cost-effective compared with the potential improved productivity for ED cases requiring CT imaging.Keywords: workflow, quality, administration, CT, staffing
Procedia PDF Downloads 113269 Accounting Legislation, Corporate Governance Codes and Disclosure in Jordan
Authors: Ayman Haddad, Wafaa Sbeiti, Amr Qasem
Abstract:
The main aim of this paper is to provide an overview of the most influential economic changes and accounting legislation affecting financial reporting and disclosure practices in Jordan. It also provides an overview of disclosure studies conducted in Jordan covering the year(s) between 1986 and 2014. The economic changes in Jordan required conducting economic reform and revising/issuing new regulations and financial market reforms that led to an improvement in disclosure practices. The issuance of Temporary Securities Law and its Directives of Disclosure in 1997, which came into effect in 1998, is considered as the turning point in the improvement of disclosure practice in Jordan. Based on a review of prior disclosure studies, we conclude that disclosure practices have improved overtime. We also observe that that firm size as a factor has always affected the level of disclosure in Jordan and followed by external auditing while liquidity was found to have the least effect. The paper also addresses the disclosure items required in Corporate Governance Codes that exist for listed shareholding companies, banks, and insurance companies. Finally, the paper discusses the quality of accounting education in Jordan since prior studies noted its impact on accounting practice.Keywords: accounting legislation, corporate governance, disclosure practice, Jordan
Procedia PDF Downloads 362268 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 404267 Developing Fire Risk Factors for Existing Small-Scale Hospitals
Authors: C. L. Wu, W. W. Tseng
Abstract:
From the National Health Insurance (NHI) system was introduced in Taiwan in 2000, there have been some problems in transformed small-scale hospitals, such as mobility of patients, shortage of nursing staff, medical pipelines breaking fire compartments and insufficient fire protection systems. Due to shrinking of the funding scale and the aging society, fire safety in small-scale hospitals has recently given cause for concern. The aim of this study is to determine fire risk index for small-scale hospital through a systematic approach The selection of fire safety mitigation methods can be regarded as a multi-attribute decision making process which must be guaranteed by expert groups. First of all, identify and select safety related factors and identify evaluation criteria through literature reviews and experts group. Secondly, application of the Fuzzy Analytic Hierarchy Process method is used to ascertain a weighted value which enables rating of the importance each of the selected factors. Overall, Sprinkler type and Compartmentation are the most crucial indices in mitigating fire, that is to say, structural approach play an important role to decrease losses in fire events.Keywords: Fuzzy Delphi Method, fuzzy analytic hierarchy, process risk assessment, fire events
Procedia PDF Downloads 448266 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0
Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart
Abstract:
In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)
Procedia PDF Downloads 237265 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 381264 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran
Authors: Parvin Abedi, Poorandokht Afshari
Abstract:
Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.Keywords: law of the population, midwife, motivation, childbearing
Procedia PDF Downloads 45263 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine
Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret
Abstract:
Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.Keywords: mobile tool, body damage, personal injury and disability, telemedicine
Procedia PDF Downloads 90262 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 128261 The Impact of Cybercrime on Youth Development in Nigeria
Authors: Christiana Ebobo
Abstract:
Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.Keywords: armed robber, cybercrime, integrity, youth
Procedia PDF Downloads 528260 Noninvasive Continuous Glucose Monitoring Device Using a Photon-Assisted Tunneling Photodetector Based on a Quantum Metal-Oxide-Semiconductor
Authors: Wannakorn Sangthongngam, Melissa Huerta, Jaewoo Kim, Doyeon Kim
Abstract:
Continuous glucose monitoring systems are essential for diabetics to avoid health complications but come at a costly price, especially when insurance does not fully cover the diabetic testing kits needed. This paper proposes a noninvasive continuous glucose monitoring system to provide an accessible, low-cost, and painless alternative method of accurate glucose measurements to help improve quality of life. Using a light source with a wavelength of 850nm illuminates the fingertip for the photodetector to detect the transmitted light. Utilizing SeeDevice’s photon-assisted tunneling photodetector (PAT-PD)-based QMOS™ sensor, fluctuations of voltage based on photon absorption in blood cells are comparable to traditional glucose measurements. The performance of the proposed method was validated using 4 test participants’ transmitted voltage readings compared with measurements obtained from the Accu-Chek glucometer. The proposed method was able to successfully measure concentrations from linear regression calculations.Keywords: continuous glucose monitoring, non-invasive continuous glucose monitoring, NIR, photon-assisted tunneling photodetector, QMOS™, wearable device
Procedia PDF Downloads 99259 Board Regulation and Its Impact on Composition and Effects: Evidence from German Cooperative Banks
Authors: Markus Stralla
Abstract:
This study employs a GMM framework to examine the impact of potential regulatory intervention regarding the occupations of supervisory board members in cooperative banking. To achieve insights, the study proceeds in two different ways. First, it investigates the changes in board structure prior and following to the German Act to Strengthen Financial Market and Insurance Supervision (FinVAG). Second, the study estimates the influence of Ph.D.Share, professional concentration and supervisory power on bank-risk changes in consideration of the implementation of FinVAG. Therefore, the study is based on a sample of 246 German cooperative banks from 2006-2011 while applying four different measures of bank risk, namely credit-, equity-, liquidity-risk, and Z-Score, with the former three also being addressed in FinVAG. Results indicate that the implementation of FinVAG results in (most likely unintentional) structural changes, especially at the expense of farmers, and affects all risk measures and relations between risk measures and supervisory board characteristics in a risk-reducing and therefore intended way. To disentangle the complex relationship between board characteristics and risk measures, the study utilizes two-step system GMM estimator to account for unobserved heterogeneity and simultaneity in order to reduce endogeneity problems. The findings may be especially relevant for stakeholders, regulators, supervisors and managers.Keywords: bank governance, bank risk-taking, board of directors, regulation
Procedia PDF Downloads 429258 Change of Endocrine and Exocrine Insufficiency on Non-Diabetes Patients after Distal Pancreatectomy: A Nationwide Database Study
Authors: Jin-Ming Wu, Te-Wei Ho, Yu-Wen Tien
Abstract:
Background: The aim of this population-based study was to determine the occurrence of diabetes and exocrine pancreatic insufficiencies (EPI) on non-diabetes subjects receiving distal pancreatectomy (DP). Method: A nationwide cohort study between 2000 and 2010 was collected from the Taiwan National Health Insurance Research Database. Among 3264 DP patients, we identified 1410 non-diabetes and 966 non-diabetes non-EPI. Results. Of 1410 non-diabetes DP subjects, 312 patients (22.1%) developed newly-diagnosed diabetes after PD. On a multiple logistic regression model, co-morbid hyperlipidemia (odds ratio, 1.640; 95% CI, 1.362–2.763; P < 0.001) and pancreatitis (odds ratio, 2.428; 95% CI, 1.889–3.121; P < 0.001) significantly contributed to higher incidences of diabetes after DP. Moreover, 380 subjects (39.3%) developed EPI, and pancreatic cancer is the statistically significant risk factor (odds ratio, 4.663; 95% CI, 2.108–6.085; P < 0.001). Conclusion: The patients with co-morbid hyperlipidemia and chronic pancreatitis had higher rates of newly-diagnosed diabetes after DP, moreover, pancreatic cancer subjects had higher rates of pancreatic exocrine insufficiency after DP. The clinicians should be alert to follow up glucose metabolism and clinical symptoms of fat intolerance for DP patients.Keywords: distal pancreatectomy, National database, diabetes, exocrine insufficiency
Procedia PDF Downloads 198257 Developing High-Definition Flood Inundation Maps (HD-Fims) Using Raster Adjustment with Scenario Profiles (RASPTM)
Authors: Robert Jacobsen
Abstract:
Flood inundation maps (FIMs) are an essential tool in communicating flood threat scenarios to the public as well as in floodplain governance. With an increasing demand for online raster FIMs, the FIM State-of-the-Practice (SOP) is rapidly advancing to meet the dual requirements for high-resolution and high-accuracy—or High-Definition. Importantly, today’s technology also enables the resolution of problems of local—neighborhood-scale—bias errors that often occur in FIMs, even with the use of SOP two-dimensional flood modeling. To facilitate the development of HD-FIMs, a new GIS method--Raster Adjustment with Scenario Profiles, RASPTM—is described for adjusting kernel raster FIMs to match refined scenario profiles. With RASPTM, flood professionals can prepare HD-FIMs for a wide range of scenarios with available kernel rasters, including kernel rasters prepared from vector FIMs. The paper provides detailed procedures for RASPTM, along with an example of applying RASPTM to prepare an HD-FIM for the August 2016 Flood in Louisiana using both an SOP kernel raster and a kernel raster derived from an older vector-based flood insurance rate map. The accuracy of the HD-FIMs achieved with the application of RASPTM to the two kernel rasters is evaluated.Keywords: hydrology, mapping, high-definition, inundation
Procedia PDF Downloads 82256 Innovations for Freight Transport Systems
Authors: M. Lu
Abstract:
The paper presents part of the results of EU-funded projects: SoCool@EU (Sustainable Organisation between Clusters Of Optimized Logistics @ Europe), DG-RTD (Research and Innovation), Regions of Knowledge Programme (FP7-REGIONS-2011-1). It will provide an in-depth review of emerging technologies for further improving urban mobility and freight transport systems, such as (information and physical) infrastructure, ICT-based Intelligent Transport Systems (ITS), vehicles, advanced logistics, and services. Furthermore, the paper will provide an analysis of the barriers and will review business models for the market uptake of innovations. From a perspective of science and technology, the challenges of urbanization could be mainly handled through adequate (human-oriented) solutions for urban planning, sustainable energy, the water system, building design and construction, the urban transport system (both physical and information aspects), and advanced logistics and services. Implementation of solutions for these domains should be follow a highly integrated and balanced approach, a silo approach should be avoided. To develop a sustainable urban transport system (for people and goods), including inter-hubs and intra-hubs, a holistic view is needed. To achieve a sustainable transport system for people and goods (in terms of cost-effectiveness, efficiency, environment-friendliness and fulfillment of the mobility, transport and logistics needs of the society), a proper network and information infrastructure, advanced transport systems and operations, as well as ad hoc and seamless services are required. In addition, a road map for an enhanced urban transport system until 2050 will be presented. This road map aims to address the challenges of urban transport, and to provide best practices in inter-city and intra-city environments from various perspectives, including policy, traveler behaviour, economy, liability, business models, and technology.Keywords: synchromodality, multimodal transport, logistics, Intelligent Transport Systems (ITS)
Procedia PDF Downloads 318255 Off-Policy Q-learning Technique for Intrusion Response in Network Security
Authors: Zheni S. Stefanova, Kandethody M. Ramachandran
Abstract:
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.Keywords: cyber security, intrusion prevention, optimal policy, Q-learning
Procedia PDF Downloads 239254 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space
Authors: P. Saee, Baiju Gopal
Abstract:
YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.Keywords: cyber-psychology, internet, media, mental health, mental illness, technology
Procedia PDF Downloads 181253 Risk Measurement and Management Strategies in Poultry Farm Enterprises in Imo State, Nigeria
Authors: Donatus Otuiheoma Ohajianya, Augusta Onyekachi Unamba
Abstract:
This study analyzed risk among poultry farm enterprises in Imo State of Nigeria. Specifically, it examined sources of risks, the major risks associated with poultry farm enterprise, and the risk-reducing strategies among the poultry farm enterprises in the study area. Primary data collected in 2015 with validated questionnaire from 120 proportionately and randomly selected poultry farm enterprises were used for the study. The data were analyzed with descriptive statistics and W-Statistic that was validated with Pearson Criterion (X2). The results showed that major risk sources affecting poultry farm enterprises were production, marketing, financial and political in that order. The results found a W-Statistic value of 0.789, which was verified by Pearson Criterion to obtain X2-Calculated value of 4.65 which is lower that X2-Critical value of 11.07 at 5% significant level. The risk-reducing strategies were found to be diversification, savings, co-operative marketing, borrowing, and insurance. It was recommended that government and donor agencies should make policies aimed at encouraging poultry farm enterprises adopt the highlighted risk-reducing strategies in risk management to improve their productivity and farm income.Keywords: risk, measurement, management, poultry farm, Imo State
Procedia PDF Downloads 302252 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement
Authors: Mohamamd Ayish
Abstract:
This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.Keywords: diplomacy, engagement, social, globalization
Procedia PDF Downloads 277251 Operation and Management System of New Ahmadi Hospital Facility
Authors: Abdulrahman H. Alrashidi
Abstract:
Kuwait Oil Company provides health care services through Ahmadi hospital for oil sector employee and their families. Due to increasing number of entitled patients in Ahmadi hospital, the company starts health insurance option in 2010. In addition, a new Ahmadi hospital decided to build to accumulate all entitled patients. Operation and management of new Ahmadi hospital investigated in this research. In order to maintain the high quality of medical services and satisfaction rate among oil sector community and reducing the operation cost. Six operation and management options evaluated in order to implement in new Ahmadi hospital. Qualitative Risk assessment method used to investigate proposed options for operation and management of new Ahmadi hospital. Evaluation criteria consist of quality of medical services, operation cost and satisfaction rate among oil sector community. Results show that using the same operation and management system in existing Ahmadi hospital with new Ahmadi hospital will bring cost higher. This approach brings risk to KOC. Results from risk assessment show that partially operated new Ahmadi hospital is the best opportunity to meet the objectives of KOC’s medical group.Keywords: Kuwait Oil Company, new Ahmadi hospital, operation and management, risk assessment
Procedia PDF Downloads 360250 Disaster and Crisis Management Using Geographical Information System (GIS) during the Operation and Maintenance Stages of the Hyderabad Metro Rail in India
Authors: Sai Rajeev Reddy, Ishita Roy, M. Anji Reddy
Abstract:
The paper describes the importance of preventive measures and immediate Emergency logistics during accidents and unfortunate Disasters for the Hyderabad Metro Rails in their various stages of construction. This is the need of the modern generation where accidents, explosions, attacks and sudden crisis are frequent casualties which take huge tolls of life in the present world. The paper utilizes the workflow and application of Geographical information System (GIS) to provide information about problems and crisis structures for efficient Metro Transportation in the city. The study analyzes the difficulties and problems which cause accidents during operation and maintenance stages of the Metro Rail. The paper focuses upon the intermediate and firsthand information of Crisis with the help of GIS technology to share Disaster data for effective measures by the Cyber Police stations, Emergency Responders, Hospitals and First Aid Centre to act immediately and save lives. The results and conclusions have nevertheless proved very informative and useful for the safety board authorities of the Hyderabad Metro Rail. The operation and Maintenance are integral stages in the development of any Multipurpose transportation Projects and are usually prone to various Disasters and tragedies. Hence, the GIS technologies help in distribution of information among the masses with the web Technologies and advanced software developed to prevent and manage crisis widely and in a cost-benefits manner.Keywords: Geographical Information System, emergency assessment, accident zones, surveillance
Procedia PDF Downloads 567249 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 296248 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.Keywords: autism disease, neural network, CPU, GPU, transfer learning
Procedia PDF Downloads 121247 Human-Tiger Conflict in Chitwan National Park, Nepal
Authors: Abishek Poudel
Abstract:
Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship
Procedia PDF Downloads 463246 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective
Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad
Abstract:
There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media
Procedia PDF Downloads 290245 Prioritization in Modern Portfolio Management - An Action Design Research Approach to Method Development for Scaled Agility
Authors: Jan-Philipp Schiele, Karsten Schlinkmeier
Abstract:
Allocation of scarce resources is a core process of traditional project portfolio management. However, with the popularity of agile methodology, established concepts and methods of portfolio management are reaching their limits and need to be adapted. Consequently, the question arises of how the process of resource allocation can be managed appropriately in scaled agile environments. The prevailing framework SAFe offers Weightest Shortest Job First (WSJF) as a prioritization technique, butestablished companies are still looking for methodical adaptions to apply WSJF for prioritization in portfolios in a more goal-oriented way and aligned for their needs in practice. In this paper, the relevant problem of prioritization in portfolios is conceptualized from the perspective of coordination and related mechanisms to support resource allocation. Further, an Action Design Research (ADR) project with case studies in a finance company is outlined to develop a practically applicable yet scientifically sound prioritization method based on coordination theory. The ADR project will be flanked by consortium research with various practitioners from the financial and insurance industry. Preliminary design requirements indicate that the use of a feedback loop leads to better team and executive level coordination in the prioritization process.Keywords: scaled agility, portfolio management, prioritization, business-IT alignment
Procedia PDF Downloads 198