Search results for: social networks privacy issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15796

Search results for: social networks privacy issues

15286 An Eco-Translatology Approach to the Translation of Spanish Tourism Advertising in Digital Communication in Chinese

Authors: Mingshu Liu, Laura Santamaria, Xavier Carmaniu Mainadé

Abstract:

As one of the sectors most affected by the COVID-19 pandemic, tourism is facing challenges in revitalizing the industry. But at the same time, it would be a good opportunity to take advantage of digital communication as an effective tool for tourism promotion. Our proposal aims to verify the linguistic operations on online platforms in China. The research is carried out based on the theory of Eco-traductology put forward by Gengshen Hu, whose contribution focuses on the translator's adaptation to the ecosystem environment and the three elaborated parameters (linguistic, cultural and communicative). We also relate it to Even-Zohar's and Toury's theoretical postulates on the Polysystem to elaborate on interdisciplinary methodology. Such a methodology allows us to analyze personal treatments and phraseology in the target text. As for the corpus, we adopt the official Spanish-language website of Turismo de España as the source text and the postings on the two major social networks in China, Weibo and Wechat, in 2019. Through qualitative analysis, we conclude that, in the tourism advertising campaign on Chinese social networks, chengyu (Chinese phraseology) and honorific titles are used very frequently.

Keywords: digital communication, eco-traductology, polysystem theory, tourism advertising

Procedia PDF Downloads 231
15285 Safe Zone: A Framework for Detecting and Preventing Drones Misuse

Authors: AlHanoof A. Alharbi, Fatima M. Alamoudi, Razan A. Albrahim, Sarah F. Alharbi, Abdullah M Almuhaideb, Norah A. Almubairik, Abdulrahman Alharby, Naya M. Nagy

Abstract:

Recently, drones received a rapid interest in different industries worldwide due to its powerful impact. However, limitations still exist in this emerging technology, especially privacy violation. These aircrafts consistently threaten the security of entities by entering restricted areas accidentally or deliberately. Therefore, this research project aims to develop drone detection and prevention mechanism to protect the restricted area. Until now, none of the solutions have met the optimal requirements of detection which are cost-effectiveness, high accuracy, long range, convenience, unaffected by noise and generalization. In terms of prevention, the existing methods are focusing on impractical solutions such as catching a drone by a larger drone, training an eagle or a gun. In addition, the practical solutions have limitations, such as the No-Fly Zone and PITBULL jammers. According to our study and analysis of previous related works, none of the solutions includes detection and prevention at the same time. The proposed solution is a combination of detection and prevention methods. To implement the detection system, a passive radar will be used to properly identify the drone against any possible flying objects. As for the prevention, jamming signals and forceful safe landing of the drone integrated together to stop the drone’s operation. We believe that applying this mechanism will limit the drone’s invasion of privacy incidents against highly restricted properties. Consequently, it effectively accelerates drones‘ usages at personal and governmental levels.

Keywords: detection, drone, jamming, prevention, privacy, RF, radar, UAV

Procedia PDF Downloads 215
15284 Individuals’ Inner Wellbeing during the COVID-19 Pandemic: A Quantitative Comparison of Social Connections and Close Relationships between the UK and India

Authors: Maria Spanoudaki, Pauldy C. J. Otermans, Dev Aditya

Abstract:

Relationships form an integral part of our everyday wellbeing. In this study, the focus is on Inner Wellbeing which can be described as an individuals' thoughts and feelings about what they can do and be. Relationships can come in many forms and can be divided into Social Connections (thoughts and feelings about the social network people can establish and rely on), and Close Relationships (thoughts and feeling about the emotional support people can receive from significant others or their close, intimate circle). The purpose of this study is to compare the Social Connections and Close Relationship dimensions of Inner Wellbeing during the COVID-19 pandemic between the UK and India. 392 participants in the UK and 205 participants India completed an online questionnaire using the Inner Wellbeing scale. Factor analyses showed that the construct of Inner Wellbeing can be described as one factor for the UK sample whereas it can be described as two factors (one focusing on positive items and one focusing on negative items) for the Indian sample. Results showed that Social Connections were significantly during COVID-19 in the UK compared to India, whereas there is no significant difference for Close Relationships. The implications on relationships and wellbeing are discussed in detail.

Keywords: social networks, relationship maintenance, relationship satisfaction, COVID-19

Procedia PDF Downloads 166
15283 Water Governance Perspectives on the Urmia Lake Restoration Process: Challenges and Achievements

Authors: Jalil Salimi, Mandana Asadi, Naser Fathi

Abstract:

Urmia Lake (UL) has undergone a significant decline in water levels, resulting in severe environmental, socioeconomic, and health-related challenges. This paper examines the restoration process of UL from a water governance perspective. By applying a water governance model, the study evaluates the process based on six selected principles: stakeholder engagement, transparency and accountability, effectiveness, equitable water use, adaptation capacity, and water usage efficiency. The dominance of structural and physicalist approaches to water governance has led to a weak understanding of social and environmental issues, contributing to social crises. Urgent efforts are required to address the water crisis and reform water governance in the country, making water-related issues a top national priority. The UL restoration process has achieved significant milestones, including stakeholder consensus, scientific and participatory planning, environmental vision, intergenerational justice considerations, improved institutional environment for NGOs, investments in water infrastructure, transparency promotion, environmental effectiveness, and local issue resolutions. However, challenges remain, such as power distribution imbalances, bureaucratic administration, weak conflict resolution mechanisms, financial constraints, accountability issues, limited attention to social concerns, overreliance on structural solutions, legislative shortcomings, program inflexibility, and uncertainty management weaknesses. Addressing these weaknesses and challenges is crucial for the successful restoration and sustainable governance of UL.

Keywords: evaluation, restoration process, Urmia Lake, water governance, water resource management

Procedia PDF Downloads 72
15282 The Effect of Socio-Economic Factors on Electric Vehicle Charging Behavior: An Investigation

Authors: Judith Mwakalonge, Geophrey Mbatta, Cuthbert Ruseruka, Gurcan Comert, Saidi Siuhi

Abstract:

Recent advancements in technology have fostered the development of Electric Vehicles (EVs) that provides relief from transportation dependence on natural fossil fuels as sources of energy. It is estimated that more than 50% of petroleum is used for transportation, which accounts for 28% of annual energy use. Vehicles make up about 82% of all transportation energy use. It is also estimated that about 22% of global Carbon dioxide (CO2) emissions are produced by the transportation sector, therefore, it raises environmental concerns. Governments worldwide, including the United States, are investing in developing EVs to resolve the issues related to the use of natural fossil fuels, such as air pollution due to emissions. For instance, the Bipartisan Infrastructure Law (BIL) that was signed by President Biden on November 15th, 2021, sets aside about $5 billion to be apportioned to all 50 states, the District of Columbia, and Puerto Rico for the development of EV chargers. These chargers should be placed in a way that maximizes their utility. This study aims at studying the charging behaviors of Electric Vehicle (EV) users to establish factors to be considered in the selection of charging locations. The study will focus on social-economic and land use data by studying the relationship between charging time and charging locations. Local factors affecting the charging time and the chargers’ utility will be investigated.

Keywords: electric vehicles, EV charging stations, social economic factors, charging networks

Procedia PDF Downloads 87
15281 Analysis of Delivery of Quad Play Services

Authors: Rahul Malhotra, Anurag Sharma

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: FTTH, quad play, play service, access networks, data rate

Procedia PDF Downloads 419
15280 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 270
15279 Visualize Global Warming and Its Consequences Using Augmented Reality

Authors: K. R. Parvathy, R. Rao Bhavani , M. L. McLain, Kamal Bijlani, R. Jayakrishnan

Abstract:

Augmented Reality (AR) technology is considered to be an important emerging technology used in education today. One potentially key use of AR in education is to teach socio-scientific issues (SSI), topics that inure students towards social conscience and critical thinking. This work uses multiple markers and virtual buttons that interact with each other, creating a life-like visual spectacle. Learning about issues such as global warming by using AR technology, students will have an increased sense of experiencing immersion, immediacy, and presence, thereby enhancing their learning as well as likely improving their ability to make better informed decisions about considerations of such issues. Another advantage of AR is that it is a low cost technology, making it advantageous for educators to adapt to their classrooms. Also in this work we compare the effectiveness of AR versus ordinary video by polling a group of students to assess the content understandability, effectiveness and interaction of both the delivery methods.

Keywords: augmented reality, global warming, multiple markers, virtual buttons

Procedia PDF Downloads 401
15278 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 127
15277 Hybrid Hierarchical Clustering Approach for Community Detection in Social Network

Authors: Radhia Toujani, Jalel Akaichi

Abstract:

Social Networks generally present a hierarchy of communities. To determine these communities and the relationship between them, detection algorithms should be applied. Most of the existing algorithms, proposed for hierarchical communities identification, are based on either agglomerative clustering or divisive clustering. In this paper, we present a hybrid hierarchical clustering approach for community detection based on both bottom-up and bottom-down clustering. Obviously, our approach provides more relevant community structure than hierarchical method which considers only divisive or agglomerative clustering to identify communities. Moreover, we performed some comparative experiments to enhance the quality of the clustering results and to show the effectiveness of our algorithm.

Keywords: agglomerative hierarchical clustering, community structure, divisive hierarchical clustering, hybrid hierarchical clustering, opinion mining, social network, social network analysis

Procedia PDF Downloads 371
15276 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence

Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers

Abstract:

Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.

Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design

Procedia PDF Downloads 95
15275 Comparison of Classical Computer Vision vs. Convolutional Neural Networks Approaches for Weed Mapping in Aerial Images

Authors: Paulo Cesar Pereira Junior, Alexandre Monteiro, Rafael da Luz Ribeiro, Antonio Carlos Sobieranski, Aldo von Wangenheim

Abstract:

In this paper, we present a comparison between convolutional neural networks and classical computer vision approaches, for the specific precision agriculture problem of weed mapping on sugarcane fields aerial images. A systematic literature review was conducted to find which computer vision methods are being used on this specific problem. The most cited methods were implemented, as well as four models of convolutional neural networks. All implemented approaches were tested using the same dataset, and their results were quantitatively and qualitatively analyzed. The obtained results were compared to a human expert made ground truth for validation. The results indicate that the convolutional neural networks present better precision and generalize better than the classical models.

Keywords: convolutional neural networks, deep learning, digital image processing, precision agriculture, semantic segmentation, unmanned aerial vehicles

Procedia PDF Downloads 264
15274 Demand Forecasting Using Artificial Neural Networks Optimized by Particle Swarm Optimization

Authors: Daham Owaid Matrood, Naqaa Hussein Raheem

Abstract:

Evolutionary algorithms and Artificial neural networks (ANN) are two relatively young research areas that were subject to a steadily growing interest during the past years. This paper examines the use of Particle Swarm Optimization (PSO) to train a multi-layer feed forward neural network for demand forecasting. We use in this paper weekly demand data for packed cement and towels, which have been outfitted by the Northern General Company for Cement and General Company of prepared clothes respectively. The results showed superiority of trained neural networks using particle swarm optimization on neural networks trained using error back propagation because their ability to escape from local optima.

Keywords: artificial neural network, demand forecasting, particle swarm optimization, weight optimization

Procedia PDF Downloads 458
15273 A Study of the Understated Violence within Social Contexts against Adolescent Girls

Authors: Niranjana Soperna, Shivangi Nigam

Abstract:

Violence against women is linked to their disadvantageous position in the society. It is rooted in unequal power relationships between men and women in society and is a global problem which is not limited to a specific group of women in society. An adolescent girl’s life is often accustomed to the likelihood of violence, and acts of violence exert additional power over girls because the stigma of violence often attaches more to a girl than to her doer. The experience of violence is distressing at the individual emotional and physical level. The field of research and programs for adolescent girls has traditionally focused on sexuality, reproductive health, and behavior, neglecting the broader social issues that underpin adolescent girls’ human rights, overall development, health, and well-being. This paper is an endeavor to address the understated or disguised form of violence which the adolescent girls experience within the social contexts. The parameters exposed under this research had been ignored to a large extent when it came to studying the dimension of violence under the social domain. Hence, the researchers attempted to explore this camouflaged form of violence and discovered some specific parameters such as: Diminished Self Worth and Esteem, Verbal Abuse, Menstruation Taboo and Social Rigidity, Negligence of Medical and Health Facilities and Complexion- A Prime Parameter for Judging Beauty. The study was conducted in the districts of Haryana where personal interviews were taken from both urban and rural adolescent girls (aged 13 to 19 years) based on structured interview schedule. The results revealed that the adolescent girls, both in urban as well as rural areas were quite affected with the above mentioned issues. In urban areas, however, due to the higher literacy rate, which resulted in more rational thinking, the magnitude was comparatively smaller, but the difference was still negligible.

Keywords: adolescent girls, education, social contexts, understated violence

Procedia PDF Downloads 324
15272 Requirements to Establish a Taxi Sharing System in an Urban Area

Authors: Morteza Ahmadpur, Ilgin Gokasar, Saman Ghaffarian

Abstract:

That Transportation system plays an important role in management of societies is an undeniable fact and it is one of the most challenging issues in human beings routine life. But by increasing the population in urban areas, the demand for transportation modes also increase. Accordingly, it is obvious that more flexible and dynamic transportation system is required to satisfy peoples’ requirements. Nowadays, there is significant increase in number of environmental issues all over the world which is because of human activities. New technological achievements bring new horizons for humans and so they changed the life style of humans in every aspect of their life and transportation is not an exception. By using new technology, societies can modernize their transportation system and increase the feasibility of their system. Real–time Taxi sharing systems is one of the novel and most modern systems all over the world. For establishing this kind of system in an urban area it is required to use the most advanced technologies in a transportation system. GPS navigation devices, computers and social networks are just some parts of this kind of system. Like carpooling, real-time taxi sharing is one of the best ways to better utilize the empty seats in most cars and taxis, thus decreasing energy consumption and transport costs. It can serve areas not covered by a public transit system and act as a transit feeder service. Taxi sharing is also capable of serving one-time trips, not only recurrent commute trips or scheduled trips. In this study, we describe the requirements and parameters that we need to establish a useful real-time ride sharing system for an urban area. The parameters and requirements of this study can be used in any urban area.

Keywords: transportation, intelligent transportation systems, ride-sharing, taxi sharing

Procedia PDF Downloads 431
15271 Audience Engagement in UNHCR Social Media Stories of Displaced People: Emotion and Reason in a Global Public Debate

Authors: Soraya Tharani

Abstract:

Social media has changed how public opinion is shaped by enabling more diversified and inclusive participation of audiences. New online forums provide spaces in which governments, NGOs and other organizations can create content and receive feedback. These forums are sites where debate can constitute public opinion. Studies of audience engagement can give an understanding of how different voices from the civil society participate in debates and how discussions can reinforce or bring into question established societal beliefs. The UN’s refugee agency, UNHCR, produces audio-visual stories about displaced people for global audiences on social media platforms. The availability of many views in these forums can give insight into how dialogues regarding transnational issues are formed. The public sphere, as defined by Habermas, is a discursive arena where reasoned debate can take place. Habermas’ concept is combined with theories on celebrity advocacy, and discussions about the role and effect celebrities have in raising public awareness for humanitarian issues. The personal and public lives of celebrities often create emotional engagement from their fans and other audiences. In this study, quantitative and qualitative methods have been used on YouTube comments for uncovering how emotion and reason are constituted in a global public debate on celebrity endorsed UNHCR stories of displaced people. The study shows that engagement intensity is not equally distributed between comment threads; comments presented as facts or emotional claims are often supported by recourse to intertextuality, and specific linguistic strategies are used to put forward emotional and reasoned claims regarding individual and group identities. The findings from this research aim to contribute to an understanding of audience engagement on issues of human survival and solidarity in a global social media public sphere.

Keywords: emotions, engagement, global public sphere, linguistic strategies, reason, refugees, social media, UNHCR

Procedia PDF Downloads 142
15270 Aggression Related Trauma and Coping among University Students, Exploring Emotional Intelligence Applications on Coping with Aggression Related Trauma

Authors: Asanka Bulathwatta

Abstract:

This Study tries to figure out the role of emotional Intelligence for developing coping strategies among adolescents who face traumatic events. Late adolescence students who have enrolled into the University education (Bachelor students/first-year students) would be selected as the sample. University education is an important stage of students’ academic life. Therefore, all students need to develop their competencies to attain the goal of passing examinations and also to developing their wisdom related to the scientific knowledge they gathered through their academic life. Study to be conducted in a cross-cultural manner and it will be taking place in Germany and Sri Lanka. The sample will be consisting of 200 students from each country. Late adolescence is a critical period of the human being as it is foot step in their life which acquiring the emotional and social qualities in their social life. There are many adolescents who have affected by aggression related traumatic events during their lifespan but have not been identified or treated. More specifically, there are numerous burning issues within the first year of the university students namely, ragging done by seniors to juniors, bulling, invalidation and issues raise based on attitudes changes and orientation issues. Those factors can be traumatic for both their academic and day to day lifestyle. Identifying the students who are with emotional damages and their resiliency afterward the aggression related traumas and effective rehabilitation from the traumatic events is immensely needed in order to facilitate university students for their academic achievements and social life within the University education. Research findings in Germany show that students shows more interpersonal traumas, life-threatening illnesses and death of someone related are common in German sample.

Keywords: emotional intelligence, agression, trauma, coping

Procedia PDF Downloads 473
15269 Impact of Implementation of Right to Education in Pakistan

Authors: Rukhsar Ahmed, Jawed Aziz Masudi

Abstract:

In the present study, an attempt has been made about the right to an education in Pakistan. The research is the focus in respect of International Law Article 26 of the Universal Declaration of Human Rights. The main motivation behind getting great training is, as a rule, decent resident and afterward being effective in close to home and expert life. We are fragmented without decent instruction since training makes us the right mastermind and right chief. In such a focused world, instruction has turned into a need for people after sustenance, dress and haven. It can give answers for all issues; it advances great propensities and mindfulness about defilement, fear-mongering, and other social issues among us.

Keywords: education, right to education, human right, universal declaration, law

Procedia PDF Downloads 169
15268 A Network Economic Analysis of Friendship, Cultural Activity, and Homophily

Authors: Siming Xie

Abstract:

In social networks, the term homophily refers to the tendency of agents with similar characteristics to link with one another and is so robustly observed across many contexts and dimensions. The starting point of my research is the observation that the “type” of agents is not a single exogenous variable. Agents, despite their differences in race, religion, and other hard to alter characteristics, may share interests and engage in activities that cut across those predetermined lines. This research aims to capture the interactions of homophily effects in a model where agents have two-dimension characteristics (i.e., race and personal hobbies such as basketball, which one either likes or dislikes) and with biases in meeting opportunities and in favor of same-type friendships. A novel feature of my model is providing a matching process with biased meeting probability on different dimensions, which could help to understand the structuring process in multidimensional networks without missing layer interdependencies. The main contribution of this study is providing a welfare based matching process for agents with multi-dimensional characteristics. In particular, this research shows that the biases in meeting opportunities on one dimension would lead to the emergence of homophily on the other dimension. The objective of this research is to determine the pattern of homophily in network formations, which will shed light on our understanding of segregation and its remedies. By constructing a two-dimension matching process, this study explores a method to describe agents’ homophilous behavior in a social network with multidimension and construct a game in which the minorities and majorities play different strategies in a society. It also shows that the optimal strategy is determined by the relative group size, where society would suffer more from social segregation if the two racial groups have a similar size. The research also has political implications—cultivating the same characteristics among agents helps diminishing social segregation, but only if the minority group is small enough. This research includes both theoretical models and empirical analysis. Providing the friendship formation model, the author first uses MATLAB to perform iteration calculations, then derives corresponding mathematical proof on previous results, and last shows that the model is consistent with empirical evidence from high school friendships. The anonymous data comes from The National Longitudinal Study of Adolescent Health (Add Health).

Keywords: homophily, multidimension, social networks, friendships

Procedia PDF Downloads 173
15267 A Secure System for Handling Information from Heterogeous Sources

Authors: Shoohira Aftab, Hammad Afzal

Abstract:

Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.

Keywords: information integration, semantic data, interoperability, security, access control system

Procedia PDF Downloads 361
15266 Exploring the Psychosocial Brain: A Retrospective Analysis of Personality, Social Networks, and Dementia Outcomes

Authors: Felicia N. Obialo, Aliza Wingo, Thomas Wingo

Abstract:

Psychosocial factors such as personality traits and social networks influence cognitive aging and dementia outcomes both positively and negatively. The inherent complexity of these factors makes defining the underlying mechanisms of their influence difficult; however, exploring their interactions affords promise in the field of cognitive aging. The objective of this study was to elucidate some of these interactions by determining the relationship between social network size and dementia outcomes and by determining whether personality traits mediate this relationship. The longitudinal Alzheimer’s Disease (AD) database provided by Rush University’s Religious Orders Study/Memory and Aging Project was utilized to perform retrospective regression and mediation analyses on 3,591 participants. Participants who were cognitively impaired at baseline were excluded, and analyses were adjusted for age, sex, common chronic diseases, and vascular risk factors. Dementia outcome measures included cognitive trajectory, clinical dementia diagnosis, and postmortem beta-amyloid plaque (AB), and neurofibrillary tangle (NT) accumulation. Personality traits included agreeableness (A), conscientiousness (C), extraversion (E), neuroticism (N), and openness (O). The results show a positive correlation between social network size and cognitive trajectory (p-value = 0.004) and a negative relationship between social network size and odds of dementia diagnosis (p = 0.024/ Odds Ratio (OR) = 0.974). Only neuroticism mediates the positive relationship between social network size and cognitive trajectory (p < 2e-16). Agreeableness, extraversion, and neuroticism all mediate the negative relationship between social network size and dementia diagnosis (p=0.098, p=0.054, and p < 2e-16, respectively). All personality traits are independently associated with dementia diagnosis (A: p = 0.016/ OR = 0.959; C: p = 0.000007/ OR = 0.945; E: p = 0.028/ OR = 0.961; N: p = 0.000019/ OR = 1.036; O: p = 0.027/ OR = 0.972). Only conscientiousness and neuroticism are associated with postmortem AD pathologies; specifically, conscientiousness is negatively associated (AB: p = 0.001, NT: p = 0.025) and neuroticism is positively associated with pathologies (AB: p = 0.002, NT: p = 0.002). These results support the study’s objectives, demonstrating that social network size and personality traits are strongly associated with dementia outcomes, particularly the odds of receiving a clinical diagnosis of dementia. Personality traits interact significantly and beneficially with social network size to influence the cognitive trajectory and future dementia diagnosis. These results reinforce previous literature linking social network size to dementia risk and provide novel insight into the differential roles of individual personality traits in cognitive protection.

Keywords: Alzheimer’s disease, cognitive trajectory, personality traits, social network size

Procedia PDF Downloads 132
15265 Youth and International Environmental Voluntary Initiatives: A Case Study of IGreen Project by AIESEC in Bandung

Authors: Yoel Agustheo Rinding

Abstract:

Globalization has made physical borders between countries become more obscure. Due to the free flow of information between countries, issue for instance, environment has become global concern. The concern has grown as the result of endless campaign made by most of the non-governmental organizations (NGOs). By means of this situation, international voluntary initiatives on environmental issues have appeared to be popular among world’s society today especially for youth. AIESEC as international non-governmental organization (INGO) through IGreen Project has initiated environmental international voluntary initiatives concerning in environmental awareness of Bandung’s citizen. Bandung itself is still struggling on solving flood as one of its major problems regardless the fact that Bandung is one of the most developed cities in Indonesia. This paper would like to discuss on how globalization affects AIESEC as an INGO in order to spread its influence and also on how it could build international voluntary initiatives networks. Afterwards, author would like to elaborate how both AIESEC and youth perceive the importance of international voluntary initiatives by using cosmopolitanism approach. In order to get a deep understanding of how this activity works, this paper also would like to explain regarding the management, expected outcomes, and the real impacts of IGreen project towards Bandung. In the end of this paper, author would like to propose solutions on how to utilize international voluntary initiatives as a solution for environmental issues nowadays.

Keywords: AIESEC, cosmopolitanism, environmental issues, globalization, IGreen project, international environmental voluntary initiatives, INGO, youth

Procedia PDF Downloads 225
15264 Community Development and Empowerment

Authors: Shahin Marjan Nanaje

Abstract:

The present century is the time that social worker faced complicated issues in the area of their work. All the focus are on bringing change in the life of those that they live in margin or live in poverty became the cause that we have forgotten to look at ourselves and start to bring change in the way we address issues. It seems that there is new area of needs that social worker should response to that. In need of dialogue and collaboration, to address the issues and needs of community both individually and as a group we need to have new method of dialogue as tools to reach to collaboration. The social worker as link between community, organization and government play multiple roles. They need to focus in the area of communication with new ability, to transfer all the narration of the community to those organization and government and vice versa. It is not relate only in language but it is about changing dialogue. Migration for survival by job seeker to the big cities created its own issues and difficulty and therefore created new need. Collaboration is not only requiring between government sector and non-government sectors but also it could be in new way between government, non-government and communities. To reach to this collaboration we need healthy, productive and meaningful dialogue. In this new collaboration there will not be any hierarchy between members. The methodology that selected by researcher were focusing on observation at the first place, and used questionnaire in the second place. Duration of the research was three months and included home visits, group discussion and using communal narrations which helped to bring enough evidence to understand real need of community. The sample selected randomly was included 70 immigrant families which work as sweepers in the slum community in Bangalore, Karnataka. The result reveals that there is a gap between what a community is and what organizations, government and members of society apart from this community think about them. Consequently, it is learnt that to supply any service or bring any change to slum community, we need to apply new skill to have dialogue and understand each other before providing any services. Also to bring change in the life of those marginal groups at large we need to have collaboration as their challenges are collective and need to address by different group and collaboration will be necessary. The outcome of research helped researcher to see the area of need for new method of dialogue and collaboration as well as a framework for collaboration and dialogue that were main focus of the paper. The researcher used observation experience out of ten NGO’s and their activities to create framework for dialogue and collaboration.

Keywords: collaboration, dialogue, community development, empowerment

Procedia PDF Downloads 594
15263 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 303
15262 Subjectivities of the Inhabitants and Trajectories of Family Life in Vulnerable Groups

Authors: Mora Kestelman

Abstract:

This paper analyzes various family groups of vulnerable populations as regards their family, educational, labor trajectory and sociability from a relational and historical approach based on archive research and fieldwork. Therefrom, their position and life projects are reconsidered as regards the planning and design of the habitat in which they are immersed. It concludes that a critical review of objectivity and subjectivity emphasizes the nonrational, often unconscious, forces that drive human and non-human relationships to configure identities, which, thus, permanently become constituent to the subjects.

Keywords: social psychology, urban planning, self concept, social networks, identity theory

Procedia PDF Downloads 83
15261 The Study of ZigBee Protocol Application in Wireless Networks

Authors: Ardavan Zamanpour, Somaieh Yassari

Abstract:

ZigBee protocol network was developed in industries and MIT laboratory in 1997. ZigBee is a wireless networking technology by alliance ZigBee which is designed to low board and low data rate applications. It is a Protocol which connects between electrical devises with very low energy and cost. The first version of IEEE 802.15.4 which was formed ZigBee was based on 2.4GHZ MHZ 912MHZ 868 frequency band. The name of system is often reminded random directions that bees (BEES) traversing during pollination of products. Such as alloy of the ways in which information packets are traversed within the mesh network. This paper aims to study the performance and effectiveness of this protocol in wireless networks.

Keywords: ZigBee, protocol, wireless, networks

Procedia PDF Downloads 371
15260 An Interactive Methodology to Demonstrate the Level of Effectiveness of the Synthesis of Local-Area Networks

Authors: W. Shin, Y. Kim

Abstract:

This study focuses on disconfirming that wide-area networks can be made mobile, highly-available, and wireless. This methodological test shows that IPv7 and context-free grammar are mismatched. In the cases of robots, a similar tendency is also revealed. Further, we also prove that public-private key pairs could be built embedded, adaptive, and wireless. Finally, we disconfirm that although hash tables can be made distributed, interposable, and autonomous, XML and DNS can interfere to realize this purpose. Our experiments soon proved that exokernelizing our replicated Knesis keyboards was more significant than interrupting them. Our experiments exhibited degraded average sampling rate.

Keywords: collaborative communication, DNS, local-area networks, XML

Procedia PDF Downloads 189
15259 Understanding the Operational Challenges of Social Enterprises: A Review of Real-Life Issues in the Context of Developing Countries

Authors: Humayun Murshed

Abstract:

There is growing importance of ‘social enterprise’ among the researchers and policy makers around the globe. Such enterprises have been viewed as alternative means for addressing the concerns relating to financing of corporate enterprises and social empowerment. This, some cases, has led to relatively unrealistic and higher level of expectations among policy makers and the members of the society at large. There is a general perception among different social actors that these enterprises provide universal and magic solution towards employment generation, and thus resulting in eradicating poverty, and ensuring equitable distribution of income and wealth. However, in many cases, these enterprises find a challenging journey in terms of prevailing market structure, socio-political environment, and unrealistic perception and expectations of social participants. This paper is focused on reviewing case studies based on empirical research and information from secondary sources and geared to looking at the challenges that social enterprises face. The research will draw the experience primarily from the developing countries’ perspective by adopting case study methodology. A tentative action plan will be suggested for further review by the policy makers and researchers in this growing arena of discipline. This research will attempt to highlight the myths and realities surrounding the operation of social enterprises.

Keywords: social enterprises, social empowerment, economic development, financing need

Procedia PDF Downloads 186
15258 Diversity and Inclusion in Focus: Cultivating a Sense of Belonging in Higher Education

Authors: Naziema Jappie

Abstract:

South Africa is a diverse nation but with many challenges. The fundamental changes in the political, economic and educational domains in South Africa in the late 1990s affected the South African community profoundly. In higher education, experiences of discrimination and bias are detrimental to the sense of belonging of staff and students. It is therefore important to cultivate an appreciation of diversity and inclusion. To bridge common understandings with the reality of racial inequality, we must understand the ways in which senior and executive leadership at universities think about social justice issues relating to diversity and inclusion and contextualize these within the current post-democracy landscape. The position and status of social justice issues and initiatives in South African higher education is a slow process. The focus is to highlight how and to what extent initiatives or practices around campus diversity and inclusion have been considered and made part of the mainstream intellectual and academic conversations in South Africa. This involves an examination of the social and epistemological conditions of possibility for meaningful research and curriculum practices, staff and student recruitment, and student access and success in addressing the challenges posed by social diversity on campuses. Methodology: In this study, university senior and executive leadership were interviewed about their perceptions and advancement of social justice and examine the buffering effects of diverse and inclusive peer interactions and institutional commitment on the relationship between discrimination–bias and sense of belonging for staff and students at the institutions. The paper further explores diversity and inclusion initiatives at the three institutions using a Critical Race Theory approach in conjunction with a literature review on social justice with a special focus on diversity and inclusion. Findings: This paper draws on research findings that demonstrate the need to address social justice issues of diversity and inclusion in the SA higher education context. The reason for this is so that university leaders can live out their experiences and values as they work to transform students into being accountable and responsible. Documents were selected for review with the intent of illustrating how diversity and inclusion work being done across an institution can shape the experiences of previously disadvantaged persons at these institutions. The research has highlighted the need for institutional leaders to embody their own mission and vision as they frame social justice issues for the campus community. Finally, the paper provides recommendations to institutions for strengthening high-level diversity and inclusion programs/initiatives among staff, students and administrators. The conclusion stresses the importance of addressing the historical and current policies and practices that either facilitate or negate the goals of social justice, encouraging these privileged institutions to create internal committees or task forces that focus on racial and ethnic disparities in the institution.

Keywords: diversity, higher education, inclusion, social justice

Procedia PDF Downloads 123
15257 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 383