Search results for: social networks privacy issues
15196 Current Issues on Enterprise Architecture Implementation Evaluation
Authors: Fatemeh Nikpay, Rodina Binti Ahmad, Babak Darvish Rouhani
Abstract:
Enterprise Architecture (EA) is employed by enterprises for providing integrated Information Systems (ISs) in order to support alignment of their business and Information Technology (IT). Evaluation of EA implementation can support enterprise to reach intended goals. There are some problems in current evaluation methods of EA implementation that lead to ineffectiveness implementation of EA. This paper represents current issues on evaluation of EA implementation. In this regard, we set the framework in order to represent evaluation’s issues based on their functionality and structure. The results of this research not only increase the knowledge of evaluation, but also could be useful for both academics and practitioners in order to realize the current situation of evaluations.Keywords: current issues on EA implementation evaluation, evaluation, enterprise architecture, evaluation of enterprise architecture implementation
Procedia PDF Downloads 53615195 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 37315194 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 25315193 Network Conditioning and Transfer Learning for Peripheral Nerve Segmentation in Ultrasound Images
Authors: Harold Mauricio Díaz-Vargas, Cristian Alfonso Jimenez-Castaño, David Augusto Cárdenas-Peña, Guillermo Alberto Ortiz-Gómez, Alvaro Angel Orozco-Gutierrez
Abstract:
Precise identification of the nerves is a crucial task performed by anesthesiologists for an effective Peripheral Nerve Blocking (PNB). Now, anesthesiologists use ultrasound imaging equipment to guide the PNB and detect nervous structures. However, visual identification of the nerves from ultrasound images is difficult, even for trained specialists, due to artifacts and low contrast. The recent advances in deep learning make neural networks a potential tool for accurate nerve segmentation systems, so addressing the above issues from raw data. The most widely spread U-Net network yields pixel-by-pixel segmentation by encoding the input image and decoding the attained feature vector into a semantic image. This work proposes a conditioning approach and encoder pre-training to enhance the nerve segmentation of traditional U-Nets. Conditioning is achieved by the one-hot encoding of the kind of target nerve a the network input, while the pre-training considers five well-known deep networks for image classification. The proposed approach is tested in a collection of 619 US images, where the best C-UNet architecture yields an 81% Dice coefficient, outperforming the 74% of the best traditional U-Net. Results prove that pre-trained models with the conditional approach outperform their equivalent baseline by supporting learning new features and enriching the discriminant capability of the tested networks.Keywords: nerve segmentation, U-Net, deep learning, ultrasound imaging, peripheral nerve blocking
Procedia PDF Downloads 11115192 Populism in the Age of Twitter: How Social Media Contextualized New Insights on an Old Phenomenon
Authors: Djehich Mohamed Yousri
Abstract:
With the advent of social media, political communication scholars have systematically reviewed theories and empirical findings that revolve around media use and democracy. It is interesting that around the same time period, there has been a trend towards revitalization of political populism in different latitudes around the world. This wide-ranging populist movement has expanded regardless of whether these political systems are established democracies, emerging democracies, or societies mired in endangered political contexts. This article serves as an introductory piece to a special issue on populism. First, it highlights the ways in which "populism", as an ancient phenomenon, has transmigrated into the political sphere in the age of social media. Second, the article seeks to better define the populist context and how it has evolved in today's hybrid media society. Finally, this introduction also lays the groundwork for six data-driven theoretical core papers that cover many of the important issues revolving around the phenomenon of populism today.Keywords: democracy, facebook, populism, social media, twitter
Procedia PDF Downloads 7715191 Dissolved Gas Analysis Based Regression Rules from Trained ANN for Transformer Fault Diagnosis
Authors: Deepika Bhalla, Raj Kumar Bansal, Hari Om Gupta
Abstract:
Dissolved Gas Analysis (DGA) has been widely used for fault diagnosis in a transformer. Artificial neural networks (ANN) have high accuracy but are regarded as black boxes that are difficult to interpret. For many problems it is desired to extract knowledge from trained neural networks (NN) so that the user can gain a better understanding of the solution arrived by the NN. This paper applies a pedagogical approach for rule extraction from function approximating neural networks (REFANN) with application to incipient fault diagnosis using the concentrations of the dissolved gases within the transformer oil, as the input to the NN. The input space is split into subregions and for each subregion there is a linear equation that is used to predict the type of fault developing within a transformer. The experiments on real data indicate that the approach used can extract simple and useful rules and give fault predictions that match the actual fault and are at times also better than those predicted by the IEC method.Keywords: artificial neural networks, dissolved gas analysis, rules extraction, transformer
Procedia PDF Downloads 54015190 Blockchain Security in MANETs
Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Abstract:
The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.Keywords: Ad hocs networks, blockchain, MPR, security
Procedia PDF Downloads 18715189 Health and the Politics of Trust: Multi-Drug-Resistant Tuberculosis in Kathmandu
Authors: Mattia Testuzza
Abstract:
Public health is a social endeavour, which involves many different actors: from extremely stratified, structured health systems to unofficial networks of people and knowledge. Health and diseases are an intertwined individual and social experiences. Both patients and health workers navigate this public space through relations of trust. Trust in healthcare goes from the personal trust between a patient and her/his doctor to the trust of both the patient and the health worker in the medical knowledge and the healthcare system. Trust it is not a given, but it is continuously negotiated, given and gained. The key to understand these essential relations of trust in health is to recognise them as a social practice, which therefore implies agency and power. In these terms, health is constantly public and made public, as trust emerges as a meaningfully political phenomenon. Trust as a power relation can be observed at play in the implementation of public health policies such as the WHO’s Directly-Observed Theraphy Short-course (DOTS), and with the increasing concern for drug-resistance that tuberculosis pose, looking at the role of trust in the healthcare delivery system and implementation of public health policies becomes significantly relevant. The ethnographic fieldwork was carried out in four months through observation of the daily practices at the National Tuberculosis Center of Nepal, and semi-structured interviews with MultiDrug-Resistant Tuberculosis (MDR-TB) patients at different stages of the treatment, their relatives, MDR-TB specialised nurses, and doctors. Throughout the research, the role which trust plays in tuberculosis treatment emerged as one fundamental ax that cuts through all the different factors intertwined with drug-resistance development, unfolding a tension between the DOTS policy, which undermines trust, and the day-to-day healthcare relations and practices which cannot function without trust. Trust also stands out as a key component of the solutions to unforeseen issues which develop from the overall uncertainty of the context - for example, political instability and extreme poverty - in which tuberculosis treatment is carried out in Nepal.Keywords: trust, tuberculosis, drug-resistance, politics of health
Procedia PDF Downloads 25815188 The Role and Tasks of a Social Worker in the Care of a Terminally Ill Child with Regard to the Malopolska Hospice for Children
Authors: Ewelina Zdebska
Abstract:
A social worker is an integral part of an interdisciplinary team working with the child and his family in a terminal state. Social support is an integral part of the medical procedure in the care of hospice. This is the basis and prerequisite of full treatment and good care of the child - patient, whose illness often finds at least the expected period of his life when his personal and legal issues are not regulated, and the family burdened with the problem requires care and support specialists - professionals. Hospice for Children in Krakow: a palliative care team operating in the province of Krakow and Malopolska, conducts specialized care for terminally ill children in place of their residence from the time when parents and doctors decided to end of treatment in hospital, allows parents to carry out medical care at home, provides parents social and legal assistance and provides care, psychological support and friendship to families throughout the life of the child's illness and after his death, as long as it is needed. The social worker in a hospice does not bear the burden of solving social problems, which is the responsibility of other authorities, but provides support possible and necessary at the moment. The most common form of assistance is to provide information on benefits, which for the child and his family may be subject to any treatment and fight for the life and health of a child. Employee assists in the preparation and completion of documents, requests to increase the degree of disability because of progressive disease or Allowance care because of the inability to live independently. It works in settling all the issues with the Department of Social Security, as well as with the Municipal and District Team Affairs of disability. Seeking help and support using multi-faceted childcare. With the Centres for Social Welfare contacts are also often on the organization of additional respite care for the sick at home (care), especially in the work of the other members of the family or if the family can not cope with the care and needs extra help. Hospice for Children in Cracow completing construction of Poland's first Respite Care Centre for chronically and terminally ill children, will be an open house where children suffering from chronic and incurable diseases and their families can get professional help, whenever - when they need it. The social worker has to pick up a very important role in caring for a terminally ill child. His presence gives a little patient and family the opportunity to be at this difficult time together while organizing assistance and support.Keywords: social worker, care, terminal care, hospice
Procedia PDF Downloads 25215187 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.Keywords: cyber security, vulnerability detection, neural networks, feature extraction
Procedia PDF Downloads 9215186 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 2315185 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 30415184 The Evolutionary Characteristics and Mechanisms and of Multi-scale Intercity Innovation Enclave Networks in China’s Yangtze River Delta Region
Authors: Yuhua Yang, Yingcheng Li
Abstract:
As a new form of intercity economic cooperation, innovation enclaves have received much attention from governments and scholars in China, which are of great significance in promoting the flow of innovation elements and advancing regional integration. Utilizing inter-city linkages of innovation enclaves within and beyond the Yangtze River Delta Region, we construct multi-scalar innovation enclave networks in 2018 and 2022, and analyze the evolutionary characteristics and underlying mechanisms of the networks. Overall, we find that: (1) The intercity innovation enclave networks have the characteristics of preferential connection and are gradually forming a clear multi-scale and hierarchical structure, with Shanghai, Hangzhou and Nanjing as the core and other cities as the general nodes; (2) The intercity innovation enclave networks exhibit local clustering dominated by geographical proximity connections, and are becoming more noticeable in the effect of distance decay and functionally polycentric as the spatial scale decreases; (3) The intercity innovation enclave networks are influenced by both functional distance and multidimensional proximity. While the innovation potential differences caused by urban attributes internally drive the formation of innovation enclave cooperation, geographic proximity, technological proximity and institutional proximity externally affect the selection of cooperation partners.Keywords: economic enclave, intercity cooperation, proximity, yangtze river delta region
Procedia PDF Downloads 3015183 Use of Protection Motivation Theory to Assess Preventive Behaviors of COVID-19
Authors: Maryam Khazaee-Pool, Tahereh Pashaei, Koen Ponnet
Abstract:
Background: The global prevalence and morbidity of Coronavirus disease 2019 (COVID-19) are high. Preventive behaviors are proven to reduce the damage caused by the disease. There is a paucity of information on determinants of preventive behaviors in response to COVID-19 in Mazandaran province, north of Iran. So, we aimed to evaluate the protection motivation theory (PMT) in promoting preventive behaviors of COVID-19 in Mazandaran province. Materials and Methods: In this descriptive cross-sectional study, 1220 individuals participated. They were selected via social networks using convenience sampling in 2020. Data were collected online using a demographic questionnaire and a valid and reliable scale based on PMT. Data analysis was done using the Pearson correlation coefficient and linear regression in SPSS V24. Result: The mean age of the participants was 39.34±8.74 years. The regression model showed perceived threat (ß =0.033, P =0.007), perceived costs (ß=0.039, P=0.045), perceived self-efficacy (ß =0.116, P>0.001), and perceived fear (ß=0.131, P>0.001) as the significant predictors of COVID-19 preventive behaviors. This model accounted for 78% of the variance in these behaviors. Conclusion: According to constructs of the PMT associated with protection against COVID-19, educational programs and health promotion based on the theory and benefiting from social networks could be helpful in increasing the motivation of people towards protective behaviors against COVID-19.Keywords: questionnaire development, validation, intention, prevention, covid-19
Procedia PDF Downloads 4615182 Use of Telephone Counselling in Employee Assistance Program
Authors: Andy S.K. Cheng, Samuel Leung, Cindy Kwok, Hector Tsang
Abstract:
Background: Telephone counselling is one of the essential interventions that can be found in most of the Employee Assistance Programs (EAP). The purposes of this study were to (1) explore the trend of the telephone counselling from 2003-2016 in Hong Kong; (2) explore which EAP issue requires more follow-up; and 3) examine the relationship between the EAP issues and demographic data such as gender and job ranking. Method: Date of EAP services usage was collected from EAP providers in Hong Kong during 2003-2016. EAP issues were categorized into two domains, namely workplace issues and personal issues. Each domain has 12 sub-categories. Two hypotheses were formulated in this study (1) there was a gender difference in EAP issues and the follow-up hours; and (2) there was a significant difference between job ranking, EAP issues and follow-up hours. Results: A total of eight hundred and ninety-three valid cases were identified for analysis. Of them, three hundred and forty-three cases sought for follow-up. The duration of follow-up by hours was calculated for each of the follow-up cases. The results of the study shows that the top three workplace issues that required the longest duration of follow-up were (1) workload, (2) supervisor-subordinate relationship; and (3) team member’s relationship. On the other hand, the top three personal issues that required the longest duration of follow-up were (1) parenting/parent-child relationship, (2) family care, and (3) marital relationship. Two-way ANOVA was performed to compare the total follow-up hours (excluding first intake) between gender and EAP issues. There was no statistical significance for gender (p =.891), but a statistically significant main effect for EAP issues (p <.001) was found. Post-hoc analysis (Tukey’s test) showed that total follow-up hour in personal issues was statistically significant higher than that in handling workplace issues (p <.001). However, there was no statistically significant interaction effect between gender and EAP issues (p=.879) and between job ranking and EAP issues (p=.843). Conclusion: Telephone counselling is a very common intervention in addressing EAP issues arising from workplace and personal level in Hong Kong. It was frequently used to handle interpersonal relationships and the service usage was independent of gender and job ranking.Keywords: employee assistance program, follow-up time, interpersonal relationships, telephone counselling
Procedia PDF Downloads 21915181 Entrepreneur Competencies: An Exploratory Study Applied to Educational Social Enterprise in South East Asia
Authors: D. Songpol, K. Taweesak, T. Sookyuen
Abstract:
A social enterprise is an organization that operates commercial business as a source of income with the aim of addressing social and environmental issues. Though it is clear that this kind of organization will benefit society and environment but in practice, it is found that most of social enterprises’ goals cannot be achieved. The most success factors of social enterprises usually rely on individual characteristics of entrepreneurs, especially in educational business. This study aims to find out the magnitude of influence from the components of entrepreneur competencies to social enterprises in education. There are developmental models of research demonstrating that knowledge, skills and attributes affect the success of social enterprises in term of sustainability, social opportunities and innovation leadership. The 5-scale questionnaire was used to collect data from the social entrepreneurs in education who operates in the South East Asian region of 135 samples and then processed by the methods of structural equation models. The results show that the competency of entrepreneurs in attributes has the greatest impact on the success of social enterprises while the skills and knowledge have respectively impact on the social enterprises’ success as well. The reason why attributes of entrepreneurs have the greatest impact on social enterprise success is because, social enterprise is an organization that does not motivate or provide attractive financial incentives to the entrepreneur. Entrepreneurs, who succeed in developing their organizations, therefore need attribute factor higher than normal entrepreneurs, especially those in education sector that have somewhat few human resources to operate their businesses. More importantly, attribute’s traits such as entrepreneurial passion, self-efficacy, entrepreneurial identity and, innovativeness and perseverance will significantly affect the ideology and tolerance of the entrepreneurs once facing the problem in doing business. In conclusion, the education social enterprise would be successful depending on the performance of the entrepreneurs which derives from higher attributes competency.Keywords: education, entrepreneur competencies, social enterprise, South East Asia
Procedia PDF Downloads 15815180 Blockchain Solutions for IoT Challenges: Overview
Authors: Amir Ali Fatoorchi
Abstract:
Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.Keywords: Blockchain, security, data security, IoT
Procedia PDF Downloads 21515179 Service Flow in Multilayer Networks: A Method for Evaluating the Layout of Urban Medical Resources
Authors: Guanglin Song
Abstract:
(Objective) Situated within the context of China's tiered medical treatment system, this study aims to analyze spatial causes of urban healthcare access difficulties from the perspective of the configuration of healthcare facilities. (Methods) A social network analysis approach is employed to construct a healthcare demand and supply flow network between major residential clusters and various tiers of hospitals in the city.(Conclusion) The findings reveal that:1.there exists overall maldistribution and over-concentration of healthcare resources in Study Area, characterized by structural imbalance; 2.the low rate of primary care utilization in Study Area is a key factor contributing to congestion at higher-tier hospitals, as excessive reliance on these institutions by neighboring communities exacerbates the problem; 3.gradual optimization of the healthcare facility layout in Study Area, encompassing holistic, local, and individual institutional levels, can enhance systemic efficiency and resource balance.(Prospects) This research proposes a method for evaluating urban healthcare resource distribution structures based on service flows within hierarchical networks. It offers spatially targeted optimization suggestions for promoting the implementation of the tiered healthcare system and alleviating challenges related to accessibility and congestion in seeking medical care. Provide some new ideas for researchers and healthcare managers in countries, cities, and healthcare management around the world with similar challenges.Keywords: flow of public services, urban networks, healthcare facilities, spatial planning, urban networks
Procedia PDF Downloads 7515178 Working Between Human and Non-Human Nature: Using Labour as a Tool to Capture the Transformations of Planetary Life
Authors: Ellen Kirkpatrick
Abstract:
Deforestation, toxification, and loss of environmental habitats, accompanied by expanding production and urbanization, are visibly altering planetary life. This is bringing humans and non-human nature into closer contact, resulting in the emergence of infectious diseases such as the Covid-19 virus which, while zoonotic in origin, spread through market relations and networks of local and global production. However, while the pandemic sharply illuminated the role of labour within social transformations, the question remains about the role of labour in transforming ecological relations. Drawing on a historical materialist approach, this paper explores the emergence and transmission of the COVID-19 virus through the Marxist conceptualization of metabolic rift. This allows for a perspective of human and non-human nature, which is in constant motion and dialectical. This negotiates distinctions and binaries between them as humans and non-human nature are taken to mutually constrain, enable and constitute one another. This is particularly significant when considering the ongoing transformations of a climate-changing world and the corresponding effects on social life. To do this, this paper empirically focuses on the Huanan Seafood Wholesale Market in Wuhan, China, where the COVID-19 virus was first detected. It examines how the virus jumped from non-human animals to humans through concrete production operations locally before traveling globally through networks of abstract market relations based on the logic of circulation, trade and exchange. As a mediating relation between human and non-human nature, labour is an analytical tool that can create a dialogue between the concrete and the abstract, as well as the local and global.Keywords: Marxism, social reproduction, metabolic rift, labour
Procedia PDF Downloads 2615177 Selecting the Best RBF Neural Network Using PSO Algorithm for ECG Signal Prediction
Authors: Najmeh Mohsenifar, Narjes Mohsenifar, Abbas Kargar
Abstract:
In this paper, has been presented a stable method for predicting the ECG signals through the RBF neural networks, by the PSO algorithm. In spite of quasi-periodic ECG signal from a healthy person, there are distortions in electro cardiographic data for a patient. Therefore, there is no precise mathematical model for prediction. Here, we have exploited neural networks that are capable of complicated nonlinear mapping. Although the architecture and spread of RBF networks are usually selected through trial and error, the PSO algorithm has been used for choosing the best neural network. In this way, 2 second of a recorded ECG signal is employed to predict duration of 20 second in advance. Our simulations show that PSO algorithm can find the RBF neural network with minimum MSE and the accuracy of the predicted ECG signal is 97 %.Keywords: electrocardiogram, RBF artificial neural network, PSO algorithm, predict, accuracy
Procedia PDF Downloads 62915176 Development of Social Competence in the Preparation and Continuing Training of Adult Educators
Authors: Genute Gedviliene, Vidmantas Tutlys
Abstract:
The aim of this paper is to reveal the deployment and development of the social competence in the higher education programmes of adult education and in the continuing training and competence development of the andragogues. There will be compared how the issues of cooperation and communication in the learning and teaching processes are treated in the study programmes and in the courses of continuing training of andragogues. Theoretical and empirical research methods were combined for research analysis. For the analysis the following methods were applied: 1) Literature and document analysis helped to highlight the communication and cooperation as fundamental phenomena of the social competence, it’s important for the adult education in the context of digitalization and globalization. There were also analyzed the research studies on the development of social competence in the field of andragogy, as well as on the place and weight of the social competence in the overall competence profile of the andragogue. 2) The empirical study is based on questionnaire survey method. The population of survey consists of 240 students of bachelor and master degree studies of andragogy in Lithuania and of 320 representatives of the different bodies and institutions involved in the continuing training and professional development of the adult educators in Lithuania. The themes of survey questionnaire were defined on the basis of findings of the literature review and included the following: 1) opinions of the respondents on the role and place of a social competence in the work of andragogue; 2) opinions of the respondents on the role and place of the development of social competence in the curricula of higher education studies and continuing training courses; 3) judgements on the implications of the higher education studies and courses of continuing training for the development of social competence and it’s deployment in the work of andragogue. Data analysis disclosed a wide range of ways and modalities of the deployment and development of social competence in the preparation and continuing training of the adult educators. Social competence is important for the students and adult education providers not only as the auxiliary capability for the communication and transfer of information, but also as the outcome of collective learning leading to the development of new capabilities applied by the learners in the learning process, their professional field of adult education and their social life. Equally so, social competence is necessary for the effective adult education activities not only as an auxiliary capacity applied in the teaching process, but also as a potential for improvement, development and sustainability of the didactic competence and know-how in this field. The students of the higher education programmes in the field of adult education treat social competence as important generic capacity important for the work of adult educator, whereas adult education providers discern the concrete issues of application of social competence in the different processes of adult education, starting from curriculum design and ending with assessment of learning outcomes.Keywords: adult education, andragogues, social competence, curriculum
Procedia PDF Downloads 15115175 Anti-Social Media: Implications of Social Media in the Form of Stressors on Our Daily Lives
Authors: Aimen Batool Bint-E-Rashid, Huma Irfan
Abstract:
This research aims to investigate the role of social media (Snapchat, Facebook, Twitter, etc.) in our daily lives and its implication on our everyday routine in the form of stressors. The study has been validated by a social media survey with 150 social media users belonging to various age groups. The study explores how social media can make an individual anti-social in his or her life offline. To explain the phenomenon, we have proposed and evaluated a model based on social media usage and stressors including burnout and social overload. Results, through correlation and regression tests, have revealed that with increase in social media usage, social overload and burnout also increases. Evidence for the fact that excessive social media usage causes social overload and burnout has been provided in the study.Keywords: burnout, emotional exhaustion, fatigue, stressors, social networking, social media, social overload
Procedia PDF Downloads 20915174 Political Empowerment of Japanese Women: Roles and Strategies of Social Movements and Feminist Groups
Authors: Soliman Rosemary
Abstract:
Despite the widespread movements towards democratization in most countries, women are still largely underrepresented at most levels of governments, especially in ministerial and other executive bodies. This paper is going to focus on the status quo of women political marginalization in Japan and the role social movements, feminist groups and campaigns play in raising the number of female politicians in administrative decision making process. The paper will raise some Japanese feminist groups such as ‘WIN WIN’ and ‘Q no Kai’ and other feminist groups as case studies. The study will help in furthering the understanding of women political empowerment in Japan and the strategies of contemporary social movements in raising the awareness of the importance of gender quota in the electoral system to be able to place new items on the political agenda that reflect and address women's gender-specific concerns, values and experiences, and providing new perspectives on mainstream political issues.Keywords: feminist, political empowerment, quota, social movements
Procedia PDF Downloads 32715173 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts
Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter
Abstract:
Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings
Procedia PDF Downloads 12615172 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model
Authors: Skiker Kaoutar, Mounir Maouene
Abstract:
Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.Keywords: animals, tools, network, semantics, small-worls, resilience to damage
Procedia PDF Downloads 54615171 Developing Artificial Neural Networks (ANN) for Falls Detection
Authors: Nantakrit Yodpijit, Teppakorn Sittiwanchai
Abstract:
The number of older adults is rising rapidly. The world’s population becomes aging. Falls is one of common and major health problems in the elderly. Falls may lead to acute and chronic injuries and deaths. The fall-prone individuals are at greater risk for decreased quality of life, lowered productivity and poverty, social problems, and additional health problems. A number of studies on falls prevention using fall detection system have been conducted. Many available technologies for fall detection system are laboratory-based and can incur substantial costs for falls prevention. The utilization of alternative technologies can potentially reduce costs. This paper presents the new design and development of a wearable-based fall detection system using an Accelerometer and Gyroscope as motion sensors for the detection of body orientation and movement. Algorithms are developed to differentiate between Activities of Daily Living (ADL) and falls by comparing Threshold-based values with Artificial Neural Networks (ANN). Results indicate the possibility of using the new threshold-based method with neural network algorithm to reduce the number of false positive (false alarm) and improve the accuracy of fall detection system.Keywords: aging, algorithm, artificial neural networks (ANN), fall detection system, motion sensorsthreshold
Procedia PDF Downloads 49915170 Young People, the Internet and Inequality: What are the Causes and Consequences of Exclusion?
Authors: Albin Wallace
Abstract:
Part of the provision within educational institutions is the design, commissioning and implementation of ICT facilities to improve teaching and learning. Inevitably, these facilities focus largely on Internet Protocol (IP) based provisions including access to the World Wide Web, email, interactive software and hardware tools. Educators should be committed to the use of ICT to improve learning and teaching as well as to issues relating to the Internet and educational disadvantage, especially with respect to access and exclusion concerns. In this paper I examine some recent research into the issue of inequality and use of the Internet during which I discuss the causes and consequences of exclusion in the context of social inequality, digital literacy and digital inequality, also touching on issues of global inequality.Keywords: inequality, internet, education, design
Procedia PDF Downloads 49215169 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 39515168 A Unified Approach for Naval Telecommunication Architectures
Authors: Y. Lacroix, J.-F. Malbranque
Abstract:
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion
Procedia PDF Downloads 29415167 The Recording of Personal Data in the Spanish Criminal Justice System and Its Impact on the Right to Privacy
Authors: Deborah García-Magna
Abstract:
When a person goes through the criminal justice system, either as a suspect, arrested, prosecuted or convicted, certain personal data are recorded, and a wide range of persons and organizations may have access to it. The recording of data can have a great impact on the daily life of the person concerned during the period of time determined by the legislation. In addition, this registered information can refer to various aspects not strictly related directly to the alleged or actually committed infraction. In some areas, the Spanish legislation does not clearly determine the cancellation period of the registers nor what happens when they are cancelled since some of the files are not really erased and remain recorded, even if their consultation is no more allowed or it is stated that they should not be taken into account. Thus, access to the recorded data of arrested or convicted persons may reduce their possibilities of reintegration into society. In this research, some of the areas in which data recording has a special impact on the lives of affected persons are analyzed in a critical manner, taking into account Spanish legislation and jurisprudence, and the influence of the European Court of Human Rights, the Council of Europe and other supranational instruments. In particular, the analysis cover the scope of video-surveillance in public spaces, the police record, the recording of personal data for the purposes of police investigation (especially DNA and psychological profiles), the registry of administrative and minor offenses (especially as they are taken into account to impose aggravating circumstaces), criminal records (of adults, minors and legal entities), and the registration of special circumstances occurred during the execution of the sentence (files of inmates under special surveillance –FIES–, disciplinary sanctions, special therapies in prison, etc.).Keywords: ECHR jurisprudence, formal and informal criminal control, privacy, disciplinary sanctions, social reintegration
Procedia PDF Downloads 148