Search results for: information and communication technology (ICT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18340

Search results for: information and communication technology (ICT)

11710 Systematic Review of Current Best Practice in the Diagnosis and Treatment of Obsessive Compulsive Disorder

Authors: Zahra R. Almansoor

Abstract:

Background: Selective serotonin reuptake inhibitors (SSRI’s) and cognitive behavioural therapy (CBT) are the main treatment methods used for patients with obsessive compulsive disorder (OCD) under the National Institute of Health and Care Excellence (NICE) guidelines. Yet many patients are left with residual symptoms or remit, so several other therapeutic approaches have been explored. Objective: The objective was to systematically review the available literature regarding the treatment efficacy of current and potential approaches and diagnostic strategies. Method: First, studies were examined concerning diagnosis, prognosis, and influencing factors. Then, one reviewer conducted a systematic search of six databases using stringent search terms. Results of studies exploring the efficacy of treatment interventions were analysed and compared separately for adults and children. This review was limited to randomised controlled trials (RCT’s) conducted from 2016 onwards, and an improved Y-BOCS (Yale- Brown obsessive compulsive scale) score was the primary outcome measure. Results: Technology-based interventions including internet-based cognitive behavioural therapy (iCBT) were deemed as potentially effective. Discrepancy remains about the benefits of SSRI use past one year, but potential medication adjuncts include amantadine. Treatments such as association splitting and family and mindfulness strategies also have future potential. Conclusion: A range of potential therapies exist, either as treatment adjuncts to current interventions or as sole therapies. To further improve efficacy, it may be necessary to remodel the current NICE stepped-care model, especially regarding the potential use of lower intensity, cheaper treatments, including iCBT. Although many interventions show promise, further research is warranted to confirm this.

Keywords: family and group treatment, mindfulness strategies, novel treatment approaches, standard treatment, technology-based interventions

Procedia PDF Downloads 104
11709 Digital Preservation Policies in the Institutional Repositories of Brazilian Federal Universities

Authors: Laerte Pereira da Silva Júnior, Maria Manuel Borges

Abstract:

Institutional Repositories (IR) are complex constructs that depend on political, cultural and technological aspects. Because IRs are a mirror of the organization's intellectual production, their main function is to make that production available worldwide, and also to consider its long term preservation. To this end, there is a need to define clearly the digital preservation policies supported by political decisions. There are several guidelines about the definition of digital preservation policies focusing in different themes from preservation planning to rights and restriction management, sustainability planning, etc., but this work aims to verify the implementation of digital preservation policies on the Institutional Repositories of the Federal Universities of Brazil. The methodology used was to check the information available on the websites of the IRs selected against two fields of the OpenDOAR, policies and OpenDOAR ID, to verify the existence of digital preservation policies. For this purpose a sample of the 21 of the 25 IRs registered at the Directory of Open Access Repositories (DOAR) was used, which is about 1/3 rd of the total of the brazilian universities. The 4 IRs that presented no information by the OpenDOAR team were desconsidered. The main conclusion is that most of the IRs of these universities have no polices clearly stated or no policies at all, and that there is a need to include these concerns at the top level management of IRs. The number of initiatives in digital preservation policies around the world stress the need of awareness of its importance in Brazil and requires measures to raise this awareness.

Keywords: Brazil, digital preservation policies, institutional repositories, openDOAR

Procedia PDF Downloads 520
11708 A Comparative Assessment of Information Value, Fuzzy Expert System Models for Landslide Susceptibility Mapping of Dharamshala and Surrounding, Himachal Pradesh, India

Authors: Kumari Sweta, Ajanta Goswami, Abhilasha Dixit

Abstract:

Landslide is a geomorphic process that plays an essential role in the evolution of the hill-slope and long-term landscape evolution. But its abrupt nature and the associated catastrophic forces of the process can have undesirable socio-economic impacts, like substantial economic losses, fatalities, ecosystem, geomorphologic and infrastructure disturbances. The estimated fatality rate is approximately 1person /100 sq. Km and the average economic loss is more than 550 crores/year in the Himalayan belt due to landslides. This study presents a comparative performance of a statistical bivariate method and a machine learning technique for landslide susceptibility mapping in and around Dharamshala, Himachal Pradesh. The final produced landslide susceptibility maps (LSMs) with better accuracy could be used for land-use planning to prevent future losses. Dharamshala, a part of North-western Himalaya, is one of the fastest-growing tourism hubs with a total population of 30,764 according to the 2011 census and is amongst one of the hundred Indian cities to be developed as a smart city under PM’s Smart Cities Mission. A total of 209 landslide locations were identified in using high-resolution linear imaging self-scanning (LISS IV) data. The thematic maps of parameters influencing landslide occurrence were generated using remote sensing and other ancillary data in the GIS environment. The landslide causative parameters used in the study are slope angle, slope aspect, elevation, curvature, topographic wetness index, relative relief, distance from lineaments, land use land cover, and geology. LSMs were prepared using information value (Info Val), and Fuzzy Expert System (FES) models. Info Val is a statistical bivariate method, in which information values were calculated as the ratio of the landslide pixels per factor class (Si/Ni) to the total landslide pixel per parameter (S/N). Using this information values all parameters were reclassified and then summed in GIS to obtain the landslide susceptibility index (LSI) map. The FES method is a machine learning technique based on ‘mean and neighbour’ strategy for the construction of fuzzifier (input) and defuzzifier (output) membership function (MF) structure, and the FR method is used for formulating if-then rules. Two types of membership structures were utilized for membership function Bell-Gaussian (BG) and Trapezoidal-Triangular (TT). LSI for BG and TT were obtained applying membership function and if-then rules in MATLAB. The final LSMs were spatially and statistically validated. The validation results showed that in terms of accuracy, Info Val (83.4%) is better than BG (83.0%) and TT (82.6%), whereas, in terms of spatial distribution, BG is best. Hence, considering both statistical and spatial accuracy, BG is the most accurate one.

Keywords: bivariate statistical techniques, BG and TT membership structure, fuzzy expert system, information value method, machine learning technique

Procedia PDF Downloads 113
11707 Review of Vehicle to Grid Applications in Recent Years

Authors: Afsane Amiri

Abstract:

Electric Vehicle (EV) technology is expected to take a major share in the light-vehicle market in the coming decades. Charging of EVs will put an extra burden on the distribution grid and in some cases adjustments will need to be made. In this paper a review of different plug-in and vehicle to grid (V2G) capable vehicles are given along with their power electronics topologies. The economic implication of charging the vehicle or sending power back to the utility is described in brief.

Keywords: energy storage system, battery unit, cost, optimal sizing, plug-in electric vehicles (PEVs), smart grid

Procedia PDF Downloads 584
11706 Sustaining Language Learning: A Case Study of Multilingual Writers' ePortfolios

Authors: Amy Hodges, Deanna Rasmussen, Sherry Ward

Abstract:

This paper examines the use of ePortfolios in a two-course sequence for ESL (English as a Second Language) students at an international branch campus in Doha, Qatar. ePortfolios support the transfer of language learning, but few have examined the sustainability of that transfer across an ESL program. Drawing upon surveys and interviews with students, we analyze three case studies that complicate previous research on metacognition, language learning, and ePortfolios. Our findings have implications for those involved in ESL programs and assessment of student writing.

Keywords: TESOL, electronic portfolios, assessment, technology

Procedia PDF Downloads 245
11705 Design and Implementation of Remote Control Application for Elderly People Who Live Alone

Authors: Cristina Nieves Perdomo Delgado

Abstract:

The study consists of the design and use of an application for cell phones called “Me Cuido” that consists of remote control of elderly people who live alone with their families. The objective of the study is to analyze the usability of the application by 40-year-olds using the Questionnaire for User Interaction Satisfaction (QUIS) method. The results highlight that the application has a design adapted to the elderly and that it is easy to use and understand.

Keywords: design, assistive technology, elderly people, independence

Procedia PDF Downloads 230
11704 Comparing Stability Index MAPping (SINMAP) Landslide Susceptibility Models in the Río La Carbonera, Southeast Flank of Pico de Orizaba Volcano, Mexico

Authors: Gabriel Legorreta Paulin, Marcus I. Bursik, Lilia Arana Salinas, Fernando Aceves Quesada

Abstract:

In volcanic environments, landslides and debris flows occur continually along stream systems of large stratovolcanoes. This is the case on Pico de Orizaba volcano, the highest mountain in Mexico. The volcano has a great potential to impact and damage human settlements and economic activities by landslides. People living along the lower valleys of Pico de Orizaba volcano are in continuous hazard by the coalescence of upstream landslide sediments that increased the destructive power of debris flows. These debris flows not only produce floods, but also cause the loss of lives and property. Although the importance of assessing such process, there is few landslide inventory maps and landslide susceptibility assessment. As a result in México, no landslide susceptibility models assessment has been conducted to evaluate advantage and disadvantage of models. In this study, a comprehensive study of landslide susceptibility models assessment using GIS technology is carried out on the SE flank of Pico de Orizaba volcano. A detailed multi-temporal landslide inventory map in the watershed is used as framework for the quantitative comparison of two landslide susceptibility maps. The maps are created based on 1) the Stability Index MAPping (SINMAP) model by using default geotechnical parameters and 2) by using findings of volcanic soils geotechnical proprieties obtained in the field. SINMAP combines the factor of safety derived from the infinite slope stability model with the theory of a hydrologic model to produce the susceptibility map. It has been claimed that SINMAP analysis is reasonably successful in defining areas that intuitively appear to be susceptible to landsliding in regions with sparse information. The validations of the resulting susceptibility maps are performed by comparing them with the inventory map under LOGISNET system which provides tools to compare by using a histogram and a contingency table. Results of the experiment allow for establishing how the individual models predict the landslide location, advantages, and limitations. The results also show that although the model tends to improve with the use of calibrated field data, the landslide susceptibility map does not perfectly represent existing landslides.

Keywords: GIS, landslide, modeling, LOGISNET, SINMAP

Procedia PDF Downloads 296
11703 Intelligent Ambulance with Advance Features of Traffic Management and Telecommunication

Authors: Mamatha M. N.

Abstract:

Traffic problems, congested traffic, and flow management were recognized as major problems mostly in all the areas, which have caused a problem for the ambulance which carries the emergency patient. The proposed paper aims in the development of ambulance which reaches the nearby hospital faster even in heavy traffic scenario. This process is activated by implementing hardware in an ambulance as well as in traffic post thus allowing a smooth flow to the ambulance to reach the hospital in time. 1) The design of the vehicle to have a communication between ambulance and traffic post. 2)Electronic Health Record with Data-acquisition system 3)Telemetry of acquired biological parameters to the nearest hospital. Thus interfacing all these three different modules and integrating them on the ambulance could reach the hospital earlier than the present ambulance. The system is accurate and efficient of 99.8%.

Keywords: bio-telemetry, data acquisition, patient database, automatic traffic control

Procedia PDF Downloads 298
11702 Impairments Correction of Six-Port Based Millimeter-Wave Radar

Authors: Dan Ohev Zion, Alon Cohen

Abstract:

In recent years, the presence of short-range millimeter-wave radar in civil application has increased significantly. Autonomous driving, security, 3D imaging and high data rate communication systems are a few examples. The next challenge is the integration inside small form-factor devices, such as smartphones (e.g. gesture recognition). The main challenge is implementation of a truly low-power, low-complexity high-resolution radar. The most popular approach is the Frequency Modulated Continuous Wave (FMCW) radar, with an analog multiplication front-end. In this paper, we present an approach for adaptive estimation and correction of impairments of such front-end, specifically implemented using the Six-Port Device (SPD) as the multiplier element. The proposed algorithm was simulated and implemented on a 60 GHz radar lab prototype.

Keywords: radar, FMCW Radar, IQ mismatch, six port

Procedia PDF Downloads 137
11701 Low-Power Digital Filters Design Using a Bypassing Technique

Authors: Thiago Brito Bezerra

Abstract:

This paper presents a novel approach to reduce power consumption of digital filters based on dynamic bypassing of partial products in their multipliers. The bypassing elements incorporated into the multiplier hardware eliminate redundant signal transitions, which appear within the carry-save adders when the partial product is zero. This technique reduces the power consumption by around 20%. The circuit implementation was made using the AMS 0.18 um technology. The bypassing technique applied to the circuits is outlined.

Keywords: digital filter, low-power, bypassing technique, low-pass filter

Procedia PDF Downloads 360
11700 Distance and Coverage: An Assessment of Location-Allocation Models for Fire Stations in Kuwait City, Kuwait

Authors: Saad M. Algharib

Abstract:

The major concern of planners when placing fire stations is finding their optimal locations such that the fire companies can reach fire locations within reasonable response time or distance. Planners are also concerned with the numbers of fire stations that are needed to cover all service areas and the fires, as demands, with standard response time or distance. One of the tools for such analysis is location-allocation models. Location-allocation models enable planners to determine the optimal locations of facilities in an area in order to serve regional demands in the most efficient way. The purpose of this study is to examine the geographic distribution of the existing fire stations in Kuwait City. This study utilized location-allocation models within the Geographic Information System (GIS) environment and a number of statistical functions to assess the current locations of fire stations in Kuwait City. Further, this study investigated how well all service areas are covered and how many and where additional fire stations are needed. Four different location-allocation models were compared to find which models cover more demands than the others, given the same number of fire stations. This study tests many ways to combine variables instead of using one variable at a time when applying these models in order to create a new measurement that influences the optimal locations for locating fire stations. This study also tests how location-allocation models are sensitive to different levels of spatial dependency. The results indicate that there are some districts in Kuwait City that are not covered by the existing fire stations. These uncovered districts are clustered together. This study also identifies where to locate the new fire stations. This study provides users of these models a new variable that can assist them to select the best locations for fire stations. The results include information about how the location-allocation models behave in response to different levels of spatial dependency of demands. The results show that these models perform better with clustered demands. From the additional analysis carried out in this study, it can be concluded that these models applied differently at different spatial patterns.

Keywords: geographic information science, GIS, location-allocation models, geography

Procedia PDF Downloads 159
11699 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 71
11698 Inference for Compound Truncated Poisson Lognormal Model with Application to Maximum Precipitation Data

Authors: M. Z. Raqab, Debasis Kundu, M. A. Meraou

Abstract:

In this paper, we have analyzed maximum precipitation data during a particular period of time obtained from different stations in the Global Historical Climatological Network of the USA. One important point to mention is that some stations are shut down on certain days for some reason or the other. Hence, the maximum values are recorded by excluding those readings. It is assumed that the number of stations that operate follows zero-truncated Poisson random variables, and the daily precipitation follows a lognormal random variable. We call this model a compound truncated Poisson lognormal model. The proposed model has three unknown parameters, and it can take a variety of shapes. The maximum likelihood estimators can be obtained quite conveniently using Expectation-Maximization (EM) algorithm. Approximate maximum likelihood estimators are also derived. The associated confidence intervals also can be obtained from the observed Fisher information matrix. Simulation results have been performed to check the performance of the EM algorithm, and it is observed that the EM algorithm works quite well in this case. When we analyze the precipitation data set using the proposed model, it is observed that the proposed model provides a better fit than some of the existing models.

Keywords: compound Poisson lognormal distribution, EM algorithm, maximum likelihood estimation, approximate maximum likelihood estimation, Fisher information, skew distribution

Procedia PDF Downloads 97
11697 The Impact of Environmental Corporate Social Responsibility (ECSR) and the Perceived Moral Intensity on the Intention of Ethical Investment

Authors: Chiung-Yao Huang, Yu-Cheng Lin, Chiung-Hui Chen

Abstract:

This study seeks to examine perceived environmental corporate social responsibility (ECSR) with a focus on negative environmental questions, related to intention of ethical investment intention after a environmental failure recovery. An empirical test was employed to test the hypotheses. We manipulated the information on negative ECSR activities of a hypothetical firm in a experimental design with a failure recovery treatment. The company’s negative ECSR recovery was depicted in a positive perspective (depicting a follow-up strong social action), whereas in the negative ECSR treatment it was described in a negative perspective (depicting a follow-up non social action). In both treatments, information about other key characteristics of the focal company were kept constant. Investors’ intentions to invest in the company’s stock were evaluated by multi-item scales. Results indicate that positive ECSR recovery information about a firm enhances investors’ intentions to invest in the company’s stock. In addition, perceived moral intensity has a significant impact on the intention of ethical investment and that perceived moral intensity also serves as a key moderating variable in the relationship between negative ECSR and the intention of ethical investment. Finally, theoretical and managerial implications of the findings are discussed. Practical implications: The results suggest that managers may need to be aware of perceived moral intensity as a key variable in restoring the intention of ethical investment. The results further suggest that perceived moral intensity has a direct, and it also has an moderating influence between ECSR and the intention of ethical investment. Originality/value: In an attempt to deepen the understanding of how investors perceptions of firm environmental CSR are connected with other investor‐related outcomes through ECSR recovery, the present research proposes a comprehensive model which encompasses ECSR and other key relationship constructs after a ECSR failure and recovery.

Keywords: ethical investment, Environmental Corporate Social Responsibility(ECSR), ECSR recovery, moral intensity

Procedia PDF Downloads 334
11696 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 340
11695 Bilingual Books in British Sign Language and English: The Development of E-Book

Authors: Katherine O'Grady-Bray

Abstract:

For some deaf children, reading books can be a challenge. Frank Barnes School (FBS) provides guided reading time with Teachers of the Deaf, in which they read books with deaf children using a bilingual approach. The vocabulary and context of the story is explained to deaf children in BSL so they develop skills bridging English and BSL languages. However, the success of this practice is only achieved if the person is fluent in both languages. FBS piloted a scheme to convert an Oxford Reading Tree (ORT) book into an e-book that can be read using tablets. Deaf readers at FBS have access to both languages (BSL and English) during lessons and outside the classroom. The pupils receive guided reading sessions with a Teacher of the Deaf every morning, these one to one sessions give pupils the opportunity to learn how to bridge both languages e.g. how to translate English to BSL and vice versa. Generally, due to our pupils’ lack of access to incidental learning, gaining new information about the world around them is limited. This highlights the importance of quality time to scaffold their language development. In some cases, there is a shortfall of parental support at home due to poor communication skills or an unawareness of how to interact with deaf children. Some families have a limited knowledge of sign language or simply don’t have the required learning environment and strategies needed for language development with deaf children. As the majority of our pupils’ preferred language is BSL we use that to teach reading and writing English. If this is not mirrored at home, there is limited opportunity for joint reading sessions. Development of the e-Book required planning and technical development. The overall production took time as video footage needed to be shot and then edited individually for each page. There were various technical considerations such as having an appropriate background colour so not to draw attention away from the signer. Appointing a signer with the required high level of BSL was essential. The language and pace of the sign language was an important consideration as it was required to match the age and reading level of the book. When translating English text to BSL, careful consideration was given to the nonlinear nature of BSL and the differences in language structure and syntax. The e-book was produced using Apple’s ‘iBook Author’ software which allowed video footage of the signer to be embedded on pages opposite the text and illustration. This enabled BSL translation of the content of the text and inferences of the story. An interpreter was used to directly ‘voice over’ the signer rather than the actual text. The aim behind the structure and layout of the e-book is to allow parents to ‘read’ with their deaf child which helps to develop both languages. From observations, the use of e-books has given pupils confidence and motivation with their reading, developing skills bridging both BSL and English languages and more effective reading time with parents.

Keywords: bilingual book, e-book, BSL and English, bilingual e-book

Procedia PDF Downloads 157
11694 Tobacco Taxation and the Heterogeneity of Smokers' Responses to Price Increases

Authors: Simone Tedeschi, Francesco Crespi, Paolo Liberati, Massimo Paradiso, Antonio Sciala

Abstract:

This paper aims at contributing to the understanding of smokers’ responses to cigarette prices increases with a focus on heterogeneity, both across individuals and price levels. To do this, a stated preference quasi-experimental design grounded in a random utility framework is proposed to evaluate the effect on smokers’ utility of the price level and variation, along with social conditioning and health impact perception. The analysis is based on individual-level data drawn from a unique survey gathering very detailed information on Italian smokers’ habits. In particular, qualitative information on the individual reactions triggered by changes in prices of different magnitude and composition are exploited. The main findings stemming from the analysis are the following; the average price elasticity of cigarette consumption is comparable with previous estimates for advanced economies (-.32). However, the decomposition of this result across five latent-classes of smokers, reveals extreme heterogeneity in terms of price responsiveness, implying a potential price elasticity that ranges between 0.05 to almost 1. Such heterogeneity is in part explained by observable characteristics such as age, income, gender, education as well as (current and lagged) smoking intensity. Moreover, price responsiveness is far from being independent from the size of the prospected price increase. Finally, by comparing even and uneven price variations, it is shown that uniform across-brand price increases are able to limit the scope of product substitutions and downgrade. Estimated price-response heterogeneity has significant implications for tax policy. Among them, first, it provides evidence and a rationale for why the aggregate price elasticity is likely to follow a strictly increasing pattern as a function of the experienced price variation. This information is crucial for forecasting the effect of a given tax-driven price change on tax revenue. Second, it provides some guidance on how to design excise tax reforms to balance public health and revenue goals.

Keywords: smoking behaviour, preference heterogeneity, price responsiveness, cigarette taxation, random utility models

Procedia PDF Downloads 139
11693 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 425
11692 Variations in Breast Aesthetic Reconstruction Rates between Asian and Caucasian Patients Post Mastectomy in a UK Tertiary Breast Referral Centre: A Five-Year Institutional Review

Authors: Wisam Ismail, Chole Wright, Elizabeth Baker, Cathy Tait, Mohamed Salhab, Richard Linforth

Abstract:

Background: Post-mastectomy breast reconstruction is an important treatment option for women with breast cancer with psychosocial, emotional and quality of life benefits. Despite this, Asian patients are one-fifth as likely as Caucasian patients to undergo reconstruction after mastectomy. Aim: This study aimed to assess the difference in breast reconstruction rates between Asian and Caucasian patients treated at Bradford Teaching Hospitals between May 2011 – December 2015.The long-term goal is to equip healthcare professionals to improve breast cancer treatment outcome by increasing breast reconstruction rates in this sub-population. Methods: All patients undergoing mastectomy were identified using a prospectively collected departmental database. Further data was obtained via retrospective electronic case note review. Bradford city population is about 530.000 by the end of 2015, with 67.44% of the city's population was White ethnic groups and 26.83% Asian Ethnic Groups (UK population consensus). The majority of Asian population speaks Urdu, hence an Urdu speaking breast care nurse was appointed to facilitate communications and deliver a better understanding of the reconstruction options and pathways. Statistical analysis was undertaken using the SAS program. Patients were stratified by age, self-reported ethnicity, axillary surgery and reconstruction. Relative odds were calculated using univariate and multivariate logistic regression analyses with adjustment for known confounders. An Urdu speaking breast care nurse was employed throughout this period to facilitate communication and patient decision making. Results: 506 patients underwent Mastectomy over 5 years. 72 (14%) Asian v. 434 (85%) Caucasian. Overall median age is 64 years (SD1.1). Asian median age is 62 (SD0.9), versus Caucasian 65 (SD1.2). Total axillary clearance rate was 30% (42% Asian v.30% Caucasian). Overall reconstruction rate was 126 patients (28.9%).Only 6 of 72 Asian patients (<1%) underwent breast reconstruction versus 121of 434 Caucasian (28%) (p < 0.04), Odds ratio 0.68, (95% confidence interval 0.57-0.79). Conclusions: There is a significant difference in post-mastectomy reconstruction rates between Asian and Caucasian patients. This difference is likely to be multi-factorial. Higher rates of axillary clearance in Asian patients might suggest later disease presentation and/or higher rates of subsequent adjuvant therapy, both of which, can impact on the suitability of breast reconstruction. Strategies aimed at reducing racial disparities in breast reconstruction should include symptom awareness to enable earlier presentation and facilitated communication to ensure informed decision-making.

Keywords: aesthetic, Asian, breast, reconstruction

Procedia PDF Downloads 262
11691 Conventional and Islamic Perspective in Accounting: Potential for Alternative Reporting Framework

Authors: Shibly Abdullah

Abstract:

This paper provides an overview of fundamental philosophical and functional differences in conventional and Islamic accounting. The aim of this research is to undertake a detailed analysis focus on specific illustrations drawn from both these systems and highlight how these differences implicate in recording financial transactions and preparation of financial reports for a range of stakeholders. Accounting as being universally considered as a platform for providing a ‘true and fair’ view of corporate entities can be challenged in the current world view, as the business environment has evolved and transformed significantly. Growth of the non-traditional corporate entity such as Islamic financial institutions, fundamentally questions the applicability of conventional accounting standards in preparation of Shariah-compliant financial reporting. Coupled with this, there are significant concerns about the wider applicability of Islamic accounting standards and framework in order to achieve reporting practices satisfying the information needs generally. Against the backdrop of such a context, this paper raises fundamental question as to how potential convergence could be achieved between these two systems in order to provide users’ a transparent and comparable state of financial information resulting in an alternative framework of financial reporting.

Keywords: accounting, conventional accounting, corporate reporting, Islamic accounting

Procedia PDF Downloads 266
11690 Influence of Vesicular Arbuscular Mycorrhiza on Growth of Cucumis myriocarpus Indigenous Leafy Vegetable

Authors: Pontsho E. Tseke, Phatu W. Mashela

Abstract:

Climate-smart agriculture dictates that underusilised indigenous plant, which served as food for local marginalized communities, be assessed for introduction into mainstream agriculture. Most of the underutilised indigenous plants had survived adverse conditions in the wild; with limited information on how the interact with most abiotic and biotic factors. Cucumis myriocarpus leafy vegetable has nutritional, pharmacological and industrial applications, with limited information on how it interacts with effective microorganisms. The objective of this study was to determine the effects vesicular arbuscular mycorrhiza (VAM) on the growth of C. myriocarpus indigenous leafy vegetable under greenhouse conditions. Four-weeks-old seedlings of C. myriocarpus were transplanted into 20-cm-diameter plastic pots. Two weeks after transplanting, VAM was applied at 0, 10, 20, 30, 40, 50, 60 and 70 g Biocult-VAM plant. At 56 days after treatments, plant growth variables of C. myriocarpus with increase Biocult-VAM levels exhibited positive quadratic relations. Plant variables and increasing concentrations of salinity exhibited positive quadric relations, with 95 to 99% associations. Inclusion, Biocult-VAM can be used in sustainable production of C. myriocarpus for functional food security.

Keywords: abiotic, biotic, rhizasphere, sustainable agriculture

Procedia PDF Downloads 256
11689 Decoding Socio-Cultural Trends in Indian Urban Youth Using Ogilvy 3E Model

Authors: Falguni Vasavada, Pradyumna Malladi

Abstract:

The research focuses on studying the ecosystem of the youth using Ogilvy's 3E model, Ethnography and Thematic Analysis. It has been found that urban Indian youth today is an honest generation, hungry for success, living life by the moment, fiercely independent, are open about sex, sexuality and embrace individual differences. Technology and social media dominate their life. However, they are also phobic about commitments, often drifting along life and engage in unsubstantiated brave-talk.

Keywords: ethnography, youth, culture, track, buyer behavior

Procedia PDF Downloads 345
11688 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 142
11687 Wet Processing of Algae for Protein and Carbohydrate Recovery as Co-Product of Algal Oil

Authors: Sahil Kumar, Rajaram Ghadge, Ramesh Bhujade

Abstract:

Historically, lipid extraction from dried algal biomass remained a focus area of the algal research. It has been realized over the past few years that the lipid-centric approach and conversion technologies that require dry algal biomass have several challenges. Algal culture in cultivation systems contains more than 99% water, with algal concentrations of just a few hundred milligrams per liter ( < 0.05 wt%), which makes harvesting and drying energy intensive. Drying the algal biomass followed by extraction also entails the loss of water and nutrients. In view of these challenges, focus has shifted toward developing processes that will enable oil production from wet algal biomass without drying. Hydrothermal liquefaction (HTL), an emerging technology, is a thermo-chemical conversion process that converts wet biomass to oil and gas using water as a solvent at high temperature and high pressure. HTL processes wet algal slurry containing more than 80% water and significantly reduces the adverse cost impact owing to drying the algal biomass. HTL, being inherently feedstock agnostic, i.e., can convert carbohydrates and proteins also to fuels and recovers water and nutrients. It is most effective with low-lipid (10--30%) algal biomass, and bio-crude yield is two to four times higher than the lipid content in the feedstock. In the early 2010s, research remained focused on increasing the oil yield by optimizing the process conditions of HTL. However, various techno-economic studies showed that simply converting algal biomass to only oil does not make economic sense, particularly in view of low crude oil prices. Making the best use of every component of algae is a key for economic viability of algal to oil process. On investigation of HTL reactions at the molecular level, it has been observed that sequential HTL has the potential to recover value-added products along with biocrude and improve the overall economics of the process. This potential of sequential HTL makes it a most promising technology for converting wet waste to wealth. In this presentation, we will share our experience on the techno-economic and engineering aspects of sequential HTL for conversion of algal biomass to algal bio-oil and co-products.

Keywords: algae, biomass, lipid, protein

Procedia PDF Downloads 192
11686 Evaluation of Natural Waste Materials for Ammonia Removal in Biofilters

Authors: R. F. Vieira, D. Lopes, I. Baptista, S. A. Figueiredo, V. F. Domingues, R. Jorge, C. Delerue-matos, O. M. Freitas

Abstract:

Odours are generated in municipal solid wastes management plants as a result of decomposition of organic matter, especially when anaerobic degradation occurs. Information was collected about the substances and respective concentration in the surrounding atmosphere of some management plants. The main components which are associated with these unpleasant odours were identified: ammonia, hydrogen sulfide and mercaptans. The first is the most common and the one that presents the highest concentrations, reaching values of 700 mg/m3. Biofiltration, which involves simultaneously biodegradation, absorption and adsorption processes, is a sustainable technology for the treatment of these odour emissions when a natural packing material is used. The packing material should ideally be cheap, durable, and allow the maximum microbiological activity and adsorption/absorption. The presence of nutrients and water is required for biodegradation processes. Adsorption and absorption are enhanced by high specific surface area, high porosity and low density. The main purpose of this work is the exploitation of natural waste materials, locally available, as packing media: heather (Erica lusitanica), chestnut bur (from Castanea sativa), peach pits (from Prunus persica) and eucalyptus bark (from Eucalyptus globulus). Preliminary batch tests of ammonia removal were performed in order to select the most interesting materials for biofiltration, which were then characterized. The following physical and chemical parameters were evaluated: density, moisture, pH, buffer and water retention capacity. The determination of equilibrium isotherms and the adjustment to Langmuir and Freundlich models was also performed. Both models can fit the experimental results. Based both in the material performance as adsorbent and in its physical and chemical characteristics, eucalyptus bark was considered the best material. It presents a maximum adsorption capacity of 0.78±0.45 mol/kg for ammonia. The results from its characterization are: 121 kg/m3 density, 9.8% moisture, pH equal to 5.7, buffer capacity of 0.370 mmol H+/kg of dry matter and water retention capacity of 1.4 g H2O/g of dry matter. The application of natural materials locally available, with little processing, in biofiltration is an economic and sustainable alternative that should be explored.

Keywords: ammonia removal, biofiltration, natural materials, odour control

Procedia PDF Downloads 357
11685 Inter-Personal and Inter-Organizational Relationships in Supply Chain Integration: A Resource Orchestration Perspective

Authors: Bill Wang, Paul Childerhouse, Yuanfei Kang

Abstract:

Purpose: The research is to extend resource orchestration theory (ROT) into supply chain management (SCM) area to investigate the dyadic relationships at both individual and organizational levels in supply chain integration (SCI). Also, we try to explore the interaction mechanism between inter-personal relationships (IPRs) and inter-organizational (IORs) during the whole SCI process. Methodology/approach: The research employed an exploratory multiple case study approach of four New Zealand companies. The data was collected via semi-structured interviews with top, middle, and lower level managers and operators from different departments of both suppliers and customers triangulated with company archival data. Findings: The research highlights the important role of both IPRs and IORs in the whole SCI process. Both IPRs and IORs are valuable, inimitable resources but IORs are formal and exterior while IPRs are informal and subordinated. In the initial stage of SCI process, IPRs are seen as key resources antecedents to IOR building while three IPRs dimensions work differently: personal credibility acts as an icebreaker to strengthen the confidence forming IORs, and personal affection acts as a gatekeeper, whilst personal communication expedites the IORs process. In the maintenance and development stage, IORs and IPRs interact each other continuously: good interaction between IPRs and IORs can facilitate SCI process while the bad interaction between IPRs can damage the SCI process. On the other hand, during the life-cycle of SCI process, IPRs can facilitate the formation, development of IORs while IORs development can cultivate the ties of IPRs. Out of the three dimensions of IPRs, Personal communication plays a more important role to develop IORs than personal credibility and personal affection. Originality/value: This research contributes to ROT in supply chain management literature by highlighting the interaction of IPRs and IORs in SCI. The intangible resources and capabilities of three dimensions of IPRs need to be orchestrated and nurtured to achieve efficient and effective IORs in SCI. Also, IPRs and IORs need to be orchestrated in terms of breadth, depth, and life-cycle of whole SCI process. Our study provides further insight into the rarely explored inter-personal level of SCI. Managerial implications: Our research provides top management with further evidence of the significance roles of IPRs at different levels when working with trading partners. This highlights the need to actively manage and develop these soft IPRs skills as an intangible competitive resource. Further, the research identifies when staff with specific skills and connections should be utilized during the different stages of building and maintaining inter-organizational ties. More importantly, top management needs to orchestrate and balance the resources of IPRs and IORs.

Keywords: case study, inter-organizational relationships, inter-personal relationships, resource orchestration, supply chain integration

Procedia PDF Downloads 218
11684 A Study on Pattern of Acute Poisoning in Patients Admitted to Emergency Wards in a Tertiary Care Hospital

Authors: Sathvika Reddy, Devi Revathi

Abstract:

Background: In India, deliberate self-harm (DSH) with poisoning agents carries a significant impact on morbidity and mortality. Changes in the patterns of poisoning vary across various geographical locations. It is important to know the patterns in a given region in order to facilitate rapid clinical diagnosis, appropriate treatment to reduce associated morbidity and mortality. Aim and Objective: To study the patterns, treatment outcomes of acute poisoning in patients admitted to emergency wards in a tertiary care hospital and to provide poison information services. Materials and Methods: This study was conducted at M.S Ramaiah Memorial and Teaching Hospital from November 2016 to March 2017. The patient’s data was obtained from patient case sheet, interaction with health care professionals, interviewing patients and their caretakers (if possible), and were documented in a suitably designed form. Results: The study involved 131 patients with a mean age of 27.76 ± 15.5 years. Majority of the patients were in the age group 21-30 years, literates (n=53) dwelling in urban (n=113) areas belonging to upper middle class (n=50). Analgesics and antipyretics were commonly utilized in intentional drug overdosage (n=49). Envenomation constituted n=21(16.03%). Furthermore, a significant relationship was observed between marital status and self-poisoning (n=64) (P < 0.001) which commonly occurred through oral ingestion. The outcomes were correlated with the GCS and PSS system and n=85 recovered, n=17 were discharged against medical advice, and n=4 died, and n=4 were lost to follow up respectively. The poison information queries include drug overdose (n=29) and management related queries (n=22) provided majorly by residents (n=45) to update knowledge (n=11) and for better patient care (n=40). Conclusion: The trend in poisoning is dynamic. Medications were identified as the main cause of poisoning in urban areas of India. Educational programs with more emphasis on preventive measures are necessary to create awareness among the general public.

Keywords: poisoning, suicides, clinical pharmacist, envenomation, poison information services

Procedia PDF Downloads 151
11683 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 433
11682 Corporate Socially Responsible and Financial Performance in the Tourism-Related Industries

Authors: Yu Shan Wang

Abstract:

Different from other industries, the structure of the tourism industry depends to a large degree the environmental and cultural resources. The industry has to undertake social responsibilities for its commercial behaviour. This paper refers to the seven dimensions of the KLD STATS in 1991-2011 as the indicator to CSR practices. The purpose is to investigate what CSR activities create significant impacts on accounting-based financials and firm values by delving into different CSR dimensions. Meanwhile, this paper takes into consideration S&P 500 and control variables (firm sizes and financial leverage). In fact, the commercial behavior of the tourism-related industry may result in negative impacts on the economy and the society. Therefore, this paper classifies a positive set of CSR elements and a negative set of CSR elements for the tourism-related industry in order to examine their respective effects on short-term profitability and long-term firm values. This can shed light on which CSR dimensions exhibit significant impacts on CFP better than holistic CSR indicators, and hence provide more useful information to investors and corporates. This paper uses quantile regressions to avoid the impact of outliers in the data set. This helps to offer specific information so that companies can make informed decisions.

Keywords: corporate social responsibility, CSR, firm value, tourism, corporate financial performance, CFP

Procedia PDF Downloads 266
11681 Video Materials as a Persuasive Strategy in Tourism Discourse

Authors: Ganna Zakharova

Abstract:

The persuasive influence of tourism promotional materials is very much experienced nowadays. In order to attract the attention of viewers, marketers choose various techniques in their digital texts. Video is an essential element for attraction and seduction; it is a trigger element for tourists. This solution for web marketing engages and convinces potential tourists to book a tourism product. Embedding video materials into a website provides useful information, create different feelings in viewers, and help them finalize their decisions. The present article discusses video solutions for health tourism websites used to allure potential tourists. The paper reviews the influential elements of persuasive tourism marketing videos. The article highlights how these components as persuasive strategies of tourism promotional materials can influence the decisions of tourism websites’ users. The result section provides the real examples of the deployment of the mentioned technique to convince the audience by the website of 'Karpaty' resort (Ukraine). This technique is worth attention as it plays an important role in the promotion of tourism services. The data collection of this study will provide updated information in relation to the rhetoric of tourism.

Keywords: tourism discourse, persuasive video, influential videos in marketing, persuasive discourse, tourism promotion

Procedia PDF Downloads 102