Search results for: scope of cyber attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2029

Search results for: scope of cyber attacks

1309 Contemporary Arabic Novel Probing the Self and the Other: A Contrapuntal Study of Identity, Sexuality, and Fundamentalism

Authors: Jihan Mahmoud

Abstract:

This paper examines the role played by Arabic novelists in revolutionary change in the Arab world, discussing themes of identity, sexuality and fundamentalism as portrayed in a selection of modern and contemporary Arabic novels that are either written in English or translated from Arabic into English. It particularly focuses on the post-Naguib Mahfouz era. Taking my cue from the current political changes in the Arab world, starting with 9/11/ terrorist attacks in the USA and the UK, the ‘Arab Spring’ revolutions, the rise of political Islam and the emergence of Isis, the Islamic state in Iraq and the Levant, the study analyses the differences in the ways contemporary Arab novelists from different Arabic countries represent the interaction between identity, sexual politics and fundamentalist ideas in the Arab world, with a specific focus on the overlap between literature, religion and international politics in the region. It argues that the post-Mahfouz era marked a new phase in the development of the political Arabic novel not only as a force of resistance against political-religious oppression, but as a call for revolution as well. Thus, the Arabic novel reshapes values and prompts future action.

Keywords: Arabic novel, Islam, politics, sexuality

Procedia PDF Downloads 524
1308 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 427
1307 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 604
1306 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 234
1305 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space

Authors: P. Saee, Baiju Gopal

Abstract:

YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.

Keywords: cyber-psychology, internet, media, mental health, mental illness, technology

Procedia PDF Downloads 180
1304 Embodied Carbon Footprint of Existing Malaysian Green Homes

Authors: Fahanim Abdul Rashid, Muhammad Azzam Ismail

Abstract:

Part and parcel of building green homes (GHs) with favorable thermal comfort (TC) is to design and build with reduced carbon footprint (CF) from embodied energy in the building envelope and reduced operational CF overall. Together, the environmental impact of GHs can be reduced significantly. Nevertheless, there is still a need to identify the base CF value for Malaysian GHs and this can be done by assessing existing ones which can then be compared to conventional and vernacular houses which are built differently with different building materials. This paper underlines the research design and introduces the case studies. For now, the operational CF of the case studies is beyond the scope of this study. Findings from this research could identify the best building material and construction technique combination to build GHs depending on the available skills, financial constraints and the condition of the immediate environment.

Keywords: embodied carbon footprint, Malaysian green homes

Procedia PDF Downloads 342
1303 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 283
1302 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 275
1301 Evaluation of Rehabilitation in Ischemic Stroke

Authors: Amirmohammad Dahouri

Abstract:

Each year, more than 795,000 individuals in the United States grieve a stroke, and by 2030, it is predictable that 4% of the U.S. people will have had a stroke. Ischemic stroke, accounting for about 80% of all strokes, is one of the main causes of disability. The goal of stroke rehabilitation is to help patients return to physical and mental functions and relearn the required aids to living everyday life. This flagging has an adverse effect on patients’ quality of life and affects their daily living activities. In recent years, the rehabilitation of ischemic stroke attractions more attention in the world. A review of the rudimentary perceptions of stroke rehabilitation that are price stressing to all specialists who delicacy patients with stroke. Ideas are made for patients on how to functionally manage daily activities after they have qualified for a stroke. It is vital for home healthcare clinicians to understand the process from acute events to medical equilibrium and rehabilitation to adaptation. Different sources such as Pub Med Google Scholar and science direct have been used and various contemporary articles in this era have been analyzed. The care plan must also foundation actual actions to protect against recurrent stroke, as stroke patients are generally at significant risk for further ischemic or hemorrhagic attacks. Here, we review evidence of rehabilitation in treating post-stroke impairment.

Keywords: rehabilitation, stroke, ischemic, hemorrhagic, brain

Procedia PDF Downloads 160
1300 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 292
1299 An Investigation of Sustainability: Scope of Eco Denim Fashion

Authors: Sneha Bhatnagar, Sachin Bhatnagar

Abstract:

Denim presently is the most widely accepted textile product and shows its hold even in future with its growing popularity. Denim today is no longer restricted to only a pair of jeans but has diversified in all different product categories. Although denim is considered as an expression of youth and demonstrates durability and comfort, denim raises issues of sustainability. Through an exploratory research, the researcher aims at addressing the possibilities of denim fashion promoting environmental sustainability by means of creativity, awareness, recycle and artisan appreciation. It also touches on how eco conscious fashion brands involve in development in terms of ideation and modification of denim as a fabric or product into diversified sustainable fashion. In conclusion, it is shown that blue denim fashion continues to evolve and shows eventual transformation in becoming green denim in future, nurturing values of both quality and sustainability.

Keywords: arts, craft, creativity, denim, fashion, recycle, sustainability

Procedia PDF Downloads 331
1298 The Process of Sanctification: A Bourdieusian Approach to the Declension of Power in New England Puritan Clergy

Authors: W. Scott Jackson

Abstract:

This paper explains the declension of Puritan clerical power following the Great Migration up until when Massachusetts lost its charter in 1684. Historian Perry Miller argued that an overall declension in Puritan culture occurred during this period. However, that notion has been dispelled. There is a resurging field exploring declension in areas outside of Miller’s scope of Puritan culture. I determine that colonial New England existed as a functional theocracy by using Pierre Bourdieu’s theory of symbolic capital to explain clerical power through symbolic and religious misdirection and conversion. I explore civil and economic power struggles in colonial New England during the decades following the Great Migration to establish that Puritan culture did not largely decline. Instead, it was the Puritan clergy’s power that waned during this period.

Keywords: Bourdieu, Historical Sociology, Symbolic Capital, Puritan

Procedia PDF Downloads 135
1297 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.

Keywords: autism disease, neural network, CPU, GPU, transfer learning

Procedia PDF Downloads 117
1296 Forum Shopping in Biotechnology Law: Understanding Conflict of Laws in Protecting GMO-Based Inventions as Part of a Patent Portfolio in the Greater China Region

Authors: Eugene C. Lim

Abstract:

This paper seeks to examine the extent to which ‘forum shopping’ is available to patent filers seeking protection of GMO (genetically modified organisms)-based inventions in Hong Kong. Under Hong Kong’s current re-registration system for standard patents, an inventor must first seek patent protection from one of three Designated Patent Offices (DPO) – those of the People’s Republic of China (PRC), the Europe Union (EU) (designating the UK), or the United Kingdom (UK). The ‘designated patent’ can then be re-registered by the successful patentee in Hong Kong. Interestingly, however, the EU and the PRC do not adopt a harmonized approach toward the patenting of GMOs, and there are discrepancies in their interpretation of the phrase ‘animal or plant variety’. In view of these divergences, the ability to effectively manage ‘conflict of law’ issues is an important priority for multinational biotechnology firms with a patent portfolio in the Greater China region. Generally speaking, both the EU and the PRC exclude ‘animal and plant varieties’ from the scope of patentable subject matter. However, in the EU, Article 4(2) of the Biotechnology Directive allows a genetically modified plant or animal to be patented if its ‘technical feasibility is not limited to a specific variety’. This principle has allowed for certain ‘transgenic’ mammals, such as the ‘Harvard Oncomouse’, to be the subject of a successful patent grant in the EU. There is no corresponding provision on ‘technical feasibility’ in the patent legislation of the PRC. Although the PRC has a sui generis system for protecting plant varieties, its patent legislation allows the patenting of non-biological methods for producing transgenic organisms, not the ‘organisms’ themselves. This might lead to a situation where an inventor can obtain patent protection in Hong Kong over transgenic life forms through the re-registration of a patent from a more ‘biotech-friendly’ DPO, even though the subject matter in question might not be patentable per se in the PRC. Through a comparative doctrinal analysis of legislative provisions, cases and court interpretations, this paper argues that differences in the protection afforded to GMOs do not generally prejudice the ability of global MNCs to obtain patent protection in Hong Kong. Corporations which are able to first obtain patents for GMO-based inventions in Europe can generally use their European patent as the basis for re-registration in Hong Kong, even if such protection might not be available in the PRC itself. However, the more restrictive approach to GMO-based patents adopted in the PRC would be more acutely felt by enterprises and inventors based in mainland China. The broader scope of protection offered to GMO-based patents in Europe might not be available in Hong Kong to mainland Chinese patentees under the current re-registration model for standard patents, unless they have the resources to apply for patent protection as well from another (European) DPO as the basis for re-registration.

Keywords: biotechnology, forum shopping, genetically modified organisms (GMOs), greater China region, patent portfolio

Procedia PDF Downloads 326
1295 The Effect of Technology in Improving Tourism Cluster Competitiveness

Authors: Michael Safwat Kotit Istemalek

Abstract:

In this study, a project on a small project called Zeytinseli, which plays an important role from the beginning to the end of olive oil and olive oil production, is presented with the help of tourism companies that play an important role in the tourism sector. In the study, first of all, a framework of ideas about travel agency, tourism, specific tourism agency and rural tourism was created and tourism knowledge in the modern world was emphasized. After this, the "olive", which had an important place in both mythology and the religion of God, disappeared in the field of rural tourism. Since Didim Zeytinseli is the Aydın district, accommodation prices were calculated within the scope of the project and a 15-day factory tour was given at the end of the project. It can be said that the study is an original study as it covers not only environmental and agricultural tourism but also cultural tourism and non-traditional tourism98.

Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness

Procedia PDF Downloads 29
1294 An Analysis of the Differences between Three Levels Water Polo Players Based on Indicators of Efficiency

Authors: Mladen Hraste, Igor Jelaska, Ivan Granic

Abstract:

The scope of this research is the identification and explanation of differences of three levels of water polo players in some parameters of effectiveness. The sample for this study was 132 matches of the Adriatic Water Polo League in the 2013/14 competition season. Using the Kruskal-Wallis test and multiple comparisons of mean ranks for all groups at the significance level of α=0, 05, the hypothesis that there are significant differences between groups of respondents in ten of the seventeen variables of effectiveness was confirmed. There is a reasonable possibility that the differences are caused by the degree of learned and implemented tactical knowledge, the degree of scoring ability and the best selection for certain roles in the team. The results of this study can be applied to selection of teams and players, for the selection of the appropriate match concept and for organizing training process.

Keywords: scoring abilities, selection, tactical knowledge, water polo effectiveness

Procedia PDF Downloads 500
1293 Connecting the Dots: Bridging Academia and National Community Partnerships When Delivering Healthy Relationships Programming

Authors: Nicole Vlasman, Karamjeet Dhillon

Abstract:

Over the past four years, the Healthy Relationships Program has been delivered in community organizations and schools across Canada. More than 240 groups have been facilitated in collaboration with 33 organizations. As a result, 2157 youth have been engaged in the programming. The purpose and scope of the Healthy Relationships Program are to offer sustainable, evidence-based skills through small group implementation to prevent violence and promote positive, healthy relationships in youth. The program development has included extensive networking at regional and national levels. The Healthy Relationships Program is currently being implemented, adapted, and researched within the Resilience and Inclusion through Strengthening and Enhancing Relationships (RISE-R) project. Alongside the project’s research objectives, the RISE-R team has worked to virtually share the ongoing findings of the project through a slow ontology approach. Slow ontology is a practice integrated into project systems and structures whereby slowing the pace and volume of outputs offers creative opportunities. Creative production reveals different layers of success and complements the project, the building blocks for sustainability. As a result of integrating a slow ontology approach, the RISE-R team has developed a Geographic Information System (GIS) that documents local landscapes through a Story Map feature, and more specifically, video installations. Video installations capture the cartography of space and place within the context of singular diverse community spaces (case studies). By documenting spaces via human connections, the project captures narratives, which further enhance the voices and faces of the community within the larger project scope. This GIS project aims to create a visual and interactive flow of information that complements the project's mixed-method research approach. Conclusively, creative project development in the form of a geographic information system can provide learning and engagement opportunities at many levels (i.e., within community organizations and educational spaces or with the general public). In each of these disconnected spaces, fragmented stories are connected through a visual display of project outputs. A slow ontology practice within the context of the RISE-R project documents activities on the fringes and within internal structures; primarily through documenting project successes as further contributions to the Centre for School Mental Health framework (philosophy, recruitment techniques, allocation of resources and time, and a shared commitment to evidence-based products).

Keywords: community programming, geographic information system, project development, project management, qualitative, slow ontology

Procedia PDF Downloads 155
1292 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 286
1291 Enhancing the Safety Climate and Reducing Violence against Staff in Closed Hospital Wards

Authors: Valerie Isaak

Abstract:

This study examines the effectiveness of an intervention program aimed at enhancing a unit-level safety climate as a way to minimize the risk of employees being injured by patient violence. The intervention program conducted in maximum security units in one of the psychiatric hospitals in Israel included a three day workshop. Safety climate was examined before and after the implementation of the intervention. We also collected data regarding incidents involving patient violence. Six months after the intervention a significant improvement in employees’ perceptions regarding management’s commitment to safety were found as well as a marginally significant improvement in communication concerning safety issues. Our research shows that an intervention program aimed at enhancing a safety climate is associated with a decrease in the number of aggressive incidents. We conclude that such an intervention program is likely to return the sense of safety and reduce the scope of violence.

Keywords: violence, intervention, safety climate, performance, public sector

Procedia PDF Downloads 352
1290 Social Reforms and the Welfare State in America after the New Deal (1945-1969)

Authors: Aziza Tahar Djebbar

Abstract:

Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.

Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms

Procedia PDF Downloads 455
1289 National Project 'Environment' of Russian Federation as a Management Tool in Achieving SDGs

Authors: Ekaterina Posokhova, Boris Gavrilov

Abstract:

Priority national projects have become an essential phenomenon in the Russian Federation. Both regional and local government institutions and a significant part of the society have been involved in their implementation. The scale and multispectricity of the national projects give a reason to believe that their concept is beyond the scope of the individual state programs. The national project “environment” contains federal projects on waste management, water, and air quality, ecotourism development, and biodiversity conservation highlights the importance of the preservation and restoration of Volga River and Lake Baikal ecosystems. This study assesses the national projects according to their relativeness with the current SDGs (i.e., SGD 14 and 15), evaluates the methodology of the projects. The paper considers the peculiarities of the national projects as strategic management tools as well as the possibility of amending the project objective indicators. Conclusion on the effectiveness of NP in terms of achieving SDGs is provided.

Keywords: management, SDP, russia, conservation, law

Procedia PDF Downloads 142
1288 The Road to Abolition of Death Penalty in China: With the Perspective of the Ninth Amendment

Authors: Huang Gui

Abstract:

This paper supplies some possible approaches of the death penalty reform in China basic on the analyzing the reformation conducted by the Ninth Amendment. There now are 46 crimes punishable by death, and this penalty still plays a significant role in the criminal punishment structure. In order to abolish entirely the death penalty in Penal Code, the legislature of China should gradually abolish the death penalty for the nonviolent crimes and then for the nonlethal violent crimes and finally for the lethal violent crimes. In the case where the death penalty has not yet been abolished completely, increasing the applicable conditions of suspension of execution of death penalty and reducing the scope of applicable objects (elderly defendant and other kinds of special objects) of death penalty would be an effective road to control and limit the use of death penalty in judicial practice.

Keywords: death penalty, the eighth amendment, the ninth amendment, suspension of execution of death, immediate execution of death, China

Procedia PDF Downloads 476
1287 Complex Rigid-Plastic Deformation Model of Tow Degree of Freedom Mechanical System under Impulsive Force

Authors: Abdelouaheb Rouabhi

Abstract:

In order to study the plastic resource of structures, the elastic-plastic single degree of freedom model described by Prandtl diagram is widely used. The generalization of this model to tow degree of freedom beyond the scope of a simple rigid-plastic system allows investigating the plastic resource of structures under complex disproportionate by individual components of deformation (earthquake). This macro-model greatly increases the accuracy of the calculations carried out. At the same time, the implementation of the proposed macro-model calculations easier than the detailed dynamic elastic-plastic calculations existing software systems such as ANSYS.

Keywords: elastic-plastic, single degree of freedom model, rigid-plastic system, plastic resource, complex plastic deformation, macro-model

Procedia PDF Downloads 377
1286 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City

Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles

Abstract:

Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.

Keywords: aggression, satisfaction, online rant engagement, online rant

Procedia PDF Downloads 76
1285 A Survey on Ambient Intelligence in Agricultural Technology

Authors: C. Angel, S. Asha

Abstract:

Despite the advances made in various new technologies, application of these technologies for agriculture still remains a formidable task, as it involves integration of diverse domains for monitoring the different process involved in agricultural management. Advances in ambient intelligence technology represents one of the most powerful technology for increasing the yield of agricultural crops and to mitigate the impact of water scarcity, climatic change and methods for managing pests, weeds, and diseases. This paper proposes a GPS-assisted, machine to machine solutions that combine information collected by multiple sensors for the automated management of paddy crops. To maintain the economic viability of paddy cultivation, the various techniques used in agriculture are discussed and a novel system which uses ambient intelligence technique is proposed in this paper. The ambient intelligence based agricultural system gives a great scope.

Keywords: ambient intelligence, agricultural technology, smart agriculture, precise farming

Procedia PDF Downloads 605
1284 Pre-Service Science Teachers' Perceptions Related to the Concept of Laboratory: A Metaphorical Analysis

Authors: Salih Uzun

Abstract:

The laboratory activities are seen an indispensable part of science, teaching, and learning. In this study, the aim was to identify pre-service science teachers’ perceptions related to the concept of laboratory through metaphors. It is expressed that metaphors can be used as a powerful research tool in order to understand personal perceptions. Therefore, metaphors were used with the aim of revealing a picture regarding how pre-service science teachers perceive laboratory. Within the scope of this aim, phenomenographic research design was adopted for this study and an answer was sought to the question; ‘What are pre-service science teachers’ perceptions about the concept of laboratory?’. The sample of this study was a total of 80 pre-service science teachers at various grade levels in Turkey. Participants were asked to complete the sentence; ‘Laboratory is like…; because…’. Documents including pre-service science teachers’ answers to the open-ended questions were used as data sources and the data were analysed with content analysis.

Keywords: laboratory, metaphor, phenomenology, pre-service science teachers

Procedia PDF Downloads 429
1283 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 312
1282 Soybean Seed Composition Prediction From Standing Crops Using Planet Scope Satellite Imagery and Machine Learning

Authors: Supria Sarkar, Vasit Sagan, Sourav Bhadra, Meghnath Pokharel, Felix B.Fritschi

Abstract:

Soybean and their derivatives are very important agricultural commodities around the world because of their wide applicability in human food, animal feed, biofuel, and industries. However, the significance of soybean production depends on the quality of the soybean seeds rather than the yield alone. Seed composition is widely dependent on plant physiological properties, aerobic and anaerobic environmental conditions, nutrient content, and plant phenological characteristics, which can be captured by high temporal resolution remote sensing datasets. Planet scope (PS) satellite images have high potential in sequential information of crop growth due to their frequent revisit throughout the world. In this study, we estimate soybean seed composition while the plants are in the field by utilizing PlanetScope (PS) satellite images and different machine learning algorithms. Several experimental fields were established with varying genotypes and different seed compositions were measured from the samples as ground truth data. The PS images were processed to extract 462 hand-crafted vegetative and textural features. Four machine learning algorithms, i.e., partial least squares (PLSR), random forest (RFR), gradient boosting machine (GBM), support vector machine (SVM), and two recurrent neural network architectures, i.e., long short-term memory (LSTM) and gated recurrent unit (GRU) were used in this study to predict oil, protein, sucrose, ash, starch, and fiber of soybean seed samples. The GRU and LSTM architectures had two separate branches, one for vegetative features and the other for textures features, which were later concatenated together to predict seed composition. The results show that sucrose, ash, protein, and oil yielded comparable prediction results. Machine learning algorithms that best predicted the six seed composition traits differed. GRU worked well for oil (R-Squared: of 0.53) and protein (R-Squared: 0.36), whereas SVR and PLSR showed the best result for sucrose (R-Squared: 0.74) and ash (R-Squared: 0.60), respectively. Although, the RFR and GBM provided comparable performance, the models tended to extremely overfit. Among the features, vegetative features were found as the most important variables compared to texture features. It is suggested to utilize many vegetation indices for machine learning training and select the best ones by using feature selection methods. Overall, the study reveals the feasibility and efficiency of PS images and machine learning for plot-level seed composition estimation. However, special care should be given while designing the plot size in the experiments to avoid mixed pixel issues.

Keywords: agriculture, computer vision, data science, geospatial technology

Procedia PDF Downloads 136
1281 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 71
1280 Wally Feelings Test: Validity and Reliability Study

Authors: Gökhan Kayili, Ramazan Ari

Abstract:

In this research, it is aimed to be adapted Wally Feelings Test to Turkish children and performed the reliability and validity analysis of the test. The sampling of the research was composed of three to five year-old 699 Turkish preschoolers who are attending official and private nursery school. The schools selected with simple random sampling method by considering different socio economic conditions and different central district in Konya. In order to determine reliability of Wally Feelings Test, internal consistency coefficients (KR-20), split-half reliability and test- retest reliability analysis have been performed. During validation process construct validity, content/scope validity and concurrent/criterion validity were used. When validity and reliability of the test examined, it is seen that Wally Feelings Test is a valid and reliable instrument to evaluate three to five year old Turkish children’s understanding feeling skills.

Keywords: reliability, validity, wally feelings test, social sciences

Procedia PDF Downloads 537