Search results for: vulnerability mapping
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1756

Search results for: vulnerability mapping

946 Merging Sequence Diagrams Based Slicing

Authors: Bouras Zine Eddine, Talai Abdelouaheb

Abstract:

The need to merge software artifacts seems inherent to modern software development. Distribution of development over several teams and breaking tasks into smaller, more manageable pieces are an effective means to deal with the kind of complexity. In each case, the separately developed artifacts need to be assembled as efficiently as possible into a consistent whole in which the parts still function as described. Also, earlier changes are introduced into the life cycle and easier is their management by designers. Interaction-based specifications such as UML sequence diagrams have been found effective in this regard. As a result, sequence diagrams can be used not only for capturing system behaviors but also for merging changes in order to create a new version. The objective of this paper is to suggest a new approach to deal with the problem of software merging at the level of sequence diagrams by using the concept of dependence analysis that captures, formally, all mapping and differences between elements of sequence diagrams and serves as a key concept to create a new version of sequence diagram.

Keywords: system behaviors, sequence diagram merging, dependence analysis, sequence diagram slicing

Procedia PDF Downloads 337
945 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 339
944 Fragility Assessment for Vertically Irregular Buildings with Soft Storey

Authors: N. Akhavan, Sh. Tavousi Tafreshi, A. Ghasemi

Abstract:

Seismic behavior of irregular structures through the past decades indicate that the stated buildings do not have appropriate performance. Among these subjects, the current paper has investigated the behavior of special steel moment frame with different configuration of soft storey vertically. The analyzing procedure has been evaluated with respect to incremental dynamic analysis (IDA), and numeric process was carried out by OpenSees finite element analysis package. To this end, nine 2D steel frames, with different numbers of stories and irregularity positions, which were subjected to seven pairs of ground motion records orthogonally with respect to Ibarra-Krawinkler deterioration model, have been investigated. This paper aims at evaluating the response of two-dimensional buildings incorporating soft storey which subjected to bi-directional seismic excitation. The IDAs were implemented for different stages of PGA with various ground motion records, in order to determine maximum inter-storey drift ratio. According to statistical elements and fracture range (standard deviation), the vulnerability or exceedance from above-mentioned cases has been examined. For this reason, fragility curves for different placement of soft storey in the first, middle and the last floor for 4, 8, and 16 storey buildings have been generated and compared properly.

Keywords: special steel moment frame, soft storey, incremental dynamic analysis, fragility curve

Procedia PDF Downloads 343
943 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.

Keywords: climate variability, agriculture, land use, mitigation strategies

Procedia PDF Downloads 267
942 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data

Authors: Ruchika Yadav

Abstract:

Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.

Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability

Procedia PDF Downloads 134
941 A Modified Decoupled Semi-Analytical Approach Based On SBFEM for Solving 2D Elastodynamic Problems

Authors: M. Fakharian, M. I. Khodakarami

Abstract:

In this paper, a new trend for improvement in semi-analytical method based on scale boundaries in order to solve the 2D elastodynamic problems is provided. In this regard, only the boundaries of the problem domain discretization are by specific sub-parametric elements. Mapping functions are uses as a class of higher-order Lagrange polynomials, special shape functions, Gauss-Lobatto -Legendre numerical integration, and the integral form of the weighted residual method, the matrix is diagonal coefficients in the equations of elastodynamic issues. Differences between study conducted and prior research in this paper is in geometry production procedure of the interpolation function and integration of the different is selected. Validity and accuracy of the present method are fully demonstrated through two benchmark problems which are successfully modeled using a few numbers of DOFs. The numerical results agree very well with the analytical solutions and the results from other numerical methods.

Keywords: 2D elastodynamic problems, lagrange polynomials, G-L-Lquadrature, decoupled SBFEM

Procedia PDF Downloads 439
940 When Women Take the Lead: Exploring the Intersection Between Gender Equality and Women’s Environmental Political Engagement from a Comparative Perspective

Authors: Summer Isaacson

Abstract:

Research on gender differences in environmental behavior has long claimed that women engage less than men in environmental political participation (EPP) (protests, petitions), despite their higher levels of environmental concern and vulnerability. Using recent data from the ISSP’s 2020 Environment module including 28 countries, we revisit the gender gap in EPP. Arguing that increasing gender equality and socio-economic development can allow women to voice their environmental grievances, we use multi-level models to examine the effects of macro-level gender equality on gender differences in environmental protests, petitions, and boycotts. By distinguishing individual from collective and non-confrontational from confrontational engagement forms, this study offers an encompassing understanding of gendered patterns of participation. Women do participate more than men, but mainly in individual and non-confrontational EPP forms (petitions, boycotts) and with substantial variation across countries. Moreover, considering how women have historically been restrained from participating in politics, we argue that structural gender inequality remains an important limitation to women’s engagement. Cross-level interactions indicate that in more egalitarian countries, women are more likely to engage in several types of EPP than men. The study offers new perspectives and findings on gender differences in EPP, highlighting the impact of gender inequality on women’s participation.

Keywords: environmental activism, political participation, gender equality, pro-environmental behavior

Procedia PDF Downloads 60
939 High Speed Motion Tracking with Magnetometer in Nonuniform Magnetic Field

Authors: Jeronimo Cox, Tomonari Furukawa

Abstract:

Magnetometers have become more popular in inertial measurement units (IMU) for their ability to correct estimations using the earth's magnetic field. Accelerometer and gyroscope-based packages fail with dead-reckoning errors accumulated over time. Localization in robotic applications with magnetometer-inclusive IMUs has become popular as a way to track the odometry of slower-speed robots. With high-speed motions, the accumulated error increases over smaller periods of time, making them difficult to track with IMU. Tracking a high-speed motion is especially difficult with limited observability. Visual obstruction of motion leaves motion-tracking cameras unusable. When motions are too dynamic for estimation techniques reliant on the observability of the gravity vector, the use of magnetometers is further justified. As available magnetometer calibration methods are limited with the assumption that background magnetic fields are uniform, estimation in nonuniform magnetic fields is problematic. Hard iron distortion is a distortion of the magnetic field by other objects that produce magnetic fields. This kind of distortion is often observed as the offset from the origin of the center of data points when a magnetometer is rotated. The magnitude of hard iron distortion is dependent on proximity to distortion sources. Soft iron distortion is more related to the scaling of the axes of magnetometer sensors. Hard iron distortion is more of a contributor to the error of attitude estimation with magnetometers. Indoor environments or spaces inside ferrite-based structures, such as building reinforcements or a vehicle, often cause distortions with proximity. As positions correlate to areas of distortion, methods of magnetometer localization include the production of spatial mapping of magnetic field and collection of distortion signatures to better aid location tracking. The goal of this paper is to compare magnetometer methods that don't need pre-productions of magnetic field maps. Mapping the magnetic field in some spaces can be costly and inefficient. Dynamic measurement fusion is used to track the motion of a multi-link system with us. Conventional calibration by data collection of rotation at a static point, real-time estimation of calibration parameters each time step, and using two magnetometers for determining local hard iron distortion are compared to confirm the robustness and accuracy of each technique. With opposite-facing magnetometers, hard iron distortion can be accounted for regardless of position, Rather than assuming that hard iron distortion is constant regardless of positional change. The motion measured is a repeatable planar motion of a two-link system connected by revolute joints. The links are translated on a moving base to impulse rotation of the links. Equipping the joints with absolute encoders and recording the motion with cameras to enable ground truth comparison to each of the magnetometer methods. While the two-magnetometer method accounts for local hard iron distortion, the method fails where the magnetic field direction in space is inconsistent.

Keywords: motion tracking, sensor fusion, magnetometer, state estimation

Procedia PDF Downloads 80
938 Decoding Urban Stress Mapping Criteria in Urban Heritage Cores: Gandhi Park, Kerala Case Study

Authors: Ansal D'cruz, Anurup K., Saritha G. Parambath

Abstract:

Physical and mental strain is a growing concern arising from various stressors in an urban context. However, these stressors are relatively less explored in the domain of urban design, especially in Indian cities where the central business district falls within the heritage core. An attempt is made in the context of the heritage core of Thiruvananthapuram city, Kerala, to understand and identify the connection between the built environment and urban stress. The criteria for establishing the indicators were obtained through a systematic literature review. A thorough study conducted in Gandhi Park, East Fort area using the identified criteria resulted in valuable insights into various urban stressors. Onsite surveys established the correlation between the built environment and user stress levels. The study concludes with guidelines for approaching urban stress in urban parks in an Indian context.

Keywords: urban stress, built environment, mental health, urban stressors, urban design

Procedia PDF Downloads 60
937 Analysis of Factors Used by Farmers to Manage Risk: A Case Study on Italian Farms

Authors: A. Pontrandolfi, G. Enjolras, F. Capitanio

Abstract:

The study analyses the strategies Italian farmers use to cope with the risks that face their production. We specifically explore the potential and the limitations of the economic tools for climatic risk management in agriculture of the Common Agricultural Policy 2014-2020, that foresees contributions for economic tools for risk management, in relation to farms’ needs, exposure and vulnerability of agricultural areas to climatic risk. We consider at the farm level approaches to hedge risks in terms of the use of technical tools (agricultural practices, pesticides, fertilizers, irrigation) and economic/financial instruments (insurances, etc.). We develop cross-sectional and longitudinal analyses as well as analyses of correlation that underline the main differences between the way farms adapt their structure and management towards risk. The results show a preference for technical tools, despite the presence of important public aids on economic tools such as insurances. Therefore, there is a strong need for a more effective and integrated risk management policy scheme. Synergies between economic tools and risk reduction actions of a more technical, structural and management nature (production diversification, irrigation infrastructures, technological and management innovations and formation-information-consultancy, etc.) are emphasized.

Keywords: agriculture and climate change, climatic risk management, insurance schemes, farmers' approaches to risk management

Procedia PDF Downloads 339
936 Spatio-Temporal Analysis and Mapping of Malaria in Thailand

Authors: Krisada Lekdee, Sunee Sammatat, Nittaya Boonsit

Abstract:

This paper proposes a GLMM with spatial and temporal effects for malaria data in Thailand. A Bayesian method is used for parameter estimation via Gibbs sampling MCMC. A conditional autoregressive (CAR) model is assumed to present the spatial effects. The temporal correlation is presented through the covariance matrix of the random effects. The malaria quarterly data have been extracted from the Bureau of Epidemiology, Ministry of Public Health of Thailand. The factors considered are rainfall and temperature. The result shows that rainfall and temperature are positively related to the malaria morbidity rate. The posterior means of the estimated morbidity rates are used to construct the malaria maps. The top 5 highest morbidity rates (per 100,000 population) are in Trat (Q3, 111.70), Chiang Mai (Q3, 104.70), Narathiwat (Q4, 97.69), Chiang Mai (Q2, 88.51), and Chanthaburi (Q3, 86.82). According to the DIC criterion, the proposed model has a better performance than the GLMM with spatial effects but without temporal terms.

Keywords: Bayesian method, generalized linear mixed model (GLMM), malaria, spatial effects, temporal correlation

Procedia PDF Downloads 451
935 Slope Stabilisation of Highly Fractured Geological Strata Consisting of Mica Schist Layers While Construction of Tunnel Shaft

Authors: Saurabh Sharma

Abstract:

Introduction: The case study deals with the ground stabilisation of Nabi Karim Metro Station in Delhi, India, wherein an extremely complex geology was encountered while excavating the tunnelling shaft for launching Tunnel Boring Machine. The borelog investigation and the Seismic Refraction Technique (SRT) indicated towards the presence of an extremely hard rocky mass from a depth of 3-4 m itself, and accordingly, the Geotechnical Interpretation Report (GIR) concluded the presence of Grade-IV rock from 3m onwards and presence of Grade-III and better rock from 5-6m onwards. Accordingly, it was planned to retain the ground by providing secant piles all around the launching shaft and then excavating the shaft vertically after leaving a berm of 1.5m to prevent secant piles from getting exposed. To retain the side slopes, rock bolting with shotcreting and wire meshing were proposed, which is a normal practice in such strata. However, with the increase in depth of excavation, the rock quality kept on decreasing at an unexpected and surprising pace, with the Grade-III rock mass at 5-6 m converting to conglomerate formation at the depth of 15m. This worsening of geology from high grade rock to slushy conglomerate formation can never be predicted and came as a surprise to even the best geotechnical engineers. Since the excavation had already been cut down vertically to manage the shaft size, the execution was continued with enhanced cautions to stabilise the side slopes. But, when the shaft work was about to finish, a collapse was encountered on one side of the excavation shaft. This collapse was unexpected and surprising since all measures to stabilise the side slopes had been taken after face mapping, and the grid size, diameter, and depth of the rockbolts had already been readjusted to accommodate rock fractures. The above scenario was baffling even to the best geologists and geotechnical engineers, and it was decided that any further slope stabilisation scheme shall have to be designed in such a way to ensure safe completion of works. Accordingly, following revisions to excavation scheme were made: The excavation would be carried while maintaining a slope based on type of soil/rock. The rock bolt type was changed from SN rockbolts to Self Drilling type anchor. The grid size of the bolts changed on real time assessment. the excavation carried out by implementing a ‘Bench Release Approach’. Aggressive Real Time Instrumentation Scheme. Discussion: The above case Study again asserts vitality of correct interpretation of the geological strata and the need of real time revisions of the construction schemes based on the actual site data. The excavation is successfully being done with the above revised scheme, and further details of the Revised Slope Stabilisation Scheme, Instrumentation Schemes, Monitoring results, along with the actual site photographs, shall form the part of the final Paper.

Keywords: unconfined compressive strength (ucs), rock mass rating (rmr), rock bolts, self drilling anchors, face mapping of rock, secant pile, shotcrete

Procedia PDF Downloads 64
934 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 59
933 Identifying the Mindset of Deaf Benildean Students in Learning Anatomy and Physiology

Authors: Joanne Rieta Miranda

Abstract:

Learning anatomy and physiology among Deaf Non-Science major students is a challenge. They have this mindset that Anatomy and Physiology are difficult and very technical. In this study, nine (9) deaf students who are business majors were considered. Non-conventional teaching strategies and classroom activities were employed such as cooperative learning, virtual lab, Facebook live, big sky, blood typing, mind mapping, reflections, etc. Of all the activities; the deaf students ranked cooperative learning as the best learning activity. This is where they played doctors. They measured the pulse rate, heart rate and blood pressure of their partner classmate. In terms of mindset, 2 out of 9 students have a growth mindset with some fixed ideas while 7 have a fixed mindset with some growth ideas. All the students passed the course. Three out of nine students got a grade of 90% and above. The teacher was evaluated by the deaf students as very satisfactory with a mean score of 3.54. This means that the learner-centered practices in the classroom are manifested to a great extent.

Keywords: deaf students, learning anatomy and physiology, teaching strategies, learner-entered practices

Procedia PDF Downloads 227
932 Mitigating Climate Change: Cross-Country Variation in Policy Ambition

Authors: Mohammad Aynal Haque

Abstract:

Under the international cooperation — Paris Agreement — countries outline their self-determined policy ambition for emissions reduction in their Nationally Determined Contributions (NDCs) as a key to addressing climate change globally. Although practically all countries commit themselves to reach the Paris landmark (below 20 C) globally, some act as climate leaders, others behave as followers, and others turn out to be climate laggards. As a result, there is a substantial variation in ‘emissions reduction targets’ across countries. Thus, a question emerges: What explains this variation? Or why do some countries opt for higher while others opt for lower ‘emissions reduction targets toward global mitigation efforts? Conceptualizing the ‘emissions reduction targets by 2030’ outlined in NDCs by each country as the climate policy ambition (CPA), this paper explores how certain national political, economic, environmental, and external factors play vital roles in determining climate policy ambition. Based on the cross-country regression analysis among 168 countries, this study finds that democracy, vulnerability to climate change effects, and foreign direct investment have substantial effects on CPA. The paper also finds that resource capacity has a minimal negative effect on CPA across developed countries.

Keywords: climate change, Paris agreement, international cooperation, political economy, environmental politics, NDCs

Procedia PDF Downloads 72
931 Demotivation-Reducing Strategies Employed by Turkish EFL Learners in L2 Writing

Authors: kaveh Jalilzadeh, Maryam Rastgari

Abstract:

Motivation for learning a foreign language is needed for learners of any foreign language to effectively learn language skills. However, there are some factors that lead to the learners’ demotivation. Therefore, teachers of foreign languages, most notably English language which turned out to be an international language for academic and business purposes, need to be well aware of the demotivation sources and know how to reduce learners’ demotivation. This study is an attempt to explore demotivation-reducing strategies employed by Turkish EFL learners in L2 writing. The researchers used a qualitative case study and employed semi-structured interviews to collect data. The informants recruited in this study were 20 English writing lecturers who were selected through purposive sampling among university lecturers/instructors at the state and non-state universities in Istanbul and Ankara. Interviews were transcribed verbatim, and MAXQDA software (version 2022) was used for performing coding and thematic analysis of the data. Findings revealed that Turkish EFL teachers use 18 strategies to reduce language learners’ demotivation. The most frequently reported strategies were: writing in a group, writing about interesting topics, writing about new topics, writing about familiar topics, writing about simple topics, and writing about relevant topics. The findings have practical implications for writing teachers and learners of the English language.

Keywords: phenomenological study, emotional vulnerability, motivation, digital Settings

Procedia PDF Downloads 66
930 In Search of CO₂: Gravity and Magnetic Data for Eor Prospect Generation in Central Libya

Authors: Ahmed Saheel, Milad Ahmed Elmaradi, Tim Archer, Muammer Ahmed Aboaesha, Abdulkhaliq Abdulmajid Altoubashi

Abstract:

Enhanced oil recovery using carbon dioxide (CO₂-EOR) is a method that can increase oil production beyond what is typically achievable using conventional recovery methods by injecting and hence storing, carbon dioxide (CO₂) in the oil reservoir. In Libya, plans are underway to source a proportion of this CO₂ from subsurface geology that is known from previous drilling to contain high volumes of CO₂. But first, these subsurface volumes need to be more clearly defined and understood. Focusing on the Al-Harouj region of central Libya, ground gravity and airborne magnetic data from the LPI database and the African Magnetic Mapping Project respectively have been prepared and processed by Libyan Petroleum Institute (LPI) and Reid Geophysics Limited (RGL) to produce a range of grids and related products suitable for interpreting geological structure and to make recommendations for subsequent work that will assist CO₂ exploration for purposes of enhanced oil recovery (EOR).

Keywords: gravity anomaly, magnetic anomaly, DEDUCED lineaments, Total horizontal derivative, upward-continuation

Procedia PDF Downloads 121
929 Vector-Based Analysis in Cognitive Linguistics

Authors: Chuluundorj Begz

Abstract:

This paper presents the dynamic, psycho-cognitive approach to study of human verbal thinking on the basis of typologically different languages /as a Mongolian, English and Russian/. Topological equivalence in verbal communication serves as a basis of Universality of mental structures and therefore deep structures. Mechanism of verbal thinking consisted at the deep level of basic concepts, rules for integration and classification, neural networks of vocabulary. In neuro cognitive study of language, neural architecture and neuro psychological mechanism of verbal cognition are basis of a vector-based modeling. Verbal perception and interpretation of the infinite set of meanings and propositions in mental continuum can be modeled by applying tensor methods. Euclidean and non-Euclidean spaces are applied for a description of human semantic vocabulary and high order structures.

Keywords: Euclidean spaces, isomorphism and homomorphism, mental lexicon, mental mapping, semantic memory, verbal cognition, vector space

Procedia PDF Downloads 518
928 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 353
927 Research on Reservoir Lithology Prediction Based on Residual Neural Network and Squeeze-and- Excitation Neural Network

Authors: Li Kewen, Su Zhaoxin, Wang Xingmou, Zhu Jian Bing

Abstract:

Conventional reservoir prediction methods ar not sufficient to explore the implicit relation between seismic attributes, and thus data utilization is low. In order to improve the predictive classification accuracy of reservoir lithology, this paper proposes a deep learning lithology prediction method based on ResNet (Residual Neural Network) and SENet (Squeeze-and-Excitation Neural Network). The neural network model is built and trained by using seismic attribute data and lithology data of Shengli oilfield, and the nonlinear mapping relationship between seismic attribute and lithology marker is established. The experimental results show that this method can significantly improve the classification effect of reservoir lithology, and the classification accuracy is close to 70%. This study can effectively predict the lithology of undrilled area and provide support for exploration and development.

Keywords: convolutional neural network, lithology, prediction of reservoir, seismic attributes

Procedia PDF Downloads 173
926 The Effects of Infographics as a Supplementary Tool in Promoting Academic Reading Skill in an EFL Class

Authors: Niracha Chompurach, Dararat Khampusaen

Abstract:

EFL students have to be able to synthesize the texts they are reading critically to compose and connect the information. This study focuses on the effects of the application of Infographics as a supplementary tool to improve Thai EFL students’ Academic reading skills. Infographics are graphic visual representations of information, data, and knowledge offering students to work on gathering multiple types of information, such as pictures, texts, graphs, mapping, and charts. The study aims to investigate if the Infographics as a supplementary tool in academic reading lessons can make a difference in students’ reading skills, and the students’ opinions toward the application of infographics as a reading tool. The participants of this study were 3rd year Thai EFL Khon Kaen University students who took English Academic Reading course. This study employed Infographics assignments, Infographics rubric, and Gucus group interview. This study would advantage for both EFL teachers and students as a means to engage the students to handle the larger load of and represents the complex information in visible and comprehensible way.

Keywords: EFL, e-learning, infographics, language education

Procedia PDF Downloads 160
925 The Coexistence of Dual Form of Malnutrition among Portuguese Institutionalized Elderly People

Authors: C. Caçador, M. J. Reis Lima, J. Oliveira, M. J. Veiga, M. Teixeira Veríssimo, F. Ramos, M. C. Castilho, E. Teixeira-Lemos

Abstract:

In the present study we evaluated the nutritional status of 214 institutionalized elderly residents of both genders, aged 65 years and older of 11 care homes located in the district of Viseu (center of Portugal). The evaluation was based on anthropometric measurements and the Mini Nutritional Assessment (MNA) score. The mean age of the subjects was 82.3 ± 6.1 years-old. Most of the elderly residents were female (72.0%). The majority had 4 years of formal education (51.9%) and was widowed (74.3%) or married (14.0%). Men presented a mean age of 81.2±8.5 years-old, weight 69.3±14.5 kg and BMI 25.33±6.5 kg/m2. In women, the mean age was 84.5±8.2 years-old, weight 61.2±14.7 kg and BMI 27.43±5.6 kg/m2. The evaluation of the nutritional status using the MNA score showed that 24.0% of the residents show a risk of undernutrition and 76.0% of them were well nourished. There was a high prevalence of obese (24.8%) and overweight residents (33.2%) according to the BMI. 7.5% were considered underweight. We also found that according to their waist circumference measurements 88.3% of the residents were at risk for cardiovascular disease (CVD) and 64.0% of them presented very high risk for CVD (WC≥88 cm for women and WC ≥102 cm for men). The present study revealed the coexistence of a dual form of malnutrition (undernourished and overweight) among the institutionalized Portuguese concomitantly with an excess of abdominal adiposity. The high prevalence of residents at high risk for CVD should not be overlooked. Given the vulnerability of the group of institutionalized elderly, our study highlights the importance of the classification of nutritional status based on both instruments: the BMI and the MNA.

Keywords: nutritional satus, MNA, BMI, elderly

Procedia PDF Downloads 319
924 Development and Validation of the Response to Stressful Situations Scale in the General Population

Authors: Célia Barreto Carvalho, Carolina da Motta, Marina Sousa, Joana Cabral, Ana Luísa Carvalho, Ermelindo Peixoto

Abstract:

The aim of the current study was to develop and validate a Response to Stressful Situations Scale (RSSS) for the Portuguese population. This scale assesses the degree of stress experienced in scenarios that can constitute positive, negative and more neutral stressors, and also describes the physiological, emotional and behavioral reactions to those events according to their intensity. These scenario include typical stressor scenarios relevant to patients with schizophrenia, which are currently absent from most scale, assessing specific risks that these stressors may bring on subjects, which may prove useful in non-clinical and clinical populations (i.e. patients with mood or anxiety disorders, schizophrenia). Results from Principal Components Analysis and Confirmatory Factor Analysis of on two adult samples from general population allowed to confirm a three-factor model with good fit indices: χ2 (144)= 370.211, p = 0.000; GFI = 0.928; CFI = 0.927; TLI = 0.914, RMSEA = 0.055, P( rmsea ≤ 0.005) = 0.096; PCFI = 0.781. Further data analysis on the scale revealed that RSSS is an adequate assessment tool of stress response in adults to be used in further research and clinical settings, with good psychometric characteristics, adequate divergent and convergent validity, good temporal stability and high internal consistency.

Keywords: assessment, stress events, stress response, stress vulnerability

Procedia PDF Downloads 517
923 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 139
922 Analytical Downlink Effective SINR Evaluation in LTE Networks

Authors: Marwane Ben Hcine, Ridha Bouallegue

Abstract:

The aim of this work is to provide an original analytical framework for downlink effective SINR evaluation in LTE networks. The classical single carrier SINR performance evaluation is extended to multi-carrier systems operating over frequency selective channels. Extension is achieved by expressing the link outage probability in terms of the statistics of the effective SINR. For effective SINR computation, the exponential effective SINR mapping (EESM) method is used on this work. Closed-form expression for the link outage probability is achieved assuming a log skew normal approximation for single carrier case. Then we rely on the lognormal approximation to express the exponential effective SINR distribution as a function of the mean and standard deviation of the SINR of a generic subcarrier. Achieved formulas is easily computable and can be obtained for a user equipment (UE) located at any distance from its serving eNodeB. Simulations show that the proposed framework provides results with accuracy within 0.5 dB.

Keywords: LTE, OFDMA, effective SINR, log skew normal approximation

Procedia PDF Downloads 363
921 Foggy Image Restoration Using Neural Network

Authors: Khader S. Al-Aidmat, Venus W. Samawi

Abstract:

Blurred vision in the misty atmosphere is essential problem which needs to be resolved. To solve this problem, we developed a technique to restore foggy degraded image from its original version using Back-propagation neural network (BP-NN). The suggested technique is based on mapping between foggy scene and its corresponding original scene. Seven different approaches are suggested based on type of features used in image restoration. Features are extracted from spatial and spatial-frequency domain (using DCT). Each of these approaches comes with its own BP-NN architecture depending on type and number of used features. The weight matrix resulted from training each BP-NN represents a fog filter. The performance of these filters are evaluated empirically (using PSNR), and perceptually. By comparing the performance of these filters, the effective features that suits BP-NN technique for restoring foggy images is recognized. This system proved its effectiveness and success in restoring moderate foggy images.

Keywords: artificial neural network, discrete cosine transform, feed forward neural network, foggy image restoration

Procedia PDF Downloads 379
920 Co-Seismic Surface Deformation Induced By 24 September 2019 Mirpur, Pakistan Earthquake Along an Active Blind Fault Estimated Using Sentinel-1 TOPS Interferometry

Authors: Muhammad Ali, Zeeshan Afzal, Giampaolo Ferraioli, Gilda Schirinzi, Muhammad Saleem Mughal, Vito Pascazio

Abstract:

On 24 September 2019, an earthquake with 5.6 Mw and 10 km depth stroke in Mirpur. The Mirpur area was highly affected by this earthquake, with the death of 34 people. This study aims to estimate the surface deformation associated with this earthquake. The interferometric synthetic aperture radar (InSAR) technique is applied to study earthquake induced surface motion. InSAR data using 9 Sentinel-1A SAR images from 11 August 2019 to 22 October 2019 is used to investigate the pre, co-, and post-seismic deformation trends. Time series investigation reveals that there was not such deformation in pre-seismic time period. In the co-seismic time period, strong displacement was observed, and in post-seismic results, small displacement is seen due to aftershocks. Our results show the existence of a previously unpublished blind fault in Mirpur and help to locate the fault line. Previous this fault line was triggered during the 2005 earthquake, and now it’s activated on 24 September 2019. Study area is already facing many problems due to natural hazards where additional surface deformations, particularly because of an earthquake with an activated blind fault, have increased its vulnerability.

Keywords: surface deformation, InSAR, earthquake, sentinel-1, mirpur

Procedia PDF Downloads 124
919 Parallel Tracking and Mapping of a Fleet of Quad-Rotor

Authors: M. Bazin, I. Bouguir, D. Combe, V. Germain, G. Lassade

Abstract:

The problem of managing a fleet of quad-rotor drones in a completely unknown environment is analyzed in the present paper. This work is following the footsteps of other studies about how should be managed the movements of a swarm of elements that have to stay gathered throughout their activities. In this paper we aim to demonstrate the limitations of a system where absolutely all the calculations and physical movements of our elements are done by one single external element. The strategy of control is an adaptive approach which takes into account the explored environment. This is made possible thanks to a set of command rules which can guide the drones through various missions with defined goal. The result of the mission is independent of the nature of environment and the number of drones in the fleet. This strategy is based on a simultaneous usage of different data: obstacles positions, real-time positions of all drones and relative positions between the different drones. The present work is made with the Robot Operating System and used several open-source projects on localization and usage of drones.

Keywords: cooperative guidance, distributed control, unmanned aerial vehicle, obstacle avoidance

Procedia PDF Downloads 297
918 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 35
917 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 148