Search results for: social networks security issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17188

Search results for: social networks security issues

16348 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 59
16347 Subjectivities of the Inhabitants and Trajectories of Family Life in Vulnerable Groups

Authors: Mora Kestelman

Abstract:

This paper analyzes various family groups of vulnerable populations as regards their family, educational, labor trajectory and sociability from a relational and historical approach based on archive research and fieldwork. Therefrom, their position and life projects are reconsidered as regards the planning and design of the habitat in which they are immersed. It concludes that a critical review of objectivity and subjectivity emphasizes the nonrational, often unconscious, forces that drive human and non-human relationships to configure identities, which, thus, permanently become constituent to the subjects.

Keywords: social psychology, urban planning, self concept, social networks, identity theory

Procedia PDF Downloads 78
16346 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 409
16345 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 120
16344 Requirements to Establish a Taxi Sharing System in an Urban Area

Authors: Morteza Ahmadpur, Ilgin Gokasar, Saman Ghaffarian

Abstract:

That Transportation system plays an important role in management of societies is an undeniable fact and it is one of the most challenging issues in human beings routine life. But by increasing the population in urban areas, the demand for transportation modes also increase. Accordingly, it is obvious that more flexible and dynamic transportation system is required to satisfy peoples’ requirements. Nowadays, there is significant increase in number of environmental issues all over the world which is because of human activities. New technological achievements bring new horizons for humans and so they changed the life style of humans in every aspect of their life and transportation is not an exception. By using new technology, societies can modernize their transportation system and increase the feasibility of their system. Real–time Taxi sharing systems is one of the novel and most modern systems all over the world. For establishing this kind of system in an urban area it is required to use the most advanced technologies in a transportation system. GPS navigation devices, computers and social networks are just some parts of this kind of system. Like carpooling, real-time taxi sharing is one of the best ways to better utilize the empty seats in most cars and taxis, thus decreasing energy consumption and transport costs. It can serve areas not covered by a public transit system and act as a transit feeder service. Taxi sharing is also capable of serving one-time trips, not only recurrent commute trips or scheduled trips. In this study, we describe the requirements and parameters that we need to establish a useful real-time ride sharing system for an urban area. The parameters and requirements of this study can be used in any urban area.

Keywords: transportation, intelligent transportation systems, ride-sharing, taxi sharing

Procedia PDF Downloads 427
16343 Audience Engagement in UNHCR Social Media Stories of Displaced People: Emotion and Reason in a Global Public Debate

Authors: Soraya Tharani

Abstract:

Social media has changed how public opinion is shaped by enabling more diversified and inclusive participation of audiences. New online forums provide spaces in which governments, NGOs and other organizations can create content and receive feedback. These forums are sites where debate can constitute public opinion. Studies of audience engagement can give an understanding of how different voices from the civil society participate in debates and how discussions can reinforce or bring into question established societal beliefs. The UN’s refugee agency, UNHCR, produces audio-visual stories about displaced people for global audiences on social media platforms. The availability of many views in these forums can give insight into how dialogues regarding transnational issues are formed. The public sphere, as defined by Habermas, is a discursive arena where reasoned debate can take place. Habermas’ concept is combined with theories on celebrity advocacy, and discussions about the role and effect celebrities have in raising public awareness for humanitarian issues. The personal and public lives of celebrities often create emotional engagement from their fans and other audiences. In this study, quantitative and qualitative methods have been used on YouTube comments for uncovering how emotion and reason are constituted in a global public debate on celebrity endorsed UNHCR stories of displaced people. The study shows that engagement intensity is not equally distributed between comment threads; comments presented as facts or emotional claims are often supported by recourse to intertextuality, and specific linguistic strategies are used to put forward emotional and reasoned claims regarding individual and group identities. The findings from this research aim to contribute to an understanding of audience engagement on issues of human survival and solidarity in a global social media public sphere.

Keywords: emotions, engagement, global public sphere, linguistic strategies, reason, refugees, social media, UNHCR

Procedia PDF Downloads 140
16342 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 161
16341 Aggression Related Trauma and Coping among University Students, Exploring Emotional Intelligence Applications on Coping with Aggression Related Trauma

Authors: Asanka Bulathwatta

Abstract:

This Study tries to figure out the role of emotional Intelligence for developing coping strategies among adolescents who face traumatic events. Late adolescence students who have enrolled into the University education (Bachelor students/first-year students) would be selected as the sample. University education is an important stage of students’ academic life. Therefore, all students need to develop their competencies to attain the goal of passing examinations and also to developing their wisdom related to the scientific knowledge they gathered through their academic life. Study to be conducted in a cross-cultural manner and it will be taking place in Germany and Sri Lanka. The sample will be consisting of 200 students from each country. Late adolescence is a critical period of the human being as it is foot step in their life which acquiring the emotional and social qualities in their social life. There are many adolescents who have affected by aggression related traumatic events during their lifespan but have not been identified or treated. More specifically, there are numerous burning issues within the first year of the university students namely, ragging done by seniors to juniors, bulling, invalidation and issues raise based on attitudes changes and orientation issues. Those factors can be traumatic for both their academic and day to day lifestyle. Identifying the students who are with emotional damages and their resiliency afterward the aggression related traumas and effective rehabilitation from the traumatic events is immensely needed in order to facilitate university students for their academic achievements and social life within the University education. Research findings in Germany show that students shows more interpersonal traumas, life-threatening illnesses and death of someone related are common in German sample.

Keywords: emotional intelligence, agression, trauma, coping

Procedia PDF Downloads 472
16340 The Study of ZigBee Protocol Application in Wireless Networks

Authors: Ardavan Zamanpour, Somaieh Yassari

Abstract:

ZigBee protocol network was developed in industries and MIT laboratory in 1997. ZigBee is a wireless networking technology by alliance ZigBee which is designed to low board and low data rate applications. It is a Protocol which connects between electrical devises with very low energy and cost. The first version of IEEE 802.15.4 which was formed ZigBee was based on 2.4GHZ MHZ 912MHZ 868 frequency band. The name of system is often reminded random directions that bees (BEES) traversing during pollination of products. Such as alloy of the ways in which information packets are traversed within the mesh network. This paper aims to study the performance and effectiveness of this protocol in wireless networks.

Keywords: ZigBee, protocol, wireless, networks

Procedia PDF Downloads 369
16339 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 239
16338 An Interactive Methodology to Demonstrate the Level of Effectiveness of the Synthesis of Local-Area Networks

Authors: W. Shin, Y. Kim

Abstract:

This study focuses on disconfirming that wide-area networks can be made mobile, highly-available, and wireless. This methodological test shows that IPv7 and context-free grammar are mismatched. In the cases of robots, a similar tendency is also revealed. Further, we also prove that public-private key pairs could be built embedded, adaptive, and wireless. Finally, we disconfirm that although hash tables can be made distributed, interposable, and autonomous, XML and DNS can interfere to realize this purpose. Our experiments soon proved that exokernelizing our replicated Knesis keyboards was more significant than interrupting them. Our experiments exhibited degraded average sampling rate.

Keywords: collaborative communication, DNS, local-area networks, XML

Procedia PDF Downloads 187
16337 The Role of China’s Rural Policies on the Changing the Rural Area in China: Changfu Village(China) Case

Authors: Zheng Lulin, Xiong Guoping

Abstract:

In recent years, agriculture, rural development, and peasants are among the top concerns and priorities of the Chinese Government. Several related issues have been paid many attentions by academic communities, including the impacts of corresponding policies on the rural villages, the mechanisms of these impacts, and the future development of rural society. However, most of the researchers focus on single rural policy instead of integral rural policy system. Hence, this dissertation focused on the mechanisms of policies’ influence on rural changes through a case study from Changfu Village in central Guangxi Province, China, to propose the optimized suggestions for rural development. Forty-three relevant pivotal policies of significant influence on rural development are summarized from literature and documents, covering five aspects of agricultural production, rural living security, open rural markets, rural household registration systems, and farmland transferring. Besides, having been live in this area for more than 20 years, researchers obtain the basic information about changing the social connection between citizens and villagers, the habitat of villagers by years of informal interviews. Furthermore, more than 200 questionnaires are given to villagers to analyze the changing of their personal and family information. The summary of rural policies revealed that the development trend of public rural policies followed the U-shape curve and these policies are characterized by economic intentions and operative economy. Report of questionnaires and interviews show that the development of rural economy was promoted greatly by public policies. Firstly, Social communication and rural culture were affected to a certain extent. Secondly, the educational level of rural individuals was significantly enhanced, whereas the quality of population had limited progress. Finally, the freedom of occupational choice for rural individuals into cities was greater than before, but still restricted by the class solidification of social background, resulting in more obstacles for rural individuals to settle down in cities. From what we discuss about, we may reach the conclusion on several perspectives: Firstly, the impact of the rural policies has a significant role in promoting the economy development of the rural area. However, separations between rural and urban area are still a major problem since rural policy contributed little to improve the rural population quality. Therefore, in the future, providing high quality educational facilities including teachers, libraries, and opportunities of broadening their knowledge base are key issues of future rural policy. Secondly, the development of rural economy would be a lack of driving force for further improvement owning to the fact that working hard couldn’t get more improvement. In the future, public policies should support the rural development of culture, technology, and personal qualities to create favorable social environment for the free increase of rural population.

Keywords: changing of rural area, rural development of China, rural policy, social environment

Procedia PDF Downloads 429
16336 Impact of Organic Farming on Soil Fertility and Microbial Activity

Authors: Menuka Maharjan

Abstract:

In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.

Keywords: organic farming, soil fertility, micobial biomas, food security

Procedia PDF Downloads 176
16335 Energy Efficient Microgrid Design with Hybrid Power Systems

Authors: Pedro Esteban

Abstract:

Today’s electrical networks, including microgrids, are evolving into smart grids. The smart grid concept brings the idea that the power comes from various sources (continuous or intermittent), in various forms (AC or DC, high, medium or low voltage, etc.), and it must be integrated into the electric power system in a smart way to guarantee a continuous and reliable supply that complies with power quality and energy efficiency standards and grid code requirements. This idea brings questions for the different players like how the required power will be generated, what kind of power will be more suitable, how to store exceeding levels for short or long-term usage, and how to combine and distribute all the different generation power sources in an efficient way. To address these issues, there has been lots of development in recent years on the field of on-grid and off-grid hybrid power systems (HPS). These systems usually combine one or more modes of electricity generation together with energy storage to ensure optimal supply reliability and high level of energy security. Hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.

Keywords: microgrids, hybrid power systems, energy storage, power quality improvement

Procedia PDF Downloads 142
16334 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 480
16333 Impact of Implementation of Right to Education in Pakistan

Authors: Rukhsar Ahmed, Jawed Aziz Masudi

Abstract:

In the present study, an attempt has been made about the right to an education in Pakistan. The research is the focus in respect of International Law Article 26 of the Universal Declaration of Human Rights. The main motivation behind getting great training is, as a rule, decent resident and afterward being effective in close to home and expert life. We are fragmented without decent instruction since training makes us the right mastermind and right chief. In such a focused world, instruction has turned into a need for people after sustenance, dress and haven. It can give answers for all issues; it advances great propensities and mindfulness about defilement, fear-mongering, and other social issues among us.

Keywords: education, right to education, human right, universal declaration, law

Procedia PDF Downloads 162
16332 Free and Open Source Licences, Software Programmers, and the Social Norm of Reciprocity

Authors: Luke McDonagh

Abstract:

Over the past three decades, free and open source software (FOSS) programmers have developed new, innovative and legally binding licences that have in turn enabled the creation of innumerable pieces of everyday software, including Linux, Mozilla Firefox and Open Office. That FOSS has been highly successful in competing with 'closed source software' (e.g. Microsoft Office) is now undeniable, but in noting this success, it is important to examine in detail why this system of FOSS has been so successful. One key reason is the existence of networks or communities of programmers, who are bound together by a key shared social norm of 'reciprocity'. At the same time, these FOSS networks are not unitary – they are highly diverse and there are large divergences of opinion between members regarding which licences are generally preferable: some members favour the flexible ‘free’ or 'no copyleft' licences, such as BSD and MIT, while other members favour the ‘strong open’ or 'strong copyleft' licences such as GPL. This paper argues that without both the existence of the shared norm of reciprocity and the diversity of licences, it is unlikely that the innovative legal framework provided by FOSS would have succeeded to the extent that it has.

Keywords: open source, copyright, licensing, copyleft

Procedia PDF Downloads 373
16331 Understanding the Operational Challenges of Social Enterprises: A Review of Real-Life Issues in the Context of Developing Countries

Authors: Humayun Murshed

Abstract:

There is growing importance of ‘social enterprise’ among the researchers and policy makers around the globe. Such enterprises have been viewed as alternative means for addressing the concerns relating to financing of corporate enterprises and social empowerment. This, some cases, has led to relatively unrealistic and higher level of expectations among policy makers and the members of the society at large. There is a general perception among different social actors that these enterprises provide universal and magic solution towards employment generation, and thus resulting in eradicating poverty, and ensuring equitable distribution of income and wealth. However, in many cases, these enterprises find a challenging journey in terms of prevailing market structure, socio-political environment, and unrealistic perception and expectations of social participants. This paper is focused on reviewing case studies based on empirical research and information from secondary sources and geared to looking at the challenges that social enterprises face. The research will draw the experience primarily from the developing countries’ perspective by adopting case study methodology. A tentative action plan will be suggested for further review by the policy makers and researchers in this growing arena of discipline. This research will attempt to highlight the myths and realities surrounding the operation of social enterprises.

Keywords: social enterprises, social empowerment, economic development, financing need

Procedia PDF Downloads 181
16330 Assessment of Image Databases Used for Human Skin Detection Methods

Authors: Saleh Alshehri

Abstract:

Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.

Keywords: image databases, image processing, pattern recognition, neural networks

Procedia PDF Downloads 271
16329 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 227
16328 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 158
16327 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger

Authors: Tracy Smith-Carrier

Abstract:

In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.

Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights

Procedia PDF Downloads 117
16326 Community Development and Empowerment

Authors: Shahin Marjan Nanaje

Abstract:

The present century is the time that social worker faced complicated issues in the area of their work. All the focus are on bringing change in the life of those that they live in margin or live in poverty became the cause that we have forgotten to look at ourselves and start to bring change in the way we address issues. It seems that there is new area of needs that social worker should response to that. In need of dialogue and collaboration, to address the issues and needs of community both individually and as a group we need to have new method of dialogue as tools to reach to collaboration. The social worker as link between community, organization and government play multiple roles. They need to focus in the area of communication with new ability, to transfer all the narration of the community to those organization and government and vice versa. It is not relate only in language but it is about changing dialogue. Migration for survival by job seeker to the big cities created its own issues and difficulty and therefore created new need. Collaboration is not only requiring between government sector and non-government sectors but also it could be in new way between government, non-government and communities. To reach to this collaboration we need healthy, productive and meaningful dialogue. In this new collaboration there will not be any hierarchy between members. The methodology that selected by researcher were focusing on observation at the first place, and used questionnaire in the second place. Duration of the research was three months and included home visits, group discussion and using communal narrations which helped to bring enough evidence to understand real need of community. The sample selected randomly was included 70 immigrant families which work as sweepers in the slum community in Bangalore, Karnataka. The result reveals that there is a gap between what a community is and what organizations, government and members of society apart from this community think about them. Consequently, it is learnt that to supply any service or bring any change to slum community, we need to apply new skill to have dialogue and understand each other before providing any services. Also to bring change in the life of those marginal groups at large we need to have collaboration as their challenges are collective and need to address by different group and collaboration will be necessary. The outcome of research helped researcher to see the area of need for new method of dialogue and collaboration as well as a framework for collaboration and dialogue that were main focus of the paper. The researcher used observation experience out of ten NGO’s and their activities to create framework for dialogue and collaboration.

Keywords: collaboration, dialogue, community development, empowerment

Procedia PDF Downloads 588
16325 Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

Authors: Ying Su, Morgan C. Wang

Abstract:

Long-term time series forecasting is an important research area for automated machine learning (AutoML). Currently, forecasting based on either machine learning or statistical learning is usually built by experts, and it requires significant manual effort, from model construction, feature engineering, and hyper-parameter tuning to the construction of the time series model. Automation is not possible since there are too many human interventions. To overcome these limitations, this article proposed to use recurrent neural networks (RNN) through the memory state of RNN to perform long-term time series prediction. We have shown that this proposed approach is better than the traditional Autoregressive Integrated Moving Average (ARIMA). In addition, we also found it is better than other network systems, including Fully Connected Neural Networks (FNN), Convolutional Neural Networks (CNN), and Nonpooling Convolutional Neural Networks (NPCNN).

Keywords: automated machines learning, autoregressive integrated moving average, neural networks, time series analysis

Procedia PDF Downloads 105
16324 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 318
16323 Youth and International Environmental Voluntary Initiatives: A Case Study of IGreen Project by AIESEC in Bandung

Authors: Yoel Agustheo Rinding

Abstract:

Globalization has made physical borders between countries become more obscure. Due to the free flow of information between countries, issue for instance, environment has become global concern. The concern has grown as the result of endless campaign made by most of the non-governmental organizations (NGOs). By means of this situation, international voluntary initiatives on environmental issues have appeared to be popular among world’s society today especially for youth. AIESEC as international non-governmental organization (INGO) through IGreen Project has initiated environmental international voluntary initiatives concerning in environmental awareness of Bandung’s citizen. Bandung itself is still struggling on solving flood as one of its major problems regardless the fact that Bandung is one of the most developed cities in Indonesia. This paper would like to discuss on how globalization affects AIESEC as an INGO in order to spread its influence and also on how it could build international voluntary initiatives networks. Afterwards, author would like to elaborate how both AIESEC and youth perceive the importance of international voluntary initiatives by using cosmopolitanism approach. In order to get a deep understanding of how this activity works, this paper also would like to explain regarding the management, expected outcomes, and the real impacts of IGreen project towards Bandung. In the end of this paper, author would like to propose solutions on how to utilize international voluntary initiatives as a solution for environmental issues nowadays.

Keywords: AIESEC, cosmopolitanism, environmental issues, globalization, IGreen project, international environmental voluntary initiatives, INGO, youth

Procedia PDF Downloads 222
16322 Socio-Economic Child’S Wellbeing Impasse in South Africa: Towards a Theory-Based Solution Model

Authors: Paulin Mbecke

Abstract:

Research Issue: Under economic constraints, socio-economic conditions of households worsen discounting child’s wellbeing to the bottom of many governments and households’ priority lists. In such situation, many governments fail to rebalance priorities in providing services such as education, housing and social security which are the prerequisites for the wellbeing of children. Consequently, many households struggle to respond to basic needs especially those of children. Although economic conditions play a crucial role in creating prosperity or poverty in households and therefore the wellbeing or misery for children; they are not the sole cause. Research Insights: The review of the South African Index of Multiple Deprivation and the South African Child Gauge establish the extent to which economic conditions impact on the wellbeing or misery of children. The analysis of social, cultural, environmental and structural theories demonstrates that non-economic factors contribute equally to the wellbeing or misery of children, yet, they are disregarded. In addition, the assessment of a child abuse database proves a weak correlation between economic factors (prosperity or poverty) and child’s wellbeing or misery. Theoretical Implications: Through critical social research theory and modelling, the paper proposes a Theory-Based Model that combines different factors to facilitate the understanding of child’s wellbeing or misery. Policy Implications: The proposed model assists in broad policy and decision making and reviews processes in promoting child’s wellbeing and in preventing, intervening and managing child’s misery with regard to education, housing, and social security.

Keywords: children, child’s misery, child’s wellbeing, household’s despair, household’s prosperity

Procedia PDF Downloads 284
16321 Anomaly Detection with ANN and SVM for Telemedicine Networks

Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos

Abstract:

In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.

Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines

Procedia PDF Downloads 357
16320 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 131
16319 Analyzing Keyword Networks for the Identification of Correlated Research Topics

Authors: Thiago M. R. Dias, Patrícia M. Dias, Gray F. Moita

Abstract:

The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and distribution of these works. Faced with this, there is a growing interest in understanding how scientific research has evolved, in order to explore this knowledge to encourage research groups to become more productive. Therefore, the objective of this work is to explore repositories containing data from scientific publications and to characterize keyword networks of these publications, in order to identify the most relevant keywords, and to highlight those that have the greatest impact on the network. To do this, each article in the study repository has its keywords extracted and in this way the network is  characterized, after which several metrics for social network analysis are applied for the identification of the highlighted keywords.

Keywords: bibliometrics, data analysis, extraction and data integration, scientometrics

Procedia PDF Downloads 257