Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1278

Search results for: socially engineered attacks

408 Prevalence of Selected Cardiovascular Risk Factors Obesity among University of Venda Staff

Authors: Avhasei Dorothy Rasifudi, Josephine Mandizha

Abstract:

Cardiovascular risk factors continue to be the leading cause of death in the majority of developed and developing countries. In 2011, the World Health Organization reported that every year an estimated 17 million people globally die of CVD, representing 30% of all global deaths, particularly caused by heart attacks and strokes. The purpose of the study was to determine and describe the prevalence of selected cardiovascular risk factors among university of Venda staff. A cross-sectional study was conducted among 100 staff aged 20-65 years. The anthropometric measurements were conducted in accordance to and with standardized procedures advocated by the International Society for the Advanced Kinanthropometry. Weight, Height, waist circumference and hip circumference were measured for calculation of body mass index and waist-hip ratio. Blood pressure was measured using a Heine cuff and sphygmomanometer. Questionnaire was administered to gather demographic details and cardiovascular risk factors of hypertension and obesity. Data were analyzed using mean and standard deviation. The parameter t-test was applied to test significance level at p ≤ 0.05 between sexes. The statistical significance was set at p ≤ 0.05. The prevalence of hypertension was 23% with the highest prevalence amongst those aged 40 years and above. Factors found to be to be significantly associated with hypertension were gender, age, physical inactivity and family history. Prevalence of obesity was 43%, with the highest prevalence among those aged 40 years. The factors associated with obesity were diet, age and physical activity. The prevalence of hypertension and obesity in the study were high.

Keywords: cardiovascular, prevalence, risk factors, staff

Procedia PDF Downloads 277
407 A Study on the Impact of Covid-19 on Primary Healthcare Workers in Ekiti State, South-West Nigeria

Authors: Adeyinka Adeniran, Omowunmi Bakare, Esther Oluwole, Florence Chieme, Temitope Durojaiye, Modupe Akinyinka, Omobola Ojo, Babatunde Olujobi, Marcus Ilesanmi, Akintunde Ogunsakin

Abstract:

Introduction: Globally, COVID-19 has greatly impacted the human race physically, socially, mentally, and economically. However, healthcare workers seemed to bear the greatest impact. The study, therefore, sought to assess the impact of COVID-19 on the primary healthcare workers in Ekiti, South-west Nigeria. Methods: The study was a cross-sectional descriptive study using a quantitative data collection method of 716 primary healthcare workers in Ekiti state. Respondents were selected using an online convenience sampling method via their social media platforms. Data was collected, collated, and analyzed using SPSS version 25 software and presented as frequency tables, mean and standard deviation. Bivariate and multivariate analyses were conducted using a t-test, and the level of statistical significance was set at p<0.05. Results: Less than half (47.1%) of respondents were between 41-50 age group and a mean age of 44.4+6.4SD. A majority (89.4%) were female, and almost all (96.2%) were married. More than (90%) had ever heard of Coronavirus, and (85.8%) had to spend more money on activities of daily living such as transportation (90.1%), groceries (80.6%), assisting relations (95.8%) and sanitary measures (disinfection) at home (95.0%). COVID-19 had a huge negative impact on about (89.7%) of healthcare workers, with a mean score of 22+4.8. Conclusion: COVID-19 negatively impacted the daily living and professional duties of primary healthcare workers, which reflected their psychological, physical, social, and economic well-being. Disease outbreaks are unlikely to disappear in the near future. Hence, global proactive interventions and homegrown measures should be adopted to protect healthcare workers and save lives.

Keywords: Covid-19, health workforce, primary health care, health systems, depression

Procedia PDF Downloads 65
406 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 79
405 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 78
404 High-Resolution Flood Hazard Mapping Using Two-Dimensional Hydrodynamic Model Anuga: Case Study of Jakarta, Indonesia

Authors: Hengki Eko Putra, Dennish Ari Putro, Tri Wahyu Hadi, Edi Riawan, Junnaedhi Dewa Gede, Aditia Rojali, Fariza Dian Prasetyo, Yudhistira Satya Pribadi, Dita Fatria Andarini, Mila Khaerunisa, Raditya Hanung Prakoswa

Abstract:

Catastrophe risk management can only be done if we are able to calculate the exposed risks. Jakarta is an important city economically, socially, and politically and in the same time exposed to severe floods. On the other hand, flood risk calculation is still very limited in the area. This study has calculated the risk of flooding for Jakarta using 2-Dimensional Model ANUGA. 2-Dimensional model ANUGA and 1-Dimensional Model HEC-RAS are used to calculate the risk of flooding from 13 major rivers in Jakarta. ANUGA can simulate physical and dynamical processes between the streamflow against river geometry and land cover to produce a 1-meter resolution inundation map. The value of streamflow as an input for the model obtained from hydrological analysis on rainfall data using hydrologic model HEC-HMS. The probabilistic streamflow derived from probabilistic rainfall using statistical distribution Log-Pearson III, Normal and Gumbel, through compatibility test using Chi Square and Smirnov-Kolmogorov. Flood event on 2007 is used as a comparison to evaluate the accuracy of model output. Property damage estimations were calculated based on flood depth for 1, 5, 10, 25, 50, and 100 years return period against housing value data from the BPS-Statistics Indonesia, Centre for Research and Development of Housing and Settlements, Ministry of Public Work Indonesia. The vulnerability factor was derived from flood insurance claim. Jakarta's flood loss estimation for the return period of 1, 5, 10, 25, 50, and 100 years, respectively are Rp 1.30 t; Rp 16.18 t; Rp 16.85 t; Rp 21.21 t; Rp 24.32 t; and Rp 24.67 t of the total value of building Rp 434.43 t.

Keywords: 2D hydrodynamic model, ANUGA, flood, flood modeling

Procedia PDF Downloads 258
403 Constructing the Cult of the Self: on White, Working-class Males And The Neoliberalisation Of Identities – An Autoethnographic Study

Authors: Dane Morace-Court

Abstract:

This paper offers a reflective and reflexive examination of the lived experience of a group of young, white, working-class males engaging in secondary-education in England at a time when this population is widely recognised as the lowest attaining ethnic group within British schools. The focus of the paper is an exploration of the development of identities and aspirations, alongside contemporary demographic and ideological shifts in the British population, in their intersection with neoliberal education policies and the emerging ideological conflict between identity conservatism and liberalism. The construction and performance of intersecting social-class, gender, ethnic and national identities is considered as well as the process through which socially constructed narratives inform identities, values, and aspirations. Evocative autoethnography is then employed to offer reflections on working-class habitus and, in particular, classed and gendered codes that underpin expectations of manhood in post-industrial culture within an education system which seemingly requires the abandonment of aspects of a working-class background. Findings from the study identify the emergence of a culture of hyper-individualisation amongst white, working-class males in schools and a belief in the meritocratic ideologies of the New Right. In particular, the breakdown of the social contract, including notions of political and civic responsibility, coupled with the symbolic violence perpetrated against working-class culture and solidarity in British schools, have all informed the construction of a working-class masculinity which values the individual entrepreneur over the collective, and depoliticizes students to an extent where a focus on the spectacle and performance of success has replaced individual and collective investment in community.

Keywords: education, identity, masculinity, neoliberalism, working-class, intersectionality, autoethnography

Procedia PDF Downloads 92
402 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 57
401 Path Planning for Unmanned Aerial Vehicles in Constrained Environments for Locust Elimination

Authors: Aadiv Shah, Hari Nair, Vedant Mittal, Alice Cheeran

Abstract:

Present-day agricultural practices such as blanket spraying not only lead to excessive usage of pesticides but also harm the overall crop yield. This paper introduces an algorithm to optimize the traversal of an unmanned aerial vehicle (UAV) in constrained environments. The proposed system focuses on the agricultural application of targeted spraying for locust elimination. Given a satellite image of a farm, target zones that are prone to locust swarm formation are detected through the calculation of the normalized difference vegetation index (NDVI). This is followed by determining the optimal path for traversal of a UAV through these target zones using the proposed algorithm in order to perform pesticide spraying in the most efficient manner possible. Unlike the classic travelling salesman problem involving point-to-point optimization, the proposed algorithm determines an optimal path for multiple regions, independent of its geometry. Finally, the paper explores the idea of implementing reinforcement learning to model complex environmental behaviour and make the path planning mechanism for UAVs agnostic to external environment changes. This system not only presents a solution to the enormous losses incurred due to locust attacks but also an efficient way to automate agricultural practices across the globe in order to improve farmer ergonomics.

Keywords: locust, NDVI, optimization, path planning, reinforcement learning, UAV

Procedia PDF Downloads 231
400 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 130
399 Social Sustainability and Affordability of the Transitional Housing Scheme in Hong Kong

Authors: Tris Kee

Abstract:

This research investigates social sustainability factors in transitional housing projects and their impact on fostering healthy living environments that promote physical activity and social interaction for residents. Social sustainability is integral to individual health and well-being, as emphasized by Goal 11 of the 2030 Agenda for Sustainable Development, which highlights the importance of safe, affordable, and accessible transport systems, green spaces, and public spaces catering to vulnerable populations' needs. Communal spaces in urban environments are essential for fostering social sustainability, as they serve as settings for physical activities and social interactions among diverse socio-economic groups. Factors such as neighborhood social atmosphere, historical context, social disparity, and mobility can influence the relationship between existing and transitional communities. Mental health effects can be measured through housing segregation, mobility and accessibility, and housing tenure. A significant research gap exists in understanding the living environment of transitional housing in Hong Kong and the social sustainability factors affecting residents' mental and physical health. To address this gap, our study employs a mixed-methods approach combining survey questionnaires and interviews to gather both quantitative and qualitative data. This methodology will provide comprehensive insights into residents' experiences and perceptions. Our research's main contribution is identifying key social sustainability factors in transitional housing and their impact on residents' well-being, informing policy-making and the creation of inclusive, healthy living environments. By addressing this research gap, we aim to provide valuable insights for future housing projects, ultimately promoting the development of socially sustainable transitional communities.

Keywords: social sustainablity, affordable housing, transitional housing, high density housing

Procedia PDF Downloads 61
398 Rejuvenating a Space into World Class Environment through Conservation of Heritage Architecture

Authors: Abhimanyu Sharma

Abstract:

India is known for its cultural heritage. As the country is rich in diversity along its length and breadth, the state of Jammu & Kashmir is world famous for the beautiful tourist destinations in the Kashmir region of the state. However, equally destined destinations are also located in Jammu region of the said state. For most of the time in last 50-60 years, the prime focus of development was centered around Kashmir region. But now due to an ever increase in globalization, the focus is decentralizing throughout the country. Pertinently, the potential of Jammu Region needs to be incorporated into the world tourist map in particular. One such spot in the Jammu region of the state is a place called ‘Mubarak Mandi’ – the palace with the royal residence of the Maharaja of Jammu & Kashmir from the Dogra Dynasty, is located in the heart of Jammu city (the winter capital of the state). Since the place is destined with a heritage importance but yet lack the supporting infrastructure to attract the national tourist in general and worldwide tourist at large. For such places, conservation and restoration of the existing structures are the potential tools to overcome the present limiting nature of the place. The rejuvenation of this place through potential and dynamic conservation techniques is targeted through this paper. This paper deals with developing and restoring the areas within the whole campus with appropriate building materials, conservation techniques, etc. to promote a great number of visitors by developing it into a prioritised tourist attraction point. Major thrust shall be on studying the criteria’s for developing the place considering the psychological effect needed to create a socially interactive environment. Additionally, thrust shall be on the spatial elements that will aid in creating a common platform for all kinds of tourists. Accordingly, different conservation guidelines (or model) shall be targeted through this paper so that this Jammu region shall also be an equally contributor to the tourist graph of the country as the Kashmir part is.

Keywords: conservation, heritage architecture, rejuvenating, restoration

Procedia PDF Downloads 281
397 Influence of Plant Cover and Redistributing Rainfall on Green Roof Retention and Plant Drought Stress

Authors: Lubaina Soni, Claire Farrell, Christopher Szota, Tim D. Fletcher

Abstract:

Green roofs are a promising engineered ecosystem for reducing stormwater runoff and restoring vegetation cover in cities. Plants can contribute to rainfall retention by rapidly depleting water in the substrate; however, this increases the risk of plant drought stress. Green roof configurations, therefore, need to provide plants the opportunity to efficiently deplete the substrate but also avoid severe drought stress. This study used green roof modules placed in a rainout shelter during a six-month rainfall regime simulated in Melbourne, Australia. Rainfall was applied equally with an overhead irrigation system on each module. Aside from rainfall, modules were under natural climatic conditions, including temperature, wind, and radiation. A single species, Ficinia nodosa, was planted with five different treatments and three replicates of each treatment. In this experiment, we tested the impact of three plant cover treatments (0%, 50% and 100%) on rainfall retention and plant drought stress. We also installed two runoff zone treatments covering 50% of the substrate surface for additional modules with 0% and 50% plant cover to determine whether directing rainfall resources towards plant roots would reduce drought stress without impacting rainfall retention. The retention performance for the simulated rainfall events was measured, quantifying all components for hydrological performance and survival on green roofs. We found that evapotranspiration and rainfall retention were similar for modules with 50% and 100% plant cover. However, modules with 100% plant cover showed significantly higher plant drought stress. Therefore, planting at a lower cover/density reduced plant drought stress without jeopardizing rainfall retention performance. Installing runoff zones marginally reduced evapotranspiration and rainfall retention, but by approximately the same amount for modules with 0% and 50% plant cover. This indicates that reduced evaporation due to the installation of the runoff zones likely contributed to reduced evapotranspiration and rainfall retention. Further, runoff occurred from modules with runoff zones faster than those without, indicating that we created a faster pathway for water to enter and leave the substrate, which also likely contributed to lower overall evapotranspiration and retention. However, despite some loss in retention performance, modules with 50% plant cover installed with runoff zones showed significantly lower drought stress in plants compared to those without runoff zones. Overall, we suggest that reducing plant cover represents a simple means of optimizing green roof performance but creating runoff zones may reduce plant drought stress at the cost of reduced rainfall retention.

Keywords: green roof, plant cover, plant drought stress, rainfall retention

Procedia PDF Downloads 104
396 Optimization Based Extreme Learning Machine for Watermarking of an Image in DWT Domain

Authors: RAM PAL SINGH, VIKASH CHAUDHARY, MONIKA VERMA

Abstract:

In this paper, we proposed the implementation of optimization based Extreme Learning Machine (ELM) for watermarking of B-channel of color image in discrete wavelet transform (DWT) domain. ELM, a regularization algorithm, works based on generalized single-hidden-layer feed-forward neural networks (SLFNs). However, hidden layer parameters, generally called feature mapping in context of ELM need not to be tuned every time. This paper shows the embedding and extraction processes of watermark with the help of ELM and results are compared with already used machine learning models for watermarking.Here, a cover image is divide into suitable numbers of non-overlapping blocks of required size and DWT is applied to each block to be transformed in low frequency sub-band domain. Basically, ELM gives a unified leaning platform with a feature mapping, that is, mapping between hidden layer and output layer of SLFNs, is tried for watermark embedding and extraction purpose in a cover image. Although ELM has widespread application right from binary classification, multiclass classification to regression and function estimation etc. Unlike SVM based algorithm which achieve suboptimal solution with high computational complexity, ELM can provide better generalization performance results with very small complexity. Efficacy of optimization method based ELM algorithm is measured by using quantitative and qualitative parameters on a watermarked image even though image is subjected to different types of geometrical and conventional attacks.

Keywords: BER, DWT, extreme leaning machine (ELM), PSNR

Procedia PDF Downloads 294
395 Predicting Aggregation Propensity from Low-Temperature Conformational Fluctuations

Authors: Hamza Javar Magnier, Robin Curtis

Abstract:

There have been rapid advances in the upstream processing of protein therapeutics, which has shifted the bottleneck to downstream purification and formulation. Finding liquid formulations with shelf lives of up to two years is increasingly difficult for some of the newer therapeutics, which have been engineered for activity, but their formulations are often viscous, can phase separate, and have a high propensity for irreversible aggregation1. We explore means to develop improved predictive ability from a better understanding of how protein-protein interactions on formulation conditions (pH, ionic strength, buffer type, presence of excipients) and how these impact upon the initial steps in protein self-association and aggregation. In this work, we study the initial steps in the aggregation pathways using a minimal protein model based on square-well potentials and discontinuous molecular dynamics. The effect of model parameters, including range of interaction, stiffness, chain length, and chain sequence, implies that protein models fold according to various pathways. By reducing the range of interactions, the folding- and collapse- transition come together, and follow a single-step folding pathway from the denatured to the native state2. After parameterizing the model interaction-parameters, we developed an understanding of low-temperature conformational properties and fluctuations, and the correlation to the folding transition of proteins in isolation. The model fluctuations increase with temperature. We observe a low-temperature point, below which large fluctuations are frozen out. This implies that fluctuations at low-temperature can be correlated to the folding transition at the melting temperature. Because proteins “breath” at low temperatures, defining a native-state as a single structure with conserved contacts and a fixed three-dimensional structure is misleading. Rather, we introduce a new definition of a native-state ensemble based on our understanding of the core conservation, which takes into account the native fluctuations at low temperatures. This approach permits the study of a large range of length and time scales needed to link the molecular interactions to the macroscopically observed behaviour. In addition, these models studied are parameterized by fitting to experimentally observed protein-protein interactions characterized in terms of osmotic second virial coefficients.

Keywords: protein folding, native-ensemble, conformational fluctuation, aggregation

Procedia PDF Downloads 345
394 Digital Female Entrepreneurs in South Africa: Drivers and Relationship to Economic Development

Authors: C. van den Berg, C. Pokpas

Abstract:

Popular discourse touts entrepreneurship as a universal solution for underdevelopment, unemployment, and poverty. Moreover, claims are made that women and other disadvantaged groups can achieve material and personal success through digital entrepreneurship. This paper examines the potential of digital technology in entrepreneurial ventures to stimulate economic growth for marginalized groups and communities. Although digital entrepreneurship is hailed as a means to empower under-resourced and socially marginalized people, these opportunities still exist within the confines of existing social and cultural practices. The perspectives of female digital entrepreneurs in developing countries are sorely understudied, particularly concerning an understanding of the complex underlying socio-cultural factors impeding women’s entrepreneurial behaviors. This qualitative study, guided by a feminist phenomenological perspective, focused on the experiences of digital female entrepreneurs in the Western Cape of South Africa. Data were collected via semi-structured interviews and analyzed through the interpretative phenomenological analysis (IPA) approach to determine the relationships between digital entrepreneurship and structural and agential enabling conditions. Findings show that digital entrepreneurship is not a panacea for economic growth in marginalized groups and communities and highlight the importance of addressing socio-cultural gender inequality to enable successful entrepreneurial activity. The paper concludes with recommendations for specialized training initiatives aimed at female entrepreneurs that address internalized constraints and barriers that keep women subservient and measures to shift gender and power beliefs. The outcome will benefit the stimulation of gender-specific public policies to develop a successful digital start-up ecosystem further.

Keywords: digital innovation, female digital entrepreneurs, feminist phenomenology, gender, marginalised communities

Procedia PDF Downloads 113
393 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications

Authors: Robyn White, Juan Bornman, Ensa Johnson

Abstract:

People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.

Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency

Procedia PDF Downloads 460
392 Understanding the Factors behind Graduate Employability in the United Arab Emirates

Authors: Mohammed Islam

Abstract:

Graduate employability is a well debated topic by governments, employers, and higher education institutes (HEI) across the world. Much of the focus of these debates have centred around the skills that graduates bring or should bring to the job market, a point echoed by United Arab Emirates (UAE) policy makers and employers. While some research has been carried out on graduates' employability skills, little or no attention has been paid to the forces at play in developing employability policy and its subsequent implementation. The focus of debate has been on a perceived skills gap rather than policy. Recognising a gap in the literature, this paper details a study of UAE employability policy development. Taking a social constructionist approach, this case study views policy as discursive and socially constructed through interactions with key stakeholders. It is within the myriad of interdependent socio-political factors and social practices, particularly power relationships, that this paper explores UAE policy on graduate employability. In doing so, this adds to the debate on graduate employability from the perspective of policy and explores its roots in the interaction between human activity and the ‘system’. Data was collected from two main sources: documentary review and semi-structured interviews. Policies and publicly stated rhetoric on graduate employability were analysed using Critical Discourse Analysis. Semi-structured interviews with representatives from policy makers, HEIs, and employers were reviewed through Thematic Analysis. The theoretical framework for the discussion of findings draws from social practice theories and highlights the factors at play in access to employment for UAE graduates. This case study presents a methodological approach to policy studies that can be applied beyond the context under investigation. Education policy researchers are provided with an opportunity to compare similarities and differences with their own specific contexts.

Keywords: critical discourse analysis, employability, methodology, policy, social constructionism

Procedia PDF Downloads 110
391 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 142
390 Voice Liveness Detection Using Kolmogorov Arnold Networks

Authors: Arth J. Shah, Madhu R. Kamble

Abstract:

Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.

Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection

Procedia PDF Downloads 14
389 Literature as a Strategic Tool to Conscientise Africans: An Attempt by Postcolonial Writers and Critics to Reverse the Socio-Economics Imbalances of Colonialism

Authors: Lutendo Nendauni

Abstract:

Colonialism breaks things, colonisers exploded native cultural solidarity, producing the spiritual confusion, psychic wounding, and economic exploitation of a new and dominated ‘other’. Colonialism as the cultural and economic exploitation began when the West defended in their seizure of foreign territories for the exploitation of its natural resources; this resulted in brutal socio-economic imbalances. The Western profited at the detriment of the weak Africa. However, colonialism has since passed, but the effects are still evident culturally, socially, and economically. This paper explored how postcolonial writers and critics attempt to reverse the socio-economic imbalances resulting from the fragmentation of colonialism, with a focus on the play 'I will Marry When I Want' by Ngugi wa Thiong’o and Ngugi wa Mirii, as a primary text. Using qualitative discourse-textual analysis as the research methodology, the researcher purposively extracts discourse segments from the text for analysis and interpretation. The findings reveal that Postcolonial critics and writers attempt to reverse the socio-economic effects of colonialism through various counter discourses; their literature is concerned with the destruction of colonised identity, the search for this identity, and its assertion. It is manifest in the text that writers offer corrective views about Africans; they stress that they write their literary texts to conscientise their fellow Africans. Postcolonial writers and critics argue that language is a carrier of culture and that the only way to break free from colonial influence is by not adopting a foreign language. They further through their poems, novels, plays, and music strategically shine the spotlight on the previously nameless and destitute people so that they can develop the human spirit’s desire to overcome defeat, socio-political deprivation, and isolation.

Keywords: colonialism, postcoloniality, critics, socio-economic imbalances

Procedia PDF Downloads 134
388 Engineering Education for Sustainable Development in China: Perceptions Bias between Experienced Engineers and Engineering Students

Authors: Liang Wang, Wei Zhang

Abstract:

Nowadays, sustainable development has increasingly become an important research topic of engineering education. Existing research on Engineering Education for Sustainable Development (EESD) has highlighted the importance of perceptions for ethical responsibility to address sustainable development in practice. However, whether and how the professional engineering experience affects those perceptions has not been proved, especially in a Chinese context. Our study fills this gap by investigating the perceptions bias of EESD between experienced engineers and engineering students. We specifically examined what EESD means for experienced engineers and engineering students using a triple-dimensional model to understand if there are obvious differences between the two groups. Our goal is to make the benefits of these experiences more accessible in school context. The data (n=438) came from a questionnaire created and adapted from previously published studies containing 288 students from mechanical or civil engineering and 150 civil engineers with rich working experience, and the questionnaire was distributed during Fall 2020. T-test was used to find the difference in different dimensions between the two groups. The statistical results show that there is a significant difference in the perceptions of EESD between experienced engineers and inexperienced engineering students in China. Experienced engineers tend to consider sustainable development from ecological, economic, and social perspectives, while engineering students' answers focus more on ecology and ignore economic and social dimensions to some extend. The findings provide empirical evidence that professional experience is helpful to cultivate the cognition and ability of sustainable development in engineering education. The results of this work indicate that more practical content should be added to engineering education to promote sustainable development. In addition, for the design of engineering courses and professional practice systems for sustainable development, we should not only pay attention to the ecological aspects but also emphasize the coordination of ecological, economic, and socially sustainable development (e.g., engineer's ethical responsibility).

Keywords: engineering education, sustainable development, experienced engineers, engineering students

Procedia PDF Downloads 93
387 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 284
386 Gender Discrimination and Wellbeing in Family Sphere Due to Male Migration and Remittances: A Study of Doaba Region of Punjab

Authors: Atinder Pal Kaur

Abstract:

A central characteristic of people is their apparent movement from one station to other for their sustenance. Human migration has become one of the most challenging issues faced by the world today. Migration represents an important dimension in world-wide setting; and remittances received by families constitute a major agent in integrating societies in the all over the world, both economically and socially. This paper is an attempt to explore the impact of male migration and remittances upon the family system. This paper brings out how the women play the role of head of the household and take all the economic decisions, but still faces discrimination in the family, that bring loneliness and emotional breakdown on their personal front. For the purpose of this study, data was collected using 30 interviews and 10 case studies in the Doaba region of Punjab. The respondents were classified into two age groups 20-35 years and above 40 years aged women whose husbands migrated abroad. The findings of this study revealed that even though the women were taking some of the economic decisions, but in majority of the cases the patriarchal structure still existed and power remained in the hands of their husbands or in-laws. It was found that women of different age groups reported differently in terms of authority that they have regarding remittances and its consequences in their emotional well-being. The distinction related to their participation in public and private spheres still exists and public spheres are mostly dominated by male members of the family. It can be concluded that freedom of women to take decision on their own is still restricted and they are subjugated to follow their husband or in-law’s opinion in matters related to both public and private spheres. However, old age group women enjoyed more independence and freedom to take decision in comparison to young age women. Loneliness and depression were more common in the young age respondent’s group than in old age women.

Keywords: gender discrimination, migration, patriarchal structure, remittances

Procedia PDF Downloads 249
385 Determining of the Performance of Data Mining Algorithm Determining the Influential Factors and Prediction of Ischemic Stroke: A Comparative Study in the Southeast of Iran

Authors: Y. Mehdipour, S. Ebrahimi, A. Jahanpour, F. Seyedzaei, B. Sabayan, A. Karimi, H. Amirifard

Abstract:

Ischemic stroke is one of the common reasons for disability and mortality. The fourth leading cause of death in the world and the third in some other sources. Only 1/3 of the patients with ischemic stroke fully recover, 1/3 of them end in permanent disability and 1/3 face death. Thus, the use of predictive models to predict stroke has a vital role in reducing the complications and costs related to this disease. Thus, the aim of this study was to specify the effective factors and predict ischemic stroke with the help of DM methods. The present study was a descriptive-analytic study. The population was 213 cases from among patients referring to Ali ibn Abi Talib (AS) Hospital in Zahedan. Data collection tool was a checklist with the validity and reliability confirmed. This study used DM algorithms of decision tree for modeling. Data analysis was performed using SPSS-19 and SPSS Modeler 14.2. The results of the comparison of algorithms showed that CHAID algorithm with 95.7% accuracy has the best performance. Moreover, based on the model created, factors such as anemia, diabetes mellitus, hyperlipidemia, transient ischemic attacks, coronary artery disease, and atherosclerosis are the most effective factors in stroke. Decision tree algorithms, especially CHAID algorithm, have acceptable precision and predictive ability to determine the factors affecting ischemic stroke. Thus, by creating predictive models through this algorithm, will play a significant role in decreasing the mortality and disability caused by ischemic stroke.

Keywords: data mining, ischemic stroke, decision tree, Bayesian network

Procedia PDF Downloads 157
384 Social Norms around Adolescent Girls’ Marriage Practices in Ethiopia: A Qualitative Exploration

Authors: Dagmawit Tewahido

Abstract:

Purpose: This qualitative study was conducted to explore social norms around adolescent girls’ marriage practices in West Hararghe, Ethiopia, where early marriage is prohibited by law. Methods: Twenty Focus Group Discussions were conducted with Married and Unmarried adolescent girls, adolescent boys and parents of girls using locally developed vignettes. A total of 32 in-depth interviews were conducted with married and unmarried adolescent girls, husbands of adolescent girls and mothers-in-law. Key informant interviews were conducted with 36 district officials. Data analysis was assisted by Open Code computer software. The Social Norms Analysis Plot (SNAP) framework developed by CARE guided the development and analysis of vignettes. A thematic data analysis approach was utilized to summarize the data. Results: Early marriage is seen as a positive phenomenon in our study context, and girls who are not married by the perceived ideal age of 15 are socially sanctioned. They are particularly influenced by their peers to marry. Marrying early is considered a chance given by God and a symbol of good luck. The two common types of marriage are decided: 1) by adolescent girl and boy themselves without seeking parental permission (’Jalaa-deemaa’- meaning ‘to go along’), and 2) by just informing girl’s parents (‘Cabsaa’- meaning ‘to break the culture’). Relatives and marriage brokers also arrange early marriages. Girls usually accept the first marriage proposal regardless of their age. Parents generally tend not to oppose marriage arrangements chosen by their daughters. Conclusions: In the study context social norms encourage early marriage despite the existence of a law prohibiting marriage before the age of eighteen years. Early marriage commonly happens through consensual arrangements between adolescent girls and boys. Interventions to reduce early marriage need to consider the influence of Reference Groups on the decision makers for marriages, especially girls’ own peers.

Keywords: adolescent girls, social norms, early marriage, Ethiopia

Procedia PDF Downloads 120
383 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 436
382 Haptic Robotic Glove for Tele-Exploration of Explosive Devices

Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes

Abstract:

ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.

Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation

Procedia PDF Downloads 155
381 Greenhouse Gas Mitigation by Promoting Renewable Energy in Algeria

Authors: F. Sahnoune

Abstract:

The study focuses on the analysis of the Algerian greenhouse gase emissions. In Algeria, as in other countries, the issue of greenhouse gas (GHG) emissions and climate change is the subject of great concern. As climate change is a global problem and taking into consideration the principle of 'common but differentiated responsibilities' as mentioned in the Rio Declaration in 1992, Algeria has initiated a broad program of voluntary reduction of GHG emissions and climate change adaptation. Thus although the contribution of Algeria on global warming is minimal (less than 0.5% of global GHG emissions), the country is, because its geographical position and climatic characteristics, very vulnerable and should integrate mitigation and adaptation into its development policy. Even a small rise in temperature would lead to various socio-economic problems that hinder the development of the country. The models predict that rainfall events are less frequent but more intense, while droughts are more common and longer. The decrease of water resources, declining agricultural yields, encroaching desert, the challenge of planning and the energy consumption for air conditioning are only the initial impacts to which Algeria must find answers supportable economically and socially. The study examines to what extent, Algeria can significantly reduce greenhouse gas emissions. We present an analysis of the current situation, trends in CO2 emissions, footprint of Algeria, national climate plan and especially what will be the impact on GHG emissions of the new strategy for promoting renewable energy adopted in 2011 and expects to produce 40% of electricity needs from solar energy. The results show that in 2012 the GHG emissions totaled 153 MT CO2 eq and growing at a rate of over 3%. The Introduction of solar energy in electricity production and implementation of energy efficiency allow to reduce by 2030 more than 300 MT CO2 eq. Avenues of consideration relating to a combination of policies and improved technologies that are able to reduce CO2 emissions and mitigate the impacts caused by climate change in the medium term will also be presented.

Keywords: climate change, co2 mitigation, greenhouse gases, renewable energy, sustainable development

Procedia PDF Downloads 270
380 CyberSteer: Cyber-Human Approach for Safely Shaping Autonomous Robotic Behavior to Comply with Human Intention

Authors: Vinicius G. Goecks, Gregory M. Gremillion, William D. Nothwang

Abstract:

Modern approaches to train intelligent agents rely on prolonged training sessions, high amounts of input data, and multiple interactions with the environment. This restricts the application of these learning algorithms in robotics and real-world applications, in which there is low tolerance to inadequate actions, interactions are expensive, and real-time processing and action are required. This paper addresses this issue introducing CyberSteer, a novel approach to efficiently design intrinsic reward functions based on human intention to guide deep reinforcement learning agents with no environment-dependent rewards. CyberSteer uses non-expert human operators for initial demonstration of a given task or desired behavior. The trajectories collected are used to train a behavior cloning deep neural network that asynchronously runs in the background and suggests actions to the deep reinforcement learning module. An intrinsic reward is computed based on the similarity between actions suggested and taken by the deep reinforcement learning algorithm commanding the agent. This intrinsic reward can also be reshaped through additional human demonstration or critique. This approach removes the need for environment-dependent or hand-engineered rewards while still being able to safely shape the behavior of autonomous robotic agents, in this case, based on human intention. CyberSteer is tested in a high-fidelity unmanned aerial vehicle simulation environment, the Microsoft AirSim. The simulated aerial robot performs collision avoidance through a clustered forest environment using forward-looking depth sensing and roll, pitch, and yaw references angle commands to the flight controller. This approach shows that the behavior of robotic systems can be shaped in a reduced amount of time when guided by a non-expert human, who is only aware of the high-level goals of the task. Decreasing the amount of training time required and increasing safety during training maneuvers will allow for faster deployment of intelligent robotic agents in dynamic real-world applications.

Keywords: human-robot interaction, intelligent robots, robot learning, semisupervised learning, unmanned aerial vehicles

Procedia PDF Downloads 248
379 Urban Security and Social Sustainability in Cities of Developing Countries

Authors: Taimaz Larimian, Negin Sadeghi

Abstract:

Very little is known about the impacts of urban security on the level of social sustainability within the cities of developing countries. Urban security is still struggling to find its position in the social sustainability agenda, despite the significant role of safety and security on different aspects of peoples’ lives. This paper argues that urban safety and security should be better integrated within the social sustainability framework. With this aim, this study investigates the hypothesized relationship between social sustainability and Crime Prevention through Environmental Design (CPTED) approach at the neighborhood scale. This study proposes a model of key influential dimensions of CPTED analyzed into localized factors and sub-factors. These factors are then prioritized using pairwise comparison logic and fuzzy group Analytic Hierarchy Process (AHP) method in order to determine the relative importance of each factor on achieving social sustainability. The proposed model then investigates social sustainability in six case study neighborhoods of Isfahan city based on residents’ perceptions of safety within their neighborhood. Mixed method of data collection is used by using a self-administered questionnaire to explore the residents’ perceptions of social sustainability in their area of residency followed by an on-site observation to measure the CPTED construct. In all, 150 respondents from selected neighborhoods were involved in this research. The model indicates that CPTED approach has a significant direct influence on increasing social sustainability in neighborhood scale. According to the findings, among different dimensions of CPTED, ‘activity support’ and ‘image/ management’ have the most influence on people’s feeling of safety within studied areas. This model represents a useful designing tool in achieving urban safety and security during the development of more socially sustainable and user-friendly urban areas.

Keywords: crime prevention through environmental design (CPTED), developing countries, fuzzy analytic hierarchy process (FAHP), social sustainability

Procedia PDF Downloads 290