Search results for: secure communications
350 Digital Forensic Exploration Framework for Email and Instant Messaging Applications
Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed
Abstract:
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.Keywords: forensics, network sessions, packet reconstruction, packet reordering
Procedia PDF Downloads 344349 Insights Into Serotonin-Receptor Binding and Stability via Molecular Dynamics Simulations: Key Residues for Electrostatic Interactions and Signal Transduction
Authors: Arunima Verma, Padmabati Mondal
Abstract:
Serotonin-receptor binding plays a key role in several neurological and biological processes, including mood, sleep, hunger, cognition, learning, and memory. In this article, we performed molecular dynamics simulation to examine the key residues that play an essential role in the binding of serotonin to the G-protein-coupled 5-HT₁ᴮ receptor (5-HT₁ᴮ R) via electrostatic interactions. An end-point free energy calculation method (MM-PBSA) determines the stability of the 5-HT1B R due to serotonin binding. The single-point mutation of the polar or charged amino acid residues (Asp129, Thr134) on the binding sites and the calculation of binding free energy validate the importance of these residues in the stability of the serotonin-receptor complex. Principal component analysis indicates the serotonin-bound 5-HT1BR is more stabilized than the apo-receptor in terms of dynamical changes. The difference dynamic cross-correlations map shows the correlation between the transmembrane and mini-Go, which indicates signal transduction happening between mini-Go and the receptor. Allosteric communication reveals the key nodes for signal transduction in 5-HT1BR. These results provide useful insights into the signal transduction pathways and mutagenesis study to regulate the functionality of the complex. The developed protocols can be applied to study local non-covalent interactions and long-range allosteric communications in any protein-ligand system for computer-aided drug design.Keywords: allostery, CADD, MD simulations, MM-PBSA
Procedia PDF Downloads 87348 Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development
Authors: Boon Yih Mah
Abstract:
Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style.Keywords: WeCWI, literacy discovery, language discovery, cognitive discovery, psychological discovery
Procedia PDF Downloads 561347 Energy Efficient Massive Data Dissemination Through Vehicle Mobility in Smart Cities
Authors: Salman Naseer
Abstract:
One of the main challenges of operating a smart city (SC) is collecting the massive data generated from multiple data sources (DS) and to transmit them to the control units (CU) for further data processing and analysis. These ever-increasing data demands require not only more and more capacity of the transmission channels but also results in resource over-provision to meet the resilience requirements, thus the unavoidable waste because of the data fluctuations throughout the day. In addition, the high energy consumption (EC) and carbon discharges from these data transmissions posing serious issues to the environment we live in. Therefore, to overcome the issues of intensive EC and carbon emissions (CE) of massive data dissemination in Smart Cities, we propose an energy efficient and carbon reduction approach by utilizing the daily mobility of the existing vehicles as an alternative communications channel to accommodate the data dissemination in smart cities. To illustrate the effectiveness and efficiency of our approach, we take the Auckland City in New Zealand as an example, assuming massive data generated by various sources geographically scattered throughout the Auckland region to the control centres located in city centre. The numerical results show that our proposed approach can provide up to 5 times lower delay as transferring the large volume of data by utilizing the existing daily vehicles’ mobility than the conventional transmission network. Moreover, our proposed approach offers about 30% less EC and CE than that of conventional network transmission approach.Keywords: smart city, delay tolerant network, infrastructure offloading, opportunistic network, vehicular mobility, energy consumption, carbon emission
Procedia PDF Downloads 142346 Early Depression Detection for Young Adults with a Psychiatric and AI Interdisciplinary Multimodal Framework
Authors: Raymond Xu, Ashley Hua, Andrew Wang, Yuru Lin
Abstract:
During COVID-19, the depression rate has increased dramatically. Young adults are most vulnerable to the mental health effects of the pandemic. Lower-income families have a higher ratio to be diagnosed with depression than the general population, but less access to clinics. This research aims to achieve early depression detection at low cost, large scale, and high accuracy with an interdisciplinary approach by incorporating clinical practices defined by American Psychiatric Association (APA) as well as multimodal AI framework. The proposed approach detected the nine depression symptoms with Natural Language Processing sentiment analysis and a symptom-based Lexicon uniquely designed for young adults. The experiments were conducted on the multimedia survey results from adolescents and young adults and unbiased Twitter communications. The result was further aggregated with the facial emotional cues analyzed by the Convolutional Neural Network on the multimedia survey videos. Five experiments each conducted on 10k data entries reached consistent results with an average accuracy of 88.31%, higher than the existing natural language analysis models. This approach can reach 300+ million daily active Twitter users and is highly accessible by low-income populations to promote early depression detection to raise awareness in adolescents and young adults and reveal complementary cues to assist clinical depression diagnosis.Keywords: artificial intelligence, COVID-19, depression detection, psychiatric disorder
Procedia PDF Downloads 131345 An Investigation of the Effects of Gripping Systems in Geosynthetic Shear Testing
Authors: Charles Sikwanda
Abstract:
The use of geosynthetic materials in geotechnical engineering projects has rapidly increased over the past several years. These materials have resulted in improved performance and cost reduction of geotechnical structures as compared to the use of conventional materials. However, working with geosynthetics requires knowledge of interface parameters for design. These parameters are typically determined by the large direct shear device in accordance with ASTM-D5321 and ASTM-D6243 standards. Although these laboratory tests are standardized, the quality of the results can be largely affected by several factors that include; the shearing rate, applied normal stress, gripping mechanism, and type of the geosynthetic specimens tested. Amongst these factors, poor surface gripping of a specimen is the major source of the discrepancy. If the specimen is inadequately secured to the shearing blocks, it experiences progressive failure and shear strength that deviates from the true field performance of the tested material. This leads to inaccurate, unsafe, and cost ineffective designs of projects. Currently, the ASTM-D5321 and ASTM-D6243 standards do not provide a standardized gripping system for geosynthetic shear strength testing. Over the years, researchers have come up with different gripping systems that can be used such as; glue, metal textured surface, sandblasting, and sandpaper. However, these gripping systems are regularly not adequate to sufficiently secure the tested specimens to the shearing device. This has led to large variability in test results and difficulties in results interpretation. Therefore, this study was aimed at determining the effects of gripping systems in geosynthetic interface shear strength testing using a 300 x 300 mm direct shear box. The results of the research will contribute to easy data interpretation and increase result accuracy and reproducibility.Keywords: geosynthetics, shear strength parameters, gripping systems, gripping
Procedia PDF Downloads 203344 Study on Effective Continuous Assessments Methods to Improve Undergraduates English Language Skills
Authors: K. M. R. Siriwardhana
Abstract:
Sri Lanka is a developing country in South Asia which uses English as its second language. Today, most of the university students in Sri Lanka are eagerly exploring knowledge giving special consideration to English as their 2nd Language with the understanding that to climb up the career ladder, English is inevitable both in local and international contexts. However, still a considerable failing rate in English can also be seen among the Sri Lankan undergraduates Further, most of the Sri Lankan universities now practice English as their medium of instructions making English a credited Subject to brighten the future of the Sri Lankan students. Accordingly, in many universities an array of assessments are employed to evaluate undergraduates’ competence in English language. The main objective of this study was to ascertain the effective assessment methods to improve the 2nd language skills of the Sri Lankan university students which also create a more interest in them to learn English. Accordingly, hundred (100) undergraduates were selected as the research sample and the primary data was collected employing a semi structured questionnaire along with class room observations and semi structured interviews. Data was mainly analyzed descriptively employing graphical illustrations. According to the research findings, it was revealed that practical assessments such as oral tests, competitive drama and presentations are more effective in improving their language skills and preferred by the majority of students than written assignments and papers. Further, most of the students have scored better in practical assignments than in the written assignments. Hence, the study concludes that best and the benefited way of improving English language skills of Sri Lankan undergraduates is practical assessments as it gives them the opportunity to apply the language with much confidence and competence in actual situations. Further, the study recommends the language teachers to improve their own skills and creativity in practicing and employing such assessments as it will develop both second language teaching and learning skills. Ultimately, the university graduates will be able to secure their positions internationally as they are well capable in English, the lingua franca of the world.Keywords: assessments, second language, Sri Lanka, undergraduates
Procedia PDF Downloads 303343 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 77342 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate
Authors: Susan Diamond
Abstract:
Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare.Keywords: deep learning, machine learning, cognitive computing, model training
Procedia PDF Downloads 209341 A Case Study on Re-Assessment Study of an Earthfill Dam at Latamber, Pakistan
Authors: Afnan Ahmad, Shahid Ali, Mujahid Khan
Abstract:
This research presents the parametric study of an existing earth fill dam located at Latamber, Karak city, Pakistan. The study consists of carrying out seepage analysis, slope stability analysis, and Earthquake analysis of the dam for the existing dam geometry and do the same for modified geometry. Dams are massive as well as expensive hydraulic structure, therefore it needs proper attention. Additionally, this dam falls under zone 2B region of Pakistan, which is an earthquake-prone area and where ground accelerations range from 0.16g to 0.24g peak. So it should be deal with great care, as the failure of any dam can cause irreparable losses. Similarly, seepage as well as slope failure can also cause damages which can lead to failure of the dam. Therefore, keeping in view of the importance of dam construction and associated costs, our main focus is to carry out parametric study of newly constructed dam. GeoStudio software is used for this analysis in the study in which Seep/W is used for seepage analysis, Slope/w is used for Slope stability analysis and Quake/w is used for earthquake analysis. Based on the geometrical, hydrological and geotechnical data, Seepage and slope stability analysis of different proposed geometries of the dam are carried out along with the Seismic analysis. A rigorous analysis was carried out in 2-D limit equilibrium using finite element analysis. The seismic study began with the static analysis, continuing by the dynamic response analysis. The seismic analyses permitted evaluation of the overall patterns of the Latamber dam behavior in terms of displacements, stress, strain, and acceleration fields. Similarly, the seepage analysis allows evaluation of seepage through the foundation and embankment of the dam, while slope stability analysis estimates the factor of safety of the upstream and downstream of the dam. The results of the analysis demonstrate that among multiple geometries, Latamber dam is secure against seepage piping failure and slope stability (upstream and downstream) failure. Moreover, the dam is safe against any dynamic loading and no liquefaction has been observed while changing its geometry in permissible limits.Keywords: earth-fill dam, finite element, liquefaction, seepage analysis
Procedia PDF Downloads 164340 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 294339 Vibration Analysis of Magnetostrictive Nano-Plate by Using Modified Couple Stress and Nonlocal Elasticity Theories
Authors: Hamed Khani Arani, Mohammad Shariyat, Armaghan Mohammadian
Abstract:
In the present study, the free vibration of magnetostrictive nano-plate (MsNP) resting on the Pasternak foundation is investigated. Firstly, the modified couple stress (MCS) and nonlocal elasticity theories are compared together and taken into account to consider the small scale effects; in this paper not only two theories are analyzed but also it improves the MCS theory is more accurate than nonlocal elasticity theory in such problems. A feedback control system is utilized to investigate the effects of a magnetic field. First-order shear deformation theory (FSDT), Hamilton’s principle and energy method are utilized in order to drive the equations of motion and these equations are solved by differential quadrature method (DQM) for simply supported boundary conditions. The MsNP undergoes in-plane forces in x and y directions. In this regard, the dimensionless frequency is plotted to study the effects of small scale parameter, magnetic field, aspect ratio, thickness ratio and compression and tension loads. Results indicate that these parameters play a key role on the natural frequency. According to the above results, MsNP can be used in the communications equipment, smart control vibration of nanostructure especially in sensor and actuators such as wireless linear micro motor and smart nano valves in injectors.Keywords: feedback control system, magnetostrictive nano-plate, modified couple stress theory, nonlocal elasticity theory, vibration analysis
Procedia PDF Downloads 135338 Collaborative Platform for Learning Basic Programming (Algorinfo)
Authors: Edgar Mauricio Ruiz Osuna, Claudia Yaneth Herrera Bolivar, Sandra Liliana Gomez Vasquez
Abstract:
The increasing needs of professionals with skills in software development in industry are incremental, therefore, the relevance of an educational process in line with the strengthening of these competencies, are part of the responsibilities of universities with careers related to the area of Informatics and Systems. In this sense, it is important to consider that in the National Science, Technology and Innovation Plan for the development of the Electronics, Information Technologies and Communications (2013) sectors, it is established as a weakness in the SWOT Analysis of the Software sector and Services, Deficiencies in training and professional training. Accordingly, UNIMINUTO's Computer Technology Program has addressed the analysis of students' performance in software development, identifying various problems such as dropout in programming subjects, academic averages, as well as deficiencies in strategies and competencies developed in the area of programming. As a result of this analysis, it was determined to design a collaborative learning platform in basic programming using heat maps as a tool to support didactic feedback. The pilot phase allows to evaluate in a programming course the ALGORINFO platform as a didactic resource, through an interactive and collaborative environment where students can develop basic programming practices and in turn, are fed back through the analysis of time patterns and difficulties frequent in certain segments or program cycles, by means of heat maps. The result allows the teacher to have tools to reinforce and advise critical points generated on the map, so that students and graduates improve their skills as software developers.Keywords: collaborative platform, learning, feedback, programming, heat maps
Procedia PDF Downloads 162337 Transforming Health Information from Manual to Digital (Electronic) World: A Reference and Guide
Authors: S. Karthikeyan, Naveen Bindra
Abstract:
Introduction: To update ourselves and understand the concept of latest electronic formats available for Health care providers and how it could be used and developed as per standards. The idea is to correlate between the patients Manual Medical Records keeping and maintaining patients Electronic Information in a Health care setup in this world. Furthermore this stands with adapting to the right technology depending upon the organization and improve our quality and quantity of Healthcare providing skills. Objective: The concept and theory is to explain the terms of Electronic Medical Record (EMR), Electronic Health Record (EHR) and Personal Health Record (PHR) and selecting the best technical among the available Electronic sources and software before implementing. It is to guide and make sure the technology used by the end users without any doubts and difficulties. The idea is to evaluate is to admire the uses and barriers of EMR-EHR-PHR. Aim and Scope: The target is to achieve the health care providers like Physicians, Nurses, Therapists, Medical Bill reimbursements, Insurances and Government to assess the patient’s information on easy and systematic manner without diluting the confidentiality of patient’s information. Method: Health Information Technology can be implemented with the help of Organisations providing with legal guidelines and help to stand by the health care provider. The main objective is to select the correct embedded and affordable database management software and generating large-scale data. The parallel need is to know how the latest software available in the market. Conclusion: The question lies here is implementing the Electronic information system with healthcare providers and organisation. The clinicians are the main users of the technology and manage us to ‘go paperless’. The fact is that day today changing technologically is very sound and up to date. Basically the idea is to tell how to store the data electronically safe and secure. All three exemplifies the fact that an electronic format has its own benefit as well as barriers.Keywords: medical records, digital records, health information, electronic record system
Procedia PDF Downloads 459336 A Global Organizational Theory for the 21st Century
Authors: Troy A. Tyre
Abstract:
Organizational behavior and organizational change are elements of the ever-changing global business environment. Leadership and organizational behavior are 21st century disciplines. Network marketing organizations need to understand the ever-changing nature of global business and be ready and willing to adapt to the environment. Network marketing organizations have a challenge keeping up with a rapid escalation in global growth. Network marketing growth has been steady and global. Network marketing organizations have been slow to develop a 21st century global strategy to manage the rapid escalation of growth degrading organizational behavior, job satisfaction, increasing attrition, and degrading customer service. Development of an organizational behavior and leadership theory for the 21st century to help network marketing develops a global business strategy to manage the rapid escalation in growth that affects organizational behavior. Managing growth means organizational leadership must develop and adapt to the organizational environment. Growth comes with an open mind and one’s departure from the comfort zone. Leadership growth operates in the tacit dimension. Systems thinking and adaptation of mental models can help shift organizational behavior. Shifting the organizational behavior requires organizational learning. Organizational learning occurs through single-loop, double-loop, and triple-loop learning. Triple-loop learning is the most difficult, but the most rewarding. Tools such as theory U can aid in developing a landscape for organizational behavioral development. Additionally, awareness to espoused and portrayed actions is imperatives. Theories of motivation, cross-cultural diversity, and communications are instrumental in founding an organizational behavior suited for the 21st century.Keywords: global, leadership, network marketing, organizational behavior
Procedia PDF Downloads 554335 Influence of Instrumental Playing on Attachment Type of Musicians and Music Students Using Adult Attachment Scale-R
Authors: Sofia Serra-Dawa
Abstract:
Adult relationships accrue on a variety of past social experiences, intentions, and emotions that might predispose and influence the approach to and construction of subsequent relationships. The Adult Attachment Theory (AAT) proposes four types of adult attachment, where attachment is built over two dimensions of anxiety and avoidance: secure, anxious-preoccupied, dismissive-avoidant, and fearful-avoidant. The AAT has been studied in multiple settings such as personal and therapeutic relationships, educational settings, sexual orientation, health, and religion. In music scholarship, the AAT has been used to frame class learning of student singers and study the relational behavior between voice teachers and students. Building on this study, the present inquiry studies how attachment types might characterize learning relationships of music students (in the Western Conservatory tradition), and whether particular instrumental experiences might correlate to given attachment styles. Given certain behavioral cohesive features of established traditions of instrumental playing and performance modes, it is hypothesized that student musicians will display specific characteristics correlated to instrumental traditions, demonstrating clear tendency of attachment style, which in turn has implications on subsequent professional interactions. This study is informed by the methodological framework of Adult Attachment Scale-R (Collins and Read, 1990), which was particularly chosen given its non-invasive questions and classificatory validation. It is further hypothesized that the analytical comparison of musicians’ profiles has the potential to serve as the baseline for other comparative behavioral observation studies [this component is expected to be verified and completed well before the conference meeting]. This research may have implications for practitioners concerned with matching and improving musical teaching and learning relationships and in (professional and amateur) long-term musical settings.Keywords: adult attachment, music education, musicians attachment profile, musicians relationships
Procedia PDF Downloads 157334 Empowering Girls and Youth in Bangladesh: Importance of Creating Safe Digital Space for Online Learning and Education
Authors: Md. Rasel Mia, Ashik Billah
Abstract:
The empowerment of girls and youth in Bangladesh is a demanding issue in today's digital age, where online learning and education have become integral to personal and societal development. This abstract explores the critical importance of creating a secure online environment for girls and youth in Bangladesh, emphasizing the transformative impact it can have on their access to education and knowledge. Bangladesh, like many developing nations, faces gender inequalities in education and access to digital resources. The creation of a safe digital space not only mitigates the gender digital divide but also fosters an environment where girls and youth can thrive academically and professionally. This manuscript draws attention to the efforts through a mixed-method study to assess the current digital landscape in Bangladesh, revealing disparities in phone and internet access, online practices, and awareness of cyber security among diverse demographic groups. Moreover, the study unveils the varying levels of familial support and barriers encountered by girls and youth in their quest for digital literacy. It emphasizes the need for tailored training programs that address specific learning needs while also advocating for enhanced internet accessibility, safe online practices, and inclusive online platforms. The manuscript culminates in a call for collaborative efforts among stakeholders, including NGOs, government agencies, and telecommunications companies, to implement targeted interventions that bridge the gender digital divide and pave the way for a brighter, more equitable future for girls and youth in Bangladesh. In conclusion, this research highlights the undeniable significance of creating a safe digital space as a catalyst for the empowerment of girls and youth in Bangladesh, ensuring that they not only access but excel in the online space, thereby contributing to their personal growth and the advancement of society as a whole.Keywords: collaboration, cyber security, digital literacy, digital resources, inclusiveness
Procedia PDF Downloads 61333 The Influence of the Normative Gender Binary in Diversity Management: A Multi-Method Study on Gender Diversity of Diversity Management
Authors: Robin C. Ladwig
Abstract:
Diversity Management, as a substantial element of Human Resource Management, aims to secure the economic benefit that assumingly comes with a diverse workforce. Consequently, diversity managers focus on the protection of employees and securing equality measurements to assure organisational gender diversity. Gender diversity as one aspect of Diversity Management seems to adhere to gender binarism and cis-normativity. Workplaces are gendered spaces which are echoing the binary gender-normativity presented in Diversity Management, sold under the label of gender diversity. While the expectation of Diversity Management implies the inclusion of a multiplicity of marginalised groups, such as trans and gender diverse people, in current literature and practice, the reality is curated by gender binarism and cis-normativity. The qualitative multi-method research showed a lack of knowledge about trans and gender diverse matters within the profession of Diversity Management and Human Resources. The semi-structured interviews with trans and gender diverse individuals from various backgrounds and occupations in Australia exposed missing considerations of trans and gender diverse experiences in the inclusivity and gender equity of various workplaces. Even if practitioners consider trans and gender diverse matters under gender diversity, the practical execution is limited to gender binary structures and cis-normative actions as the photo-elicit questionnaire with diversity managers, human resource officers, and personnel management demonstrates. Diversity Management should approach a broader source of informed practice by extending their business focus to the knowledge of humanity studies. Humanity studies could include diversity, queer, or gender studies to increase the inclusivity of marginalised groups such as trans and gender diverse employees and people. Furthermore, the definition of gender diversity should be extended beyond the gender binary and cis-normative experience. People may lose trust in Diversity Management as a supportive ally of marginalised employees if the understanding of inclusivity is limited to a gender binary and cis-normativity value system that misrepresents the richness of gender diversity.Keywords: cis-normativity, diversity management, gender binarism, trans and gender diversity
Procedia PDF Downloads 202332 Controlling Differential Settlement of Large Reservoir through Soil Structure Interaction Approach
Authors: Madhav Khadilkar
Abstract:
Construction of a large standby reservoir was required to provide secure water supply. The new reservoir was required to be constructed at the same location of an abandoned old open pond due to space constraints. Some investigations were carried out earlier to improvise and re-commission the existing pond. But due to a lack of quantified risk of settlement from voids in the underlying limestone, the shallow foundations were not found feasible. Since the reservoir was resting on hard strata for about three-quarter of plan area and one quarter was resting on soil underlying with limestone and considerably low subgrade modulus. Further investigations were carried out to ascertain the locations and extent of voids within the limestone. It was concluded that the risk due to lime dissolution was acceptably low, and the site was found geotechnically feasible. The hazard posed by limestone dissolution was addressed through the integrated structural and geotechnical analysis and design approach. Finite Element Analysis was carried out to quantify the stresses and differential settlement due to various probable loads and soil-structure interaction. Walls behaving as cantilever under operational loads were found undergoing in-plane bending and tensile forces due to soil-structure interaction. Sensitivity analysis for varying soil subgrade modulus was carried out to check the variation in the response of the structure and magnitude of stresses developed. The base slab was additionally checked for the loss of soil contact due to lime pocket formations at random locations. The expansion and contraction joints were planned to receive minimal additional forces due to differential settlement. The reservoir was designed to sustain the actions corresponding to allowable deformation limits per code, and geotechnical measures were proposed to achieve the soil parameters set in structural analysis.Keywords: differential settlement, limestone dissolution, reservoir, soil structure interaction
Procedia PDF Downloads 155331 Improvement of Fixed Offshore Structures' Boat Landing Performance Using Practicable Design Criteria
Authors: A. Hamadelnil, Z. Razak, E. Matsoom
Abstract:
Boat landings on fixed offshore structure are designed to absorb the impact energy from the boats approaching the platform for crew transfer. As the size and speed of operating boats vary, the design and maintenance of the boat landings become more challenging. Different oil and gas operators adopting different design criteria for the boat landing design in the region of South East Asia. Rubber strip is used to increase the capacity of the boat landing in absorbing bigger impact energy. Recently, it has been reported that all the rubber strips peel off the boat landing frame within one to two years, and replacement is required to avoid puncturing of the boat’s hull by the exposed sharp edges and bolts used to secure the rubber strip. The capacity of the boat landing in absorbing the impact energy is reduced after the failure of the rubber strip and results in failure of the steel members. The replacement of the rubber strip is costly as it requires a diving spread. The objective of this study is to propose the most practicable criteria to be adopted by oil and gas operators in the design of the boat landings in the region of South East Asia to improve the performance of the boat landing and assure safe operation and cheaper maintenance. This study explores the current design and maintenance challenges of boat landing and compares between the criteria adopted by different operators. In addition, this study explains the reasons behind the denting of many of the boat landing. It also evaluates the effect of grout and rubber strip in the capacity of the boat landing and jacket legs and highlight. Boat landing model and analysis using USFOS and SACS software are carried out and presented in this study considering different design criteria. This study proposes the most practicable criteria to be used in designing the boat landing in South East Asia region to save cost and achieve better performance, safe operation and less cost and maintenance.Keywords: boat landing, grout, plastic hinge, rubber strip
Procedia PDF Downloads 301330 The Effect of Ethnic and Boko Haram Insurgency in the Economic Development of Cultural Heritage and Tourism Industries in Nigeria
Authors: Chinwe Juliana Abara, Dayo Keshi
Abstract:
Through cultural heritage materials, nations witness significant boom in the world of art and tourism as well as attract foreign investors and tourists to the benefit of the regions and countries where they are located. There are notable heritage sites which record visits by tourists in their thousands annually. According to UNESCO the cultural heritage reflects the life of the community, its history and its identity. Its preservation helps to rebuild broken communities, re-establish their identities, and link their past with their present and future. During any form of conflict or war, a lot happen. People die, houses destroyed and every other thing in the society suffers. Wars and conflicts in various countries have claimed antiquities, heritage materials, contemporary Arts, Galleries, Museums, Archives and very important Monuments and Heritage sites. My Paper deals with the effects of insurgencies and conflicts on cultural heritage and tourism industries in Nigeria and how they can be protected and restored so as to yield the desirable economic gains. Preceding from the premise that conflict of any type puts our cultural heritage at risk; this paper also explores the practical challenges and opportunities available to us in the face of incessant ethnic and Boko Haram (western education is abomination) insurgents and their wanton destruction of lives and properties. There will be a review of relevant literature and documents on the effects of violence on heritage materials and tourism industries in Nigeria particularly and other parts of the world in generally .My paper also highlights the activities the National Council for Arts and Culture as well as other Cultural Agencies in Nigeria have employed to sensitize the stakeholders, the youth, the elderly, and the community at large on the need for peaceful co-existence so as to collectively strive to safeguard and secure our cultural heritage in the face of all these challenges for posterity and desirable economic gains.Keywords: cultural heritage, conflict, tourism, insurgency, challenges
Procedia PDF Downloads 395329 Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia
Authors: Ahmad Fauzi Makarim, Okkie Puspitorini, Hani'ah Mahmudah, Nur Adi Siswandari, Ari Wijayanti
Abstract:
As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage.Keywords: maritime of Indonesia, maritime communications, outdoor wifi, coverage, AODV
Procedia PDF Downloads 351328 Challenges Faced by the Visually Impaired Children and their Parents in Doing Homework Assignments Using Braille
Authors: Shazia Farooq Mirza
Abstract:
The purpose of this study was to explore the challenges faced by visually impaired children and their parents in doing homework assignments using Braille. This study had a quantitative approach and it was descriptive in nature. It took place in 6 public and special private schools of Lahore.177 visually impaired children of grades 4-10 and 153 parents of the visually impaired children were the volunteer participants of this study which were selected through a convenient sampling method. A survey method was adopted for the data collection. And for this purpose 2 self-developed validated questionnaires were used as instruments. The instruments were constructed by exploring the factors and sub-factors from the literature review. Thirty students with visual impairment and 30 parents of the students with visual impairment filled the questionnaires as a pilot study, and it ensured the reliability of the instruments. Data were analyzed using a statistical package of social sciences and it was completely interpreted. Findings revealed that the common challenges faced by the students with visual impairment were Physical Stress, Readiness, Braille Knowledge, Braille Skill and Communications. And the major challenges faced by the parents of the students with visual impairment were the Availability of the helping material, the Availability of the reading material, Braille Knowledge, Braille skills, School and family interactions, Behavior management and the Environment and equipment. Conclusions were drawn on the basis of the major findings. Future suggestions are given in light of the conclusions. This study will be beneficial for the children with visual impairment, the parents of the children with visual impairment, the special education teachers and for the policymakers of the special schools.Keywords: challenges, visually impaired children, homework, parents, braille
Procedia PDF Downloads 122327 Modeling Route Selection Using Real-Time Information and GPS Data
Authors: William Albeiro Alvarez, Gloria Patricia Jaramillo, Ivan Reinaldo Sarmiento
Abstract:
Understanding the behavior of individuals and the different human factors that influence the choice when faced with a complex system such as transportation is one of the most complicated aspects of measuring in the components that constitute the modeling of route choice due to that various behaviors and driving mode directly or indirectly affect the choice. During the last two decades, with the development of information and communications technologies, new data collection techniques have emerged such as GPS, geolocation with mobile phones, apps for choosing the route between origin and destination, individual service transport applications among others, where an interest has been generated to improve discrete choice models when considering the incorporation of these developments as well as psychological factors that affect decision making. This paper implements a discrete choice model that proposes and estimates a hybrid model that integrates route choice models and latent variables based on the observation on the route of a sample of public taxi drivers from the city of Medellín, Colombia in relation to its behavior, personality, socioeconomic characteristics, and driving mode. The set of choice options includes the routes generated by the individual service transport applications versus the driver's choice. The hybrid model consists of measurement equations that relate latent variables with measurement indicators and utilities with choice indicators along with structural equations that link the observable characteristics of drivers with latent variables and explanatory variables with utilities.Keywords: behavior choice model, human factors, hybrid model, real time data
Procedia PDF Downloads 152326 Comparison of Water Curing and Carbonation Curing on Mortar Mix Incorporating Cement Kiln Dust
Authors: Devender Sharma, Shweta Goyal
Abstract:
Sustainable development is a key to protect the environment for a secure future. Accelerated carbonation curing is a comparatively new technique for curing of concrete which involves sequestration of carbon dioxide gas into the precast concrete, resulting in improvement of the properties of concrete. This paper presents the results of a study to evaluate the effect of carbonation curing on cement mortars incorporating cement kiln dust (CKD) as partial replacement of cement. The mortar specimens were prepared by replacing cement with CKD in varying percentages of 0-50% by the weight of cement. The specimens were subjected to 12 hour carbonation curing, followed by sealed packing till testing age. The results were compared with the normal curing procedure, in which the specimens were water cured till the testing age. Compressive strength and microstructure of the mix were studied. It was noted that on increasing the percentage of CKD up to 10% by the weight of the cement, no considerable change was observed in the compressive strength. But as the percentage of CKD was further increased, there was a decrease in compressive strength, with strength decreasing up to 40% when 50% of the cement was replaced with CKD. The decrease in strength is due to the lesser lime content in CKD as compared to cement. High ettringite formation was observed in mixes with high percentages of CKD, thus indicating a decrease in the compressive strength. With carbonation curing, an early age strength gain was observed in mortars, even with higher percentages of CKD. The early strength of the carbonation cured mixes was found to be greater than water cured mixes irrespective of the percentage of CKD. 7 days and 28 days compressive strength of the mix was comparable for both the carbonation cured and water cured specimen. The increase in compressive strength can be attributed to the conversion of unstable Ca(OH)2 into stable CaCO3, which causes densification of the mix. CaCO3 precipitation and greater CSH gel formation was clearly observed in the SEM images of carbonation cured specimen, indicating higher compressive strength. Thus, carbonation curing can be used as an efficient method to enhance the properties of concrete.Keywords: carbonation, cement kiln dust, compressive strength, microstructure
Procedia PDF Downloads 229325 An Agent-Based Model of Innovation Diffusion Using Heterogeneous Social Interaction and Preference
Authors: Jang kyun Cho, Jeong-dong Lee
Abstract:
The advent of the Internet, mobile communications, and social network services has stimulated social interactions among consumers, allowing people to affect one another’s innovation adoptions by exchanging information more frequently and more quickly. Previous diffusion models, such as the Bass model, however, face limitations in reflecting such recent phenomena in society. These models are weak in their ability to model interactions between agents; they model aggregated-level behaviors only. The agent based model, which is an alternative to the aggregate model, is good for individual modeling, but it is still not based on an economic perspective of social interactions so far. This study assumes the presence of social utility from other consumers in the adoption of innovation and investigates the effect of individual interactions on innovation diffusion by developing a new model called the interaction-based diffusion model. By comparing this model with previous diffusion models, the study also examines how the proposed model explains innovation diffusion from the perspective of economics. In addition, the study recommends the use of a small-world network topology instead of cellular automata to describe innovation diffusion. This study develops a model based on individual preference and heterogeneous social interactions using utility specification, which is expandable and, thus, able to encompass various issues in diffusion research, such as reservation price. Furthermore, the study proposes a new framework to forecast aggregated-level market demand from individual level modeling. The model also exhibits a good fit to real market data. It is expected that the study will contribute to our understanding of the innovation diffusion process through its microeconomic theoretical approach.Keywords: innovation diffusion, agent based model, small-world network, demand forecasting
Procedia PDF Downloads 341324 Application of Electro-Optical Hybrid Cables in Horizontal Well Production Logging
Authors: Daofan Guo, Dong Yang
Abstract:
For decades, well logging with coiled tubing has relied solely on surface data such as pump pressure, wellhead pressure, depth counter, and weight indicator readings. While this data serves the oil industry well, modern smart logging utilizes real-time downhole information, which automatically increases operational efficiency and optimizes intervention qualities. For example, downhole pressure, temperature, and depth measurement data can be transmitted through the electro-optical hybrid cable in the coiled tubing to surface operators on a real-time base. This paper mainly introduces the unique structural features and various applications of the electro-optical hybrid cables which were deployed into downhole with the help of coiled tubing technology. Fiber optic elements in the cable enable optical communications and distributed measurements, such as distributed temperature and acoustic sensing. The electrical elements provide continuous surface power for downhole tools, eliminating the limitations of traditional batteries, such as temperature, operating time, and safety concerns. The electrical elements also enable cable telemetry operation of cable tools. Both power supply and signal transmission were integrated into an electro-optical hybrid cable, and the downhole information can be captured by downhole electrical sensors and distributed optical sensing technologies, then travels up through an optical fiber to the surface, which greatly improves the accuracy of measurement data transmission.Keywords: electro-optical hybrid cable, underground photoelectric composite cable, seismic cable, coiled tubing, real-time monitoring
Procedia PDF Downloads 142323 A Review of Protocols and Guidelines Addressing the Exposure of Occupants to Electromagnetic Field (EMF) Radiation in Buildings
Authors: Shabnam Monadizadeh, Charles Kibert, Jiaxuan Li, Janghoon Woo, Ashish Asutosh, Samira Roostaei, Maryam Kouhirostami
Abstract:
A significant share of the technology that has emerged over the past several decades produces electromagnetic field (EMF) radiation. Communications devices, household appliances, industrial equipment, and medical devices all produce EMF radiation with a variety of frequencies, strengths, and ranges. Some EMF radiation, such as Extremely Low Frequency (ELF), Radio Frequency (RF), and the ionizing range have been shown to have harmful effects on human health. Depending on the frequency and strength of the radiation, EMF radiation can have health effects at the cellular level as well as at brain, nervous, and cardiovascular levels. Health authorities have enacted regulations locally and globally to set critical values to limit the adverse effects of EMF radiation. By introducing a more comprehensive field of EMF radiation study and practice, architects and designers can design for a safer electromagnetic (EM) indoor environment, and, as building and construction specialists, will be able to monitor and reduce EM radiation. This paper identifies the nature of EMF radiation in the built environment, the various EMF radiation sources, and its human health effects. It addresses European and US regulations for EMF radiation in buildings and provides a preliminary action plan. The challenges of developing measurement protocols for the various EMF radiation frequency ranges and determining the effects of EMF radiation on building occupants are discussed. This paper argues that a mature method for measuring EMF radiation in building environments and linking these measurements to human health impacts occupant health should be developed to provide adequate safeguards for human occupants of buildings for future research.Keywords: biological affection, electromagnetic field, building regulation, human health, healthy building, clean construction
Procedia PDF Downloads 182322 Performing Marginality and Contestation of Ethnic Identity: Dynamics of Identity Politics in Assam, India
Authors: Hare Krishna Doley
Abstract:
Drawing upon empirical data, this paper tries to examine how ethnic groups like Ahom, Moran, Motok, and Chutia creates and recreates ethnic boundaries while making claims for recognition as Scheduled Tribes (STs) under the Sixth Schedule of the Constitution of India, in the state of Assam. Underlying such claim is the distinct identity consciousness amongst these groups as they assert themselves originally as tribe drawing upon primordial elements. For them, tribal identity promises social justice and give credence to their claims of indigeneity while preserving their exclusivity within the multifarious society of Assam. Having complex inter-group relationships, these groups under study displays distinct as well as overlapping identities, which demonstrate fluidity of identities across groups while making claims for recognition. In this process, the binary of ‘us’ and ‘them’ are often constructed amongst these groups, which are in turn difficult to grasp as they share common historical linkages. This paper attempts to grapple with such complex relationships the studied groups and their assertion as distinct cultural entities while making ethnic boundaries on the basis of socio-cultural identities. Such claims also involve frequent negotiation with the Sate as well as with other ethnic groups, which further creates strife among indigenous groups for tribal identity. The paper argues that identity consciousnesses amongst groups have persisted since the introduction of resource distribution on ethnic lines; therefore, issues of exclusive ethnic identity in the state of Assam can be contextualised within the colonial and post-colonial politics of redrawing ethnic and spatial boundaries. Narrative of the ethnic leaders who are in the forefront of struggle for ST status revealed that it is not merely to secure preferential treatment, but it also encompasses entitlement to land and their socio-cultural identity as aboriginal. While noting the genesis of struggle by the ethnic associations for ST status, this paper will also delineate the interactions among ethnic groups and how the identity of tribe is being performed by them to be included in the official categories of ST.Keywords: ethnic, identity, sixth schedule, tribe
Procedia PDF Downloads 202321 Innovative Design Considerations for Adaptive Spacecraft
Authors: K. Parandhama Gowd
Abstract:
Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.Keywords: satellites, low earth orbit (LEO), medium earth orbit (MEO), geostationary earth orbit (GEO), self-organizing control system, anti-satellite weapons (ASAT), orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems (AOCS), command and data handling (CDH)
Procedia PDF Downloads 296