Search results for: threat information sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12050

Search results for: threat information sharing

11150 An Information System for Strategic Performance Scoring in Municipal Management

Authors: Emin Gundogar, Aysegul Yilmaz

Abstract:

Strategic performance scoring is a significant procedure in management. There are various methods to improve this procedure. This study introduces an information system that is developed to score performance for municipal management. The application of the system is clarified by exemplifying municipal processes.

Keywords: management information system, municipal management, performance scoring

Procedia PDF Downloads 751
11149 Designing a Tool for Software Maintenance

Authors: Amir Ngah, Masita Abdul Jalil, Zailani Abdullah

Abstract:

The aim of software maintenance is to maintain the software system in accordance with advancement in software and hardware technology. One of the early works on software maintenance is to extract information at higher level of abstraction. In this paper, we present the process of how to design an information extraction tool for software maintenance. The tool can extract the basic information from old program such as about variables, based classes, derived classes, objects of classes, and functions. The tool have two main part; the lexical analyzer module that can read the input file character by character, and the searching module which is user can get the basic information from existing program. We implemented this tool for a patterned sub-C++ language as an input file.

Keywords: extraction tool, software maintenance, reverse engineering, C++

Procedia PDF Downloads 475
11148 DH-Students Promoting Underage Asylum Seekers' Oral Health in Finland

Authors: Eeva Wallenius-Nareneva, Tuula Toivanen-Labiad

Abstract:

Background: Oral health promotion event was organised for forty Afghanistan, Iraqi and Bangladeshi underage asylum seekers in Finland. The invitation to arrange this coaching occasion was accepted in the Degree Programme in Oral Hygiene in Metropolia. The personnel in the reception center found the need to improve oral health among the youngsters. The purpose was to strengthen the health literacy of the boys in their oral self-care and to reduce dental fears. The Finnish studies, especially the terminology of oral health was integrated to coaching with the help of interpreters. Cooperative learning was applied. Methods: Oral health was interactively discussed in four study group sessions: 1. The importance of healthy eating habits; - Good and bad diets, - Regular meals, - Acid attack o Xylitol. 2. Oral diseases − connection to general health; - Aetiology of gingivitis, periodontitis and caries, - Harmfulness of smoking 3. Tools and techniques for oral self-care; - Brushing and inter dental cleaning. 4. Sharing earlier dental care experiences; - Cultural differences, - Dental fear, - Regular check-ups. Results: During coaching deficiencies appeared in brushing and inter dental cleaning techniques. Some boys were used to wash their mouth with salt justifying it by salt’s antiseptic properties. Many brushed their teeth by vertical movements. The boys took feedback positively when a demonstration with model jaws revealed the inefficiency of the technique. The advantages of fluoride tooth paste were advised. Dental care procedures were new and frightening for many boys. Finnish dental care system was clarified. The safety and indolence of the treatments and informed consent were highlighted. Video presentations and the dialog lowered substantially the threshold to visit dental clinic. The occasion gave the students means for meeting patients from different cultural and language backgrounds. The information hidden behind the oral health problems of the asylum seekers was valuable. Conclusions: Learning dental care practices used in different cultures is essential for dental professionals. The project was a good start towards multicultural oral health care. More experiences are needed before graduation. Health education themes should be held simple regardless of the target group. The heterogeneity of the group does not pose a problem. Open discussion with questions leading to the theme works well in clarifying the target group’s knowledge level. Sharing own experiences strengthens the sense of equality among the participants and encourages them to express own opinions. Motivational interview method turned out to be successful. In the future coaching occasions must confirm active participation of everyone. This could be realized by dividing the participants to even smaller groups. The different languages impose challenges but they can be solved by using more interpreters. Their presence ensures that everyone understands the issues properly although the use of plain and sign languages are helpful. In further development, it would be crucial to arrange a rehearsal occasion to the same participants in two/three months’ time. This would strengthen the adaption of self-care practices and give the youngsters opportunity to pose more open questions. The students would gain valuable feedback regarding the effectiveness of their work.

Keywords: cooperative learning, interactive methods, motivational interviewing, oral health promotion, underage asylum seekers

Procedia PDF Downloads 272
11147 Attitudes, Knowledge and Perceptions towards Cervical Cancer Messages among Female University Students

Authors: Anne Nattembo

Abstract:

Cervical cancer remains a major public health problem in developing countries, especially in Africa. Effective cervical cancer prevention communication requires identification of behaviors, attitudes and increasing awareness of a given population; thus this study focused on investigating awareness, attitudes, and behavior among female university students towards cervical cancer messages. The study objectives sought to investigate the communication behavior of young adults towards cervical cancer, to understand female students recognition of cervical cancer as a problem, to identify the frames related to cervical cancer and their impact towards audience communication and participation behaviors, to identify the factors that influence behavioral intentions and level of involvement towards cervical cancer services and to make recommendations on how to improve cervical cancer communication towards female university students. The researcher obtained data using semi-structured interviews and focus group discussions targeting 90 respondents. The semi-structured in-depth interviews were carried out through one-on-one discussions basis using a set of prepared questions among 53 respondents. All interviews were audio-tape recorded. Each interview was directly typed into Microsoft Word. 4 focus group discussions were conducted with a total of 37 respondents; 2 female only groups with 10 respondents in one and 9 respondents in another, 1 mixed with 12 participants 5 of whom were male, and 1 male only group with 6 participants. The key findings show that the participants preferred to receive and access cervical cancer information from doctors although they were mainly receiving information from the radio. In regards to the type of public the respondents represent, majority of the respondents were non-publics in the sense that they did not have knowledge about cervical cancer, had low levels of involvement and had high constraint recognition their cervical cancer knowledge levels. The researcher identified the most salient audience frames among female university students towards cervical cancer and these included; death, loss, and fear. These frames did not necessarily make cervical cancer an issue of concern among the female university students but rather an issue they distanced themselves from as they did not perceive it as a risk. The study also identified the constraints respondents face in responding to cervical cancer campaign calls-to-action which included; stigma, lack of knowledge and access to services as well as lack of recommendation from doctors. In regards to sex differences, females had more knowledge about cervical cancer than the males. In conclusion the study highlights the importance of interpersonal communication in risk or health communication with a focus on health providers proactively sharing cervical cancer prevention information with their patients. Health provider’s involvement in cervical cancer is very important in influencing behavior and compliance of cervical cancer calls-to-action. The study also provides recommendations for designing effective cervical cancer campaigns that will positively impact on the audience such as packaging cervical cancer messages that also target the males as a way of increasing their involvement and more campaigns to increase awareness of cervical cancer as well as designing positive framed messages to counter the negative audience frames towards cervical cancer.

Keywords: cervical cancer communication, health communication, university students, risk communication

Procedia PDF Downloads 209
11146 General Framework for Price Regulation of Container Terminals

Authors: Murat Yildiz, Burcu Yildiz

Abstract:

Price Cap Regulation is a form of economic regulation designed in the 1980s in the United Kingdom. Price cap regulation sets a cap on the price that the utility provider can charge. The cap is set according to several economic factors, such as the price cap index, expected efficiency savings and inflation. It has been used by several countries as a regulatory regime in several sectors. Container port privatization is still in early stages in some countries. Lack of a general framework can be an impediment to privatization. This paper aims a general framework to comprising decisions to be made for variables which are able to accommodate the variety of container terminals. Several approaches that may be needed as well as a passage between approaches.

Keywords: Price Cap Regulation, ports privatization, container terminal price regime, earning sharing

Procedia PDF Downloads 336
11145 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 21
11144 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 363
11143 Price Setting and the Role of Accounting Information

Authors: Chris Durden, Peter Lane

Abstract:

Cost accounting information potentially plays an important role in price setting. According to prior research fixed and variable cost information often is a key influence on pricing decisions. The literature highlights the benefits of applying systematic costing systems for enhanced price setting processes. This paper explores how costing systems are used for pricing decisions in the tourism and hospitality industry relative to other sources of price setting information. Pricing based on full cost information was found to have relatively greater importance and short-term survival and customer oriented objectives were found to be the more important pricing objectives. This paper contributes to the literature by providing a recent analysis of accounting’s role in price setting within the tourism and hospitality industry.

Keywords: cost accounting systems, pricing decisions, cost-plus pricing, market pricing, tourism industry

Procedia PDF Downloads 372
11142 Prevalence of SARS-CoV-2 Infection and Associated Risk Factors in Selected Health Facilities of Tigray, Ethiopia: Cross-Sectional Study Design, 2023

Authors: Weldegerima Gebremedhin Hagos

Abstract:

Background: The Coronavirus disease of 2019 (COVID-19) is a catastrophic emerging global health threat caused by the severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). COVID-19 has a wide range of complications and sequels. It is devastating in developing countries, causing serious health and socioeconomic crises as a result of the increasingly overburdened healthcare system. Ethiopia reported the first case of SARS-CoV-2 on 13th March 2020, with community transmission ensuing by mid-May. The aim of this study was conducted to determine the prevalence of SARS-CoV-2 infection in Tigray, Ethiopia. Methods: Facility-based correctional study designs were used on a total of 380 study participants from March 2023 up to May 2023 in two general hospitals and one comprehensive specialized hospital in Tigray, Ethiopia. A pre-structured questionnaire was used to assess information regarding the socio-demographic, clinical data and other risk factors. A nasal swap was taken by trained health professionals, and the laboratory analysis was done by RT-PCR (quant studio 7-flex, applied biosystems) in Tigrai Health Research Institute and Mekelle University Medical Microbiology Research Laboratory. Result: The mean age of the study participants was 31 (SD+/-3.5) years, with 65% being male and 35% female. The overall seropositivity of sars-cov-2 among the study participants was 5.5%. The prevalence was higher in males (6.2%) than females which were (4.7%). Sars-cov-2 infection was significantly associated with a history of lack of vaccination (p-value 0.002). There was no significant association between seropositivity and demographic factors (P > 0.05). Conclusion: The seroprevalence of SARS-CoV-2 among the study participants is high. Those study participants with a previous history of vaccination have a low probability of developing COVID-19 infection. A low SARS-CoV-2 infection rate was recorded in those who frequently use masks.

Keywords: prevalence, SARS-CoV-2, infection, risk factors

Procedia PDF Downloads 36
11141 Unleashing the Potential of Green Finance in Architecture: A Promising Path for Balkan Countries

Authors: Luan Vardari, Dena Arapi Vardari

Abstract:

The Balkan countries, known for their diverse landscapes and cultural heritage, face the dual challenge of promoting economic growth while addressing pressing environmental concerns. In recent years, the concept of green finance has emerged as a powerful tool to achieve sustainable development and mitigate the environmental impact of various sectors, including architecture. This extended abstract explores the untapped potential of green finance in architecture within the Balkan region and highlights its role in driving sustainable construction practices and fostering a greener future. The abstract begins by defining green finance and emphasizing its relevance in the context of the architectural sector in Balkan countries. It underlines the benefits of green finance, such as economic growth, environmental conservation, and social well-being. Integrating green finance into architectural projects is important as a means to achieve sustainable development goals while promoting financial viability. Also, delves into the current state of green building practices in the Balkan countries and identifies the need for financial support to further drive adoption. It explores the existing regulatory frameworks and policies that promote sustainable architecture and discusses how green finance can complement these initiatives. Unique challenges faced by Balkan countries are highlighted, along with the potential opportunities that green finance presents in overcoming these challenges. We highlight successful sustainable architectural projects in the region to showcase the practical application of green finance in the Balkans. These projects exemplify the effective utilization of green finance mechanisms, resulting in tangible economic and environmental impacts, including job creation, energy efficiency, and reduced carbon emissions. The abstract concludes by identifying replicable models and lessons learned from these projects that can serve as a blueprint for future sustainable architecture initiatives in the Balkans. The importance of collaboration and knowledge sharing among stakeholders is emphasized. Engaging architects, financial institutions, governments, and local communities is crucial to promoting green finance in architecture. The abstract suggests the establishment of knowledge exchange platforms and regional/international networks to foster collaboration and facilitate the sharing of expertise among Balkan countries.

Keywords: sustainable finance, renewable energy, Balkan region, investment opportunities, green infrastructure, ESG criteria, architecture

Procedia PDF Downloads 49
11140 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 247
11139 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 403
11138 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 127
11137 Towards Improved Public Information on Industrial Emissions in Italy: Concepts and Specific Issues Associated to the Italian Experience in IPPC Permit Licensing

Authors: C. Mazziotti Gomez de Teran, D. Fiore, B. Cola, A. Fardelli

Abstract:

The present paper summarizes the analysis of the request for consultation of information and data on industrial emissions made publicly available on the web site of the Ministry of Environment, Land and Sea on integrated pollution prevention and control from large industrial installations, the so called “AIA Portal”. However, since also local Competent Authorities have been organizing their own web sites on IPPC permits releasing procedures for public consultation purposes, as a result, a huge amount of information on national industrial plants is already available on internet, although it is usually proposed as textual documentation or images. Thus, it is not possible to access all the relevant information through interoperability systems and also to retrieval relevant information for decision making purposes as well as rising of awareness on environmental issue. Moreover, since in Italy the number of institutional and private subjects involved in the management of the public information on industrial emissions is substantial, the access to the information is provided on internet web sites according to different criteria; thus, at present it is not structurally homogeneous and comparable. To overcome the mentioned difficulties in the case of the Coordinating Committee for the implementation of the Agreement for the industrial area in Taranto and Statte, operating before the IPPC permit granting procedures of the relevant installation located in the area, a big effort was devoted to elaborate and to validate data and information on characterization of soil, ground water aquifer and coastal sea at disposal of different subjects to derive a global perspective for decision making purposes. Thus, the present paper also focuses on main outcomes matured during such experience.

Keywords: public information, emissions into atmosphere, IPPC permits, territorial information systems

Procedia PDF Downloads 267
11136 Experiences of HIV Positive Serostatus Disclosure to Sexual Partner Among Individuals in Discordant Couples in Mbarara City, Southwestern Uganda

Authors: Humphrey Atwijukiire, Gladys Nakidde, Anne Tweheyo Otwine, Jane Kabami

Abstract:

Experiences of HIV Positive Serostatus Disclosure to Sexual Partner Among Individuals in Discordant Couples in Mbarara City, Southwestern Uganda Introduction: Disclosure of HIV status is key in HIV management. Despite many studies on serostatus disclosure, there is a gap in experiences regarding HIV status disclosure among discordant couples. This study explored the lived experiences of serostatus disclosure among discordant couples in Mbarara City, South Western Uganda. Methods: We conducted 12 in-depth interviews using translated interview guide, and audio recorders. Participants were purposively enrolled in the study. The study was conducted at three public health facilities in Mbarara City. Data was analyzed using thematic content analysis. Approval for this research was obtained from Mbarara University Research Ethics Committee and administrative clearance from city clerk of Mbarara City. Results: The mean age of participants was 38 years. An equal number of males (six) and females participated. Most of them had at least secondary level education, only three had primary education. Experienced benefits of HIV serostatus disclosure included: social support and care; decisions regarding health, fertility, and child bearing; sharing information on HIV prevention and protection; positive living; and, ease of HIV disclosure. The challenges included: misunderstandings in the families. Conclusion: Socially, psychologically and financially PLWHIV have benefited from their negative partners. Health wise, they have been supported, and cared for, but some have faced challenges, such as family misunderstandings. Couple HIV counseling and testing by a trained health worker is beneficial in HIV care and could mitigate the challenges related HIV serostatus disclosure.

Keywords: discordant couples, disclosure, experiences, HIV

Procedia PDF Downloads 119
11135 A Nonlocal Means Algorithm for Poisson Denoising Based on Information Geometry

Authors: Dongxu Chen, Yipeng Li

Abstract:

This paper presents an information geometry NonlocalMeans(NLM) algorithm for Poisson denoising. NLM estimates a noise-free pixel as a weighted average of image pixels, where each pixel is weighted according to the similarity between image patches in Euclidean space. In this work, every pixel is a Poisson distribution locally estimated by Maximum Likelihood (ML), all distributions consist of a statistical manifold. A NLM denoising algorithm is conducted on the statistical manifold where Fisher information matrix can be used for computing distribution geodesics referenced as the similarity between patches. This approach was demonstrated to be competitive with related state-of-the-art methods.

Keywords: image denoising, Poisson noise, information geometry, nonlocal-means

Procedia PDF Downloads 270
11134 WhatsApp Application and Challenges of Radio Broadcasting in Northern Nigeria: Special Interest on FRCN Kaduna

Authors: Aliyu Damri

Abstract:

This study analyzed the emergence of WhatsApp and how employees at the Federal Radio Corporation of Nigeria, Kaduna defined the concept base on their vast broadcasting experiences for over five decades and application of the phenomenon to the radio station. It also analyzed the nature, patterns, dimensions, features, challenges as well as the effects of WhatsApp as a social networking site with specific interest on the radio outlet. Also, the study identified how the radio organization responded to the challenges in an attempt to adapt to the new pattern of broadcasting characterized by many technological transformations. The study further explained in details such skills journalists need to function optimally using WhatsApp as well as the impacts of the WhatsApp on radio broadcasting. It used a combination of published materials, focus group discussion, in depth interviews and participant observation on the activities of the radio stations to address the research questions. The data generated provided insight to better understand the challenges posed to FRCN Kaduna as a result of WhatsApp application and how FRCN Kaduna responded to the challenges. It also provided information on the skills journalists need to function optimally in using WhatsApp application in the radio station. The interview and focus group discussion’s transcripts and the published materials were analyzed along thematic pattern related to the research questions in the study. The dominant response relied heavily on change in the radio station’s organizational and technical integration of newsrooms, the use of a multiskilled workforce, application of a flexible and user-friendly technology in all aspects of production, expansion of the station’s services in to new media such as internet and mobile phones as well as sharing of ideas across different units in the radio outfit.

Keywords: broadcasting, challenge, northern Nigeria, radio, WhatsApp application

Procedia PDF Downloads 115
11133 Sources and Content of Sexual Information among School Going Adolescents in Uganda

Authors: Jonathan Magala

Abstract:

Context: Adolescents in Uganda face significant challenges related to sexual health due to inadequate sexual information. This lack of information puts young people at risk of early pregnancies, sexually transmitted infections, and poverty. Therefore, it is essential to understand the sources, content, and challenges of acquiring sexual information among secondary school-going adolescents in Uganda. Research Aim: The aim of this study was to establish the sources, content, and challenges of acquiring sexual information among secondary school-going adolescents in Luwero Town Council, Uganda. Methodology: This study used a cross-sectional approach with both qualitative and quantitative methods. Questionnaires and in-depth interviews were conducted with 384 school-going adolescents aged between 13-19 years in Luwero Town Council, Uganda. Findings: The results of the study revealed that adolescents receive sexual information from various sources, with schools being the most common source, followed by parents and religious institutions being the least utilized. Adolescents received information on various topics related to sexuality, including puberty and sexual changes, pregnancy and reproduction, STD information, abstinence, and family planning. However, the content of sexual information was inadequate in addressing the challenges facing adolescents, and there were generation gaps, lack of role models, peer influence, and government policies. The male character from all the sources was the least in offering sexual information to adolescents. Theoretical Importance: The study's findings highlight the need for policy implementation to strengthen sexual education in school curriculum, as the sources of sexual information and the content are inadequate. The various topics should be addressed in schools to provide comprehensive education on sexual health for adolescents. Data Collection and Analysis Procedures: Data collection involved questionnaires and in-depth interviews with school-going adolescents. The data gathered were analyzed using descriptive statistics and thematic analysis. Questions Addressed: The study aimed to answer questions about the sources of sexual information among school-going adolescents, the content of sexual information provided, the challenges faced in accessing the information, and the importance of sex education policy implementation. Conclusion: The study concludes that schools are a popular source of sexual information among school-going adolescents in Uganda. However, the content of the information provided is inadequate in addressing the challenges that adolescents face regarding their sexual health. Therefore, policy implementation is essential in strengthening sexual education in the school curriculum and addressing various topics related to sexual health.

Keywords: adolescents, sexual information, schools, reproductive health

Procedia PDF Downloads 59
11132 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 166
11131 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 40
11130 Victims and Violators: Open Source Information, Admissibility Standards, and War Crimes Investigations in Iraq and Syria

Authors: Genevieve Zingg

Abstract:

Modern technology and social media platforms have fundamentally altered the nature of war crimes investigations by providing new forms of data, evidence, and documentation, and pose a unique opportunity to expand the efficacy of international law. However, much of the open source information available is deemed inadmissible in subsequent legal proceedings and fails to function as evidence largely due to issues of reliability and verifiability. Focusing on current judicial investigations related to ongoing conflicts in Syria and Iraq, this paper will examine key challenges and opportunities for the effective use of open source information in securing justice. This paper will consider strategies and approaches that can be used to ensure that information collected by affected populations meets basic admissibility standards. This paper argues that the critical failure to equip civilian populations in conflict zones with knowledge and information regarding established admissibility standards and guidelines both jeopardizes the potential of open source information and compromises the ability of victims to participate effectively in justice and accountability processes. The ultimate purpose of this paper is, therefore, to examine how to maximize the value of open source information based on the rules of evidence in international, regional, and national courts, and how to maximize the participation of affected populations in holding their abusers to account.

Keywords: human rights, international criminal law, international justice, international law, Iraq, open source information, social media, Syria, transitional justice, war crimes

Procedia PDF Downloads 324
11129 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 232
11128 Neo-Liberal Challenge - Apple in China

Authors: Mark McKeown

Abstract:

Press articles opining on how China has become the West’s biggest threat have become so common as to feel like old news. Since the United States shifted diplomatic recognition from Taiwan to the People’s Republic of China in 1979 the relationship between the world’s two largest economies has been at best a brittle one. This coiled tension has grown as trade between the two countries snaked ever upwards. As a byproduct of globalization Apple have focused much of their production and assembly in China. This has left the U.S. Big Tech company with several challenges. This paper focusses on the tightrope Apple now has to traverse. The majority of the data and analysis within this paper is sourced from my current ongoing PhD research on the influence of Big Tech lobbying on U.S. foreign policy. One of the main conclusions from this analysis is Apple has to adopt a carefully nuanced strategy of appeasement to avoid friction, with both the governments of China and the United States.

Keywords: apple, China, Taiwan, war

Procedia PDF Downloads 50
11127 Research on Urban Point of Interest Generalization Method Based on Mapping Presentation

Authors: Chengming Li, Yong Yin, Peipei Guo, Xiaoli Liu

Abstract:

Without taking account of the attribute richness of POI (point of interest) data and spatial distribution limited by roads, a POI generalization method considering both attribute information and spatial distribution has been proposed against the existing point generalization algorithm merely focusing on overall information of point groups. Hierarchical characteristic of urban POI information expression has been firstly analyzed to point out the measurement feature of the corresponding hierarchy. On this basis, an urban POI generalizing strategy has been put forward: POIs urban road network have been divided into three distribution pattern; corresponding generalization methods have been proposed according to the characteristic of POI data in different distribution patterns. Experimental results showed that the method taking into account both attribute information and spatial distribution characteristics of POI can better implement urban POI generalization in the mapping presentation.

Keywords: POI, road network, selection method, spatial information expression, distribution pattern

Procedia PDF Downloads 392
11126 Construction Information Visualization System Using nD CAD Model

Authors: Hyeon-seoung Kim, Sang-mi Park, Sun-ju Han, Leen-seok Kang

Abstract:

The visualization technology of construction information using 3D and nD modeling can satisfy the visualization needs of each construction project participant. The nD CAD system is a tool that the construction information, such as construction schedule, cost and resource utilization, are simulated by 4D, 5D and 6D object formats based on 3D object. This study developed a methodology and simulation engine for nD CAD system for construction project management. It has improved functions such as built-in schedule generation, cost simulation of changed budget and built-in resource allocation comparing with the current systems. To develop an integrated nD CAD system, this study attempts an integrated method to link 5D and 6D objects based on 4D object.

Keywords: building information modeling, visual simulation, 3D object, nD CAD augmented reality

Procedia PDF Downloads 292
11125 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 65
11124 Settlement Network Supplying Energy

Authors: Balázs Kulcsár

Abstract:

Few people now doubt the future of the global energy transition. The only question is whether the pace of renewables' penetration will be sufficient to compete with the rate of warming. Dynamic changes are also taking place in the Hungarian electricity system. In addition to nuclear power, which provides the basic electricity supply, the most dynamic is solar power, which is largely small-scale and residential. The emergence of solar power is outlining the emergence of energy production and supply fabric of municipalities. This creates the potential for over-producing municipalities to supply the electricity needs of neighboring settlements with lower production beyond renewables. By taking advantage of this energy sharing, electricity supply based on pure renewables can be achieved more quickly.

Keywords: renewable energy, energy geography, self-sufficiency, energy transition

Procedia PDF Downloads 163
11123 Analyzing Information Management in Science and Technology Institute Libraries in India

Authors: P. M. Naushad Ali

Abstract:

India’s strength in basic research is recognized internationally. Science and Technology research in India has been performed by six distinct bodies or organizations such as Cooperative Research Associations, Autonomous Research Council, Institute under Ministries, Industrial R&D Establishment, Universities, Private Institutions. All most all these institutions are having a well-established library/information center to cater the information needs of their users like scientists and technologists. Information Management (IM) comprises disciplines concerned with the study and the effective and efficient management of information and resources, products and services as well as the understanding of the involved technologies and the people engaged in this activity. It is also observed that the libraries and information centers in India are also using modern technologies for the management of various activities and services to serve their users in a better way. Science and Technology libraries in the country are usually better equipped because the investment in Science and Technology in the country are much larger than those in other fields. Thus, most of the Science and Technology libraries are equipped with modern IT-based tools for handling and management of library services. In spite of these facts Science and Technology libraries are having all the characteristics of a model organization where computer application is found most successful, however, the adoption of this IT based management tool is not uniform in these libraries. The present study will help to know about the level use of IT-based management tools for the information management of Science and Technology libraries in India. The questionnaire, interview, observation and document review techniques have been used in data collection. Finally, the author discusses findings of the study and put forward some suggestions to improve the quality of Science and Technology institute library services in India.

Keywords: information management, science and technology libraries, India, IT-based tools

Procedia PDF Downloads 379
11122 Predicting Seoul Bus Ridership Using Artificial Neural Network Algorithm with Smartcard Data

Authors: Hosuk Shin, Young-Hyun Seo, Eunhak Lee, Seung-Young Kho

Abstract:

Currently, in Seoul, users have the privilege to avoid riding crowded buses with the installation of Bus Information System (BIS). BIS has three levels of on-board bus ridership level information (spacious, normal, and crowded). However, there are flaws in the system due to it being real time which could provide incomplete information to the user. For example, a bus comes to the station, and on the BIS it shows that the bus is crowded, but on the stop that the user is waiting many people get off, which would mean that this station the information should show as normal or spacious. To fix this problem, this study predicts the bus ridership level using smart card data to provide more accurate information about the passenger ridership level on the bus. An Artificial Neural Network (ANN) is an interconnected group of nodes, that was created based on the human brain. Forecasting has been one of the major applications of ANN due to the data-driven self-adaptive methods of the algorithm itself. According to the results, the ANN algorithm was stable and robust with somewhat small error ratio, so the results were rational and reasonable.

Keywords: smartcard data, ANN, bus, ridership

Procedia PDF Downloads 152
11121 Information and Communication Technology in Architectural Education: The Challenges

Authors: Oluropo Stephen Ilesanmi, Oluwole Ayodele Alejo

Abstract:

Architectural education, beyond training the students to become architects, impacts in them the appreciation of the responsibilities relating to public health, safety, and welfare. Architecture is no longer a personal philosophical or aesthetic pursuit by individuals, rather, it has to consider everyday needs of the people and use technology to give a liveable environment. In the present age, architectural education must have to grapple with the recent integration of technology, in particular, facilities offered by information and communication technology. Electronic technologies have moved architecture from the drawing board to cyberspace. The world is now a global village in which new information and methods are easily and quickly available to people at different poles of the globe. It is the position of this paper that in order to remain relevant in the ever-competing forces within the building industry, architectural education must show the impetus to continue to draw from technological advancements associated with the use of computers.

Keywords: architecture, education, communication, information, technology

Procedia PDF Downloads 187