Search results for: vulnerable child
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2566

Search results for: vulnerable child

1666 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 309
1665 Great Art for Little Children - Games in School Education as Integration of Polish-Language, Eurhythmics, Artistic and Mathematical Subject Matter

Authors: Małgorzata Anna Karczmarzyk

Abstract:

Who is the contemporary child? What are his/her distinctive features making him/her different from earlier generations? And how to teach in the dissimilar social reality? These questions will constitute the key to my reflections on contemporary early school education. For, to my mind, games have become highly significant for the modern model of education. There arise publications and research employing games to increase competence both in business, tutoring, or coaching, as well as in academic education . Thanks to games students and subordinates can be taught such abilities as problem thinking, creativity, consistent fulfillment of goals, resourcefulness and skills of communication.

Keywords: games, art, children, school education, integration

Procedia PDF Downloads 853
1664 Enhancing Child Diets in Food-Insecure Rural Ethiopia

Authors: Tigist mamo, Beryl Oranga, Precious Mubanga

Abstract:

High rates of child undernutrition in Ethiopia place children at significant risk, highlighting the need for low-cost, nutritious diets starting at six months of age. These diets should be diverse and rich in essential nutrients like proteins, vitamins, and minerals. However, many rural households participating in the Productive Safety Net Program (PSNP) struggle to afford fortified foods and often rely on low-protein, cereal-based diets, leading to micronutrient deficiencies. In addition, fasting practices further restrict the consumption of animal-source foods for 190 to 250 days each year, limiting dietary diversity even more. Addressing these challenges requires solutions beyond nutrition counseling, focusing on factors such as seasonality, food perishability, and safety to promote better health outcomes for children. The program's main objective is to empower caregivers with practical recipes for complementary feeding for children aged 6 to 23 months by enhancing meals with affordable ingredients like cereal, legumes, dried vegetables, and meat. The ongoing implementation research within the SPIR-II program is centered on developing a cost-effective mixed flour and exploring drying techniques to extend shelf life, ultimately addressing the delayed introduction of complementary foods and increasing nutrient-rich options in households. Saleswomen participating in the SPIR-II program have been empowered to produce easy-to-use local complementary flour and conduct door-to-door sales in their neighborhoods. Caregivers who have purchased and fed this flour to their children have reported significant improvements in their nutritional status. Additionally, SPIR-II is testing low-tech drying methods suitable for rural Ethiopian contexts to reduce food loss and promote the inclusion of nutrient-dense foods in children's diets. The paper will highlight the primary outcomes of these initiatives as they are being implemented.

Keywords: food preservation, easy-to-use mixed flour, complementary feeding, drying techniques

Procedia PDF Downloads 6
1663 Importance of Different Spatial Parameters in Water Quality Analysis within Intensive Agricultural Area

Authors: Marina Bubalo, Davor Romić, Stjepan Husnjak, Helena Bakić

Abstract:

Even though European Council Directive 91/676/EEC known as Nitrates Directive was adopted in 1991, the issue of water quality preservation in areas of intensive agricultural production still persist all over Europe. High nitrate nitrogen concentrations in surface and groundwater originating from diffuse sources are one of the most important environmental problems in modern intensive agriculture. The fate of nitrogen in soil, surface and groundwater in agricultural area is mostly affected by anthropogenic activity (i.e. agricultural practice) and hydrological and climatological conditions. The aim of this study was to identify impact of land use, soil type, soil vulnerability to pollutant percolation, and natural aquifer vulnerability to nitrate occurrence in surface and groundwater within an intensive agricultural area. The study was set in Varaždin County (northern Croatia), which is under significant influence of the large rivers Drava and Mura and due to that entire area is dominated by alluvial soil with shallow active profile mainly on gravel base. Negative agricultural impact on water quality in this area is evident therefore the half of selected county is a part of delineated nitrate vulnerable zones (NVZ). Data on water quality were collected from 7 surface and 8 groundwater monitoring stations in the County. Also, recent study of the area implied detailed inventory of agricultural production and fertilizers use with the aim to produce new agricultural land use database as one of dominant parameters. The analysis of this database done using ArcGIS 10.1 showed that 52,7% of total County area is agricultural land and 59,2% of agricultural land is used for intensive agricultural production. On the other hand, 56% of soil within the county is classified as soil vulnerable to pollutant percolation. The situation is similar with natural aquifer vulnerability; northern part of the county ranges from high to very high aquifer vulnerability. Statistical analysis of water quality data is done using SPSS 13.0. Cluster analysis group both surface and groundwater stations in two groups according to nitrate nitrogen concentrations. Mean nitrate nitrogen concentration in surface water – group 1 ranges from 4,2 to 5,5 mg/l and in surface water – group 2 from 24 to 42 mg/l. The results are similar, but evidently higher, in groundwater samples; mean nitrate nitrogen concentration in group 1 ranges from 3,9 to 17 mg/l and in group 2 from 36 to 96 mg/l. ANOVA analysis confirmed statistical significance between stations that are classified in the same group. The previously listed parameters (land use, soil type, etc.) were used in factorial correspondence analysis (FCA) to detect importance of each stated parameter in local water quality. Since stated parameters mostly cannot be altered, there is obvious necessity for more precise and more adapted land management in such conditions.

Keywords: agricultural area, nitrate, factorial correspondence analysis, water quality

Procedia PDF Downloads 258
1662 Modeling of Tsunami Propagation and Impact on West Vancouver Island, Canada

Authors: S. Chowdhury, A. Corlett

Abstract:

Large tsunamis strike the British Columbia coast every few hundred years. The Cascadia Subduction Zone, which extends along the Pacific coast from Vancouver Island to Northern California is one of the most seismically active regions in Canada. Significant earthquakes have occurred in this region, including the 1700 Cascade Earthquake with an estimated magnitude of 9.2. Based on geological records, experts have predicted a 'great earthquake' of a similar magnitude within this region may happen any time. This earthquake is expected to generate a large tsunami that could impact the coastal communities on Vancouver Island. Since many of these communities are in remote locations, they are more likely to be vulnerable, as the post-earthquake relief efforts would be impacted by the damage to critical road infrastructures. To assess the coastal vulnerability within these communities, a hydrodynamic model has been developed using MIKE-21 software. We have considered a 500 year probabilistic earthquake design criteria including the subsidence in this model. The bathymetry information was collected from Canadian Hydrographic Services (CHS), and National Oceanic Atmospheric and Administration (NOAA). The arial survey was conducted using a Cessna-172 aircraft for the communities, and then the information was converted to generate a topographic digital elevation map. Both survey information was incorporated into the model, and the domain size of the model was about 1000km x 1300km. This model was calibrated with the tsunami occurred off the west coast of Moresby Island on October 28, 2012. The water levels from the model were compared with two tide gauge stations close to the Vancouver Island and the output from the model indicates the satisfactory result. For this study, the design water level was considered as High Water Level plus the Sea Level Rise for 2100 year. The hourly wind speeds from eight directions were collected from different wind stations and used a 200-year return period wind speed in the model for storm events. The regional model was set for 12 hrs simulation period, which takes more than 16 hrs to complete one simulation using double Xeon-E7 CPU computer plus a K-80 GPU. The boundary information for the local model was generated from the regional model. The local model was developed using a high resolution mesh to estimate the coastal flooding for the communities. It was observed from this study that many communities will be effected by the Cascadia tsunami and the inundation maps were developed for the communities. The infrastructures inside the coastal inundation area were identified. Coastal vulnerability planning and resilient design solutions will be implemented to significantly reduce the risk.

Keywords: tsunami, coastal flooding, coastal vulnerable, earthquake, Vancouver, wave propagation

Procedia PDF Downloads 129
1661 Santo Niño in Canada: Religion, Migration, and the Filipino Underside

Authors: Alison Marshall

Abstract:

“Santo Niño in Canada – Religion, Migration, and the Filipino Underside” seeks to explore the intersection of religion, migration and the Filipino underside through research participant narratives, archival research, and fieldwork on the cult of Santo Niño in Canada. Santo Niño is the single most revered saint in Filipino religiosity. According to popular lore, the original statue of Santo Niño was brought to the Philippines by Portuguese explorer Ferdinand Magellan in 1521, who claimed the islands on behalf of Spain. While Santo Niño is meant to be a manifestation of Jesus as a child, in Filipino thought and culture he very much resembles pre-Hispanic spirits, as well as patron saints introduced by the Spanish. Santo Niño shrines appear in churches, restaurants, businesses, and homes throughout the diaspora suggesting that he was much more than a Catholic image. He represents a deity who often shares a business or home shrine with non-Christian statues such as lucky cats, the Buddha, Guanyin, and Guangong, and sometimes the Chinese God of the Earth. He represents how Christian culture has been refashioned through indigenous, Chinese, Malay, and Indonesian influences. He embodies the religious superstructure that defines Christian piety and habits. On the one hand, he stands for Jesus, a pious son of God, and yet, on the other hand, he can be a simple vindictive child who punishes those who ignore him. Santo Niño is a complex character linked to the past before Christianity. As Filipinos engage with Santo Niño in Canada, they connect to him as Jesus, the son of God. They are also connecting to a childlike figure who sometimes uses his spiritual power to punish. A hybrid figure who comes came into being at the beginning of the Spanish colonial moment, he is maintained throughout the American one and continues to be a powerful reminder of Filipino identity and resilience when people leave the Philippines for migrant work. As this paper argues, Santo Niño beliefs, practices, and stories unite people in the diaspora regardless of language, gender, or nation. Santo Niño enables one to think about and understand what it means to be Filipino and living migrant lives in the diaspora today. In this way, the cult of Santo Niño expresses both Catholic orthodoxy and the heterodox Filipino underside that includes the use of magical amulets, healing, visions, and spirit mediumship.

Keywords: ethnography, migration, Philippines, religion

Procedia PDF Downloads 228
1660 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 196
1659 Sensing to Respond & Recover in Emergency

Authors: Alok Kumar, Raviraj Patil

Abstract:

The ability to respond to an incident of a disastrous event in a vulnerable area is very crucial an aspect of emergency management. The ability to constantly predict the likelihood of an event along with its severity in an area and react to those significant events which are likely to have a high impact allows the authorities to respond by allocating resources optimally in a timely manner. It provides for measuring, monitoring, and modeling facilities that integrate underlying systems into one solution to improve operational efficiency, planning, and coordination. We were particularly involved in this innovative incubation work on the current state of research and development in collaboration. technologies & systems for a disaster.

Keywords: predictive analytics, advanced analytics, area flood likelihood model, area flood severity model, level of impact model, mortality score, economic loss score, resource allocation, crew allocation

Procedia PDF Downloads 319
1658 The Effectiveness of Intervention Methods for Repetitive Behaviors in Preschool Children with Autism Spectrum Disorder: A Systematic Review

Authors: Akane Uda, Ami Tabata, Mi An, Misa Komaki, Ryotaro Ito, Mayumi Inoue, Takehiro Sasai, Yusuke Kusano, Toshihiro Kato

Abstract:

Early intervention is recommended for children with autism spectrum disorder (ASD), and an increasing number of children have received support and intervention before school age in recent years. In this study, we systematically reviewed preschool interventions focused on repetitive behaviors observed in children with ASD, which are often observed at younger ages. Inclusion criteria were as follows : (1) Child of preschool status (age ≤ 7 years) with a diagnosis of ASD (including autism, Asperger's, and pervasive developmental disorder) or a parent (caregiver) with a preschool child with ASD, (2) Physician-confirmed diagnosis of ASD (autism, Asperger's, and pervasive developmental disorder), (3) Interventional studies for repetitive behaviors, (4) Original articles published within the past 10 years (2012 or later), (5) Written in English and Japanese. Exclusion criteria were as follows: (1) Systematic reviews or meta-analyses, (2) Conference reports or books. We carefully scrutinized databases to remove duplicate references and used a two-step screening process to select papers. The primary screening included close scrutiny of titles and abstracts to exclude articles that did not meet the eligibility criteria. During the secondary screening, we carefully read the complete text to assess eligibility, which was double-checked by six members at the laboratory. Disagreements were resolved through consensus-based discussion. Our search yielded 304 papers, of which nine were included in the study. The level of evidence was as follows: three randomized controlled trials (level 2), four pre-post studies (level 4b), and two case reports (level 5). Seven articles selected for this study described the effectiveness of interventions. Interventions for repetitive behaviors in preschool children with ASD were categorized as five interventions that directly involved the child and four educational programs for caregivers and parents. Studies that directly intervened with children used early intensive intervention based on applied behavior analysis (Early Start Denver Model, Early Intensive Behavioral Intervention, and the Picture Exchange Communication System) and individualized education based on sensory integration. Educational interventions for caregivers included two methods; (a) education regarding combined methods and practices of applied behavior analysis in addition to classification and coping methods for repetitive behaviors, and (b) education regarding evaluation methods and practices based on children’s developmental milestones in play. With regard to the neurophysiological basis of repetitive behaviors, environmental factors are implicated as possible contributors. We assumed that applied behavior analysis was shown to be effective in reducing repetitive behaviors because analysis focused on the interaction between the individual and the environment. Additionally, with regard to educational interventions for caregivers, the intervention was shown to promote behavioral change in children based on the caregivers' understanding of the classification of repetitive behaviors and the children’s developmental milestones in play and adjustment of the person-environment context led to a reduction in repetitive behaviors.

Keywords: autism spectrum disorder, early intervention, repetitive behaviors, systematic review

Procedia PDF Downloads 138
1657 Meeting Criminogenic Needs to Reduce Recidivism: The Diversion of Vulnerable Offenders from the Criminal Justice System into Care

Authors: Paulo Rocha

Abstract:

Once in touch with the Criminal Justice System, offenders with mental disorder tend to return to custody more often than nondisordered individuals, which suggests they have not been receiving appropriate treatment in prison. In this scenario, diverting individuals into care as early as possible in their trajectory seems to be the appropriate approach to rehabilitate mentally unwell offenders and alleviate overcrowded prisons. This paper builds on an ethnographic research investigating the challenges encountered by practitioners working to divert offenders into care while attempting to establish cross-boundary interactions with professionals in the Criminal Justice System and Mental Health Services in the UK. Drawing upon the findings of the study, this paper suggests the development of adequate tools to enable liaison between agencies which ultimately results in successful interventions.

Keywords: criminogenic needs, interagency collaboration, liaison and diversion, recidivism

Procedia PDF Downloads 165
1656 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 158
1655 Existing Cardiovascular Risk among Children Diagnosed with Type 1 Diabetes Mellitus at the Emergency Clinic

Authors: Masuma Novak, Daniel Novak

Abstract:

Background: Sweden along with other Nordic countries has the highest incidence of type 1 diabetes mellitus (T1DM) worldwide. The trend is increasing globally. The diagnosis is often given at the emergency clinic when children arrive with cardinal symptom of T1DM. Children with T1DM are known to have an increased risk of microvascular- and macrovascular complications. A family history of cardiovascular complications may further increase their risk. Clinically evident diabetes-related vascular complications are however rarely visible in childhood and adolescence, whereby an intensive diabetes treatment and normoglycemic control is a goal for every child. This study is a risk evaluation of children with T1DM based on their family’s cardiovascular history. Method: Since 2005 the Better Diabetes Diagnosis (BDD) study is a nationwide Swedish prospective cohort study that recruits new-onset T1DM who are less than 18 years old at time of diagnosis. For each newly diagnosed child, blood samples are collected for specific HLA genotyping and islet autoantibody assays and their family’s cardiovascular history is evaluated. As part of the BDD study, during the years 2010-2013 all children diagnosed with T1DM at the Queen Silvia’s Children’s Hospital in Sweden were asked about their family’s cardiovascular history. Questions regarded maternal and paternal high blood pressure, stroke, and myocardial infarction before the age of 55 years, and hyperlipidemia were answered. A maximum risk score of eight was possible. All children are clinically observed prospectively for early functional and structural abnormalities such as protein uremia, blood pressure, and retinopathy. Results: A total of 275 children aged 0 to 18 years were diagnosed with T1DM at the Queen Silvia’s Children’s Hospital emergency clinic during this four year period. The participation rate was 99.7%. 26.4% of the children had no hereditary cardiovascular risk factors. 22.7 % had one risk factor and 18.8% had two risk factors. 14.8% had three risk factors. 9.7% had four risk factors and 7.5% had five risk factors or more. Conclusion: Among children with T1DM in Sweden there is a difference in hereditary cardiovascular risk factors. These results indicate that children with T1DM who also have increased hereditary cardiovascular risk factors should be monitored closely with early screening for functional and structural cardiovascular abnormalities. This is a very preliminary and ongoing study which will be complemented with the cardiovascular risk analysis among children without T1DM.

Keywords: children, type I diabetes, emergency clinic, CVD risk

Procedia PDF Downloads 363
1654 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 361
1653 A Sense of Belonging: Music Learning and School Connectedness

Authors: Johanna Gamboa-Kroesen

Abstract:

School connectedness, or the sense of belonging at school, is a critical factor in adolescent health, academic achievement, and socioemotional well-being. In educational research, the construct of the psychological sense of school membership is often referred to as school engagement, school bonding, or school attachment. While current research recognizes school connectedness as integral to a child’s mental health and academic success, many schools have yet to develop adequate interventions to promote a child’s overall sense of belonging at school. However, prior researches in music education indicates that, among other benefits, music classrooms may provide an environment where students feel they belong. While studies indicates that music learning environments, specifically performing ensemble learning environments, instill a sense of school connectedness and, more broadly, contribute to a student’s socio-emotional development, there has been inadequate research on how the actions of music teachers contribute to this phenomenon. The purpose of this study was to examine the relationship between school connectedness and music learning environments with middle school music students enrolled in a school-based music ensemble. In addition, the study aimed to provide a descriptive analysis of the instructional practices that music teachers use to promote an inclusive environment in their classrooms and an overall sense of belonging in their students. Using 191 student surveys of school membership, student reflective writings, 5 teacher interviews, and 10 classroom observations, this study examined the relationship between 7th and 8th-grade student-reported levels of connectedness within their school-based music ensemble and teacher instructional practice. The study found that students reported high levels of positive school membership within their music classes. Students who participate in school-based orchestra ensembles reported a positive change in emotional state during music instruction. In addition, evidence in this study found that music teachers use instructional practices to build connectedness through de-emphasizing competition and strengthening a student’s sense of relational value within their music learning experience. The findings offer implications for future music teacher instruction to create environments of inclusion, strengthen student-teacher relationships, and promote strategies that enhance student connection to school.

Keywords: music education, belonging, instructional practice, school connectedness

Procedia PDF Downloads 68
1652 Work with Children's Music Group: Important Aspects of Didactic and Artistic Performance

Authors: Eudjen Cinc

Abstract:

Work with a human voice, especially with a child s voice and cultivating the sound of the choir, presents an area of crucial importance for a conductor. We use the term conductor because it needs to be understood that regardless of whether we have in front of us an amateur or a professional choir, whether they are singers with a wealth of experience or children who are still developing and educating their inner ear so that in the future they could contribute to the development of choir music, the person who stands in front of the group and works with them, needs to have the characteristics of a conductor. Voice formation is a long-term process, without which there is no success in both solo and collective music performance.

Keywords: music group, conductor, collective, performance

Procedia PDF Downloads 218
1651 The Impact of Animal Assisted Interventions in Primary Schools: A Mixed Method Intervention Study Examining the Influence of Reading to Dogs on Children's Reading Outcomes and Emotional Wellbeing

Authors: Jill Steel

Abstract:

The interlinked issues of emotional wellbeing and attainment continue to dominate international educational discourse. Reading skills are particularly important to attainment in all areas of the curriculum, and illiteracy is associated with reduced wellbeing and life prospects, with serious ramifications for the wider economy and society. Research shows that reading attainment is influenced by reading motivation and frequency. Reading to Dogs (RTD) is increasingly applied to promote reading motivation and frequency in schools despite a paucity of empirical evidence, specifically examining the influence of RTD on emotional wellbeing and engagement with reading. This research aims to examine whether RTD is effective in promoting these positive outcomes among children aged eight to nine years. This study also aims to inform much needed regulation of the field and standards of practice, including both child and dog welfare. Therefore, ethical matters such as children’s inclusion and safety, as well as the rights and wellbeing of dogs infuse the study throughout. The methodological design is a mixed method longitudinal study. A UK wide questionnaire will be distributed to teachers between January and June 2020 to understand their perceptions of RTD. Following this, a randomised controlled trial (N = 100) will begin in August 2020 in two schools of a comparable demographic, with N= 50 in the intervention school, and N= 50 in a waiting list control school. Reading and wellbeing assessments will be conducted prior to and immediately post RTD, and four weeks after RTD to measure sustained changes. The reading assessments include New Group Reading Test, Motivation to Read Profile (Gambrell et al., 1995), as well as reading frequency and reading anxiety assessments specifically designed for the study. Wellbeing assessments include Goodman’s SDQ, (1997) and pupil self-reporting questionnaires specifically designed for the study. Child, class teacher, and parent questionnaires and interviews prior to, during and post RTD will be conducted to measure perceptions of the impact of RTD on mood and motivation towards reading. This study will make a substantial contribution to our understanding of the effectiveness of RTD and thus have consequences for the fields of education and anthrozoology.

Keywords: animal assisted intervention, reading to dogs, welfare, wellbeing

Procedia PDF Downloads 177
1650 Seismic Analysis of URM Buildings in South Africa

Authors: Trevor N. Haas, Thomas van der Kolf

Abstract:

South Africa has some regions which are susceptible to moderate seismic activity. A peak ground acceleration of between 0.1g and 0.15g can be expected in the southern parts of the Western Cape. Unreinforced Masonry (URM) is commonly used as a construction material for 2 to 5 storey buildings in underprivileged areas in and around Cape Town. URM is typically regarded as the material most vulnerable to damage when subjected to earthquake excitation. In this study, a three-storey URM building was analysed by applying seven earthquake time-histories, which can be expected to occur in South Africa using a finite element approach. Experimental data was used to calibrate the in- and out-of-plane stiffness of the URM. The results indicated that tensile cracking of the in-plane piers was the dominant failure mode. It is concluded that URM buildings of this type are at risk of failure especially if sufficient ductility is not provided. The results also showed that connection failure must be investigated further.

Keywords: URM, seismic analysis, FEM, Cape Town

Procedia PDF Downloads 366
1649 Flood Vulnerability Zoning for Blue Nile Basin Using Geospatial Techniques

Authors: Melese Wondatir

Abstract:

Flooding ranks among the most destructive natural disasters, impacting millions of individuals globally and resulting in substantial economic, social, and environmental repercussions. This study's objective was to create a comprehensive model that assesses the Nile River basin's susceptibility to flood damage and improves existing flood risk management strategies. Authorities responsible for enacting policies and implementing measures may benefit from this research to acquire essential information about the flood, including its scope and susceptible areas. The identification of severe flood damage locations and efficient mitigation techniques were made possible by the use of geospatial data. Slope, elevation, distance from the river, drainage density, topographic witness index, rainfall intensity, distance from road, NDVI, soil type, and land use type were all used throughout the study to determine the vulnerability of flood damage. Ranking elements according to their significance in predicting flood damage risk was done using the Analytic Hierarchy Process (AHP) and geospatial approaches. The analysis finds that the most important parameters determining the region's vulnerability are distance from the river, topographic witness index, rainfall, and elevation, respectively. The consistency ratio (CR) value obtained in this case is 0.000866 (<0.1), which signifies the acceptance of the derived weights. Furthermore, 10.84m2, 83331.14m2, 476987.15m2, 24247.29m2, and 15.83m2 of the region show varying degrees of vulnerability to flooding—very low, low, medium, high, and very high, respectively. Due to their close proximity to the river, the northern-western regions of the Nile River basin—especially those that are close to Sudanese cities like Khartoum—are more vulnerable to flood damage, according to the research findings. Furthermore, the AUC ROC curve demonstrates that the categorized vulnerability map achieves an accuracy rate of 91.0% based on 117 sample points. By putting into practice strategies to address the topographic witness index, rainfall patterns, elevation fluctuations, and distance from the river, vulnerable settlements in the area can be protected, and the impact of future flood occurrences can be greatly reduced. Furthermore, the research findings highlight the urgent requirement for infrastructure development and effective flood management strategies in the northern and western regions of the Nile River basin, particularly in proximity to major towns such as Khartoum. Overall, the study recommends prioritizing high-risk locations and developing a complete flood risk management plan based on the vulnerability map.

Keywords: analytic hierarchy process, Blue Nile Basin, geospatial techniques, flood vulnerability, multi-criteria decision making

Procedia PDF Downloads 67
1648 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 102
1647 Evaluating and Examining Pictures of Children of Five Years Old

Authors: Emine Yılmaz Bolat

Abstract:

Early childhood is a very important period in terms of identifying and developing early skills and abilities. It is likely that the child's development will be in the same direction in the future. This study was conducted with 26 children for the purpose of examining pictures of children of five years old. In the survey, children were asked to draw a picture with pastel dyes. The drawings were collected and evaluated by the researcher. At the end of the research, it was found that the children used the yellow color (N = 17, 16,34%) and the least gray color (N = 1, 0,96%). When the features of children's pictures are examined, the children's paintings have been found to have hierarchy, transparency, completion, the use of vivid colors, and the presence of vertical and horizontal painting lines.

Keywords: early childhood, kindergarten, pictures of children, features of pictures

Procedia PDF Downloads 305
1646 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 446
1645 Attention Deficit Hyperactivity Disorder and Criminality: A Psychological Profile of Convicts Serving Prison Sentences

Authors: Agnieszka Nowogrodzka

Abstract:

Objectives: ADHD is a neurodevelopmental disorder in which symptoms are most prominent throughout childhood. In the longer term, these symptoms, as well as the behaviour of the child, the experiences arising from the response of the community to the child's symptoms, as well as the functioning of the community itself, all contribute to the onset of secondary symptoms and subsequent outcomes of the disorder, such as crime or mental disorders. The purpose of this study is to estimate the prevalence of ADHD among Polish convicts serving a prison sentence. To that end, the study will focus on the relationship between the severity of ADHD and early childhood trauma, family relations, maladaptive cognitive schemas, as well as mental disorders. It is an attempt to assess the interdependence between ADHD, childhood experiences, and secondary outcomes. Methods: The study enrolled two groups of first-time convicts and repeat offenders aged between 21 and 65 –each of the study groups comprised 120 participants; 240 participants in total took part in the study. Participants were recruited in semi-open penal institutions in Poland (Poznań Custody Suite, Wronki Penal Institution, Iława Penal Institution). The control group comprised 110 men without criminal records aged 21 to 65. The DIVA 5.0 questionnaire was employed to identify the severity of ADHD symptoms. Other questionnaires employed in the course of the study included the Childhood Trauma Questionnaire (CTQ), The Family Adaptability and Cohesion Scale IV (FACES-IV), Young Schema Questionnaire (YSQ), and the General Health Questionnaire (GHQ-30). Results: The findings of the study in question are currently still being compiled and will be shared during the conference. The findings of a pilot study involving two cohorts of convicts (each numbering 20 men) and a control group (20 men with no criminal records) indicate a significant correlation between ADHD and the experience of early childhood trauma. The severity of ADHD also shows a correlation with the assessment of the functioning of the family, with the subjects assessing the relationships in their families more negatively than the control group. Furthermore, the severity of ADHD is also correlated with maladaptive emotional schemas manifesting in the participants. The findings also show a correlation between selected dimensions and the severity of offenses.

Keywords: ADHD, social impairments, mental disorders, early childhood traumas, criminality

Procedia PDF Downloads 92
1644 Counselling Families with Special Needs Children: Problems and Prospect: A Case Study of Calabar Metropolis in Cross River State

Authors: Anthonia Emmanuel Inaja

Abstract:

The role of the counseling services by Special Educators, Guidance Counsellors and psychologists alike to Families and Parents of children with special needs cannot be over-emphasized. This paper examined the vital role of counseling services and its impact on the emotional and physical readiness of parents to initiate and support the education and rehabilitation needs of their children. The paper considered the importance of counseling, when counseling services are best required preparing the mindset of parents and family members as well as the immediate community of the social needs child.

Keywords: counseling, families, special, needs, children, problems, prospect

Procedia PDF Downloads 511
1643 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 319
1642 Application of Fuzzy Multiple Criteria Decision Making for Flooded Risk Region Selection in Thailand

Authors: Waraporn Wimuktalop

Abstract:

This research will select regions which are vulnerable to flooding in different level. Mathematical principles will be systematically and rationally utilized as a tool to solve problems of selection the regions. Therefore the method called Multiple Criteria Decision Making (MCDM) has been chosen by having two analysis standards, TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) and AHP (Analytic Hierarchy Process). There are three criterions that have been considered in this research. The first criterion is climate which is the rainfall. The second criterion is geography which is the height above mean sea level. The last criterion is the land utilization which both forest and agriculture use. The study found that the South has the highest risk of flooding, then the East, the Centre, the North-East, the West and the North, respectively.

Keywords: multiple criteria decision making, TOPSIS, analytic hierarchy process, flooding

Procedia PDF Downloads 232
1641 A Longitudinal Exploration into Computer-Mediated Communication Use (CMC) and Relationship Change between 2005-2018

Authors: Laurie Dempsey

Abstract:

Relationships are considered to be beneficial for emotional wellbeing, happiness and physical health. However, they are also complicated: individuals engage in a multitude of complex and volatile relationships during their lifetime, where the change to or ending of these dynamics can be deeply disruptive. As the internet is further integrated into everyday life and relationships are increasingly mediated, Media Studies’ and Sociology’s research interests intersect and converge. This study longitudinally explores how relationship change over time corresponds with the developing UK technological landscape between 2005-2018. Since the early 2000s, the use of computer-mediated communication (CMC) in the UK has dramatically reshaped interaction. Its use has compelled individuals to renegotiate how they consider their relationships: some argue it has allowed for vast networks to be accumulated and strengthened; others contend that it has eradicated the core values and norms associated with communication, damaging relationships. This research collaborated with UK media regulator Ofcom, utilising the longitudinal dataset from their Adult Media Lives study to explore how relationships and CMC use developed over time. This is a unique qualitative dataset covering 2005-2018, where the same 18 participants partook in annual in-home filmed depth interviews. The interviews’ raw video footage was examined year-on-year to consider how the same people changed their reported behaviour and outlooks towards their relationships, and how this coincided with CMC featuring more prominently in their everyday lives. Each interview was transcribed, thematically analysed and coded using NVivo 11 software. This study allowed for a comprehensive exploration into these individuals’ changing relationships over time, as participants grew older, experienced marriages or divorces, conceived and raised children, or lost loved ones. It found that as technology developed between 2005-2018, everyday CMC use was increasingly normalised and incorporated into relationship maintenance. It played a crucial role in altering relationship dynamics, even factoring in the breakdown of several ties. Three key relationships were identified as being shaped by CMC use: parent-child; extended family; and friendships. Over the years there were substantial instances of relationship conflict: for parents renegotiating their dynamic with their child as they tried to both restrict and encourage their child’s technology use; for estranged family members ‘forced’ together in the online sphere; and for friendships compelled to publicly display their relationship on social media, for fear of social exclusion. However, it was also evident that CMC acted as a crucial lifeline for these participants, providing opportunities to strengthen and maintain their bonds via previously unachievable means, both over time and distance. A longitudinal study of this length and nature utilising the same participants does not currently exist, thus provides crucial insight into how and why relationship dynamics alter over time. This unique and topical piece of research draws together Sociology and Media Studies, illustrating how the UK’s changing technological landscape can reshape one of the most basic human compulsions. This collaboration with Ofcom allows for insight that can be utilised in both academia and policymaking alike, making this research relevant and impactful across a range of academic fields and industries.

Keywords: computer mediated communication, longitudinal research, personal relationships, qualitative data

Procedia PDF Downloads 121
1640 Pregnancy through the Lens of Iranian Women with HIV: A Qualitative

Authors: Zahra BehboodiI-Moghadam, Zohre Khalajinia, Ali Reza Nikbakht Nasrabadi, Minoo Mohraz

Abstract:

The purpose of our study was to explore and describe the experiences of pregnant women with HIV in Iran. A qualitative exploratory study with conventional content analysis was used. Twelve pregnant women with HIV who referred to perinatal care at the Imam Khomeini Hospital Behavioral Diseases Consultation: Center in Tehran were recruited to participate in in-depth interviews. The average age of the participants was 32.5 years. Four main themes were extracted from the data: “fear and hope, “stigma and discrimination, “marital life stability” and “trust”. The findings reveal the pregnant women living with HIV are vulnerable and need professional support. Improving the knowledge of healthcare professionals especially midwifes on pregnancy complications for women with HIV is crucial in order to provide high-quality care to pregnant women with HIV-positive.

Keywords: HIV, pregnancy, content analysis, experiences, Iran, qualitative research

Procedia PDF Downloads 470
1639 Nurturing Resilient Families: Strategies for Positive Parenting and Emotional Well-Being

Authors: Xu Qian

Abstract:

This abstract explores the importance of building resilience within families and offers evidence-based strategies for promoting positive parenting and enhancing emotional well-being. It emphasizes the role of effective communication, conflict resolution, and fostering a supportive environment to strengthen family bonds and promote healthy child development. Introduction: The well-being and resilience of families play a crucial role in fostering healthy child development and promoting overall emotional well-being. This abstract highlights the significance of nurturing resilient families and provides evidence-based strategies for positive parenting. By focusing on effective communication, conflict resolution, and creating a supportive environment, families can strengthen their bonds and enhance emotional well-being for both parents and children. Methods: This abstract draws upon a comprehensive review of existing research and literature on resilient families, positive parenting, and emotional well-being. The selected studies employ various methodologies, including surveys, interviews, and longitudinal observations, to investigate the factors contributing to family resilience and the strategies that promote positive parenting practices. The findings from these studies serve as the foundation for the strategies discussed in this abstract. Results: The results of the reviewed studies demonstrate that effective communication within families is a key factor in building resilience and promoting emotional well-being. Open and honest communication allows family members to express their thoughts, feelings, and concerns, fostering trust and understanding. Conflict resolution skills, such as active listening, compromise, and problem-solving, are vital in managing conflicts constructively and preventing negative consequences on family dynamics and children's well-being. Creating a supportive environment that nurtures emotional well-being is another critical aspect of promoting resilient families. This includes providing emotional support, setting clear boundaries, and promoting positive discipline strategies. Research indicates that consistent and responsive parenting approaches contribute to improved self-regulation skills, emotional intelligence, and overall mental health in children. Discussion: The discussion centers on the implications of these findings for promoting positive parenting and emotional well-being. It emphasizes the need for parents to prioritize self-care and seek support when facing challenges. Parental well-being directly influences the quality of parenting and the overall family environment. By attending to their own emotional needs, parents can better meet the needs of their children and create a nurturing atmosphere. Furthermore, the importance of fostering resilience in children is highlighted. Resilient children are better equipped to cope with adversity, adapt to change, and thrive in challenging circumstances. By cultivating resilience through supportive relationships, encouragement of independence, and providing opportunities for growth, parents can foster their children's ability to bounce back from setbacks and develop essential life skills. Conclusion: In conclusion, nurturing resilient families is crucial for positive parenting and enhancing emotional well-being. This abstract presents evidence-based strategies that emphasize effective communication, conflict resolution, and creating a supportive environment. By implementing these strategies, parents can strengthen family bonds, promote healthy child development, and enhance overall family resilience. Investing in resilient families not only benefits individual family members but also contributes to the well-being of the broader community.

Keywords: childrearing families, family education, children's mental health, positive parenting, emotional health

Procedia PDF Downloads 83
1638 Improving Water and Sanitation Systems in Rural Ethiopia

Authors: Betselot Girma Argaw

Abstract:

The health of people living in rural areas of Ethiopia depends a lot on how good their water and sanitation systems are. Even though there have been efforts to improve these systems, many communities still struggle to get clean water and proper sanitation, which leads to many health problems and unfair conditions. This research looks into the current situation of water and sanitation in rural Ethiopia, focusing on the main challenges that stop these communities from having safe and lasting solutions. By studying current practices, policies, and infrastructure, this paper highlights the areas that need urgent attention. It also reviews successful examples and suggests recommendations that fit the local context. The goal is to offer practical ideas that can help create better strategies to improve the lives of millions of rural Ethiopians, aiming for lasting improvements in water and sanitation in these vulnerable areas.

Keywords: rural Ethiopia water, sanitation infrastructure, sustainable solutions, water accessibility

Procedia PDF Downloads 23
1637 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 321