Search results for: identity threat
1663 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 3591662 Malaria Vulnerability Mapping from the Space: A Case Study of Damaturu Town-Nigeria
Authors: Isa Muhammad Zumo
Abstract:
Malaria is one of the worst illnesses that may affect humans. It is typically transmitted by the bite of a female Anopheles mosquito and is caused by parasitic protozoans from the Plasmodium parasite. Government and non-governmental organizations made numerous initiatives to combat the threat of malaria in communities. Nevertheless, the necessary attention was not paid to accurate and current information regarding the size and location of these favourable locations for mosquito development. Because mosquitoes can only reproduce in specific habitats with surface water, this study will locate and map those favourable sites that act as mosquito breeding grounds. Spatial and attribute data relating to favourable mosquito breeding places will be collected and analysed using Geographic Information Systems (GIS). The major findings will be in five classes, showing the vulnerable and risky areas for malaria cases. These risk categories are very high, high, moderate, low, and extremely low vulnerable areas. The maps produced by this study will be of great use to the health department in combating the malaria pandemic.Keywords: Malaria, vulnerability, mapping, space, Damaturu
Procedia PDF Downloads 591661 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region
Authors: Muzammil Dar
Abstract:
The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China
Procedia PDF Downloads 1531660 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 3651659 Divalent Iron Oxidative Process for Degradation of Carbon and Nitrogen Based Pollutants from Dye Intermediate Industrial Wastewater
Authors: Nibedita Pani, Vishnu Tejani, T. S. Anantha Singh
Abstract:
Water pollution resulting from discharge of partial/not treated textile wastewater containing high carbon and nitrogen pollutants pose a huge threat to the environment, ecosystem, and human health. It is essential to remove carbon- and nitrogen-based organic pollutants more effectively from industrial wastewater before discharging. The present study focuses on removal of carbon-based pollutant in particular COD (chemical oxygen demand) and nitrogen-based pollutants, in particular, ammoniacal nitrogen by Fenton oxidation process using Fe²⁺ and H₂O₂ as reagents. The study was carried out with high strength wastewater containing initial COD 5632 mg/L and NH⁴⁺-N 1372 mg/L. The major operating condition like pH was varied between 1.0 to 4.0. The maximum degradation was obtained at pH 3.0 taking the molar ratio of Fe²⁺/H₂O₂ as 1:1. At this pH, the removal efficiencies of COD and ammoniacal nitrogen were found to be 77.27% and 74.9%, respectively. The Fenton process can be the best alternative for the simultaneous removal of COD and NH4+-N from industrial wastewater.Keywords: ammoniacal nitrogen, COD, Fenton oxidation, industrial wastewater
Procedia PDF Downloads 2041658 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey
Authors: Stephanie M. De Oliveira
Abstract:
For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.Keywords: refugees, Turkey, asylum seekers, United Nations
Procedia PDF Downloads 3681657 Visual Representation and the De-Racialization of Public Spaces
Authors: Donna Banks
Abstract:
In 1998 Winston James called for more research on the Caribbean diaspora and this ethnographic study, incorporating participant observation, interviews, and archival research, adds to the scholarship in this area. The research is grounded in the discipline of cultural studies but is cross-disciplinary in nature, engaging anthropology, psychology, and urban planning. This paper centers on community murals and their contribution to a more culturally diverse and representative community. While many museums are in the process of reassessing their collection, acquiring works, and developing programming to be more inclusive, and public art programs are investing millions of dollars in trying to fashion an identity in which all residents can feel included, local artists in neighborhoods in many countries have been using community murals to tell their stories. Community murals serve a historical, political, and social purpose and are an instrumental strategy in creative placemaking projects. Community murals add to the livability of an area. Even though official measurements of livability do not include race, ethnicity, and gender - which are egregious omissions - murals are a way to integrate historically underrepresented people into the wider history of a country. This paper draws attention to a creative placemaking project in the port city of Bristol, England. A city, like many others, with a history of spacializing race and racializing space. For this reason, Bristol’s Seven Saints of St. Pauls® Art & Heritage Trail, which memorializes seven Caribbean-born social and political change agents, is examined. The Seven Saints of St. Pauls® Art & Heritage Trail is crucial to the city, as well as the country, in its contribution to the de-racialization of public spaces. Within British art history, with few exceptions, portraits of non-White people who are not depicted in a subordinate role have been absent. The artist of the mural project, Michelle Curtis, has changed this long-lasting racist and hegemonic narrative. By creating seven large-scale portraits of individuals not typically represented visually, the artist has added them into Britain’s story. In these murals, however, we see more than just the likeness of a person; we are presented with a visual commentary that reflects each Saint’s hybrid identity of being both Black Caribbean and British, as well as their social and political involvement. Additionally, because the mural project is part of a heritage trail, the murals' are therapeutic and contribute to improving the well-being of residents and strengthening their sense of belonging.Keywords: belonging, murals, placemaking, representation
Procedia PDF Downloads 901656 Feels Like Home: A Study Of The Role Of Material Culture In Older Adults' Transition To A Retirement Village
Authors: Sharon Ganzer
Abstract:
Older adults want choices about where they ‘age-in-place’ and express the desire to remain in their home for as long as possible because it maintains feelings of independence and autonomy, perpetuates a sense of identity, enable people to have space for their belongings and supports connections and social engagement. When circumstances change, and alternative living arrangements are required, more and more older adults are considering a transition to a retirement village – the liminal space between home and residential care. This qualitative study explores the lived experience of older adults who relocate to a retirement village in Queensland, Australia, and the role that material culture plays in this process.Keywords: material culture, social gerontology, concepts of home, retirement villages
Procedia PDF Downloads 821655 A Study of Permission-Based Malware Detection Using Machine Learning
Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud
Abstract:
Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.Keywords: android malware detection, machine learning, malware, malware analysis
Procedia PDF Downloads 1671654 Analysing Anime as the Narration of Resistance: Case Study of Japanese Vampire Anime
Authors: Patrycja Pichnicka
Abstract:
Anime is the Japanese art of animation and a kind of Japanese animated movie, different from the Western ones by its specific features. In the world dominated by live action movies, mostly the ones produced in the United States, Japanese animated movies, which constitute a large part of the Japanese movie industry, play the role of the Other. They adapt elements of Western culture and technology to create something that resists global Western domination. This phenomenon is particularly interesting to observe in the case of narration borrowed from the Western culture, yet transformed in a specific manner: such as Vampire Narration. The phenomenon should be examined using the theory of cultural adaptation of Siergiei Arutiunow, as well as theory of cultural hegemony and postcolonial theories, including the theory of the discourse of resistance. Relations of cultural hegemony and resistance have been mentioned in works of Susan Napier, however they are worth to be fully developed. Anime relations to globally dominating culture reveal tension between submission and resistance in which non-Western identity is constructed and performed. Nonetheless, the tension between the Global/Western and the Japanese is not the only one existing in contemporaneous Japanese society and culture. Sexual, gender, class, and ethnic issues are also expressed in and through pop culture narrations. Using the basic division of the types of cultural adaptation we can trace the line of the evolution of the Japanese cultural attitude towards the West, expressed in the Vampire Narration from the time of American occupation till now. These attitudes changed from the submissive assimilation or reproduction of cultural models, through the simple opposition, to the more nuanced attitude of nowadays. However, according to Kimberlé Crenshaw’s intersectional theory, there is no one category of discrimination or submission. There are individuals or groups existing on the cross of two or more categories of emancipation. If the Japanese were culturally subdued to the Westerner, the Japanese woman was doubly subdued: as a woman and as a Japanese. The emancipation of one group can deepen the submission of another one, of internal Other, of the group in which two or more categories of domination/submission intersect. That is why some Japanese female authors enthusiastically reproduce the Western cultural models, even if this means a cultural hegemony of the West over the Japanese. They see, as women, more liberal attitudes towards their gender in the Western culture than in the Japanese culture, as it is constructed and produced by Japanese men. The Japanese anime is the realm in which sophisticated art meets social tendencies and cultural attitudes. Anime examination permits to study of the composed contemporaneous Japanese identity, as well as general rules of cultural relations.Keywords: anime, cultural hegemony, intercultural relations, resistance, vampire narration
Procedia PDF Downloads 1421653 School Counseling in Sri Lanka: Analysis of the past Recommending a Way Forward
Authors: Buddhiprabha D. D. Pathirana
Abstract:
Despite a rapid increase in the number of school counselors in the recent past; procuring the service of school counselors is a luxury that many Sri Lankan schools cannot afford. In addition, school counseling in Sri Lanka also faces new challenges in implementation due to the fact that a generally agreed consensus on training, ethical standards, role identity, counseling model, and structures for school counselors has not been reached. Therefore, this paper has several objectives. First, it reviews a brief history of school counseling in Sri Lanka and describes its current status. Second, it describes current trends/ problems specific to Sri Lankan school counseling milieu which have limited the progress of school counseling as a practice. Third, it discusses societal and cultural issues that are important to consider when implementing school counseling as a practices in Sri Lanka and provides recommendations to improve it.Keywords: school counseling, Sri Lanka, current situation, recommendations
Procedia PDF Downloads 5371652 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria
Authors: Paul Anyaogu, E. U. M. Igbo
Abstract:
This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.Keywords: Aba Urban, child street hawking, dangers, disposition, poverty
Procedia PDF Downloads 2811651 Life in Bequia in the Era of Climate Change: Societal Perception of Adaptation and Vulnerability
Authors: Sherry Ann Ganase, Sandra Sookram
Abstract:
This study examines adaptation measures and factors that influence adaptation decisions in Bequia by using multiple linear regression and a structural equation model. Using survey data, the results suggest that households are knowledgeable and concerned about climate change but lack knowledge about the measures needed to adapt. The findings from the SEM suggest that a positive relationship exist between vulnerability and adaptation, vulnerability and perception, along with a negative relationship between perception and adaptation. This suggests that being aware of the terms associated with climate change and knowledge about climate change is insufficient for implementing adaptation measures; instead the risk and importance placed on climate change, vulnerability experienced with household flooding, drainage and expected threat of future sea level are the main factors that influence the adaptation decision. The results obtained in this study are beneficial to all as adaptation requires a collective effort by stakeholders.Keywords: adaptation, Bequia, multiple linear regression, structural equation model
Procedia PDF Downloads 4631650 Vietnamese Les Rap as Art to Promote Rights and Gender
Authors: Ly Quyet Tien
Abstract:
The object of this paper is to study Vietnamese Les Rap as art to promote rights and gender in the twenty-first century. The author analyzed Vietnamese Les Rap from the point of view of a contemporary person who has witnessed the tumultuous destiny of the most suffering minority group in Vietnam’s LGBT community. He reviewed scholarly studies, and reputable newspapers on the topic and conducted face to face interviews for qualitative data. The study found that Vietnamese lesbians have composed and used rap as an effective tool to express their fight for visibility, identity, and sensibility. Research reveals that these songs did not only touch the heart of the LGBT community but also the larger public, marking the rising queer voice, contributing to a flourishing of LGBT culture, and revolutionizing the colors of Vietnamese hip hop music in the twenty-first century.Keywords: culture, lesbian, rap, Vietnam
Procedia PDF Downloads 971649 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order
Authors: Omair Anas
Abstract:
The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis
Procedia PDF Downloads 1361648 Developing Gifted Students’ STEM Career Interest
Authors: Wing Mui Winnie So, Tian Luo, Zeyu Han
Abstract:
To fully explore and develop the potentials of gifted students systematically and strategically by providing them with opportunities to receive education at appropriate levels, schools in Hong Kong are encouraged to adopt the "Three-Tier Implementation Model" to plan and implement the school-based gifted education, with Level Three refers to the provision of learning opportunities for the exceptionally gifted students in the form of specialist training outside the school setting by post-secondary institutions, non-government organisations, professional bodies and technology enterprises. Due to the growing concern worldwide about low interest among students in pursuing STEM (Science, Technology, Engineering, and Mathematics) careers, cultivating and boosting STEM career interest has been an emerging research focus worldwide. Although numerous studies have explored its critical contributors, little research has examined the effectiveness of comprehensive interventions such as “Studying with STEM professional”. This study aims to examine the effect on gifted students’ career interest during their participation in an off-school support programme designed and supervised by a team of STEM educators and STEM professionals from a university. Gifted students were provided opportunities and tasks to experience STEM career topics that are not included in the school syllabus, and to experience how to think and work like a STEM professional in their learning. Participants involved 40 primary school students joining the intervention programme outside the normal school setting. Research methods included adopting the STEM career interest survey and drawing tasks supplemented with writing before and after the programme, as well as interviews before the end of the programme. The semi-structured interviews focused on students’ views regarding STEM professionals; what’s it like to learn with a STEM professional; what’s it like to work and think like a STEM professional; and students’ STEM identity and career interest. The changes in gifted students’ STEM career interest and its well-recognised significant contributors, for example, STEM stereotypes, self-efficacy for STEM activities, and STEM outcome expectation, were collectively examined from the pre- and post-survey using T-test. Thematic analysis was conducted for the interview records to explore how studying with STEM professional intervention can help students understand STEM careers; build STEM identity; as well as how to think and work like a STEM professional. Results indicated a significant difference in STEM career interest before and after the intervention. The influencing mechanism was also identified from the measurement of the related contributors and the analysis of drawings and interviews. The potential of off-school support programme supervised by STEM educators and professionals to develop gifted students’ STEM career interest is argued to be further unleashed in future research and practice.Keywords: gifted students, STEM career, STEM education, STEM professionals
Procedia PDF Downloads 751647 To Study the New Invocation of Biometric Authentication Technique
Authors: Aparna Gulhane
Abstract:
Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology.Keywords: types of biometrics, importance of biometric, review for biometrics and getting a new implementation, biometric authentication technique
Procedia PDF Downloads 3211646 Countering Terrorism and Defending Human Right after 9/11: The European Perspective
Authors: Anita Blagojević
Abstract:
It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights
Procedia PDF Downloads 3781645 Cultural Studies in the Immigration Movements: Memories and Social Collectives
Authors: María Eugenia Peltzer, María Estela Rodríguez
Abstract:
This work presents an approach to the cultural aspects of the Immigrants as part of the Cultural Intangible Heritage of Argentina. The intangible cultural heritage consists of the manifestations, practices, uses, representations, expressions, knowledge, techniques and cultural spaces that communities and groups recognize as an integral part of their cultural heritage. This heritage generates feelings of identity and establishes links with the collective memory, as well as being transmitted and recreated over time according to its environment, its interaction with nature and its history contributing to promote respect for cultural diversity and Human creativity. The Immigrants brings together those who came from other lands and their descendants, thus maintaining their traditions through time and linking the members of each cultural group with a strong sense of belonging through a communicative and effective process.Keywords: cultural, immigration, memories, social
Procedia PDF Downloads 4391644 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1071643 Determinants of Psychological Distress in Teenagers and Young Adults Affected by Cancer: A Systematic Review
Authors: Anna Bak-Klimek, Emily Spencer, Siew Lee, Karen Campbell, Wendy McInally
Abstract:
Background & Significance: Over half of Teenagers and Young Adults (TYAs) say that they experience psychological distress after cancer diagnosis and TYAs with cancer are at higher risk of developing distress compared to other age groups. Despite this there are no age-appropriate interventions to help TYAs manage distress and there is a lack of conceptual understanding of what causes distress in this population group. This makes it difficult to design a targeted, developmentally appropriate intervention. This review aims to identify the key determinants of distress in TYAs affected by cancer and to propose an integrative model of cancer-related distress for TYAs. Method: A literature search was performed in Cochrane Database of Systematic Reviews, MEDLINE, PsycINFO, CINAHL, EMBASE and PsycArticles in May-June, 2022. Quantitative literature was systematically reviewed on the relationship between psychological distress experienced by TYAs affected by cancer and a wide range of factors i.e. individual (demographic, psychological, developmental, and clinical factors) and contextual (social/environmental) factors. Evidence was synthesized and correlates were categorized using the Biopsychosocial Model. The full protocol is available from PROSPERO (CRD42022322069) Results: Thirty eligible quantitative studies met criteria for the review. A total of twenty-six studies were cross-sectional, three were longitudinal and one study was a case control study. The evidence on the relationship between the socio-demographic, illness and treatment-related factors and psychological distress is inconsistent and unclear. There is however consistent evidence on the link between psychological factors and psychological distress. For instance, the use of cognitive and defence coping, negative meta-cognitive beliefs, less optimism, a lack of sense of meaning and lower resilience levels were significantly associated with higher psychological distress. Furthermore, developmental factors such as poor self-image, identity issues and perceived conflict were strongly associated with higher distress levels. Conclusions: The current review suggests that psychological and developmental factors such as ineffective coping strategies, poor self-image and identity issues may play a key role in the development of psychological distress in TYAs affected by cancer. The review proposes a Positive Developmental Psychology Model of Distress for Teenagers and Young Adults affected by cancer. The review highlights that implementation of psychological interventions that foster optimism, improve resilience and address self-image may result in reduced distress in TYA’s with cancer.Keywords: cancer, determinant, psychological distress, teenager and young adult, theoretical model
Procedia PDF Downloads 941642 Create a Brand Value Assessment Model to Choosing a Cosmetic Brand in Tehran Combining DEMATEL Techniques and Multi-Stage ANFIS
Authors: Hamed Saremi, Suzan Taghavy, Seyed Mohammad Hanif Sanjari, Mostafa Kahali
Abstract:
One of the challenges in manufacturing and service companies to provide a product or service is recognized Brand to consumers in target markets. They provide most of their processes under the same capacity. But the constant threat of devastating internal and external resources to prevent a rise Brands and more companies are recognizing the stages are bankrupt. This paper has tried to identify and analyze effective indicators of brand equity and focuses on indicators and presents a model of intelligent create a model to prevent possible damage. In this study, the identified indicators of brand equity are based on literature study and according to expert opinions, set of indicators By techniques DEMATEL Then to used Multi-Step Adaptive Neural-Fuzzy Inference system (ANFIS) to design a multi-stage intelligent system for assessment of brand equity.Keywords: brand, cosmetic product, ANFIS, DEMATEL
Procedia PDF Downloads 4171641 Dual Mode “Turn On-Off-On” Photoluminescence Detection of EDTA and Lead Using Moringa Oleifera Gum-Derived Carbon Dots
Authors: Anisha Mandal, Swambabu Varanasi
Abstract:
Lead is one of the most prevalent toxic heavy metal ions, and its pollution poses a significant threat to the environment and human health. On the other hand, Ethylenediaminetetraacetic acid is a widely used metal chelating agent that, due to its poor biodegradability, is an incessant pollutant to the environment. For the first time, a green, simple, and cost-effective approach is used to hydrothermally synthesise photoluminescent carbon dots using Moringa Oleifera Gum in a single step. Then, using Moringa Oleifera Gum-derived carbon dots, a photoluminescent "ON-OFF-ON" mechanism for dual mode detection of trace Pb2+ and EDTA was proposed. MOG-CDs detect Pb2+ selectively and sensitively using a photoluminescence quenching mechanism, with a detection limit (LOD) of 0.000472 ppm. (1.24 nM). The quenched photoluminescence can be restored by adding EDTA to the MOG-CD+Pb2+ system; this strategy is used to quantify EDTA at a level of detection of 0.0026 ppm. (8.9 nM). The quantification of Pb2+ and EDTA in actual samples encapsulated the applicability and dependability of the proposed photoluminescent probe.Keywords: carbon dots, photoluminescence, sensor, moringa oleifera gum
Procedia PDF Downloads 1141640 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment
Authors: Wenqing Fan, Yixuan Cheng, Wei Huang
Abstract:
The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence
Procedia PDF Downloads 1211639 Language Maintenance and Literacy of Madurese in Probolinggo City
Authors: Maria Ulfa, Nur Awaliyah Putri
Abstract:
Madurese is known as Malayo-Sumbawan Austronesian language which is used by Madurese people in Madura Island, Indonesia. However, there was a massive migration of Madurese people due to Dutch colonization. The Madurese people were brought by force for cultivation system to the eastern salient north coast or called as Tapal Kuda that spread in region covers the regencies of Probolinggo, Lumajang, Jember, Situbondo, Bondowoso, and Banyuwangi, the eastern part of the Pasuruan Regency, as well as the city of Probolinggo. The city of Probolinggo has unique characteristic regarding the ethnic and language variation. Several ethnics can be found in this city, such as Madurese, Javanese, Tengger, Arabic, Mandhalungan, Osing, and Chinese. Hence, the hybrid culture happens in Probolinggo, they called the culture as Pendhalungan which is the combination of culture among Madurese and Javanese. Among those ethnics, Madurese is the strongest ethnic that still maintains their identity, such as their ethnic language. The massive growth of Madurese in Probolinggo city, East Java is interesting to be analyzed. The object of this study is to discover language ideology and literacy of Madurese to maintain their ethnic language in Probolinggo city, East Java. The researchers used the theory of language maintenance practice based on three types of practices social language, social literacy, and peripheral ritualized practices. The approach of this study was qualitative research with ethnography method. In order to collect the data, researchers used observation and interview techniques. The amount of informants were 20 families which consist of mother, father and children in 5 sub-districts in Probolinggo city and they were interviewed regarding language ideology and literacy of Madurese. In supporting the data, researchers employed the Madurese speakers outside family scope like in school, office, and market. The result of the study revealed that Madurese has been preserved heritably to young generations by ethnics of Madura in Probolinggo city. Primarily the language is being taught in the earlier age of their children as L1 and used as ethnic identity. The parents teach them with simple sentences that grammatically correct. This language literacy is applied to maintain ethnic language as their ethnicity marker since they inhabit in Javanese ethnic area. In fact, it is not the only ideology of Madurese ethnic but also the influence of economic situation like in trading communication. The usage of Madurese in the trading scope is very beneficial since people can bargain the goods cheaper and easier because most of the traders are from Madurese ethnic. In this situation, linguistic phenomena such as code mixing and code switching between Madurese and Javanese are emerged as the trading communication. From the result, it can be concluded that solidarity exists among Madurese people in many scopes.Keywords: language literacy, language maintenance, Madurese, Probolinggo City
Procedia PDF Downloads 2331638 British Female Muslim Converts: An Investigation into Their De-Conversions from Islam
Authors: Mona Alyedreessy
Abstract:
This study, which is based on a qualitative study sample of thirty-four British converts from different ages, ethnicities, social classes, areas and religious backgrounds in London, investigates the common challenges, problems and abuse in the name of Islam that many British female Muslim converts experienced during their time as Muslims, which caused them to leave the faith. It is an important study, as it creates an awareness of the weaknesses found in western Muslim societies and in various Islamic educational programs that causes people to leave Islam and contribute towards its negative reputation in the media. The women in this study shared common problems regarding gender and racial discrimination, identity development, feminism, marriage, parenting, Muslim culture, isolation, extremism, belonging and practising Islam in both Muslim and non-Muslim societies with differing sacrifices and consequences that caused them to de-convert. The study argues that many of the personal, religious and social problems female Muslim converts experience are due to a lack of knowledge about Islam and their rights as Muslim women, which often results in them being vulnerable and influenced by the opinions, attitudes and actions of uneducated, abusive, non-practising and extremist Muslims. For example, it was found that young female converts in particular were often taken advantage of and manipulated into believing that many negative actions displayed by patriarchal Muslim husbands were a part of Islam. This created much confusion, especially when their husbands used specific Quran texts and Hadiths to justify their abuse, authority and attitudes that made them miserable. As a result and based on the positive experiences of some converts, the study found that obtaining a broad Islamic education that started with an intimate study of the Prophet Muhammad’s biography alongside being guided by the teachings of western Muslim scholars contributed greatly towards a more enjoyable conversion journey, as women were able to identify and avoid problematic Muslims and abuse in the name of Islam. This in turn helped to create a healthier family unit and Muslim society. Those who enjoyed being Muslims were able to create a balanced western Muslim identity by negotiating and applying their own morals and western values to their understanding of The Prophet’s biography and The Quran and integrated Islamic values into their own secular western environments that were free from foreign cultural practices. The outcomes of the study also highlight some effective modern approaches to da’wah based on the teachings of The Prophet Mohammad and other prophets for young Arab and Asian Muslims who marry, study and live among non-Muslims and converts.Keywords: abuse, apostasy, converts, Muslims
Procedia PDF Downloads 2321637 Structuring the Role of Indonesia's Dilemma Position in ASEAN to Combat Human Trafficking
Authors: Febi Eka Putri, Prabowo Anggorono
Abstract:
Human Trafficking has become a threat in the global phenomenon, including Indonesia as a country adopting democracy to uphold the human rights value. Indonesia is classified as a source of trafficking in persons which dominate by women and children for sexual exploitation and forced labor purposes. In this case, Indonesia has committed to combat trafficking in persons by enacted domestic law to criminalize all types of human trafficking in domestic and international level. Tracing to the efforts, we cannot just simplify it, however, in 2016 Indonesia has placed as a tier 2 country because the government does not fully achieve the minimum standard by U. S. Trafficking Victims Protection Act due to only making efforts as progress. While as a part of ASEAN member, Indonesia has signed ASEAN Human Rights Declaration but when it comes to Human Trafficking issue, there is only few ASEAN member who has ratified ASEAN Convention on Trafficking in Persons, in particular Women and Children such as Singapore, Cambodia, and Thailand. This brings the evidence to structuring the role of Indonesia to combat human trafficking.Keywords: Indonesia, Association of Southeast Asian Nations (ASEAN), human trafficking, Tier 2 country
Procedia PDF Downloads 3531636 Strong Convergence of an Iterative Sequence in Real Banach Spaces with Kadec Klee Property
Authors: Umar Yusuf Batsari
Abstract:
Let E be a uniformly smooth and uniformly convex real Banach space and C be a nonempty, closed and convex subset of E. Let $V= \{S_i : C\to C, ~i=1, 2, 3\cdots N\}$ be a convex set of relatively nonexpansive mappings containing identity. In this paper, an iterative sequence obtained from CQ algorithm was shown to have strongly converge to a point $\hat{x}$ which is a common fixed point of relatively nonexpansive mappings in V and also solve the system of equilibrium problems in E. The result improve some existing results in the literature.Keywords: relatively nonexpansive mappings, strong convergence, equilibrium problems, uniformly smooth space, uniformly convex space, convex set, kadec klee property
Procedia PDF Downloads 4221635 Biomedical Countermeasures to Category a Biological Agents
Authors: Laura Cochrane
Abstract:
The United States Centers for Disease Control and Prevention has established three categories of biological agents based on their ease of spread and the severity of the disease they cause. Category A biological agents are the highest priority because of their high degree of morbidity and mortality, ease of dissemination, the potential to cause social disruption and panic, special requirements for public health preparedness, and past use as a biological weapon. Despite the threat of Category A biological agents, opportunities for medical intervention exist. This work summarizes public information, consolidated and reviewed across the situational usefulness and disease awareness to offer discussion to three specific Category A agents: anthrax (Bacillus anthracis), botulism (Clostridium botulinum toxin), and smallpox (variola major), and provides an overview on the management of medical countermeasures available to treat these three (3) different types of pathogens. The medical countermeasures are discussed in the setting of pre-exposure prophylaxis, post-exposure prophylaxis, and therapeutic treatments to provide a framework for requirements in public health preparedness.Keywords: anthrax, botulism, smallpox, medical countermeasures
Procedia PDF Downloads 761634 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)
Authors: R. Rama Kishore, Sunesh Malik
Abstract:
Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.Keywords: digital watermarking, fractional transform, halftone, visual cryptography
Procedia PDF Downloads 355