Search results for: vulnerable people
6994 An Improved Many Worlds Quantum Genetic Algorithm
Authors: Li Dan, Zhao Junsuo, Zhang Wenjun
Abstract:
Aiming at the shortcomings of the Quantum Genetic Algorithm such as the multimodal function optimization problems easily falling into the local optimum, and vulnerable to premature convergence due to no closely relationship between individuals, the paper presents an Improved Many Worlds Quantum Genetic Algorithm (IMWQGA). The paper using the concept of Many Worlds; using the derivative way of parallel worlds’ parallel evolution; putting forward the thought which updating the population according to the main body; adopting the transition methods such as parallel transition, backtracking, travel forth. In addition, the algorithm in the paper also proposes the quantum training operator and the combinatorial optimization operator as new operators of quantum genetic algorithm.Keywords: quantum genetic algorithm, many worlds, quantum training operator, combinatorial optimization operator
Procedia PDF Downloads 7456993 Personality Traits and Starting a Romantic Relationship on Social Media in a Turkish Sample
Authors: Ates Gul Ergun, Melda Tacyildiz
Abstract:
The current study focuses on the relationship between the personality traits and starting a romantic relationship on social media. It is interested in the study whether there are any personality trait differences between individuals who started their romantic relationships on social media platforms or through circle of friends in daily life. Sixty five participants between the ages of 18-30 filled out a three-question-survey about romantic relationships and social media, with the Big Five Inventory. Four separate independent samples t tests comparing agreeableness and extraversion scores on the environment of participants first interacted (online vs. real-life) and where they fırst meet without interaction (online vs. real-life) were carried out. The results indicated that there was a statistically significant difference between people who had the first interaction with their partner online vs. real-life in terms of extraversion and agreeableness traits. The more extrovert and agreeable traits reported the more people were likely to interact with their partner through circle of friends in real-life. Furthermore, it was found that people who are less agreeable have a tendency to interact with their partners in social media for the first time. However, there was no statistically significant difference between how participants met with their partners without interaction (online vs. real-life) in terms of extraversion and agreeableness traits. This study has shown the relationships between personality traits and starting a romantic relationship on social media versus in real-life but not the reasons behind it. Further research could examine such reasons. In addition, the data only includes Turkish sample. By virtue of the cultural restriction in the present study, it is suggested that the future research should also include different cultures to investigate how people spend time with their friends and also in social media which can be changed according to individualism levels of countries. Overall, the study emphasizes the importance and the role of social media in individual’s lives, and it opens the ways associated with personal traits and social media relationships for further researches.Keywords: agreeableness, big five, extraversion, romantic relationships, social media
Procedia PDF Downloads 1476992 The Socio-Religious, Economic, and Cultural Impacts of Aso-Ebi on South-East Nigeria
Authors: Nwaoga, Theresa Chinyere
Abstract:
The paper examines the impacts of Aso-Ebi, a Yoruba term for ‘uniform’ on the people of south-east Nigeria. Aso-Ebi is used to denote uniform wear which is typical of the people of south-west Nigeria. In the 1980s and 1990s, uniform wears were used only by immediate family members of a deceased person. This is for easy identification by visitors—to know those who are related to the deceased person. Aso-Ebi is now part of a culture that has existed in Nigeria from the Yoruba and transcended to other parts of Nigeria, precisely south-east Nigeria. The buying of Aso-Ebi and attending the occasions in the attire is the only way of showing solidarity and support to the celebrant. Aso-Ebi has led to creating a sense of belonging, opening of doors for marriage by those single, and fundraising. As part of the findings, it was discovered that Aso-Ebi has led to an increase in marital infidelity and divorce, robbery, prostitution, depression, and an increase in enmity between friends in south-east Nigeria. Data was generated through oral interviews, focus group discussion and participant observation. Secondary data were obtained from journals, textbooks, the internet and periodicals. The phenomenological method of research was used as the methodology. This method allows for an objective report and analysis of the research problem. Aso-Ebi has come to stay in Igbo culture, so there should be a proper re-orientation on the uses of Aso-Ebi during occasions like burial in Igbo land. The campaign can start from the church by discouraging people from using Aso-Ebi during burials and wedding ceremonies.Keywords: Asho Ebi, uniformed women, burial ceremonies, August meetings
Procedia PDF Downloads 1486991 The Symbolism of Kolanut in Igbo Cosmology: A Re-Examination
Authors: Chukwudi Chidume
Abstract:
This paper considers the symbolism of kola nut according to Igbo worldview. How kola nut helps to shape the people’s philosophical ideology, especially in relation to religion. The roles of kola nut within the Igbo socio-cultural context and the values attached to these roles will be examined. The roles of kola nut as a means of socialization, education and transmission of cultural values from the preceding to succeeding generations will come under consideration. Equally, this paper looks at the traditional rules regarding not only the uses but more essentially the mode of kola nut presentation, blessing, breaking and sharing of kola nut. How these rules and kola nut have persisted in the face of social and cultural changes which have affected the Igbo people shall be reviewed. The roles played by kola nut in Igbo religion will come under study, which is to correct some of the misconceptions by writers who are motivated by eurocentric idealism but quite oblivious of the Igbo cultural setting and the place of kola nut in it. The onslaught of Western civilization causing the change of attitude among the young generation towards kola nut as a vital aspect of our culture tends to pose a threat to the future and survival of kola nut. Again, the study of Igbo culture as many have done rarely gives an in depth knowledge on the concept, roles and symbolism of kola nut as one of the sacred objects like Ofo and Shrines in Igboland. Mostly it is forgotten that without kola nut, shrines cannot be attended to. Many people think that the spiritual significance and sacramental symbolism are not worth exploring. They, therefore, refuse to try and discover the ritual ramifications, claiming that to probe into the mystery demystifies the matter. Kola nut symbolism is not mysteriously inexplicable. It is a revered symbol of social intercourse with deep social relevance.Keywords: communion, consecration, Igbo, kola nut, religion
Procedia PDF Downloads 4566990 Oil Exploration in the Niger Delta and the Right to a Healthy Environment
Authors: Olufunke Ayilara Aje-Famuyide
Abstract:
The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Nigerian coast, the story and consequence is virtually the same. Nigeria’s Niger Delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Nigeria earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Niger Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Niger Delta of Nigeria with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Niger Delta and their enforcement by the Nigerian State. It is quite worrisome that the Niger Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Nigerian effort at best is half-hearted in its protection of the people’s right.Keywords: environment, exploration, petroleum, pollution
Procedia PDF Downloads 4346989 Cultural Studies: The Effect of Western Culture on Muslim Lifestyle
Authors: Farah Wahida Binti Mohamad Said
Abstract:
Islamic culture is the way of life a Muslim is defined by the Qur’an and Sunnah. On the other hand, Western culture is fashioned by a host of people; Capitalists, atheists, people who believe in same-gender marriages and others of a similar nature. The main issue that faced by the Muslim in Malaysia is the effect of western culture on Muslim lifestyle. This is because of the influence from western culture that dominates mind of the Muslim and also impressed on their lifestyle. Practically, majority all things have connected with western culture. However, the main objective for this project is to develop the effect of western culture on Muslim lifestyle. This project also focuses on a few aspects that relate with cultural of Muslim and western culture nowadays. This paper will include a few method .The methods for this project are a video, interview etc. Another methodology we will put on next paper for more detail information. As a result, this research found that western cultural will be effect on Muslim lifestyle.Keywords: effect of western culture, Muslim lifestyle, western culture, western and Muslim culture
Procedia PDF Downloads 5216988 Modelling of Passengers Exchange between Trains and Platforms
Authors: Guillaume Craveur
Abstract:
The evaluation of the passenger exchange time is necessary for railway operators in order to optimize and dimension rail traffic. Several influential parameters are identified and studied. Each parameter leads to a modeling completed with the buildingEXODUS software. The objective is the modelling of passenger exchanges measured by passenger counting. Population size is dimensioned using passenger counting files which are a report of the train service and contain following useful informations: number of passengers who get on and leave the train, exchange time. These information are collected by sensors placed at the top of each train door. With passenger counting files it is possible to know how many people are engaged in the exchange and how long is the exchange, but it is not possible to know passenger flow of the door. All the information about observed exchanges are thus not available. For this reason and in order to minimize inaccuracies, only short exchanges (less than 30 seconds) with a maximum of people are performed.Keywords: passengers exchange, numerical tools, rolling stock, platforms
Procedia PDF Downloads 2286987 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2906986 Heat Vulnerability Index (HVI) Mapping in Extreme Heat Days Coupled with Air Pollution Using Principal Component Analysis (PCA) Technique: A Case Study of Amiens, France
Authors: Aiman Mazhar Qureshi, Ahmed Rachid
Abstract:
Extreme heat events are emerging human environmental health concerns in dense urban areas due to anthropogenic activities. High spatial and temporal resolution heat maps are important for urban heat adaptation and mitigation, helping to indicate hotspots that are required for the attention of city planners. The Heat Vulnerability Index (HVI) is the important approach used by decision-makers and urban planners to identify heat-vulnerable communities and areas that require heat stress mitigation strategies. Amiens is a medium-sized French city, where the average temperature has been increasing since the year 2000 by +1°C. Extreme heat events are recorded in the month of July for the last three consecutive years, 2018, 2019 and 2020. Poor air quality, especially ground-level ozone, has been observed mainly during the same hot period. In this study, we evaluated the HVI in Amiens during extreme heat days recorded last three years (2018,2019,2020). The Principal Component Analysis (PCA) technique is used for fine-scale vulnerability mapping. The main data we considered for this study to develop the HVI model are (a) socio-economic and demographic data; (b) Air pollution; (c) Land use and cover; (d) Elderly heat-illness; (e) socially vulnerable; (f) Remote sensing data (Land surface temperature (LST), mean elevation, NDVI and NDWI). The output maps identified the hot zones through comprehensive GIS analysis. The resultant map shows that high HVI exists in three typical areas: (1) where the population density is quite high and the vegetation cover is small (2) the artificial surfaces (built-in areas) (3) industrial zones that release thermal energy and ground-level ozone while those with low HVI are located in natural landscapes such as rivers and grasslands. The study also illustrates the system theory with a causal diagram after data analysis where anthropogenic activities and air pollution appear in correspondence with extreme heat events in the city. Our suggested index can be a useful tool to guide urban planners and municipalities, decision-makers and public health professionals in targeting areas at high risk of extreme heat and air pollution for future interventions adaptation and mitigation measures.Keywords: heat vulnerability index, heat mapping, heat health-illness, remote sensing, urban heat mitigation
Procedia PDF Downloads 1516985 Mandate of Heaven and Serving the People in Chinese Political Rhetoric: An Evolving Discourse System across Three Thousand Years
Authors: Weixiao Wei, Chris Shei
Abstract:
This paper describes Mandate of Heaven as a source of justification for the ruling regime from ancient China approximately three thousand years ago. Initially, the kings of Shang dynasty simply nominated themselves as the sons of Heaven sent to Earth to rule the common people. As the last generation of the kings became corrupted and ruled withbrutal force and crueltywhich directly caused their destruction, the successive kings of Zhou dynasty realised the importance of virtue and the provision of goods to the people. Legitimacy of the ruling regimes became rested not entirely on random allocation of the throne by an unknown supernatural force but on a foundation comprising morality and the ability to provide goods. The latter composite was picked up by the current ruling regime, the Chinese Communist Party, and became the cornerstone of its political legitimacy, also known as ‘performance legitimacy’ where economic development accounts for the satisfaction of the people in place of election and other democratic means of providing legal-rational legitimacy. Under this circumstance, it becomes important as well for the ruling party to use political rhetoric to convince people of the good performance of the government in the economy, morality, and foreign policy. Thus, we see a lot of propaganda materials in both government policy statements and international press conference announcements. The former consists mainly of important speeches made by prominent figures in Party conferences which are not only made publicly available on the government websites but also become obligatory reading materials for university entrance examinations. The later consists of announcements about foreign policies and strategies and actions taken by the government regarding foreign affairsmade in international conferences and offered in Chinese-English bilingual versions on official websites. This documentation strategy creates an impressive image of the Chinese Communist Party that is domestically competent and international strong, taking care of the people it governs in terms of economic needs and defending the country against any foreign interference and global adversities. This political discourse system comprising reading materials fully extractable from government websites also becomes excellent repertoire for teaching and researching in contemporary Chinese language, discourse and rhetoric, Chinese culture and tradition, Chinese political ideology, and Chinese-English translation. This paper aims to provide a detailed and comprehensive description of the current Chinese political discourse system, arguing about its lineage from the rhetorical convention of Mandate of Heaven in ancient China and its current concentration on serving the people in place of election, human rights, and freedom of speech. The paper will also provide guidelines as to how this discourse system and the manifestation of official documents created under this system can become excellent research and teaching materials in applied linguistics.Keywords: mandate of heaven, Chinese communist party, performance legitimacy, serving the people, political discourse
Procedia PDF Downloads 1106984 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1546983 Safety Conditions Analysis of Scaffolding on Construction Sites
Authors: M. Pieńko, A. Robak, E. Błazik-Borowa, J. Szer
Abstract:
This paper presents the results of analysis of 100 full-scale scaffolding structures in terms of compliance with legal acts and safety of use. In 2016 and 2017, authors examined scaffolds in Poland located at buildings which were at construction or renovation stage. The basic elements affecting the safety of scaffolding use such as anchors, supports, platforms, guardrails and toe-boards have been taken into account. All of these elements were checked in each of considered scaffolding. Based on the analyzed scaffoldings, the most common errors concerning assembly process and use of scaffolding were collected. Legal acts on the scaffoldings are not always clear, and this causes many issues. In practice, people realize how dangerous the use of incomplete scaffolds is only when the accident occurs. Despite the fact that the scaffolding should ensure the safety of its users, most accidents on construction sites are caused by fall from a height.Keywords: façade scaffolds, load capacity, practice, safety of people
Procedia PDF Downloads 4036982 Facebook Spam and Spam Filter Using Artificial Neural Networks
Authors: A. Fahim, Mutahira N. Naseem
Abstract:
SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.Keywords: artificial neural networks, facebook spam, social networking sites, spam filter
Procedia PDF Downloads 3736981 Behavioral Experiments of Small Societies in Social Media: Facebook Expressions of Anchored Relationships
Authors: Nuran Öze
Abstract:
Communities and societies have been changing towards computer mediated communication. This paper explores online and offline identities and how relationships are formed and negotiated within internet environments which offer opportunities for people who know each other offline and move into relationships online. The expectations and norms of behavior within everyday life cause people to be embodied self. According to the age categories of Turkish Cypriots, their measurements of attitudes in Facebook will be investigated. Face-to-face field research and semi-structured interview methods are used in the study. Face-to-face interview has been done with Turkish Cypriots who are using Facebook already. According to the study, in constructing a linkage between real and virtual identities mostly affected from societal relations serves as a societal grooming tool for Turkish Cypriots.Keywords: facebook, identity, social media, virtual reality
Procedia PDF Downloads 3046980 Functional Vision of Older People with Cognitive Impairment Living in Galician Nursing Homes
Authors: C. Vázquez, L. M. Gigirey, C. P. del Oro, S. Seoane
Abstract:
Poor vision is common among older people, and several studies show connections between visual impairment and cognitive function. 15 older adult live in Galician Government nursing homes, and cognitive decline is one of the main reasons of admission. Objectives: (1) To evaluate functional far and near vision of older people with cognitive impairment. (2) To determine connections between visual and cognitive state of “our” residents. Methodology: A total of 364 older adults (aged 65 years or more) underwent a visual and cognitive screening. We tested presenting visual acuity (binocular visual acuity with habitual correction if warn) for distance and near vision (E-Snellen, usual working distance for near vision). Binocular presenting visual acuity less than 0.3 was used as cut point for diagnosis of visual impairment. Exclusion criteria included immobilized residents unable to reach the USC Dual Sensory Loss Unit for visual screening. To screen cognition we employed the mini-mental examination test (Spanish version). Analysis of categorical variables was performed using chi-square tests. We utilized Pearson and Spearman correlation tests and the variance analysis to determine differences between groups of interest (SPSS 19.0 version). Results: the percentage of residents with cognitive decline reaches 32.2% Prevalence of visual impairment for distance and near vision increases among those subjects with cognitive impairment respect those with normal cognition. Shift correlation exists between distance visual acuity and mini-mental test (age and sex controlled), and moderate association was found in case of near vision (p<0.01). Conclusion: First results shows that people with cognitive impairment have poor functional distance and near vision than those with normal cognition. Next step will be to analyse the individual contribution of distance and near vision loss on cognition.Keywords: visual impairment, cognition, aging, nursing homes
Procedia PDF Downloads 4306979 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks
Authors: Ebrahim Alrashed
Abstract:
Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.Keywords: energy-aware routing, reliability, sink-hole attack, WSN
Procedia PDF Downloads 3986978 Impact of Popular Passive Physiological Diversity Drivers on Thermo-Physiology
Authors: Ilango Thiagalingam, Erwann Yvin, Gabriel Crehan, Roch El Khoury
Abstract:
An experimental investigation is carried out in order to evaluate the relevance of a customization approach of the passive thermal mannikin. The promise of this approach consists in the following assumption: physiological differences lead to distinct thermo-physiological responses that explain a part of the thermal appraisal differences between people. Categorizing people and developing an appropriate thermal mannikin for each group would help to reduce the actual dispersion on the subjective thermal comfort perception. The present investigation indicates that popular passive physiological diversity drivers such as sex, age and BMI are not the correct parameters to consider. Indeed, very little or no discriminated global thermo-physiological responses arise from the physiological classification of the population using these parameters.Keywords: thermal comfort, thermo-physiology, customization, thermal mannikin
Procedia PDF Downloads 1006977 Information Sharing with Potential Users of Traditional Knowledge under Provisions of Nagoya Protocol: Issues of Participation of Indigenous People and Local Communities
Authors: Hasrat Arjjumend, Sabiha Alam
Abstract:
The Nagoya Protocol is landmark international legislation governing access to genetic resources and benefit sharing from utilization of genetic resource and traditional knowledge. The field implications of the international law have been assessed by surveying academic/ research institutions, civil society organizations (CSOs) and concerned individuals, who gave their opinions on whether the provider parties (usually developing countries) would ensure effective participation of Indigenous people and local communities (ILCs) in establishing the mechanisms to inform the potential users of traditional knowledge (TK) about their obligations under art. 12.2 of Nagoya Protocol. First of all, involvement and participation of ILCs in suggested clearing-house mechanisms of the Parties are seldom witnessed. Secondly, as respondents expressed, it is doubtful that developing countries would ensure effective participation of ILCs in establishing the mechanisms to inform the potential users of TK about their obligations. Yet, as most of ILCs speak and understand local or indigenous languages, whether the Nagoya Protocol provides or not, it is a felt need that the Parties should disclose information in a language understandable to ILCs. Alternative opinions indicate that if TK held by ILCs is disclosed, the value is gone. Therefore, it should be protected by the domestic law first and should be disclosed then.Keywords: genetic resources, indigenous people, language, Nagoya protocol, participation, traditional knowledge
Procedia PDF Downloads 1516976 Amphibious Architecture: A Benchmark for Mitigating Flood Risk
Authors: Lara Leite Barbosa, Marco Imperadori
Abstract:
This article aims to define strategies for applying innovative technology so that housing in regions subject to floods can be more resilient to disasters. Based on case studies of seven amphibious and floating projects, it proposes design guidelines to implement this practice. Its originality consists of transposing a technology developed for fluctuating buildings for housing types in regions affected by flood disasters. The proposal could be replicated in other contexts, endowing vulnerable households with the ability to resist rising water levels after a flood. The results of this study are design guidelines to adapt for houses in areas subject to flooding, contributing to the mitigation of this disaster.Keywords: amphibious housing, disaster resilience, floating architecture, flood mitigation, post-disaster reconstruction
Procedia PDF Downloads 1576975 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks
Procedia PDF Downloads 2776974 Received Signal Strength Indicator Based Localization of Bluetooth Devices Using Trilateration: An Improved Method for the Visually Impaired People
Authors: Muhammad Irfan Aziz, Thomas Owens, Uzair Khaleeq uz Zaman
Abstract:
The instantaneous and spatial localization for visually impaired people in dynamically changing environments with unexpected hazards and obstacles, is the most demanding and challenging issue faced by the navigation systems today. Since Bluetooth cannot utilize techniques like Time Difference of Arrival (TDOA) and Time of Arrival (TOA), it uses received signal strength indicator (RSSI) to measure Receive Signal Strength (RSS). The measurements using RSSI can be improved significantly by improving the existing methodologies related to RSSI. Therefore, the current paper focuses on proposing an improved method using trilateration for localization of Bluetooth devices for visually impaired people. To validate the method, class 2 Bluetooth devices were used along with the development of a software. Experiments were then conducted to obtain surface plots that showed the signal interferences and other environmental effects. Finally, the results obtained show the surface plots for all Bluetooth modules used along with the strong and weak points depicted as per the color codes in red, yellow and blue. It was concluded that the suggested improved method of measuring RSS using trilateration helped to not only measure signal strength affectively but also highlighted how the signal strength can be influenced by atmospheric conditions such as noise, reflections, etc.Keywords: Bluetooth, indoor/outdoor localization, received signal strength indicator, visually impaired
Procedia PDF Downloads 1356973 Consumption Habits of Low-Fat Plant Sterol-Enriched Yoghurt Enriched with Phytosterols
Authors: M. J. Reis Lima, J. Oliveira, A. C. Sousa Pereira, M. C. Castilho, E. Teixeira-Lemos
Abstract:
The increasing interest in plant sterol enriched foods is due to the fact that they reduce blood cholesterol concentrations without adverse side effects. In this context, enriched foods with phytosterols may be helpful in protecting population against atherosclerosis and cardiovascular diseases. The aim of the present work was to evaluate in a population of Viseu, Portugal, the consumption habits low-fat, plant sterol-enriched yoghurt. For this study, 577 inquiries were made and the sample was randomly selected for people shopping in various supermarkets. The preliminary results showed that the biggest consumers of these products were women aged 45 to 65 years old. Most of the people who claimed to buy these products consumed them once a day. Also, most of the consumers under antidyslipidemic therapeutics noticed positive effects on hypercholesterolemia.Keywords: consumption habits, fermented milk, functional foods, low fat, phytosterols
Procedia PDF Downloads 4576972 The Analysis of Education Sector and Poverty Alleviation with Benefit Incidence Analysis Approach Budget Allocation Policy in East Java
Authors: Wildan Syafitri
Abstract:
The main purpose of the development is to embody public welfare. Its indication is shown by the increasing of the public prosperity in which it will be related to the consumption level as a consequence of the increasing of public income. One of the government’s efforts to increase public welfare is to create development equity in order to alleviate poor people. Poverty’s problem is not merely about the number and percentage of the poor people, but also it includes the gap and severity of poverty.the analysis method used is Benefit Incidence Analysis (BIA) that is an analysis method used to disclose the impact of government policy or individual access based on the income distribution in society. Further, the finding of the study revealed is that the highest number of the poor people in the village is those who are unemployed and have family members who are still in the Junior High School. The income distribution calculation shows a fairly good budget allocation applied with good mass ratio that is 0.31. In addition, the finding of this study also discloses that Indonesian Government policy to subsidize education cost for Elementary and Junior High School students has reached the right target. It is indicated by more benefits received by Elementary and Junior High School students who are poor and very poor than other income group.Keywords: benefit incidence analysis, budget allocation, poverty, education
Procedia PDF Downloads 3946971 Morphosyntactic Abilities in Speakers with Broca’s Aphasia: A Preliminary Examination
Authors: Mile Vuković, Lana Jerkić Rajić
Abstract:
Introduction: Broca's aphasia is a non-fluent type of aphasic syndrome, which is primarily manifested by impairment of language production. In connected speech, patients with this type of aphasia produce short sentences in which they often omit function words and morphemes or choose inadequate forms. Aim: This research was conducted to examine the morphosyntactic abilities of people with Broca's aphasia, comparing them with neurologically healthy subjects without a language disorder. Method: The sample included 15 patients with Broca's post-stroke aphasia, who had the relatively intact ability of auditory comprehension. The diagnosis of aphasia was based on the Boston Diagnostic Aphasia Examination. The control group comprised 16 neurologically healthy subjects without data on the presence of disorders in speech and language development. The patients' mother tongue was Serbian. The new Serbian Morphosyntactic Abilities Test (SMAT) was used. Descriptive (frequency, percentage, mean, SD, min, max) and inferential (Mann-Whitney U-test) statistics were used in data processing. Results: We noticed statistically significant differences between people with Broca's aphasia and neurotypical subjects on the SMAT (U = 1.500, z = -4.982, p = 0.000). The results showed that people with Broca's aphasia had achieved low scores on the SMAT, regardless of age (ρ = -0.045, p = 0.873) and time post onset (ρ = 0.330, p = 0.229). Conclusion: Preliminary results show that the SMAT has the potential to detect morphosyntactic deficits in Serbian speakers with Broca's aphasia.Keywords: Broca’s aphasia, morphosyntactic abilities, agrammatism, Serbian language
Procedia PDF Downloads 746970 Deconstruction of Gender Stereotypes through Fashion
Authors: Nihan Akdemir
Abstract:
This research aims to investigate the role of fashion in the context of the deconstruction of gender stereotypes. Expectation of society and culture related to the biological structure of the individual corresponds to the gender. At this point there are some unseen rules which are given to person even from his/her childhoods according to the sex and gender, are called stereotypes. With basic example, girls should wear pink, and the boys should wear blue. Or boys do not wear skirt and the woman must behave like a woman. There are also many many stereotypes like them. But the clothing style the individual uses to express his or her gender identity may not match the expectations of the community and society. In the context of big role of the clothing, these stereotypes could be deconstructed because clothes are the visible expression of gender identity of the person. And fashion is a big part of this structure because fashion is a pioneer of what people wear in other words fashion tells to people what should they wear this season. Nowadays fashion has also meant about expressing identity independent of whether you were born male or female. Many fashion brands prepare their collections in the concept of ‘gender fluid’ by deconstructions. It means that fashion is opening the roads for being more free about the gender identity. The representations of gender fluidity through fashion help bring a sense of normality to people who are trying to find the self-confidence to express who they want to be. Maybe the voice of the streets carries this point to the catwalks firstly, and then it becomes a trend. All these items have been explained with visual images and supported by the literature investigations. And the results are showed that the numbers of collections about it are increasing and fashion sector takes this issue into consideration. And this new approach reached to the streets.Keywords: fashion, gender identity, gender stereotypes, trend
Procedia PDF Downloads 4736969 Early Intervention for Preschool Children of Parents with Mental Illness: The Evaluation of a Resource for Service Providers
Authors: Stella Laletas, Andrea Reupert, Melinda Goodyear, Bradley Morgan
Abstract:
Background: Many people with a mental illness have young children. Research has shown that early childhood is a particularly vulnerable time for children whose parents have a mental illness. Moreover, repeated research has demonstrated the effectiveness of a multiagency approach to family focused practice for improving parental functioning and preventing adverse outcomes in children whose parents have a mental illness, particularly in the early years of a child’s life. However, there is a paucity of professional development resources for professionals who work with families where a parent has a mental illness and has young children. Significance of the study: This study will make a contribution to addressing knowledge gaps around resource development and workforce needs for early childhood and mental health professionals working with young children where a parent has a mental illness. Objective: This presentation describes a newly developed resource, 'Pathways of Care', specifically designed for early childhood educators and mental health workers, alongside pilot evaluation data regarding its effectiveness. ‘Pathways of Care’ aims to promote collaborative practice and present early identification and referral processes for workers in this sector. The resource was developed by the Children of Parents with a Mental Illness (COPMI) National Initiative which is funded by the Australian Government. Method: Using a mixed method design, the effectiveness of the training resource is also presented. Fifteen workers completed the Family Focus Mental Health Practice Questionnaire pre and post using the resource, to measure confidence and practice change; semi-structured interviews were also conducted with eight of these same workers to further explore the utility of the resource. Findings: The findings indicated the resource was effective in increasing knowledge and confidence, particularly for new and/or inexperienced staff. Examples of how the resource was used in practice by various professions emerged from the interview data. Conclusions: Collaborative practice, early identification and intervention in early childhood can potentially play a key role in altering the life trajectory of children who are at risk. This information has important implications for workforce development and staff training in both the early childhood and mental health sectors. Implications for policy and future research are discussed.Keywords: parents with mental ilnesses, early intervention, evaluation, preschool children
Procedia PDF Downloads 4536968 Road Accidents to School Children’s in Dar Es Salaam, Tanzania
Authors: Kabuga Daniel
Abstract:
Road accidents resulting to deaths and injuries have become a new public health challenge especially in developing countries including Tanzania. Reports from Tanzania Traffic Police Force shows that last year 2016 accidents increased compare to previous year 2015, accident happened from 3710 up to 5219, accidents and safety data indicate that children are the most vulnerable to road crashes where 78 pupils died and 182 others were seriously injured in separate roads accident last year. A survey done by Amend indicates that Pupil mode of transport in Dar es salaam schools are by walk 87%, bus 9.21%, car 1.32%, motorcycle 0.88%, 3-wheeler 0.24%, train 0.14%, bicycle 0.10%, ferry 0.07%, and combined mode 0.44%. According to this study, majority of school children’s uses walking mode, most of school children’s agreed to continue using walking mode and request to have signs for traffic control during crossing road like STOP sign and CHILD CROSSING sign for safe crossing. Because children not only sit inside this buses (Daladala) but also they walk in a group to/from school, and few (33.2%) parents or adults are willing to supervise their children’s during working to school while 50% of parents agree to let their children walking alone to school if the public transport started from nearby street. The study used both qualitative and quantitative methods of research by conducting physical surveying on sample districts. The main objectives of this research are to carries out all factors affecting school children’s when they use public road, to promote and encourage the safe use of public road by all classes especially pupil or student through the circulation of advice, information and knowledge gain from research and to recommends future direction for the developments for road design or plan to vulnerable users. The research also critically analyze the problems causing death and injuries to school children’s in Dar es Salaam Region. This study determines the relationship between road traffic accidents and factors, such as socio-economic, status, and distance from school, number of sibling, behavioral problems, knowledge and attitudes of public and their parents towards road safety and parent educational study traffic. The study comes up with some of recommendations including Infrastructure Improvements like, safe footpaths, Safe crossings, Speed humps, Speed limits, Road signs. However, Planners and policymakers wishing to increase walking and cycling among children need to consider options that address distance constraints, the land use planners and transport professionals use better understanding of the various factors that affect children’s choices of school travel mode, results suggest that all school travel attributes should be considered during school location.Keywords: accidents, childrens, school, Tanzania
Procedia PDF Downloads 2456967 Real Time Multi Person Action Recognition Using Pose Estimates
Authors: Aishrith Rao
Abstract:
Human activity recognition is an important aspect of video analytics, and many approaches have been recommended to enable action recognition. In this approach, the model is used to identify the action of the multiple people in the frame and classify them accordingly. A few approaches use RNNs and 3D CNNs, which are computationally expensive and cannot be trained with the small datasets which are currently available. Multi-person action recognition has been performed in order to understand the positions and action of people present in the video frame. The size of the video frame can be adjusted as a hyper-parameter depending on the hardware resources available. OpenPose has been used to calculate pose estimate using CNN to produce heap-maps, one of which provides skeleton features, which are basically joint features. The features are then extracted, and a classification algorithm can be applied to classify the action.Keywords: human activity recognition, computer vision, pose estimates, convolutional neural networks
Procedia PDF Downloads 1436966 Sexual Consent and Persons with Psychosocial Disabilities: Exploring Sexual Rights under Indian Laws
Authors: Sachin Sharma
Abstract:
Sexual consent is integral to every sexual relationship. It is a process to facilitate sexual autonomy and bodily integrity. It assures complete sexual personhood and allows an individual to explore her sexual expressions independently. But the said proposition is not true for people with psychosocial disabilities. Generally, they are considered seraphic or mephistophelic and denied access to sexual autonomy. This result in institutionalizing the sexuality of disabled persons, where the eugenics-ableist narrative defines assessment and access to consent. This way, sexuality and disability are distanced apart. It is primarily due to the stigmatized socio-cultural constructs of sexuality that define sex within a “standard” and “charmed” circle. Such stigmatized expression influences the law, as it considers people with psychosocial disabilities incapable of sexual consent. The approach of legal institutions is very narrow towards interpreting their sexual rights. It echoes the modernist-ableism and strangulates the sexual choices. This way, it reflects the repressive model of sex and denies space to people with psychosocial disabilities. Moreover, judicial courts follow old and conservative methods while dealing with sexual issues. For instance, courts still practice the “standardized” norm of intelligence quotient (IQ) for determining the credibility of persons with psychosocial disabilities. Further, there is still doubt about assistive communicative techniques. This paper will try to question the normative structure of sexual consent and related laws while specifically addressing the issues of sex as desire and abuse. Considering the commitment to the United Nations Convention on the Rights of Persons with Disabilities (herein referred to as UNCRPD) and common law experience, the paper will draw a comparative study on the legal position of sexual rights in India. The paper will also analyze the role of UNCRPD in addressing sexual rights. The author will examine the position of sexual rights of people with psychosocial disabilities after the drafting of UNCRPD and specific state laws. The paper primarily follows the doctrinal method.Keywords: sexual autonomy, institutionalized choices, overregulated laws, violation of individuality
Procedia PDF Downloads 1206965 Reducing Flood Risk through Value Capture and Risk Communication: A Case Study in Cocody-Abidjan
Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama
Abstract:
Abidjan city (Republic of Ivory Coast) is an emerging megacity and an urban coastal area where the number of floods reported is on a rapid increase due to climate change and unplanned urbanization. However, comprehensive disaster mitigation plans, policies, and financial resources are still lacking as the population ignores the extent and location of the flood zones; making them unprepared to mitigate the damages. Considering the existing condition, this paper aims to discuss an approach for flood risk reduction in Cocody Commune through value capture strategy and flood risk communication. Using geospatial techniques and hydrological simulation, we start our study by delineating flood zones and depths under several return periods in the study area. Then, through a questionnaire a field survey is conducted in order to validate the flood maps, to estimate the flood risk and to collect some sample of the opinion of residents on how the flood risk information disclosure could affect the values of property located inside and outside the flood zones. The results indicate that the study area is highly vulnerable to 5-year floods and more, which can cause serious harm to human lives and to properties as demonstrated by the extent of the 5-year flood of 2014. Also, it is revealed there is a high probability that the values of property located within flood zones could decline, and the values of surrounding property in the safe area could increase when risk information disclosure commences. However in order to raise public awareness of flood disaster and to prevent future housing promotion in high-risk prospective areas, flood risk information should be disseminated through the establishment of an early warning system. In order to reduce the effect of risk information disclosure and to protect the values of property within the high-risk zone, we propose that property tax increments in flood free zones should be captured and be utilized for infrastructure development and to maintain the early warning system that will benefit people living in flood prone areas. Through this case study, it is shown that combination of value capture strategy and risk communication could be an effective tool to educate citizen and to invest in flood risk reduction in emerging countries.Keywords: Cocody-Abidjan, flood, geospatial techniques, risk communication, value capture
Procedia PDF Downloads 279