Search results for: Privacy and Data Protection Law
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26327

Search results for: Privacy and Data Protection Law

25277 Discussion on Big Data and One of Its Early Training Application

Authors: Fulya Gokalp Yavuz, Mark Daniel Ward

Abstract:

This study focuses on a contemporary and inevitable topic of Data Science and its exemplary application for early career building: Big Data and Leaving Learning Community (LLC). ‘Academia’ and ‘Industry’ have a common sense on the importance of Big Data. However, both of them are in a threat of missing the training on this interdisciplinary area. Some traditional teaching doctrines are far away being effective on Data Science. Practitioners needs some intuition and real-life examples how to apply new methods to data in size of terabytes. We simply explain the scope of Data Science training and exemplified its early stage application with LLC, which is a National Science Foundation (NSF) founded project under the supervision of Prof. Ward since 2014. Essentially, we aim to give some intuition for professors, researchers and practitioners to combine data science tools for comprehensive real-life examples with the guides of mentees’ feedback. As a result of discussing mentoring methods and computational challenges of Big Data, we intend to underline its potential with some more realization.

Keywords: Big Data, computation, mentoring, training

Procedia PDF Downloads 343
25276 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 318
25275 Exploiting JPEG2000 into Reversible Information

Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu

Abstract:

With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.

Keywords: cover media, camouflaged media, reversible information hiding, gray image

Procedia PDF Downloads 315
25274 Synthesis and Characterization of pH-Responsive Nanocarriers Based on POEOMA-b-PDPA Block Copolymers for RNA Delivery

Authors: Bruno Baptista, Andreia S. R. Oliveira, Patricia V. Mendonca, Jorge F. J. Coelho, Fani Sousa

Abstract:

Drug delivery systems are designed to allow adequate protection and controlled delivery of drugs to specific locations. These systems aim to reduce side effects and control the biodistribution profile of drugs, thus improving therapeutic efficacy. This study involved the synthesis of polymeric nanoparticles, based on amphiphilic diblock copolymers, comprising a biocompatible, poly (oligo (ethylene oxide) methyl ether methacrylate (POEOMA) as hydrophilic segment and a pH-sensitive block, the poly (2-diisopropylamino)ethyl methacrylate) (PDPA). The objective of this work was the development of polymeric pH-responsive nanoparticles to encapsulate and carry small RNAs as a model to further develop non-coding RNAs delivery systems with therapeutic value. The responsiveness of PDPA to pH allows the electrostatic interaction of these copolymers with nucleic acids at acidic pH, as a result of the protonation of the tertiary amine groups of this polymer at pH values below its pKa (around 6.2). Initially, the molecular weight parameters and chemical structure of the block copolymers were determined by size exclusion chromatography (SEC) and nuclear magnetic resonance (1H-NMR) spectroscopy, respectively. Then, the complexation with small RNAs was verified, generating polyplexes with sizes ranging from 300 to 600 nm and with encapsulation efficiencies around 80%, depending on the molecular weight of the polymers, their composition, and concentration used. The effect of pH on the morphology of nanoparticles was evaluated by scanning electron microscopy (SEM) being verified that at higher pH values, particles tend to lose their spherical shape. Since this work aims to develop systems for the delivery of non-coding RNAs, studies on RNA protection (contact with RNase, FBS, and Trypsin) and cell viability were also carried out. It was found that they induce some protection against constituents of the cellular environment and have no cellular toxicity. In summary, this research work contributes to the development of pH-sensitive polymers, capable of protecting and encapsulating RNA, in a relatively simple and efficient manner, to further be applied on drug delivery to specific sites where pH may have a critical role, as it can occur in several cancer environments.

Keywords: drug delivery systems, pH-responsive polymers, POEOMA-b-PDPA, small RNAs

Procedia PDF Downloads 244
25273 Direct and Indirect Effects of Childhood Traumas, Emotion Regulation Difficulties and Age on Tendency to Violence

Authors: Selin Kara-Bahçekapılı, Bengisu Nehir Aydın

Abstract:

Objective: In this study, it is aimed to examine the relationship between childhood traumas (overprotection-control, emotional/physical/sexual abuse, emotional/physical neglect), age, emotional regulation difficulties, and the tendency of violence in adults. In the study, the direct and indirect effects of 6 sub-factors of childhood traumas, emotion regulation difficulties, and age on tendency to violence are evaluated on a model that theoretically reveals. Method: The population of this cross-sectional study consists of individuals between the ages of 18-65 living in Turkey. The data from 527 participants were obtained by online surveys and convenience sampling method within the scope of the study. As a result of exclusion criteria and then outlier data analysis, the data of 443 participants were included in the analysis. Data were collected by demographic information form, childhood trauma scale, emotion regulation difficulty scale, and violence tendency scale. Research data were analyzed by SPSS and AMOS using correlation, path analysis, direct and indirect effects. Results: According to the research findings, the variables in the model explained 28.2% of the variance of the mean scores of the individuals' tendency to violence. Emotion regulation difficulties have the most direct effect on the tendency to violence (d=.387; p<.01). The effects of excessive protection and control, emotional neglect, and physical neglect variables on the tendency to violence are not significant. When the significant and indirect effects of the variables on tendency to violence over emotion regulation difficulties are examined, age has a negative effect, emotional neglect has a positive effect, emotional abuse has a positive effect, and overprotection-control has a positive effect. The indirect effects of sexual abuse, physical neglect, and physical abuse on tendency to violence are not significant. Childhood traumas and age variables in the model explained 24.1% of the variance of the mean scores of the individuals’ emotion regulation difficulties. The variable that most affects emotion regulation difficulties is age (d=-.268; p<.001). The direct effects of sexual abuse, physical neglect, and physical abuse on emotion regulation difficulties are not significant. Conclusion: The results of the research emphasize the critical role of difficulty in emotion regulation on the tendency to violence. Difficulty in emotion regulation affects the tendency to violence both directly and by mediating different variables. In addition, it is seen that some sub-factors of childhood traumas have direct and/or indirect effects on the tendency to violence. Emotional abuse and age have both direct and indirect effects on the tendency to violence over emotion regulation difficulties.

Keywords: childhood trauma, emotion regulation difficulties, tendency to violence, path analysis

Procedia PDF Downloads 73
25272 Development and Characterization of Soya Phosphatidylcholine Complex of Coumestans from Eclipta alba for the Management of Hepatotoxicity

Authors: Abhishek Kumar Jain, Anki Jain, Yuvraj Singh Dangi, Brajesh Kumar Tiwari

Abstract:

The plant Eclipta alba Hassk. (Family: Compositae) contains coumestans (wedelolactone and demethyl wedelolactone) used in liver disorders. The objective of the present investigation was to develop a formulation of these coumestans in combination with the soya phosphatidylcholine (PC), in order to overcome the limitation of absorption and to investigate the protective effect of coumestans–phosphatidylcholine complex (C-PC) on carbon tetrachloride induced acute liver damage in rats. Methanolic extract (ME) of the whole plant of Eclipta alba was fractionated with water and then with ehylacetate. Coumestans were characterized in the ethylacetate fraction of methanolic extract (EFME). The C-PC was prepared by dissolving EFME and PC in 1:1 ratio in dichloromethane and heating at 60°C for 2 h. The C-PC was characterized by DSC and FTIR spectroscopy. In vitro drug release from EFME and C-PC through egg membrane was measured using UV-Visible spectrophotometer. The hepatoprotective activity of C-PC (equivalent to 5.35 and 10.7 mg/kg body weight of EFME), ME 250 mg/kg and EFME 5.35 mg/kg was evaluated by measuring various enzymes level. C-PC significantly provided better protection to the liver by restoring the enzyme levels of SGPT, SGOT, ALP and total billirubin with respect to carbon tetrachloride (CCl4) treated group (P < 0.001). Histopathological studies were also performed. The C-PC provided better protection to rat liver than ME and EFME at similar doses as well as shown significant regeneration of hepatocytes, central vein, intact cytoplasm, and nucleus.

Keywords: hepatotoxicity, wedelolactone, soya phosphatidylcholine, eclipta alba

Procedia PDF Downloads 390
25271 Ontological Modeling Approach for Statistical Databases Publication in Linked Open Data

Authors: Bourama Mane, Ibrahima Fall, Mamadou Samba Camara, Alassane Bah

Abstract:

At the level of the National Statistical Institutes, there is a large volume of data which is generally in a format which conditions the method of publication of the information they contain. Each household or business data collection project includes a dissemination platform for its implementation. Thus, these dissemination methods previously used, do not promote rapid access to information and especially does not offer the option of being able to link data for in-depth processing. In this paper, we present an approach to modeling these data to publish them in a format intended for the Semantic Web. Our objective is to be able to publish all this data in a single platform and offer the option to link with other external data sources. An application of the approach will be made on data from major national surveys such as the one on employment, poverty, child labor and the general census of the population of Senegal.

Keywords: Semantic Web, linked open data, database, statistic

Procedia PDF Downloads 164
25270 Sustainable Land Use Policy and Monitoring Urban Land Expansion in Kabul: A Case Study of Rapid Urbanization

Authors: Osama Hidayat, Yoshitaka Kajiat

Abstract:

Kabul is a city that is highly representative of Afghanistan’s rapid urbanization process. As the city rapidly expands, there are enormous challenges to the sustainable use of land resources. This paper evaluates land use change and urban spatial expansion, from 1950 to 2016, in Kabul the capital of Afghanistan, using satellite images, field observation, and socio-economic data. The discussion covers the reduction in rural-to-urban land conversion, the delineation of urban growth boundaries, arable land reclamation and the establishment of farmland protection areas, urban upgrading, and the investigation and prosecution of illegal construction. This paper considers the aspects of urbanization and land management systems in Afghanistan. Efficient frames are outlined in Kabul for the following elements: governmental self-restraint and policy modification. The paper concludes that Kabul’s sustainable land use practices can provide a reference for other cities in Afghanistan.

Keywords: urban land expansion, urbanization, land use policy, sustainable development

Procedia PDF Downloads 148
25269 Testing Ammonia Borane for Multilayer Aprons in Nuclear Medicine as a Promising Non-toxic, Lightweight, Hydrogen Rich Material and to Enhance the Efficiency of Aprons for Workers Who Deal with Neutrons Radiation in Nuclear Medicine

Authors: Wed Othman Alghamdi

Abstract:

The current study aims to find a non-toxic, low density, hydrogen-rich material that can be used in aprons without causing health issues for nuclear medical workers that could hinder their work and negatively affect patients. Five samples were tested in terms of fast neutron removal cross-section(C21H25ClO5, C2H4, LiH,H3NBH3,MgH2) mathematically using computer program called Phy-x/PSD it is a computer program designed to calculate the fast neutron removal cross section, and it was obtained that ammonia borane (𝐻3𝑁𝐵𝐻3) with a density of 0.78 (g/ cm3) ,And it containment of the three most important elements that play a major role in protection shields, which are (hydrogen, boron, nitrogen), Hydrogen works as a moderator that slows neutrons and turn them into thermal neutrons, boron and nitrogen both have the largest neutron absorption cross section. Ammonia borane has the highest fast neutron removal cross-section with the value of (0.122959317985393cm-1) and the least for polyethylene (𝐶2𝐻4) with the value of (0.0838038707225853 cm-1) which made the ammonia borane a better candidate than polyethylene and other compounds that have been tasted in previous research for multi-layer aprons in nuclear medicine, and may approve a proper protection against the hazard radiations that its produced in nuclear medicine filed by several ways, due to it is low density and non-toxicity.

Keywords: aprons, radiation, non-toxic, nuclear medicine, neutrons

Procedia PDF Downloads 51
25268 Data Collection Based on the Questionnaire Survey In-Hospital Emergencies

Authors: Nouha Mhimdi, Wahiba Ben Abdessalem Karaa, Henda Ben Ghezala

Abstract:

The methods identified in data collection are diverse: electronic media, focus group interviews and short-answer questionnaires [1]. The collection of poor-quality data resulting, for example, from poorly designed questionnaires, the absence of good translators or interpreters, and the incorrect recording of data allow conclusions to be drawn that are not supported by the data or to focus only on the average effect of the program or policy. There are several solutions to avoid or minimize the most frequent errors, including obtaining expert advice on the design or adaptation of data collection instruments; or use technologies allowing better "anonymity" in the responses [2]. In this context, we opted to collect good quality data by doing a sizeable questionnaire-based survey on hospital emergencies to improve emergency services and alleviate the problems encountered. At the level of this paper, we will present our study, and we will detail the steps followed to achieve the collection of relevant, consistent and practical data.

Keywords: data collection, survey, questionnaire, database, data analysis, hospital emergencies

Procedia PDF Downloads 93
25267 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 504
25266 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 369
25265 An Integrated Approach to Cultural Heritage Management in the Indian Context

Authors: T. Lakshmi Priya

Abstract:

With the widening definition of heritage, the challenges of heritage management has become more complex . Today heritage not only includes significant monuments but comprises historic areas / sites, historic cities, cultural landscapes, and living heritage sites. There is a need for a comprehensive understanding of the values associated with these heritage resources, which will enable their protection and management. These diverse cultural resources are managed by multiple agencies having their own way of operating in the heritage sites. An Integrated approach to management of these cultural resources ensures its sustainability for the future generation. This paper outlines the importance of an integrated approach for the management and protection of complex heritage sites in India by examining four case studies. The methodology for this study is based on secondary research and primary surveys conducted during the preparation of the conservation management plansfor the various sites. The primary survey included basic documentation, inventorying, and community surveys. Red Fort located in the city of Delhi is one of the most significant forts built in 1639 by the Mughal Emperor Shahjahan. This fort is a national icon and stands testimony to the various historical events . It is on the ramparts of Red Fort that the national flag was unfurled on 15th August 1947, when India became independent, which continues even today. Management of this complex fort necessitated the need for an integrated approach, where in the needs of the official and non official stakeholders were addressed. The understanding of the inherent values and significance of this site was arrived through a systematic methodology of inventorying and mapping of information. Hampi, located in southern part of India, is a living heritage site inscribed in the World Heritage list in 1986. The site comprises of settlements, built heritage structures, traditional water systems, forest, agricultural fields and the remains of the metropolis of the 16th century Vijayanagar empire. As Hampi is a living heritage site having traditional systems of management and practices, the aim has been to include these practices in the current management so that there is continuity in belief, thought and practice. The existing national, regional and local planning instruments have been examined and the local concerns have been addressed.A comprehensive understanding of the site, achieved through an integrated model, is being translated to an action plan which safeguards the inherent values of the site. This paper also examines the case of the 20th century heritage building of National Archives of India, Delhi and protection of a 12th century Tomb of Sultan Ghari located in south Delhi. A comprehensive understanding of the site, lead to the delineation of the Archaeological Park of Sultan Ghari, in the current Master Plan for Delhi, for the protection of the tomb and the settlement around it. Through this study it is concluded that the approach of Integrated Conservation has enabled decision making that sustains the values of these complex heritage sites in Indian context.

Keywords: conservation, integrated, management, approach

Procedia PDF Downloads 71
25264 The Utilization of Big Data in Knowledge Management Creation

Authors: Daniel Brian Thompson, Subarmaniam Kannan

Abstract:

The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.

Keywords: big data, knowledge management, data driven, knowledge creation

Procedia PDF Downloads 97
25263 Air Quality Assessment for a Hot-Spot Station by Neural Network Modelling of the near-Traffic Emission-Immission Interaction

Authors: Tim Steinhaus, Christian Beidl

Abstract:

Urban air quality and climate protection are two major challenges for future mobility systems. Despite the steady reduction of pollutant emissions from vehicles over past decades, local immission load within cities partially still reaches heights, which are considered hazardous to human health. Although traffic-related emissions account for a major part of the overall urban pollution, modeling the exact interaction remains challenging. In this paper, a novel approach for the determination of the emission-immission interaction on the basis of neural network modeling for traffic induced NO2-immission load within a near-traffic hot-spot scenario is presented. In a detailed sensitivity analysis, the significance of relevant influencing variables on the prevailing NO2 concentration is initially analyzed. Based on this, the generation process of the model is described, in which not only environmental influences but also the vehicle fleet composition including its associated segment- and certification-specific real driving emission factors are derived and used as input quantities. The validity of this approach, which has been presented in the past, is re-examined in this paper using updated data on vehicle emissions and recent immission measurement data. Within the framework of a final scenario analysis, the future development of the immission load is forecast for different developments in the vehicle fleet composition. It is shown that immission levels of less than half of today’s yearly average limit values are technically feasible in hot-spot situations.

Keywords: air quality, emission, emission-immission-interaction, immission, NO2, zero impact

Procedia PDF Downloads 113
25262 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 66
25261 Cloud Design for Storing Large Amount of Data

Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás

Abstract:

Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.

Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization

Procedia PDF Downloads 340
25260 Rurality in Flux: A Perspective on Changing Face of Rural Tourism Enterprise

Authors: Gunjan Saxena

Abstract:

This paper presents case insights from India and Mexico to illustrate how tourism can work as a tool for bringing about peace and prosperity in disadvantaged communities living in peripheral rural localities. A reordering of rural space, given the slow but definite shift from production-oriented activities towards more complex and contested blends of production, consumption and protection indicates clearly that rurality is in flux. Whilst on one hand, there is a predominance of urban interests in the countryside, on the other rurality is boxed and presented for consumption in urban localities. Qualitative data, collected using semi-structured interviews and participant observation, is used in illustrating how creative enterprise is bringing about innovative use of rural ethos and space in response to consumer demands. Overall, this work seeks to contribute to debates on how rurality no longer represents a fixed space of tradition, but is packaged and promoted in a multi-faceted manner to creatively perform for and access tourism markets.

Keywords: rural tourism, creative enterprise, India, Mexico

Procedia PDF Downloads 298
25259 Estimation of Missing Values in Aggregate Level Spatial Data

Authors: Amitha Puranik, V. S. Binu, Seena Biju

Abstract:

Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.

Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis

Procedia PDF Downloads 361
25258 Association Rules Mining and NOSQL Oriented Document in Big Data

Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub

Abstract:

Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.

Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL

Procedia PDF Downloads 146
25257 Balancing Aesthetics, Sustainability, and Safety in Handmade Fabric Face Masks: A Testimony of Creativity and Adaptability

Authors: Anne Mastamet-Mason, Oluwatosin Onakoya, Karla Tissiman

Abstract:

The COVID-19 pandemic that ravaged the world in 2020 brought about the need for handmade fabric face masks in South Africa and beyond. These masks showcased individuality and environmental responsibility and effectively aided our battle against the virus. These practical masks held significant meaning, representing human creativity, resilience, and commitment to sustainability in adversity. This paper examines how aesthetics, sustainability, and safety were achieved in the Handmade Fabric Face Masks. It analyses how their integration signified human agility and resilience to the pandemic while promoting dignity and environmental welfare. The research conducted a qualitative analysis to choose handmade fabric face masks and assess their aesthetic, sustainable, and safety features. The study involved interviewing a group of mask designers and users who evaluated the masks' efficacy in providing protection, aesthetics, and environmental sustainability. Although the designers demonstrated a high level of knowledge in the design aspects, the results indicated a need for more information regarding the functional safety measures and some environmental factors in mask selection and production. The mask analysis also revealed that the masks available in the market combined aesthetics and environmental protection but had limited safety measures. Despite the lack of balance of aesthetics, sustainability, and safety among the designers and the users of hand-fabric masks, functional aspects of fabrics and sustainability literacy are essential

Keywords: sustainable fashion, fabric mask, aesthetics, safety measures

Procedia PDF Downloads 48
25256 Immunization-Data-Quality in Public Health Facilities in the Pastoralist Communities: A Comparative Study Evidence from Afar and Somali Regional States, Ethiopia

Authors: Melaku Tsehay

Abstract:

The Consortium of Christian Relief and Development Associations (CCRDA), and the CORE Group Polio Partners (CGPP) Secretariat have been working with Global Alliance for Vac-cines and Immunization (GAVI) to improve the immunization data quality in Afar and Somali Regional States. The main aim of this study was to compare the quality of immunization data before and after the above interventions in health facilities in the pastoralist communities in Ethiopia. To this end, a comparative-cross-sectional study was conducted on 51 health facilities. The baseline data was collected in May 2019, while the end line data in August 2021. The WHO data quality self-assessment tool (DQS) was used to collect data. A significant improvment was seen in the accuracy of the pentavalent vaccine (PT)1 (p = 0.012) data at the health posts (HP), while PT3 (p = 0.010), and Measles (p = 0.020) at the health centers (HC). Besides, a highly sig-nificant improvment was observed in the accuracy of tetanus toxoid (TT)2 data at HP (p < 0.001). The level of over- or under-reporting was found to be < 8%, at the HP, and < 10% at the HC for PT3. The data completeness was also increased from 72.09% to 88.89% at the HC. Nearly 74% of the health facilities timely reported their respective immunization data, which is much better than the baseline (7.1%) (p < 0.001). These findings may provide some hints for the policies and pro-grams targetting on improving immunization data qaulity in the pastoralist communities.

Keywords: data quality, immunization, verification factor, pastoralist region

Procedia PDF Downloads 85
25255 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 228
25254 Local Ordinances with Sharia Nuances in Pluralism Society of Indonesia: Convergence or Divergence

Authors: Farida Prihatini

Abstract:

As a largest Muslim country in the world with around 215 Muslim inhabitants, Indonesia interestingly is not an Islamic country. Yet, Indonesia is not a secular country as well. The country has committed to be a unity in diversity country where people from various socio-political background may be coexistent live in this archipelago country. However, many provinces and Muslim groups are disposed of special regulation for Muslim people, namely local ordinances with sharia nuances, applied specifically in provinces, cities or regions where Muslim inhabitants are the majority. For the last two decades, particularly since Indonesia reform movement of 1998, a lot of local ordinances (Peraturan Daerah) with Sharia nuance have been enacted and applied in several provinces, cities and regions in Indonesia. The local ordinances are mostly deal with restriction of alcohol, prohibition of prostitution, Al Qur'an literacy, obligation to wear Muslim attire and zakat or alms management. Some of local ordinances have been warmly welcomed by society, while other ordinances have created tension. Those who oppose the ordinances believe that such things regulated by the ordinances are in violation of human rights and democracy, part of privacy rights of the people and must not be regulated by the State or local government. This paper describes the dynamic of local Ordinances with sharia nuances in Indonesia, in this research is limited to three ordinances: on the restriction of alcohol, prohibition of prostitution and obligation to wear Muslim attire. The researcher employs a normative method by studying secondary data and local ordinances in selected areas in Indonesia. The findings of the paper are that local ordinances with sharia nuances are indeed part of the needs of society, yet, in their implementation must take the pluralism of Indonesia and the state basic foundation, which is Pancasila (five pillars) into account.

Keywords: local, ordinances, sharia, rights

Procedia PDF Downloads 261
25253 Body Armours in Amazonian Fish

Authors: Fernando G. Torres, Donna M. Ebenstein, Monica Merino

Abstract:

Most fish are covered by a protective external armour. The characteristics of these armours depend on the individual elements that form them, such as scales, scutes or dermal plates. In this work, we assess the properties of two different types of protective elements: scales from A. gigas and dermal plates from P. pardalis. A. Gigas and P. Pardalis are two Amazonian fish with a rather prehistoric aspect. They have large scales and dermal plates that form two different types of protective body armours. Although both scales and dermal plates are formed by collagen and hydroxyapatite, their structures display remarkable differences. The structure and composition of the samples were assessed by means of X-ray diffraction (XRD), Fourier Transform Infrared spectroscopy (FTIR) and Differential Scanning Calorimetry (DSC). Morphology studies were carried out using a Scanning Electron Microscopy (SEM). Nanoindentation tests were performed to measure the reduced moduli in A. gigas scales and P. pardalis plates. The similarities and differences between scales and dermal plates are discussed based on the experimental results. Both protective armours are designed to be lightweight, flexible and tough. A. Gigas scales are are light laminated composites, while P. pardalis dermal plates show a sandwich like structure with dense outer layers and a porous inner matrix. It seems that the armour of P. pardalis is more suited for a bottom-dwelling fish and allows for protection against predators. The scales from A. Gigas are more adapted to give protection to a swimming fish. The information obtained from these studies is also important for the development of bioinspired nanocomposites, with potential applications in the biomedical field.

Keywords: pterygoplichthys pardalis, dermal plates arapaima gigas, fish scales

Procedia PDF Downloads 378
25252 Na Doped ZnO UV Filters with Reduced Photocatalytic Activity for Sunscreen Application

Authors: Rafid Mueen, Konstantin Konstantinov, Micheal Lerch, Zhenxiang Cheng

Abstract:

In the past two decades, the concern for skin protection from ultraviolet (UV) radiation has attracted considerable attention due to the increased intensity of UV rays that can reach the Earth’s surface as a result of the breakdown of ozone layer. Recently, UVA has also attracted attention, since, in comparison to UVB, it can penetrate deeply into the skin, which can result in significant health concerns. Sunscreen agents are one of the significant tools to protect the skin from UV irradiation, and it is either organic or in organic. Developing of inorganic UV blockers is essential, which provide efficient UV protection over a wide spectrum rather than organic filters. Furthermore inorganic UV blockers are good comfort, and high safety when applied on human skin. Inorganic materials can absorb, reflect, or scatter the ultraviolet radiation, depending on their particle size, unlike the organic blockers, which absorb the UV irradiation. Nowadays, most inorganic UV-blocking filters are based on (TiO2) and ZnO). ZnO can provide protection in the UVA range. Indeed, ZnO is attractive for in sunscreen formulization, and this relates to many advantages, such as its modest refractive index (2.0), absorption of a small fraction of solar radiation in the UV range which is equal to or less than 385 nm, its high probable recombination of photogenerated carriers (electrons and holes), large direct band gap, high exciton binding energy, non-risky nature, and high tendency towards chemical and physical stability which make it transparent in the visible region with UV protective activity. A significant issue for ZnO use in sunscreens is that it can generate ROS in the presence of UV light because of its photocatalytic activity. Therefore it is essential to make a non-photocatalytic material through modification by other metals. Several efforts have been made to deactivate the photocatalytic activity of ZnO by using inorganic surface modifiers. The doping of ZnO by different metals is another way to modify its photocatalytic activity. Recently, successful doping of ZnO with different metals such as Ce, La, Co, Mn, Al, Li, Na, K, and Cr by various procedures, such as a simple and facile one pot water bath, co-precipitation, hydrothermal, solvothermal, combustion, and sol gel methods has been reported. These materials exhibit greater performance than undoped ZnO towards increasing the photocatalytic activity of ZnO in visible light. Therefore, metal doping can be an effective technique to modify the ZnO photocatalytic activity. However, in the current work, we successfully reduce the photocatalytic activity of ZnO through Na doped ZnO fabricated via sol-gel and hydrothermal methods.

Keywords: photocatalytic, ROS, UVA, ZnO

Procedia PDF Downloads 131
25251 Identifying Critical Success Factors for Data Quality Management through a Delphi Study

Authors: Maria Paula Santos, Ana Lucas

Abstract:

Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.

Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort

Procedia PDF Downloads 202
25250 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 143
25249 Unaccompanied Children: An Overview on National and European Law

Authors: Cinzia Valente

Abstract:

Over the last few years, national legislators have been forced to deal with social changes that have had important repercussions in family law and children’s law. This growing focus on minors has provoked important reforms, specifically on issues relating to the welfare and protection of children. My presentation focuses on the issue of migrant children in particular I refer to unaccompanied children, or ‘children on the move’, or separate children or any other term defining migrant minors who cross national borders seeking protection or better opportunities. They arrive often illegally, on the European territory without a responsible adult who take care of them. There is a common assumption that migrants are running away from conflicts, poverty and human rights abuse and they arrive in a foreign country hoping a better life; children without persons who takes care of them encounter some difficulties in their integration in the host country. The migration flows recorded in recent decades towards EU countries, and Italy in particular, have imposed an intense pressure to modernize institutions, services and specific legal frameworks, with the aim of responding adequately to the needs of foreign individuals, as well as ensuring a good level of living standards and facilitating integration, especially for migrant children. The object of my paper is the analysis of the Italian rules, practices and services existing in favor of unaccompanied children (foster care, reunification, acquisition of citizenship and other) in comparison with other European legal systems on the same thematic with a comparative method. Highlighting European standards to find common principles for the best solution to children's problems is the conclusive aim of my presentation.

Keywords: Children , Family Law, Migration , Uniform Law

Procedia PDF Downloads 126
25248 Intramuscular Heat Shock Protein 72 and Heme Oxygenase-1 mRNA are Reduced in Patients with Type 2 Diabetes Evidence That Insulin Resistance is Associated with a Disturbed Antioxidant Defense Mechanism

Authors: Ghibeche Abderrahmane

Abstract:

To examine whether genes associated with cellular defense against oxidative stress are associated with insulin sensitivity, patients with type 2 diabetes (n=7) and age-matched (n=5) and young (n=9) control subjects underwent a euglycemic-hyperinsulinemic clamp for 120 min. Muscle samples were obtained before and after the clamp and analyzed for heat shock protein (HSP)72 and heme oxygenase (HO)-1 mRNA, intramuscular triglyceride content, and the maximal activities of β-hyroxyacyl-CoA dehydrogenase (β-HAD) and citrate synthase (CS). Basal expression of both HSP72 and HO-1 mRNA were lower (P < 0.05) by 33 and 55%, respectively, when comparing diabetic patients with age-matched and young control subjects, with no differences between the latter groups. Both basal HSP72 (r = 0.75, P < 0.001) and HO-1 (r = 0.50,P < 0.05) mRNA expression correlated with the glucose infusion rate during the clamp. Significant correlations were also observed between HSP72 mRNA and both β-HAD (r = 0.61, P < 0.01) and CS (r = 0.65, P < 0.01). HSP72 mRNA was induced (P < 0.05) by the clamp in all groups. Although HO-1 mRNA was unaffected by the clamp in both the young and age-matched control subjects, it was increased (P < 0.05) ∼70-fold in the diabetic patients after the clamp. These data demonstrate that genes involved in providing cellular protection against oxidative stress are defective in patients with type 2 diabetes and correlate with insulin-stimulated glucose disposal and markers of muscle oxidative capacity. The data provide new evidence that the pathogenesis of type 2 diabetes involves perturbations to the antioxidant defense mechanism within skeletal muscle.

Keywords: euglycemic-hyperinsulinemic, HSP72, mRNA, diabete

Procedia PDF Downloads 425