Search results for: vulnerability intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2260

Search results for: vulnerability intelligence

1180 Innovating Assessment: Exploring AI-Driven Scoring for Language Tests in Pre-Service Education Admissions

Authors: Lucie Bartosova

Abstract:

The rapid advancements in generative artificial intelligence (AI) have introduced transformative possibilities in education, particularly in assessment methodologies. This work provides an overview of the current state of the literature on AI-scoring methodologies for evaluating student-written responses. The focus is on how these innovations can be leveraged within large-scale assessments to address resource constraints such as limited assessors, time, and budget. Drawing from an initiative tied to a language test used for admitting candidates into a pre-service education program in the Faculty of Education at an Ontario university, the review explores the practical and ethical implications of integrating AI-driven tools into assessment processes. These tools are designed to automate the evaluation of learners’ written compositions, provide performance feedback, and support grading procedures. By synthesizing findings from recent research, the review highlights the effectiveness, reliability, and potential biases of AI in scoring, alongside considerations for transparency and fairness. This work emphasizes the dual role of generative AI as both a practical solution for scaling assessments and a subject of critical scrutiny to ensure its responsible implementation. The proposed integration of AI-scoring methodologies in our language test underscores the need to balance innovation with accountability, ensuring that AI tools enhance, rather than compromise, educational equity and rigor. OBJECTIVES OF YOUR RESEARCH To determine which generative AI model is most capable of evaluating written responses for university assessments based on specific criteria and to investigate potential biases within AI models to ensure fair assessments. METHODOLOGIES Evaluating generative AI models to determine their performance in assessing written responses against specific criteria. Collecting responses from previous assessments and annotating them with expert feedback to train and validate the AI models. MAIN CONTRIBUTIONS Introducing a tailored AI model to assess written responses on language tests. Offering a scalable and replicable model that informs broader applications of AI in educational assessments, contributing to policy-making and institutional best practices.

Keywords: artificial intelligence, assessment practices, student written performance, automated essay scoring, language proficiency

Procedia PDF Downloads 7
1179 Development and Validation of the Response to Stressful Situations Scale in the General Population

Authors: Célia Barreto Carvalho, Carolina da Motta, Marina Sousa, Joana Cabral, Ana Luísa Carvalho, Ermelindo Peixoto

Abstract:

The aim of the current study was to develop and validate a Response to Stressful Situations Scale (RSSS) for the Portuguese population. This scale assesses the degree of stress experienced in scenarios that can constitute positive, negative and more neutral stressors, and also describes the physiological, emotional and behavioral reactions to those events according to their intensity. These scenario include typical stressor scenarios relevant to patients with schizophrenia, which are currently absent from most scale, assessing specific risks that these stressors may bring on subjects, which may prove useful in non-clinical and clinical populations (i.e. patients with mood or anxiety disorders, schizophrenia). Results from Principal Components Analysis and Confirmatory Factor Analysis of on two adult samples from general population allowed to confirm a three-factor model with good fit indices: χ2 (144)= 370.211, p = 0.000; GFI = 0.928; CFI = 0.927; TLI = 0.914, RMSEA = 0.055, P( rmsea ≤ 0.005) = 0.096; PCFI = 0.781. Further data analysis on the scale revealed that RSSS is an adequate assessment tool of stress response in adults to be used in further research and clinical settings, with good psychometric characteristics, adequate divergent and convergent validity, good temporal stability and high internal consistency.

Keywords: assessment, stress events, stress response, stress vulnerability

Procedia PDF Downloads 520
1178 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 146
1177 Co-Seismic Surface Deformation Induced By 24 September 2019 Mirpur, Pakistan Earthquake Along an Active Blind Fault Estimated Using Sentinel-1 TOPS Interferometry

Authors: Muhammad Ali, Zeeshan Afzal, Giampaolo Ferraioli, Gilda Schirinzi, Muhammad Saleem Mughal, Vito Pascazio

Abstract:

On 24 September 2019, an earthquake with 5.6 Mw and 10 km depth stroke in Mirpur. The Mirpur area was highly affected by this earthquake, with the death of 34 people. This study aims to estimate the surface deformation associated with this earthquake. The interferometric synthetic aperture radar (InSAR) technique is applied to study earthquake induced surface motion. InSAR data using 9 Sentinel-1A SAR images from 11 August 2019 to 22 October 2019 is used to investigate the pre, co-, and post-seismic deformation trends. Time series investigation reveals that there was not such deformation in pre-seismic time period. In the co-seismic time period, strong displacement was observed, and in post-seismic results, small displacement is seen due to aftershocks. Our results show the existence of a previously unpublished blind fault in Mirpur and help to locate the fault line. Previous this fault line was triggered during the 2005 earthquake, and now it’s activated on 24 September 2019. Study area is already facing many problems due to natural hazards where additional surface deformations, particularly because of an earthquake with an activated blind fault, have increased its vulnerability.

Keywords: surface deformation, InSAR, earthquake, sentinel-1, mirpur

Procedia PDF Downloads 130
1176 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 40
1175 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 154
1174 Environmental Related Mortality Rates through Artificial Intelligence Tools

Authors: Stamatis Zoras, Vasilis Evagelopoulos, Theodoros Staurakas

Abstract:

The association between elevated air pollution levels and extreme climate conditions (temperature, particulate matter, ozone levels, etc.) and mental consequences has been, recently, the focus of significant number of studies. It varies depending on the time of the year it occurs either during the hot period or cold periods but, specifically, when extreme air pollution and weather events are observed, e.g. air pollution episodes and persistent heatwaves. It also varies spatially due to different effects of air quality and climate extremes to human health when considering metropolitan or rural areas. An air pollutant concentration and a climate extreme are taking a different form of impact if the focus area is countryside or in the urban environment. In the built environment the climate extreme effects are driven through the formed microclimate which must be studied more efficiently. Variables such as biological, age groups etc may be implicated by different environmental factors such as increased air pollution/noise levels and overheating of buildings in comparison to rural areas. Gridded air quality and climate variables derived from the land surface observations network of West Macedonia in Greece will be analysed against mortality data in a spatial format in the region of West Macedonia. Artificial intelligence (AI) tools will be used for data correction and prediction of health deterioration with climatic conditions and air pollution at local scale. This would reveal the built environment implications against the countryside. The air pollution and climatic data have been collected from meteorological stations and span the period from 2000 to 2009. These will be projected against the mortality rates data in daily, monthly, seasonal and annual grids. The grids will be operated as AI-based warning models for decision makers in order to map the health conditions in rural and urban areas to ensure improved awareness of the healthcare system by taken into account the predicted changing climate conditions. Gridded data of climate conditions, air quality levels against mortality rates will be presented by AI-analysed gridded indicators of the implicated variables. An Al-based gridded warning platform at local scales is then developed for future system awareness platform for regional level.

Keywords: air quality, artificial inteligence, climatic conditions, mortality

Procedia PDF Downloads 116
1173 Lifestyle Diseases in Urban India: A Case Study of Obesity

Authors: Monika Yadav

Abstract:

The incorporation of a healthy lifestyle significantly contributes to the advancement of economic development. Urbanization, industrialization, and economic growth have enhanced living conditions, promoting sedentary behaviours among individuals with elevated socio-economic statuses. The prevalence of overweight and obesity has increased globally, along with the rise in living standards, posing a growing health risk. Overweight and obesity are known to be precursors to a range of modifiable and metabolic risk factors, contributing to the increase in lifestyle diseases. Unhealthy dietary choices and lifestyle practices primarily drive these diseases. Lifestyle diseases refer to chronic and non-communicable illnesses, encompassing conditions such as hypertension, heart disease, kidney disorders, infertility, polycystic ovary syndrome (PCOD), diabetes, respiratory diseases, and certain forms of cancer. This study examines the prevalence of lifestyle diseases among urban Indian women, explicitly differentiating between individuals with normal weight and those classified as obese. The main aim of this study is to investigate whether there is a correlation between a higher body mass index (BMI) in women and an increased vulnerability to lifestyle diseases when compared to women with a normal BMI. This research provides insights into the intricate relationship between lifestyle, health, and economic development within urban areas.

Keywords: urbanization, economic development, BMI, NCDs, urban, women, lifestyle practices

Procedia PDF Downloads 67
1172 Problems of Water Resources : Vulnerability to Climate Change, Modeling with Software WEAP 21 (Upper and Middle Cheliff)

Authors: Mehaiguene Madjid, Meddi Mohamed

Abstract:

The results of applying the model WEAP 21 or 'Water Evaluation and Planning System' in Upper and Middle Cheliff are presented in cartographic and graphic forms by considering two scenarios: -Reference scenario 1961-1990, -Climate change scenarios (low and high) for 2020 and 2050. These scenarios are presented together in the results and compared them to know the impact on aquatic systems and water resources. For the low scenario for 2050, a decrease in the rate of runoff / infiltration will be 81.4 to 3.7 Hm3 between 2010 and 2050. While for the high scenario for 2050, the reduction will be 87.2 to 78.9 Hm3 between 2010 and 2050. Comparing the two scenarios, shows that the water supplied will increase by 216.7 Hm3 to 596 Hm3 up to 2050 if we do not take account of climate change. Whereas, if climate change will decrease step by step: from 2010 to 2026: for the climate change scenario (high scenario) by 2050, water supplied from 346 Hm3 to 361 Hm3. That of the reference scenario (1961-1990) will increase to 379.7 Hm3 in 2050. This is caused by the increased demand (increased population, irrigated area, etc ). The balance water management basin is positive for the different Horizons and different situations. If we do not take account of climate change will be the outflow of 5881.4 Hm3. This excess at the basin can be used as part of a transfer for example.

Keywords: balance water, management basin, climate change scenario, Upper and Middle Cheliff

Procedia PDF Downloads 313
1171 The Impact of Artificial Intelligence on Human Rights Development

Authors: Kerols Seif Said Botros

Abstract:

The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 58
1170 The Effectiveness of Attachment-Based Family Therapy on Maladaptive Schemas and Depressive Symptoms in Adolescence

Authors: Mohamad Reza Khodabakhsh

Abstract:

The present study investigated the effectiveness of attachment-based family therapy on maladaptive schemas and depressive symptoms of adolescence. This study was a quasi-experimental study, and a pre-test and post-test design with a control group were used. In this study, the study population included all adolescence. The sample consisted of 30 adolescents who were selected by the available sampling method. Then they were randomly divided into experimental (n = 15) and control (n = 15) groups. Data were collected in this study using the Beck Depression Inventory (1974) and the short form of Young's early maladaptive schema questionnaire (1988). After taking the pre-test, group implementation of family therapy based on attachment style was presented for 11 sessions of two and a half hours for two months in the experimental group. At the end of the sessions, both groups were retested, and the data were analyzed using analysis of covariance in SPSS-22 software. The results showed that attachment-based family therapy led to a significant reduction in maladaptive schemas, including emotional deprivation, rejection/abandonment, mistrust/abuse, social isolation, disability/shame, dependence/inadequacy, vulnerability/trauma, and depressive symptoms were compared to the control group. It can be concluded that this treatment has an effect on maladaptive schemas and symptoms of depression.

Keywords: attachment-based family therapy, maladaptive schemas, depressive symptoms, adolescence

Procedia PDF Downloads 107
1169 Attachment Style, Attachment Figure, and Intimate Relationship among Emerging Adults with Anxiety and Depression

Authors: P. K. Raheemudheen, Vibha Sharma, C. B. Tripathi

Abstract:

Background and Aim: Intimate relationships are one of the major sources of unhappiness for emerging adults(18-25 years) and the extent of worry from it is higher for them as compared to older adults. This increases their vulnerability to develop anxiety and depression. Current academic literature have highlighted adult attachment have a crucial role in determining the psycho social adjustment and psychopathology in Emerging Adulthood. In this context, present study is an attempt to explore patterns of adult attachment styles, availability of attachment figures and dimensions of intimate relationship among emerging adults. Method: The participants(n=30) were emerging adults diagnosed with anxiety or/and depression seeking treatment from IHBAS, Delhi. Relationship Style Questionnaire was used to assess the adult attachment styles and Multidimensional Relationship Questionnaire was used to assess dimensions of intimate relationship. Results& Discussion: Results showed that majority of the participants have insecure attachment styles. They perceived their attachment figure as insensitive and unavailable. Further, it was found that participants experience multiple difficulties to establish and maintain healthy intimate relationships. These findings highlight Adult attachment insecurities seem to contribute to anxiety and depression among emerging adults. It proved a conceptual foundation for planning interventions to deal with these attachment based correlate of anxiety and depression which may be more amenable to therapeutic change.

Keywords: emerging adult, adult attachment, intimate relationship, anxiety

Procedia PDF Downloads 307
1168 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 242
1167 Effects of Climate Change and Livelihood Diversification on Gendered Productivity Gap of Farmers in Northern Regions of Ghana

Authors: William Adzawla

Abstract:

In the midst of climate variability and change, the role of gender in ensuring food production remains vital. Therefore, this study analysed the gendered productivity among maize farmers, and the effects of climate change and variability as well as livelihood diversification on gendered productivity gap. This involved a total of 619 farmers selected through a multistage sampling procedure. The data was analysed using Oaxaca Blinder decomposition model. From the result, there is a significant productivity gap of 58.8% and 44.8% between male and female heads, and between male heads and female spouses, respectively. About 87.47% and 98.08% of the variations in gendered productivity were explained by resource endowment. While livelihood diversification significantly influenced gendered productivity through endowment and coefficient effect, climate variables significantly affect productivity gap through only coefficient effects. The study concluded that there is a substantial gendered productivity gap among farmers and this is particularly due to differences in endowment. Generally, there is a high potential of reducing gendered productivity gaps through the provision of equal diversification opportunities and reducing females’ vulnerability to climate change. Among the livelihood activities, off-farm activities such as agro-processing and shea butter processing should be promoted. Similarly, the adoption of on-farm adaptation strategies should be promoted among the farmers.

Keywords: climate change and variability, gender, livelihood diversification, oaxaca-blinder decomposition, productivity gap

Procedia PDF Downloads 172
1166 Digestion Optimization Algorithm: A Novel Bio-Inspired Intelligence for Global Optimization Problems

Authors: Akintayo E. Akinsunmade

Abstract:

The digestion optimization algorithm is a novel biological-inspired metaheuristic method for solving complex optimization problems. The algorithm development was inspired by studying the human digestive system. The algorithm mimics the process of food ingestion, breakdown, absorption, and elimination to effectively and efficiently search for optimal solutions. This algorithm was tested for optimal solutions on seven different types of optimization benchmark functions. The algorithm produced optimal solutions with standard errors, which were compared with the exact solution of the test functions.

Keywords: bio-inspired algorithm, benchmark optimization functions, digestive system in human, algorithm development

Procedia PDF Downloads 16
1165 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 60
1164 Evaluation of Robot Application in Hospitality

Authors: Lina Zhong, Sunny Sun, Rob Law

Abstract:

Artificial intelligence has been developing rapidly. Previous studies have evaluated hotel technology either from an employee or consumer perspective. However, impacts, which mainly include the social and economic impacts of hotel robots, are unknown as they are newly introduced. To bridge the aforementioned research gap, this study evaluates hotel robots from contextual, diagnostic, evaluative, and strategic aspects using framework analysis as a basis to assist hotel managers in real-time hotel marketing strategy management, adjustment and revenue achievement. Findings show that, from a consumer perspective, the overall acceptance of hotel robots is low. The main implication is that the cost of hotel robots should be carefully estimated, and the investment should be made based on phases.

Keywords: application, evaluation, framework analysis, hotel robot

Procedia PDF Downloads 171
1163 Assessing the Impact of Urbanization on Flood Risk: A Case Study

Authors: Talha Ahmed, Ishtiaq Hassan

Abstract:

Urban areas or metropolitan is portrayed by the very high density of population due to the result of these economic activities. Some critical elements, such as urban expansion and climate change, are driving changes in cities with exposure to the incidence and impacts of pluvial floods. Urban communities are recurrently developed by huge spaces by which water cannot enter impermeable surfaces, such as man-made permanent surfaces and structures, which do not cause the phenomena of infiltration and percolation. Urban sprawl can result in increased run-off volumes, flood stage and flood extents during heavy rainy seasons. The flood risks require a thorough examination of all aspects affecting to severe an event in order to accurately estimate their impacts and other risk factors associated with them. For risk evaluation and its impact due to urbanization, an integrated hydrological modeling approach is used on the study area in Islamabad (Pakistan), focusing on a natural water body that has been adopted in this research. The vulnerability of the physical elements at risk in the research region is analyzed using GIS and SOBEK. The supervised classification of land use containing the images from 1980 to 2020 is used. The modeling of DEM with selected return period is used for modeling a hydrodynamic model for flood event inundation. The selected return periods are 50,75 and 100 years which are used in flood modeling. The findings of this study provided useful information on high-risk places and at-risk properties.

Keywords: urbanization, flood, flood risk, GIS

Procedia PDF Downloads 176
1162 Competitive Advantage on the Road Again: Exploring Nuances through a Conceptual Review and Future Research Avenues

Authors: Seyedabdolali Mortazavi Kamalabadi, Faegheh Taheran

Abstract:

By giving an overview of previous arguments and findings concerned with the concept of competitive advantage, first, we define the overall concept of competitive advantage and discuss nuances of understanding such an important and strategic idea. Finally, by considering the major concerns of marketing academia, including globalization, AI-based technologies, consumer well-being, and internal coopetition between a firm’s units, fruitful avenues to be explored by future studies are presented in the form of research propositions. In the end, relevant gaps mentioned by numerous studies that are worth investigating are demonstrated.

Keywords: artificial intelligence, competitive advantage, consumer well-being, coopetition, globalization, literature review, temporary competitive advantage

Procedia PDF Downloads 115
1161 Revolutionizing Healthcare Facility Maintenance: A Groundbreaking AI, BIM, and IoT Integration Framework

Authors: Mina Sadat Orooje, Mohammad Mehdi Latifi, Behnam Fereydooni Eftekhari

Abstract:

The integration of cutting-edge Internet of Things (IoT) technologies with advanced Artificial Intelligence (AI) systems is revolutionizing healthcare facility management. However, the current landscape of hospital building maintenance suffers from slow, repetitive, and disjointed processes, leading to significant financial, resource, and time losses. Additionally, the potential of Building Information Modeling (BIM) in facility maintenance is hindered by a lack of data within digital models of built environments, necessitating a more streamlined data collection process. This paper presents a robust framework that harmonizes AI with BIM-IoT technology to elevate healthcare Facility Maintenance Management (FMM) and address these pressing challenges. The methodology begins with a thorough literature review and requirements analysis, providing insights into existing technological landscapes and associated obstacles. Extensive data collection and analysis efforts follow to deepen understanding of hospital infrastructure and maintenance records. Critical AI algorithms are identified to address predictive maintenance, anomaly detection, and optimization needs alongside integration strategies for BIM and IoT technologies, enabling real-time data collection and analysis. The framework outlines protocols for data processing, analysis, and decision-making. A prototype implementation is executed to showcase the framework's functionality, followed by a rigorous validation process to evaluate its efficacy and gather user feedback. Refinement and optimization steps are then undertaken based on evaluation outcomes. Emphasis is placed on the scalability of the framework in real-world scenarios and its potential applications across diverse healthcare facility contexts. Finally, the findings are meticulously documented and shared within the healthcare and facility management communities. This framework aims to significantly boost maintenance efficiency, cut costs, provide decision support, enable real-time monitoring, offer data-driven insights, and ultimately enhance patient safety and satisfaction. By tackling current challenges in healthcare facility maintenance management it paves the way for the adoption of smarter and more efficient maintenance practices in healthcare facilities.

Keywords: artificial intelligence, building information modeling, healthcare facility maintenance, internet of things integration, maintenance efficiency

Procedia PDF Downloads 61
1160 Causes and Effects of the 2012 Flood Disaster on Affected Communities in Nigeria

Authors: Abdulquadri Ade Bilau, Richard Ajayi Jimoh, Adejoh Amodu Adaji

Abstract:

The increasing exposures to natural hazards have continued to severely impair on the built environment causing huge fatalities, mass damage and destruction of housing and civil infrastructure while leaving psychosocial impacts on affected communities. The 2012 flood disaster in Nigeria which affected over 7 million inhabitants in 30 of the 36 states resulted in 363 recorded fatalities with about 600,000 houses and a number of civil infrastructure damaged or destroyed. In Kogi State, over 500 thousand people were displaced in 9 out of the 21 local government affected while Ibaji and Lokoja local governments were worst hit. This study identifies the causes and 2012 flood disasters and its effect on housing and livelihood. Personal observation and questionnaire survey were instruments used in carrying out the study and data collected were analysed using descriptive statistical tool. Findings show that the 2012 flood disaster was aided by the gap in hydrological data, sudden dam failure, and inadequate drainage capacity to reduce flood risk. The study recommends that communities residing along the river banks in Lokoja and Ibaji LGAs must be adequately educated on their exposure to flood hazard and mitigation and risk reduction measures such as construction of adequate drainage channel are constructed in affected communities.

Keywords: flood, hazards, housing, risk reduction, vulnerability

Procedia PDF Downloads 267
1159 Terrorism and Sustainable Tourism Development

Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu

Abstract:

Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.

Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness

Procedia PDF Downloads 624
1158 Groundwater Quality in the Rhiss-Nekor Plain, Morocco: Impacts of Human Activities

Authors: Ali Ait Boughrous, Said Benyoussef, Hossain El Ouarghi, Moulay Abdelazize Aboulhassan, Samah Aitbnichou, Said Benguamra

Abstract:

The Rhiss-Nekor aquifer represents a primary water source for the central Rif region. Many operating structures were built for irrigation and drinking water supply. Because of the vulnerability of this aquifer, a thorough knowledge of the environment is needed to evaluate and protect resources. This work aims at the quality assessment of the water table of the plain Ghiss-Nekor and determination of pollution sources in order to establish a map of the web. The plain-Rhiss Nekor, with an area of 100 km2, is located on the Mediterranean coast of Morocco. It has a particular geological structure resulting from the opening of a graben at the end of the Tertiary, which is filled by the accumulation of hundreds of meters of sediment, generating considerable heterogeneity in deposits. This heterogeneity gives various hydrodynamic properties within the aquifer of the plain. The analysis of the water quality of twenty water points, well distributed over the plain, showed high natural salinity linked to the geological nature of the area. This salinity increases in the littoral area by the seawater intrusion phenomenon. This is accentuated by overexploitation of the ground water due to the growing demand. Some wells, located inland, are characterized by organic pollution caused by wastewater seepage from septic tanks and lost wells widespread in the region.

Keywords: anthropogenic factors, groundwater quality, marine intrusion, Rhiss-Nekor aquifer

Procedia PDF Downloads 142
1157 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 81
1156 Typhoon Disaster Risk Assessment of Mountain Village: A Case Study of Shanlin District in Kaohsiung

Authors: T. C. Hsu, H. L. Lin

Abstract:

Taiwan is mountainous country, 70% of land is covered with mountains. Because of extreme climate, the mountain villages with sensitive and fragile environment often get easily affected by inundation and debris flow from typhoon which brings huge rainfall. Due to inappropriate development, overuse and fewer access roads, occurrence of disaster becomes more frequent through downpour and rescue actions are postponed. However, risk map is generally established through administrative boundaries, the difference of urban and rural area is ignored. The neglect of mountain village characteristics eventually underestimates the importance of factors related to vulnerability and reduces the effectiveness. In disaster management, there are different strategies and actions at each stage. According to different tasks, there will be different risk indices and weights to analyze disaster risk for each stage and then it will contribute to confront threat and reduce impact appropriately on right time. Risk map is important in mitigation, but also in response stage because some factors such as road network will be changed by disaster. This study will use risk assessment to establish risk map of Shanlin District which is mountain village in Kaohsiung as a case study in mitigation and response stage through Analytic Hierarchy Process (AHP). AHP helps to recognize the composition and weights of risk factors in mountain village by experts’ opinions through survey design and is combined with present potential hazard map to produce risk map.

Keywords: risk assessment, mountain village, risk map, analytic hierarchy process

Procedia PDF Downloads 399
1155 Impact of Perceived Stress on Psychological Well-Being, Aggression and Emotional Regulation

Authors: Nishtha Batra

Abstract:

This study was conducted to identify the effect of perceived stress on emotional regulation, aggression and psychological well-being. Analysis was conducted using correlational and regression models to examine the relationships between perceived stress (independent variable) and psychological factors containing emotional intelligence, psychological well-being and aggression. Subjects N=100, Male students 50 and Female students 50. The data was collected using Cohen's Perceived Stress Scale, Gross’s Emotional Regulation Questionnaire (ERQ), Ryff’s Psychological Well-being scale and Orispina’s aggression scale. Correlation and regression (SPSS version 22) Emotional regulation and psychological well-being had a significant relationship with Perceived stress.

Keywords: perceived stress, psychological well-being, aggression, emotional regulation, students

Procedia PDF Downloads 32
1154 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 156
1153 The Vulnerability of a Small, Open Economy in a Situation of Global Fiscal Crisis: The Impact of the Greek Debt Crisis on the Foreign Direct Investments to Macedonia

Authors: Viktorija Mano

Abstract:

The objective of my research is to critique the International Monetary Fund (IMF) stance on foreign investment and the benefits for small, open economies of allowing the free movement of capital. In my research as a whole I will explore the extent to which this stance impacted upon and influenced the economic policies of Macedonia. This will involve providing a contextualized, critical account of the policy of the IMF focusing on a comparison of its policies during the early 2000s through policy documents, political discourse and enacted policies in Macedonia. The conditionality associated with these policies, such as the enforcement of austerity measures (including cutting public spending and reducing debt) and the privatization of public institutions has provoked strong reactions in countries which receive such loans. My main focus in my research is on exploring how the process of Financial Liberalization (FL) of the Macedonian economy affected capital flows in the form of foreign direct investments (FDI) in the private sector and how the recent Greek crisis of 2008 has impacted on this. In the case of Macedonia, the reality of FL was tested by the collapse of the Greek economy. However, this paper will highlight the main duties of the IMF and the goals of the FL process implemented in various countries.Additionally, I will undertake a rhetorical documentary analysis on the IMF reports regarding the process of FL in Macedonia since its independence until today.

Keywords: FDI, financial liberalization, Greece, IMF, Macedonia

Procedia PDF Downloads 566
1152 Body, Sex and Culture: Gender Dissidences through Cinema

Authors: Piedad Lucia Bolivar Goez, Daniel Ignacio Garzon Luna, Maria Camila Balcero Angel, Sara Carolina Martinez Roman, Daniela Natalia Polo Rivas, Sandra Liliana Rocha Guitierrez

Abstract:

This article provides a critical analysis on the conception of disorders of sexual development (DSDs) within the bioethics framework. By means of analytical thought, the objective is to approach topics such as the rediscovery of the body, the reinvention of sexuality and link them to the liability that health personnel have to inform people about the options they have to decide over their health and body. The medicalization of sexed bodies in both psychosocial and anatomo-morpho-physiological dimensions from a legal standpoint were analyzed. Its also explored the gender stereotypes established by society and the role of laws in guaranteeing the right of autonomy that takes on greater relevance in DSD. Through this analysis, it was concluded that despite intersexuality having been analyzed by Colombia’s Constitutional Court, that it is stated as a fair entity, the stigmatization by society has not allowed these individuals to belong to an egalitarian context in which everyone has the same opportunities of access to the goods and services that they need. This leads individuals to hide their identity and expression of genre in order to be accepted in a set of contexts. Thus creating a vulnerability that the health system must be able to identify and in which it is necessary to intervene at a biopsychosocial level, in order to guarantee the protection of the individual within an unquestionable frame of equality and solidarity.

Keywords: disorders of sex development, gender identity, sexuality, transgender persons

Procedia PDF Downloads 194
1151 Advanced Techniques in Semiconductor Defect Detection: An Overview of Current Technologies and Future Trends

Authors: Zheng Yuxun

Abstract:

This review critically assesses the advancements and prospective developments in defect detection methodologies within the semiconductor industry, an essential domain that significantly affects the operational efficiency and reliability of electronic components. As semiconductor devices continue to decrease in size and increase in complexity, the precision and efficacy of defect detection strategies become increasingly critical. Tracing the evolution from traditional manual inspections to the adoption of advanced technologies employing automated vision systems, artificial intelligence (AI), and machine learning (ML), the paper highlights the significance of precise defect detection in semiconductor manufacturing by discussing various defect types, such as crystallographic errors, surface anomalies, and chemical impurities, which profoundly influence the functionality and durability of semiconductor devices, underscoring the necessity for their precise identification. The narrative transitions to the technological evolution in defect detection, depicting a shift from rudimentary methods like optical microscopy and basic electronic tests to more sophisticated techniques including electron microscopy, X-ray imaging, and infrared spectroscopy. The incorporation of AI and ML marks a pivotal advancement towards more adaptive, accurate, and expedited defect detection mechanisms. The paper addresses current challenges, particularly the constraints imposed by the diminutive scale of contemporary semiconductor devices, the elevated costs associated with advanced imaging technologies, and the demand for rapid processing that aligns with mass production standards. A critical gap is identified between the capabilities of existing technologies and the industry's requirements, especially concerning scalability and processing velocities. Future research directions are proposed to bridge these gaps, suggesting enhancements in the computational efficiency of AI algorithms, the development of novel materials to improve imaging contrast in defect detection, and the seamless integration of these systems into semiconductor production lines. By offering a synthesis of existing technologies and forecasting upcoming trends, this review aims to foster the dialogue and development of more effective defect detection methods, thereby facilitating the production of more dependable and robust semiconductor devices. This thorough analysis not only elucidates the current technological landscape but also paves the way for forthcoming innovations in semiconductor defect detection.

Keywords: semiconductor defect detection, artificial intelligence in semiconductor manufacturing, machine learning applications, technological evolution in defect analysis

Procedia PDF Downloads 53