Search results for: information security awareness
13824 History and Survey on Volunteer Fire Departments in Serbia
Authors: Mirjana Đ. Laban, Dragan N. Đurica, Nemanja M. Erceg
Abstract:
Volunteer fire departments (VFD) in Serbia were established as civic associations in XIX Century. The founders and members of the first VFDs were prominent members of local communities. Today, those are volunteer organizations for preventing and extinguishing fires and rescuing people and property in various accidents. The paper presents the results of research about the number and resources of active VFDs done in Autonomous Province of Vojvodina, Serbia and about activities they perform today. The survey was done based on data provided by all registered VFDs in Vojvodina. Firefighters Association of Vojvodina includes 35 municipal firefighting associations, 230 volunteer fire departments with 5,300 active members in qualified fire units and more than 15,000 supporting members. Volunteer involvement is primarily an expression of high moral values and as such it has to be respected and stimulated. Better position of the volunteers would have a major impact on the formation of safety culture concept and general public awareness of fire safety and risk reduction, and therefore the security of the society as a whole. Volunteer fire departments make a significant contribution to educate young people and prevent catastrophic consequences of fires and natural disasters.Keywords: education, prevention, rescue, volunteer fire departments
Procedia PDF Downloads 20113823 Knowledge-Attitude-Practice Survey Regarding High Alert Medication in a Teaching Hospital in Eastern India
Authors: D. S. Chakraborty, S. Ghosh, A. Hazra
Abstract:
Objective: Medication errors are a reality in all settings where medicines are prescribed, dispensed and used. High Alert Medications (HAM) are those that bear a heightened risk of causing significant patient harm when used in error. We conducted a knowledge-attitude-practice survey, among residents working in a teaching hospital, to assess the ground situation with regard to the handling of HAM. Methods: We plan to approach 242 residents among the approximately 600 currently working in the hospital through purposive sampling. Residents in all disciplines (clinical, paraclinical and preclinical) are being targeted. A structured questionnaire that has been pretested on 5 volunteer residents is being used for data collection. The questionnaire is being administered to residents individually through face-to-face interview, by two raters, while they are on duty but not during rush hours. Results: Of the 156 residents approached so far, data from 140 have been analyzed, the rest having refused participation. Although background knowledge exists for the majority of respondents, awareness levels regarding HAM are moderate, and attitude is non-uniform. The number of respondents correctly able to identify most ( > 80%) HAM in three common settings– accident and emergency, obstetrics and intensive care unit are less than 70%. Several potential errors in practice have been identified. The study is ongoing. Conclusions: Situation requires corrective action. There is an urgent need for improving awareness regarding HAM for the sake of patient safety. The pharmacology department can take the lead in designing awareness campaign with support from the hospital administration.Keywords: high alert medication, medication error, questionnaire, resident
Procedia PDF Downloads 13013822 Predictive Analytics in Oil and Gas Industry
Authors: Suchitra Chnadrashekhar
Abstract:
Earlier looked as a support function in an organization information technology has now become a critical utility to manage their daily operations. Organizations are processing huge amount of data which was unimaginable few decades before. This has opened the opportunity for IT sector to help industries across domains to handle the data in the most intelligent manner. Presence of IT has been a leverage for the Oil & Gas industry to store, manage and process the data in most efficient way possible thus deriving the economic value in their day-to-day operations. Proper synchronization between Operational data system and Information Technology system is the need of the hour. Predictive analytics supports oil and gas companies by addressing the challenge of critical equipment performance, life cycle, integrity, security, and increase their utilization. Predictive analytics go beyond early warning by providing insights into the roots of problems. To reach their full potential, oil and gas companies need to take a holistic or systems approach towards asset optimization and thus have the functional information at all levels of the organization in order to make the right decisions. This paper discusses how the use of predictive analysis in oil and gas industry is redefining the dynamics of this sector. Also, the paper will be supported by real time data and evaluation of the data for a given oil production asset on an application tool, SAS. The reason for using SAS as an application for our analysis is that SAS provides an analytics-based framework to improve uptimes, performance and availability of crucial assets while reducing the amount of unscheduled maintenance, thus minimizing maintenance-related costs and operation disruptions. With state-of-the-art analytics and reporting, we can predict maintenance problems before they happen and determine root causes in order to update processes for future prevention.Keywords: hydrocarbon, information technology, SAS, predictive analytics
Procedia PDF Downloads 36013821 The Effect of Information Technologies on Business Performance: An Application on Small Hotels
Authors: Abdullah Karaman, Kursad Sayin
Abstract:
In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.Keywords: information technologies, managers, performance, small hotels
Procedia PDF Downloads 48913820 Animation: A Footpath for Enhanced Awareness Creation on Malaria Prevention in Rural Communities
Authors: Stephen Osei Akyiaw, Divine Kwabena Atta Kyere-Owusu
Abstract:
Malaria has been a worldwide menace of a health condition to human beings for several decades with majority of people on the African continent with most causalities where Ghana is no exception. Therefore, this study employed the use of animation to enhance awareness creation on the spread and prevention of Malaria in Effutu Communities in the Central Region of Ghana. Working with the interpretivist paradigm, this study adopted Art-Based Research, where the AIDA Model and Cognitive Theory of Multimedia Learning (CTML) served as the theories underpinning the study. Purposive and convenience sampling techniques were employed in selecting sample for the study. The data collection instruments included document review and interviews. Besides, the study developed an animation using the local language of the people as the voice over to foster proper understanding by the rural community folks. Also, indigenous characters were used for the animation for the purpose of familiarization with the local folks. The animation was publicized at Health Town Halls within the communities. The outcomes of the study demonstrated that the use of animation was effective in enhancing the awareness creation for preventing and controlling malaria disease in rural communities in Effutu Communities in the Central Region of Ghana. Health officers and community folks expressed interest and desire to practice the preventive measures outlined in the animation to help reduce the spread of Malaria in their communities. The study, therefore, recommended that animation could be used to curtail the spread and enhanced the prevention of Malaria.Keywords: malaria, animation, prevention, communities
Procedia PDF Downloads 8713819 Sustainability through Resilience: How Emergency Responders Cope with Stressors
Authors: Sophie Kroeling, Agnetha Schuchardt
Abstract:
Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.Keywords: civil security, emergency responders, stress, resilience, resources
Procedia PDF Downloads 14413818 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 15813817 Pre-Primary Schools’ Earthquake Safety Initiative in Greece
Authors: A. Kourou, A. Ioakeimidou, A. Gakou
Abstract:
Greece due to its location in the Eastern Mediterranean region is characterized by a high degree of seismicity and occurrence of severe earthquakes. It is generally accepted that preventive planning is vital in mitigating impacts, protecting those who are the most vulnerable namely children and increasing the degree of resilience of local communities. Worldwide, States have highlighted the need to ensure the safety of early childhood environments in case of disaster. A great number of children are enrolled in daycare facilities, so building and improving the preparedness of pre-primary schools to prevent injuries and fatalities in case of an earthquake becomes an important policy issue. It is more than evident that preparedness in early preschool level will be increased through awareness and education of the people who work to pre-primary classes and provide early childhood care. The aim of the present study is to assess the level of awareness and preparedness of the Greek pre-primary schools staff concerning earthquake protection issues, as well as their risk mitigation behaviors and earthquake management in case of a strong event. In this framework, specific questionnaire was developed and filled by the abovementioned target group at 30 different municipalities of Greece (2014-2016). Also in the framework of this study it is presented the Pre-Primary Schools’ Earthquake Safety Initiative that has been undertaken by Earthquake Planning and Protection Organization (EPPO) the last years. This initiative aims to develop disaster-resilient day care centers through awareness, self-help, cooperation and education. Recognizing the necessity of integration of the disaster safety concept at pre-primary environments, EPPO published practical guidelines that focused on earthquake planning of these workspaces. Furthermore, dozens of seminars are implemented in municipality or prefecture-level every year by EPPO, in order the early childhood schools’ staff to be appropriately educated and adequately trained to face the earthquake risk. Great progress has been made towards building awareness and increasing preschool preparedness in Greece but significant gaps still remain. Anyway, it is extremely important that the implementation of effective programs and practices and the broad collaboration of all involved parties have been recognized as essential in order to develop a comprehensive disaster management system at preschool environment.Keywords: awareness, earthquake, education, emergency plans, preparedness, pre-primary schools
Procedia PDF Downloads 19613816 Examining Litter Distributions in Lethbridge, Alberta, Canada, Using Citizen Science and GIS Methods: OpenLitterMap App and Story Maps
Authors: Tali Neta
Abstract:
Humans’ impact on the environment has been incredibly brutal, with enormous plastic- and other pollutants (e.g., cigarette buds, paper cups, tires) worldwide. On land, litter costs taxpayers a fortune. Most of the litter pollution comes from the land, yet it is one of the greatest hazards to marine environments. Due to spatial and temporal limitations, previous litter data covered very small areas. Currently, smartphones can be used to obtain information on various pollutants (through citizen science), and they can greatly assist in acknowledging and mitigating the environmental impact of litter. Litter app data, such as the Litterati, are available for study through a global map only; these data are not available for download, and it is not clear whether irrelevant hashtags have been eliminated. Instagram and Twitter open-source geospatial data are available for download; however, these are considered inaccurate, computationally challenging, and impossible to quantify. Therefore, the resulting data are of poor quality. Other downloadable geospatial data (e.g., Marine Debris Tracker8 and Clean Swell10) are focused on marine- rather than terrestrial litter. Therefore, accurate terrestrial geospatial documentation of litter distribution is needed to improve environmental awareness. The current research employed citizen science to examine litter distribution in Lethbridge, Alberta, Canada, using the OpenLitterMap (OLM) app. The OLM app is an application used to track litter worldwide, and it can mark litter locations through photo georeferencing, which can be presented through GIS-designed maps. The OLM app provides open-source data that can be downloaded. It also offers information on various litter types and “hot-spots” areas where litter accumulates. In this study, Lethbridge College students collected litter data with the OLM app. The students produced GIS Story Maps (interactive web GIS illustrations) and presented these to school children to improve awareness of litter's impact on environmental health. Preliminary results indicate that towards the Lethbridge Coulees’ (valleys) East edges, the amount of litter significantly increased due to shrubs’ presence, that acted as litter catches. As wind generally travels from west to east in Lethbridge, litter in West-Lethbridge often finds its way down in the east part of the coulees. The students’ documented various litter types, while the majority (75%) included plastic and paper food packaging. The students also found metal wires, broken glass, plastic bottles, golf balls, and tires. Presentations of the Story Maps to school children had a significant impact, as the children voluntarily collected litter during school recess, and they were looking into solutions to reduce litter. Further litter distribution documentation through Citizen Science is needed to improve public awareness. Additionally, future research will be focused on Drone imagery of highly concentrated litter areas. Finally, a time series analysis of litter distribution will help us determine whether public education through Citizen Science and Story Maps can assist in reducing litter and reaching a cleaner and healthier environment.Keywords: citizen science, litter pollution, Open Litter Map, GIS Story Map
Procedia PDF Downloads 7913815 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security
Authors: Chandanee Wasana Kalansooriya
Abstract:
Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.Keywords: diabetes, food security, glycemic index, rice consumption
Procedia PDF Downloads 10213814 Major Constraints to Adoption of Improved Post-harvest Technologies among Smallholder Farmers in Developing Countries: A Systematic Review
Authors: Muganyizi Jonas Bisheko, G. Rejikumar
Abstract:
Reducing post-harvest losses could be a sustainable solution to enhance the food and income security of smallholder farmers in developing countries. While various research institutions have come up with a number of innovative post-harvest technologies for reducing post-harvest losses, most of them have not been extensively adopted by smallholder farmers. Despite this gap, the synthesized information about the major constraints of post-harvest technology is scarce. This study has been conducted to fill this gap and show the implications of the findings for future post-harvest research. The developed search strategy retrieved 2201 studies. However, after excluding duplicates, title, abstract and full article screening, a total of 41 documents were identified. The major findings are: (i) there is an outstanding deficiency of systematic evidence of the effect of climate change, off-farm income and sources of post-harvest information on the adoption of improved post-harvest technologies; (ii) there is very limited information on adoption constraints pertaining to matters of policy, rules and regulations; (iii) there is very thin literature on behavioral constraints associated with limited adoption of improved post-harvest technologies; (iv) most of the studies focused on post-harvest storage technologies (47%) followed by overall post-harvest management practices (25%), processing technologies (19%) and packaging technologies (3%). Much of the information was found on Cereals (58%), especially maize (44%); (v) geographically, Sub-Saharan Africa accounted for 79% of the reviewed interventions, while South Asia occupied only 21%. The findings of this review are intended to guide various post-harvest technologists and decision-makers in addressing the challenge of huge post-harvest losses.Keywords: constraints, post-harvest loss, post-harvest technology , smallholder farmer
Procedia PDF Downloads 23513813 Comparison of E-Waste Management in Switzerland and in Australia: A Qualitative Content Analysis
Authors: Md Tasbirul Islam, Pablo Dias, Nazmul Huda
Abstract:
E-waste/Waste electrical and electronic equipment (WEEE) is one of the fastest growing waste streams across the globe. This paper aims to compare the e-waste management system in Switzerland and Australia in terms of four features - legislative initiatives, disposal practice, collection and financial mechanisms. The qualitative content analysis is employed as a research method in the study. Data were collected from various published academic research papers, industry reports, and web sources. In addition, a questionnaire survey is conducted in Australia to understand the public awareness and opinions on the features. The results of the study provide valuable insights to policymakers in Australia developing better e-waste management system in conjunction with the public consensus, and the state-of-the-art operational strategies currently being practiced in Switzerland.Keywords: E-waste management, WEEE, awareness, pro-environmental behavior, Australia, Switzerland
Procedia PDF Downloads 28113812 Artificial Intelligence in Art and Other Sectors: Selected Aspects of Mutual Impact
Authors: Justyna Minkiewicz
Abstract:
Artificial Intelligence (AI) applied in the arts may influence the development of AI knowledge in other sectors and then also impact mutual collaboration with the artistic environment. Hence this collaboration may also impact the development of art projects. The paper will reflect the qualitative research outcomes based on in-depth (IDI) interviews within the marketing sector in Poland and desk research. Art is a reflection of the spirit of our times. Moreover, now we are experiencing a significant acceleration in the development of technologies and their use in various sectors. The leading technologies that contribute to the development of the economy, including the creative sector, embrace technologies such as artificial intelligence, blockchain, extended reality, voice processing, and virtual beings. Artificial intelligence is one of the leading technologies developed for several decades, which is currently reaching a high level of interest and use in various sectors. However, the conducted research has shown that there is still low awareness of artificial intelligence and its wide application in various sectors. The study will show how artists use artificial intelligence in their art projects and how it can be translated into practice within the business. At the same time, the paper will raise awareness of the need for businesses to be inspired by the artistic environment. The research proved that there is still a need to popularize knowledge about this technology which is crucial for many sectors. Art projects are tools to develop knowledge and awareness of society and also various sectors. At the same time, artists may benefit from such collaboration. The paper will include selected aspects of mutual relations, areas of possible inspiration, and possible transfers of technological solutions. Those are AI applications in creative industries such as advertising and film, image recognition in art, and projects from different sectors.Keywords: artificial intelligence, business, art, creative industry, technology
Procedia PDF Downloads 10513811 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review
Authors: Zeeshan Hamid, Asher Ramish
Abstract:
The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care
Procedia PDF Downloads 31313810 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 20613809 Exploiting JPEG2000 into Reversible Information
Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu
Abstract:
With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.Keywords: cover media, camouflaged media, reversible information hiding, gray image
Procedia PDF Downloads 32713808 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform
Authors: Nemi Bhattarai
Abstract:
In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor
Procedia PDF Downloads 46513807 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 51813806 Raising Linguistic Awareness through Metalinguistic Written Corrective Feedback
Authors: Orit Zeevy-Solovey
Abstract:
Grammar has traditionally been taught for its own sake, emphasizing rules and drills. However, in recent years, more emphasis is given to communicative competence. Current research suggests that form-focused instruction is notably efficient when incorporated in a meaningful communicative context. It is maintained that writing tasks related to the students’ academic fields will encourage them to express themselves openly in topics that are close to their hearts, without feeling too uneasy about grammatical forms. The teacher can further reduce students’ apprehension of grammar by announcing that credit will be given for merely doing the task and that grammar mistakes will not affect the grade. Students’ linguistic errors can then be corrected by giving metalinguistic feedback which involves providing learners with some kind of explicit remark about the nature of the errors they have made. Research has also shown that learners’ developmental readiness is an important factor influencing the effectiveness of written corrective feedback. Larger effect sizes appear as the proficiency level is higher. The purposes of this paper are to demonstrate how grammar can be taught indirectly through writing tasks, and more specifically, how the use of metalinguistic written corrective feedback given to advanced English as a Foreign Language (EFL) students can raise their linguistic awareness. Since errors are not directly corrected, the students have to work out the corrections needed through exploring grammar books and websites. Longitudinal studies of metalinguistic written corrective feedback comparing the number of errors in students’ first and fourth compositions have shown a decrease in errors.Keywords: EFL, linguistic awareness, metalinguistic corrective feedback, teaching grammar through writing
Procedia PDF Downloads 13213805 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 17213804 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 6213803 Investigating Non-suicidal Self-Injury Discussions on Twitter
Authors: Muhammad Abubakar Alhassan, Diane Pennington
Abstract:
Social networking sites have become a space for people to discuss public health issues such as non-suicidal self-injury (NSSI). There are thousands of tweets containing self-harm and self-injury hashtags on Twitter. It is difficult to distinguish between different users who participate in self-injury discussions on Twitter and how their opinions change over time. Also, it is challenging to understand the topics surrounding NSSI discussions on Twitter. We retrieved tweets using #selfham and #selfinjury hashtags and investigated those from the United kingdom. We applied inductive coding and grouped tweeters into different categories. This study used the Latent Dirichlet Allocation (LDA) algorithm to infer the optimum number of topics that describes our corpus. Our findings revealed that many of those participating in NSSI discussions are non-professional users as opposed to medical experts and academics. Support organisations, medical teams, and academics were campaigning positively on rais-ing self-injury awareness and recovery. Using LDAvis visualisation technique, we selected the top 20 most relevant terms from each topic and interpreted the topics as; children and youth well-being, self-harm misjudgement, mental health awareness, school and mental health support and, suicide and mental-health issues. More than 50% of these topics were discussed in England compared to Scotland, Wales, Ireland and Northern Ireland. Our findings highlight the advantages of using the Twitter social network in tackling the problem of self-injury through awareness. There is a need to study the potential risks associated with the use of social networks among self-injurers.Keywords: self-harm, non-suicidal self-injury, Twitter, social networks
Procedia PDF Downloads 13213802 Presentation of Transgender identities
Authors: Tony Chapman-Wilson
Abstract:
Applied theatre is not an ultimate vehicle to create social change; but is more an opportunity of hope that the production material might affect this. Theatre-makers are able to deconstruct socially and politically challenging themes to encourage their audience to witness lived experiences as they consider themes of concern and injustice. This allows writers to (re) present the lived experiences of trans people, and for social injustice, continued transphobia, and lack of equity to be presented to an audience for debate. There needs to be a stronger position and presence of trans voices and active participation presented of these rather than just that of the cisgender-lens and standpoint. This research examines the relationship between human rights and theatre and considers global examples of this practice, as well as exploring the negatives formed from this relationship, and how this may be developed in the future. This focusses on the ability of theatre to denounce the violations of human rights and considers the power of theatre to support the importance of the awareness of violations to human rights for the raised awareness and potential for action of the audience – who may themselves be part of the oppressed, or indeed an oppressor. The fundamental assertion here is not one of evidenced social change, but of awareness raising of the audience and the potential for social activism and action. The practice of applied theatre is one that is experienced by the audience and the project participants alike, with the intention that theatre may consider how people interact with one another. This paper examines the opportunity of verbatim theatre techniques to allow for a cis-led trans-collaborative research project to (re) present intergenerational trans identities.Keywords: applied theatre, verbatim, transgender, social justice
Procedia PDF Downloads 4213801 The Quality of Accounting Information of Private Companies in the Czech Republic
Authors: Kateřina Struhařová
Abstract:
The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.Keywords: accounting information quality, financial statements, Czech Republic, private companies
Procedia PDF Downloads 30413800 Parents and Stakeholders’ Perspectives on Early Reading Intervention Implemented as a Curriculum for Children with Learning Disabilities
Authors: Bander Mohayya Alotaibi
Abstract:
The valuable partnerships between parents and teachers may develop positive and effective interactions between home and school. This will help these stakeholders share information and resources regarding student academics during ongoing interactions. Thus, partnerships will build a solid foundation for both families and schools to help children succeed in school. Parental involvement can be seen as an effective tool that can change homes and communities and not just schools’ systems. Seeking parents and stakeholders’ attitudes toward learning and learners can help schools design a curriculum. Subsequently, this information can be used to find ways to help improve the academic performance of students, especially in low performing schools. There may be some conflicts when designing curriculum. In addition, designing curriculum might bring more educational expectations to all the sides. There is a lack of research that targets the specific attitude of parents toward specific concepts on curriculum contents. More research is needed to study the perspective that parents of children with learning disabilities (LD) have regarding early reading curriculum. Parents and stakeholders’ perspectives on early reading intervention implemented as a curriculum for children with LD was studied through an advanced quantitative research. The purpose of this study seeks to understand stakeholders and parents’ perspectives of key concepts and essential early reading skills that impact the design of curriculum that will serve as an intervention for early struggler readers who have LD. Those concepts or stages include phonics, phonological awareness, and reading fluency as well as strategies used in house by parents. A survey instrument was used to gather the data. Participants were recruited through 29 schools and districts of the metropolitan area of the northern part of Saudi Arabia. Participants were stakeholders including parents of children with learning disability. Data were collected using distribution of paper and pen survey to schools. Psychometric properties of the instrument were evaluated for the validity and reliability of the survey; face validity, content validity, and construct validity including an Exploratory Factor Analysis were used to shape and reevaluate the structure of the instrument. Multivariate analysis of variance (MANOVA) used to find differences between the variables. The study reported the results of the perspectives of stakeholders toward reading strategies, phonics, phonological awareness, and reading fluency. Also, suggestions and limitations are discussed.Keywords: stakeholders, learning disability, early reading, perspectives, parents, intervention, curriculum
Procedia PDF Downloads 15513799 Monocular 3D Person Tracking AIA Demographic Classification and Projective Image Processing
Authors: McClain Thiel
Abstract:
Object detection and localization has historically required two or more sensors due to the loss of information from 3D to 2D space, however, most surveillance systems currently in use in the real world only have one sensor per location. Generally, this consists of a single low-resolution camera positioned above the area under observation (mall, jewelry store, traffic camera). This is not sufficient for robust 3D tracking for applications such as security or more recent relevance, contract tracing. This paper proposes a lightweight system for 3D person tracking that requires no additional hardware, based on compressed object detection convolutional-nets, facial landmark detection, and projective geometry. This approach involves classifying the target into a demographic category and then making assumptions about the relative locations of facial landmarks from the demographic information, and from there using simple projective geometry and known constants to find the target's location in 3D space. Preliminary testing, although severely lacking, suggests reasonable success in 3D tracking under ideal conditions.Keywords: monocular distancing, computer vision, facial analysis, 3D localization
Procedia PDF Downloads 13913798 Informal Governance as Response to Institutional Paralysis
Authors: Stefanie Kasparek
Abstract:
The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.Keywords: agenda-setting, decision-making, international governance, UNSC
Procedia PDF Downloads 19913797 Potentials and Impediments in the Development of Ikeji Festival for Cultural Tourism
Authors: Ifegbo Lawrencia Ifegbo
Abstract:
Nigeria is a country with many ethnic groups and therefore endowed with festival of different types and nature, yet no concerted effort is committed towards their development for cultural tourism. This paper assessed the adequacy of tourism potential of the festivals, and most importantly investigated the impediments surrounding their non-development. Ikeji, a masquerade festival of the people of Arondizuogu clan in Imo State of Nigeria was selected for the study. Ethnographic research using observer-as-participant technique was used for conducting the study. This was supplemented by focused group discussion (FGD), key informant and unstructured interviews. The result revealed that there exist so much potentials like masquerading, cultural dances, native and highlife music, drumming, role reversals and traditional dishes in the festival. It was further deduced that poor supply of amenities and infrastructural facilities, insecurity of life, lack of trained indigenous experts in tourism, lack of awareness and publicity for the festival on the part of the host communities were responsible for the non-development into tourism destinations. The implication of this is that unless the government resolves to provide the needed resources for the development of the enormous festivals, and restores security and peace in the country, cultural tourism will rarely thrive in Nigeria.Keywords: festivals, cultural tourism, tourism potential, cultural resources, tourism development
Procedia PDF Downloads 33613796 Analysis of the Effect of Increased Self-Awareness on the Amount of Food Thrown Away
Authors: Agnieszka Dubiel, Artur Grabowski, Tomasz Przerywacz, Mateusz Roganowicz, Patrycja Zioty
Abstract:
Food waste is one of the most significant challenges humanity is facing nowadays. Every year, reports from global organizations show the scale of the phenomenon, although society's awareness is still insufficient. One-third of the food produced in the world is wasted at various points in the food supply chain. Wastes are present from the delivery through the food preparation and distribution to the end of the sale and consumption. The first step in understanding and resisting the phenomenon is a thorough analysis of the everyday behaviors of humanity. This concept is understood as finding the correlation between the type of food and the reason for throwing it out and wasting it. Those actions were identified as a critical step in the start of work to develop technology to prevent food waste. In this paper, the problem mentioned above was analyzed by focusing on the inhabitants of Central Europe, especially Poland, aged 20-30. This paper provides an insight into collecting data through dedicated software and an organized database. The proposed database contains information on the amount, type, and reasons for wasting food in households. A literature review supported the work to answer research questions, compare the situation in Poland with the problem analyzed in other countries, and find research gaps. The proposed article examines the cause of food waste and its quantity in detail. This review complements previous reviews by emphasizing social and economic innovation in Poland's food waste management. The paper recommends a course of action for future research on food waste management and prevention related to the handling and disposal of food, emphasizing households, i.e., the last link in the supply chain.Keywords: food waste, food waste reduction, consumer food waste, human-food interaction
Procedia PDF Downloads 11913795 Identify the Risks Factors and Problems of Waste Management in Developing Countries as Hurdles
Authors: Zubair Ahmad
Abstract:
The aim of this study is to analyze the risks factors and issues with waste management in developing nations as barriers. Depending on their content and categorization, wastes are managed differently. Waste management strategies differ for liquid, solid, and organic wastes. The final stage of trash disposal entails procedures like burning, interment, recycling, and treatment. Due to the rising creation of solid waste, the growing urban population has a magnified impact on the environment and public health. All regions, but especially informal urban neighborhoods, tribal villages, and official rural settlements have a protracted backlog in waste services. Another significant impediment seen in the developing world is a lack of education and awareness of effective waste-management practices. Unauthorized dumpsites pose a serious risk to the environment since they could contain dangerous elements like radioactive, infectious, and toxic waste. Wealthier individuals are more inclined to think that their actions will have an impact on environmental problems and to act to address them. Waste managers need to take action to make sure the public is given information that is consistent with what they currently know. The results of the data analysis conducted with the aid of the various methodologies discussed in the preceding chapter are presented in this chapter by the researcher. Descriptive analysis has been used in research to determine whether or not there are relationships between variables and to determine the importance of the variables. According to a survey, there are no efforts being made to lessen the odor that garbage dump sites emit (in terms of treating or recycling the material placed at dumpsite) This might be the case since respondents only commented on the waste management conditions in their immediate surroundings and may not have fully understood the steps taken to resolve this issue.Keywords: risk factor of waste material, lack of awareness, developing countries struggles, waste management
Procedia PDF Downloads 70