Search results for: intellectual property protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4274

Search results for: intellectual property protection

3134 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 93
3133 Early Impact Prediction and Key Factors Study of Artificial Intelligence Patents: A Method Based on LightGBM and Interpretable Machine Learning

Authors: Xingyu Gao, Qiang Wu

Abstract:

Patents play a crucial role in protecting innovation and intellectual property. Early prediction of the impact of artificial intelligence (AI) patents helps researchers and companies allocate resources and make better decisions. Understanding the key factors that influence patent impact can assist researchers in gaining a better understanding of the evolution of AI technology and innovation trends. Therefore, identifying highly impactful patents early and providing support for them holds immeasurable value in accelerating technological progress, reducing research and development costs, and mitigating market positioning risks. Despite the extensive research on AI patents, accurately predicting their early impact remains a challenge. Traditional methods often consider only single factors or simple combinations, failing to comprehensively and accurately reflect the actual impact of patents. This paper utilized the artificial intelligence patent database from the United States Patent and Trademark Office and the Len.org patent retrieval platform to obtain specific information on 35,708 AI patents. Using six machine learning models, namely Multiple Linear Regression, Random Forest Regression, XGBoost Regression, LightGBM Regression, Support Vector Machine Regression, and K-Nearest Neighbors Regression, and using early indicators of patents as features, the paper comprehensively predicted the impact of patents from three aspects: technical, social, and economic. These aspects include the technical leadership of patents, the number of citations they receive, and their shared value. The SHAP (Shapley Additive exPlanations) metric was used to explain the predictions of the best model, quantifying the contribution of each feature to the model's predictions. The experimental results on the AI patent dataset indicate that, for all three target variables, LightGBM regression shows the best predictive performance. Specifically, patent novelty has the greatest impact on predicting the technical impact of patents and has a positive effect. Additionally, the number of owners, the number of backward citations, and the number of independent claims are all crucial and have a positive influence on predicting technical impact. In predicting the social impact of patents, the number of applicants is considered the most critical input variable, but it has a negative impact on social impact. At the same time, the number of independent claims, the number of owners, and the number of backward citations are also important predictive factors, and they have a positive effect on social impact. For predicting the economic impact of patents, the number of independent claims is considered the most important factor and has a positive impact on economic impact. The number of owners, the number of sibling countries or regions, and the size of the extended patent family also have a positive influence on economic impact. The study primarily relies on data from the United States Patent and Trademark Office for artificial intelligence patents. Future research could consider more comprehensive data sources, including artificial intelligence patent data, from a global perspective. While the study takes into account various factors, there may still be other important features not considered. In the future, factors such as patent implementation and market applications may be considered as they could have an impact on the influence of patents.

Keywords: patent influence, interpretable machine learning, predictive models, SHAP

Procedia PDF Downloads 50
3132 Protective Potential of Hyperhalophilic Diatoms Extract Against Lead Induced Oxidative Stress in Rats and Human HepG2 and HEK293 Cells Line

Authors: Wassim Guermazi, Saoussan Boukhris, Neila Annabi Trabelsi, Tarek Rebai, Alya Sellami-Kamoun, Habib Ayadi

Abstract:

This work investigates the protective effects of the microalga Halamphora sp. extract (H. Ext) as a natural product on lead-intoxicated liver and kidney human cells in vitro and in vivo on rats wistar. HepG2 cells line derived from human hepatocellular carcinoma and HEK293 cells line derived from human embryonic kidney were used for the in vitro study. The analysis of the fatty acids methyl esters of the extract was performed by a GC/MS. Four groups of rats, each of which was composed of six animals, were used for the in vivo experiment. The pretreatment of HepG2 and HEK293 cells line with the extract (100 µg mL-1) significantly (p < 0.05) protected against cytotoxicity induced by lead exposure. In vivo, the biochemical parameters in serum, namely malondialdehyde level (MDA), superoxide dismutase (SOD), catalase (CAT) and glutathione peroxidase (GPx) activities, were measured in supernatants of organ homogenates. H. Ext was found to be rich in fatty acids, essentially palmitic and palmitoleic accounting respectively 29.46% and 42.07% of total fatty acids. Both in vitro and in vivo, the co-treatment with H. Ext allowed the protection of the liver and kidney cells structure, as well as the significant preservation of normal antioxidant and biochemical parameters in rats. Halamphora extract rich in fatty acids has been proven to be effective in protection against Pb-induced toxicity.

Keywords: microalga extract, human cells line, fatty acid, lead exposure, oxidative stress, rats

Procedia PDF Downloads 88
3131 Controller Design Using GA for SMC Systems

Authors: Susy Thomas, Sajju Thomas, Varghese Vaidyan

Abstract:

This paper considers SMCs using linear feedback with switched gains and proposes a method which can minimize the pole perturbation. The method is able to enhance the robustness property of the controller. A pre-assigned neighborhood of the ‘nominal’ positions is assigned and the system poles are not allowed to stray out of these bounds even when parameters variations/uncertainties act upon the system. A quasi SMM is maintained within the assigned boundaries of the sliding surface.

Keywords: parameter variations, pole perturbation, sliding mode control, switching surface, robust switching vector

Procedia PDF Downloads 364
3130 Neural Network Mechanisms Underlying the Combination Sensitivity Property in the HVC of Songbirds

Authors: Zeina Merabi, Arij Dao

Abstract:

The temporal order of information processing in the brain is an important code in many acoustic signals, including speech, music, and animal vocalizations. Despite its significance, surprisingly little is known about its underlying cellular mechanisms and network manifestations. In the songbird telencephalic nucleus HVC, a subset of neurons shows temporal combination sensitivity (TCS). These neurons show a high temporal specificity, responding differently to distinct patterns of spectral elements and their combinations. HVC neuron types include basal-ganglia-projecting HVCX, forebrain-projecting HVCRA, and interneurons (HVC¬INT), each exhibiting distinct cellular, electrophysiological and functional properties. In this work, we develop conductance-based neural network models connecting the different classes of HVC neurons via different wiring scenarios, aiming to explore possible neural mechanisms that orchestrate the combination sensitivity property exhibited by HVCX, as well as replicating in vivo firing patterns observed when TCS neurons are presented with various auditory stimuli. The ionic and synaptic currents for each class of neurons that are presented in our networks and are based on pharmacological studies, rendering our networks biologically plausible. We present for the first time several realistic scenarios in which the different types of HVC neurons can interact to produce this behavior. The different networks highlight neural mechanisms that could potentially help to explain some aspects of combination sensitivity, including 1) interplay between inhibitory interneurons’ activity and the post inhibitory firing of the HVCX neurons enabled by T-type Ca2+ and H currents, 2) temporal summation of synaptic inputs at the TCS site of opposing signals that are time-and frequency- dependent, and 3) reciprocal inhibitory and excitatory loops as a potent mechanism to encode information over many milliseconds. The result is a plausible network model characterizing auditory processing in HVC. Our next step is to test the predictions of the model.

Keywords: combination sensitivity, songbirds, neural networks, spatiotemporal integration

Procedia PDF Downloads 65
3129 Socio-Psychological Significance of Vandalism in the Urban Environment: Destruction, Modernization, Communication

Authors: Olga Kruzhkova, Irina Vorobyeva, Roman Porozov

Abstract:

Vandalism is a common phenomenon, but its definition is still not clearly defined. In the public sense, vandalism is the blatant cases of pogroms in cemeteries, destruction of public places (regardless of whether these actions are authorized), damage to significant objects of culture and history (monuments, religious buildings). From a legal point of view, only such an act can be called vandalism, which is aimed at 'desecrating buildings or other structures, damaging property on public transport or in other public places'. The key here is the notion of public property that is being damaged. In addition, the principal is the semantics of messages, expressed in a kind of sign system (drawing, inscription, symbol), which initially threatens public order, the calmness of citizens, public morality. Because of this, the legal qualification of vandalism doesn’t include a sufficiently wide layer of environmental destructions that are common in modern urban space (graffiti and other damage to private property, broken shop windows, damage to entrances and elevator cabins), which in ordinary consciousness are seen as obvious facts of vandalism. At the same time, the understanding of vandalism from the position of psychology implies an appeal to the question of the limits of the activity of the subject of vandalism and his motivational basis. Also recently, the discourse on the positive meaning of some forms of vandalism (graffiti, street-art, etc.) has been activated. But there is no discussion of the role and significance of vandalism in public and individual life, although, like any socio-cultural and socio-psychological phenomenon, vandalism is not groundless and meaningless. Our aim of the study was to identify and describe the functions of vandalism as a socio-cultural and socio-psychological phenomenon of the life of the urban community, as well as personal determinants of its manifestations. The study was conducted in the spatial environment of the Russian megalopolis (Ekaterinburg) by photographing visual results of vandal acts (6217 photos) with subsequent trace-assessment and image content analysis, as well as diagnostics of personal characteristics and motivational basis of vandal activity of possible subjects of vandalism among youth. The results of the study allowed to identify the functions of vandalism at the socio-environmental and individual-subjective levels. The socio-environmental functions of vandalism include the signaling function, the function of preparing of social changes, the constructing function, and the function of managing public moods. The demonstrative-protest function, the response function, the refund function, and the self-expression function are assigned to the individual-subjective functions of vandalism. A two-dimensional model of vandal functions has been formed, where functions are distributed in the spaces 'construction reconstruction', 'emotional regulation/moral regulation'. It is noted that any function of vandal activity at the individual level becomes a kind of marker of 'points of tension' at the social and environmental level. Acknowledgment: The research was supported financially by Russian Science Foundation, (Project No. 17-18-01278).

Keywords: destruction, urban environment, vandal behavior, vandalism, vandalism functions

Procedia PDF Downloads 200
3128 [Keynote Talk]: Discovering Liouville-Type Problems for p-Energy Minimizing Maps in Closed Half-Ellipsoids by Calculus Variation Method

Authors: Lina Wu, Jia Liu, Ye Li

Abstract:

The goal of this project is to investigate constant properties (called the Liouville-type Problem) for a p-stable map as a local or global minimum of a p-energy functional where the domain is a Euclidean space and the target space is a closed half-ellipsoid. The First and Second Variation Formulas for a p-energy functional has been applied in the Calculus Variation Method as computation techniques. Stokes’ Theorem, Cauchy-Schwarz Inequality, Hardy-Sobolev type Inequalities, and the Bochner Formula as estimation techniques have been used to estimate the lower bound and the upper bound of the derived p-Harmonic Stability Inequality. One challenging point in this project is to construct a family of variation maps such that the images of variation maps must be guaranteed in a closed half-ellipsoid. The other challenging point is to find a contradiction between the lower bound and the upper bound in an analysis of p-Harmonic Stability Inequality when a p-energy minimizing map is not constant. Therefore, the possibility of a non-constant p-energy minimizing map has been ruled out and the constant property for a p-energy minimizing map has been obtained. Our research finding is to explore the constant property for a p-stable map from a Euclidean space into a closed half-ellipsoid in a certain range of p. The certain range of p is determined by the dimension values of a Euclidean space (the domain) and an ellipsoid (the target space). The certain range of p is also bounded by the curvature values on an ellipsoid (that is, the ratio of the longest axis to the shortest axis). Regarding Liouville-type results for a p-stable map, our research finding on an ellipsoid is a generalization of mathematicians’ results on a sphere. Our result is also an extension of mathematicians’ Liouville-type results from a special ellipsoid with only one parameter to any ellipsoid with (n+1) parameters in the general setting.

Keywords: Bochner formula, Calculus Stokes' Theorem, Cauchy-Schwarz Inequality, first and second variation formulas, Liouville-type problem, p-harmonic map

Procedia PDF Downloads 274
3127 Optimal Management of Forest Stands under Wind Risk in Czech Republic

Authors: Zohreh Mohammadi, Jan Kaspar, Peter Lohmander, Robert Marusak, Harald Vacik, Ljusk Ola Eriksson

Abstract:

Storms are important damaging agents in European forest ecosystems. In the latest decades, significant economic losses in European forestry occurred due to storms. This study investigates the problem of optimal harvest planning when forest stands risk to be felled by storms. One of the most applicable mathematical methods which are being used to optimize forest management is stochastic dynamic programming (SDP). This method belongs to the adaptive optimization class. Sequential decisions, such as harvest decisions, can be optimized based on sequential information about events that cannot be perfectly predicted, such as the future storms and the future states of wind protection from other forest stands. In this paper, stochastic dynamic programming is used to maximize the expected present value of the profits from an area consisting of several forest stands. The region of analysis is the Czech Republic. The harvest decisions, in a particular time period, should be simultaneously taken in all neighbor stands. The reason is that different stands protect each other from possible winds. The optimal harvest age of a particular stand is a function of wind speed and different wind protection effects. The optimal harvest age often decreases with wind speed, but it cannot be determined for one stand at a time. When we consider a particular stand, this stand also protects other stands. Furthermore, the particular stand is protected by neighbor stands. In some forest stands, it may even be rational to increase the harvest age under the influence of stronger winds, in order to protect more valuable stands in the neighborhood. It is important to integrate wind risk in forestry decision-making.

Keywords: Czech republic, forest stands, stochastic dynamic programming, wind risk

Procedia PDF Downloads 147
3126 Creating Risk Maps on the Spatiotemporal Occurrence of Agricultural Insecticides in Sub-Saharan Africa

Authors: Chantal Hendriks, Harry Gibson, Anna Trett, Penny Hancock, Catherine Moyes

Abstract:

The use of modern inputs for crop protection, such as insecticides, is strongly underestimated in Sub-Saharan Africa. Several studies measured toxic concentrations of insecticides in fruits, vegetables and fish that were cultivated in Sub-Saharan Africa. The use of agricultural insecticides has impact on human and environmental health, but it also has the potential to impact on insecticide resistance in malaria transmitting mosquitos. To analyse associations between historic use of agricultural insecticides and the distribution of insecticide resistance through space and time, the use and environmental fate of agricultural insecticides needs to be mapped through the same time period. However, data on the use and environmental fate of agricultural insecticides in Africa are limited and therefore risk maps on the spatiotemporal occurrence of agricultural insecticides are created using environmental data. Environmental data on crop density and crop type were used to select the areas that most likely receive insecticides. These areas were verified by a literature review and expert knowledge. Pesticide fate models were compared to select most dominant processes that are involved in the environmental fate of insecticides and that can be mapped at a continental scale. The selected processes include: surface runoff, erosion, infiltration, volatilization and the storing and filtering capacity of soils. The processes indicate the risk for insecticide accumulation in soil, water, sediment and air. A compilation of all available data for traces of insecticides in the environment was used to validate the maps. The risk maps can result in space and time specific measures that reduce the risk of insecticide exposure to non-target organisms.

Keywords: crop protection, pesticide fate, tropics, insecticide resistance

Procedia PDF Downloads 141
3125 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol

Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey

Abstract:

Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.

Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention

Procedia PDF Downloads 109
3124 Landslide Hazard a Gigantic Problem in Indian Himalayan Region: Needs In-Depth Research to Minimize Disaster

Authors: Varun Joshi, M. S. Rawat

Abstract:

The Indian Himalayan Region (IHR) is inherently fragile and susceptible to landslide hazard due to its extremely weak geology, highly rugged topography and heavy monsoonal rainfall. One of the most common hazards in the IHR is landslide, and this event is particularly frequent in Himalayan states of India i.e. Jammu & Kashmir, Himachal Pradesh, Uttarakhand, Sikkim, Manipur and Arunachal Pradesh. Landslides are mostly triggered by extreme rainfall events but the incidence increases during monsoon months (June to September). Natural slopes which are otherwise stable but they get destabilized due to anthropogenic activities like construction of various developmental activities and deforestation. These activities are required to fulfill the developmental needs and upliftment of societal status in the region. Landslides also trigger during major earthquakes and reported most observable and damaging phenomena. Studies indicate that the landslide phenomenon has increased many folds due to developmental activities in Himalayan region. Gradually increasing and devastating consequences of landslides turned into one of the most important hydro-geological hazards in Himalayan states especially in Uttarakhand and Sikkim states of India. The recent most catastrophic rainfall in June 2013 in Uttarakhand lead to colossal loss of life and property. The societal damage due to this incident is still to be recovered even after three years. Sikkim earthquake of September 2011 is witnessed for triggering of large number of coseismic landslides. The rescue and relief team faced huge problem in helping the trapped villagers in remote locations of the state due to road side blockade by landslides. The recent past incidences of landslides in Uttarakhand, as well as Sikkim states, created a new domain of research in terms of understanding the phenomena of landslide and management of disaster in such situation. Every year at many locations landslides trigger which force dwellers to either evacuate their dwelling or lose their life and property. The communication and transportation networks are also severely affected by landslides at several locations. Many times the drinking water supply disturbed and shortage of daily need household items reported during monsoon months. To minimize the severity of landslide in IHR requires in-depth research and developmental planning. For most of the areas in the present study, landslide hazard zonation is done on 1:50,000 scale. The land use planning maps on extensive basis are not available. Therefore, there is a need of large-scale landslide hazard zonation and land use planning maps. If the scientist conduct research on desired aspects and their outcome of research is utilized by the government in developmental planning then the incidents of landslide could be minimized, subsequent impact on society, life and property would be reduced. Along with the scientific research, there is another need of awareness generation in the region for stake holders and local dwellers to combat with the landslide hazard, if triggered in their location.

Keywords: coseismic, Indian Himalayan Region, landslide hazard zonation, Sikkim, societal, Uttarakhand

Procedia PDF Downloads 251
3123 The Effect of Contemporary Islamic Thought Liberalization to the Development of Science

Authors: Ibrahim Malik, Vita Fathimah Silondae, Askoning

Abstract:

The liberalization of Islamic thought is not only an impact on the views of Muslim community regarding worldview, but has touched the stage reconstruction of contemporary science. It can be seen from the emergence of Western and Eastern intellectual movements that try to reconstruct contemporary science arguing that scientific culture is not currently able to deliver audiences to change the order of the better society. Such Islamic thought liberalization has a huge influence on the multi-dimensional crisis in various sectors such as the economic, culture, politic, ecology, and other sectors. Therefore, this paper examines the effects of the liberalization of contemporary Islamic thought towards on the development of modern science. The method used in this paper is based on textual study of Al-Qur'an, Hadith (prophetic tradition), and the history of contemporary Islamic thought and comparing it with the reality of the development of science today. So, the influence of Islamic thought liberalization has created a crisis and stagnation of the development of scientific disciplines can be found.

Keywords: liberalization, science, Islam, development of science

Procedia PDF Downloads 428
3122 A Case Study Approach on Co-Constructing the Idea of 'Safety' with Children

Authors: Beng Zhen Yeow

Abstract:

In most work that involves children, the voice of the children is often not heard. This is ironic since a lot of discussions might involve their welfare and safety. It might seem natural that the professionals should hear from them about what they wish for instead of deciding what is best for them. However, this, unfortunately, might be more the exception than the norm in most case and hence in many instances, children are merely 'subjects' in conversations about safety instead of active participants in the construction or creation of safety in the family. There might be many reasons why it does not happen in our work. Firstly, professionals have learnt how to 'socialise' into their professional roles and hence in the process become 'un-childlike'. Secondly, there is also a lack of professional training with regards to how to talk with children. Finally, there might be also a lack of concrete tools and techniques that are developed to facilitate the process. In this paper, the case study method is used to show how the idea of safety could be concretised and discussed with children and their family members, and hence making them active participants and co-creators of their own safety. Specific skills and techniques are highlighted through the case study. In this case, there was improvement in outcomes like no repeated offence or abuse. In addition, children were also able to advocate for their own safety after six months of intervention and how the family members were able to explicitly say what they can do to improve safety. The professionals in the safety network reported significant improvements. On top of that, the abused child who was removed due to child protection concerns, had verbalized observations of change in mother’s parenting abilities, and has requested for home leave to begin due to ownership of safety planning and having confidence to co-create safety for her siblings and herself together with the professionals in the safety network. Children becoming active participants in the co-creation of safety not only serve the purpose in allowing them to own a 'voice' but at the same time, give them greater confidence to protect themselves at home and in other contexts outside of home.

Keywords: partnering for safety, collaborative social work, family and systemic psychotherapy, child protection

Procedia PDF Downloads 120
3121 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform

Authors: Omaima N. Ahmad AL-Allaf

Abstract:

Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.

Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform

Procedia PDF Downloads 226
3120 Managing Polytechnic Education for Entrepreneurship Development in Nigeria

Authors: Oluwalola Felicia Kikelomo

Abstract:

The introduction of entrepreneurship education in polytechnics is seen as a measure to reduce the rate of unemployment and strategically position the economy for sustainable development in Nigeria. This paper discusses the roles of polytechnics in entrepreneurship development. It also examines the challenges of entrepreneurship education in Polytechnics. The paper recommends, among others, that the entrepreneurship education should be property funded by the government with the support of non-governmental organizations so that there would be adequate resources to organize and manage the education. In addition, drastic and serious awareness campaigns should be mounted to sensitize the public and the students on the need for entrepreneurship education.

Keywords: education, polytechnic entrepreneurship development, education, human development

Procedia PDF Downloads 523
3119 The Urgenda and Juliana Cases: Redefining the Notion of Environmental Democracy

Authors: Valentina Dotto

Abstract:

Climate change cases used to take the form of statutory disputes rather than constitutional or common law disputes. This changed in 2015, with the Urgenda Climate case in the Netherlands (Urgenda Foundation v. The State of the Netherlands, C/09/456689/HAZA 13-1396) and, the Juliana case in the U.S. (United States v. U.S. District Court for District of Oregon, 17-71692, 9th Cir.). The two cases represent a new type of climate litigation, the claims brought against the federal government were in fact grounded in constitutional rights. The complaints used the Doctrine of Public Trust as a cornerstone for the lawsuits asserting that government's actions against climate change failed to protect essential public trust resources; thus, violating a generation's constitutional rights to life, liberty, and property. The Public Trust Doctrine –a quintessentially American legal concept-, reserved to the States by virtue of the 9th and 10th amendment of the federal Constitution, gives them considerable jurisdiction over natural resources and has been refined by a number of Supreme Court rulings. The Juliana case exemplifies the Doctrine’s evolutionary nature because it attempts to apply it to the federal government, and establish a right to a climate system capable of sustaining human life as a fundamental right protected by a substantive due process. Furthermore, the flexibility of the Doctrine makes it permissible to be applied to a variety of different legal systems as in the Urgenda case. At the very heart of the lawsuits stands the question of who owns the Earth resources and, to what extent the general public can claim the services that the Earth provides as common property. By employing the widest possible definition of the Doctrine of Public Trust these lawsuits tried to redefine environmental resources as a collective right of all people. By doing case analysis, the paper explores how these cases can contribute to widening the public access to information and broadening the public voice in decision making as well as providing a precedent to equal access in seeking justice and redress from environmental failures.

Keywords: climate change, doctrine of public trust, environmental democracy, Juliana case, Urgenda climate case

Procedia PDF Downloads 174
3118 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 31
3117 Anticancer Effect of Doxorubicin Using Injectable Hydrogel

Authors: Prasamsha Panta, Da Yeon Kim, Ja Yong Jang, Min Jae Kim, Jae Ho Kim, Moon Suk Kim

Abstract:

Introduction: Among the many anticancer drugs used clinically, doxorubicin (Dox), was one of widely used drugs to treat many types of solid tumors such as liver, colon, breast, or lung. Intratumoral injection of chemotherapeutic agents is a potentially more effective alternative to systemic administration because direct delivery of the anticancer drug to the target may improve both the stability and efficacy of anticancer drugs. Injectable in situ-forming gels have attracted considerable attention because they can achieve site specific drug delivery, long term action periods, and improved patient compliance. Objective: Objective of present study is to confirm clinical benefit of intratumoral chemotherapy using injectable in situ-forming poly(ethylene glycol)-b-polycaprolactone diblock copolymer (MP) and Dox with increase in efficacy and reducing the toxicity in patients with cancer diseases. Methods and methodology: We prepared biodegradable MP hydrogel and measured viscosity for the evaluation of thermo-sensitive property. In vivo antitumor activity was performed with normal saline, MP only, single free Dox, repeat free Dox, and Dox-loaded MP gel. The remaining amount of Dox drug was measured using HPLC after the mouse was sacrified. For cytotoxicity studies WST-1 assay was performed. Histological analysis was done with H&E and TUNEL processes respectively. Results: The works in this experiment showed that Dox-loaded MP have biodegradable drug depot property. Dox-loaded MP gels showed remarkable in vitro cytotoxicity activities against cancer cells. Finally, this work indicates that injection of Dox-loaded MP allowed Dox to act effectively in the tumor and induced long-lasting supression of tumor growth. Conclusion: This work has examined the potential clinical utility of intratumorally injected Dox-loaded MP gel, which shows significant effect of higher local Dox retention compared with systemically administered Dox.

Keywords: injectable in-situ forming hydrogel, anticancer, doxorubicin, intratumoral injection

Procedia PDF Downloads 408
3116 An Analysis of the Strategies Employed to Curate, Conserve and Digitize the Timbuktu Manuscripts

Authors: F. Saptouw

Abstract:

This paper briefly reviews the range of curatorial interventions made to preserve and display the Timbuktu Manuscripts. The government of South Africa and Mali collaborated to preserve the manuscripts, and brief notes will be presented about the value of archives in those specific spaces. The research initiatives of the Tombouctou Manuscripts Project, based at the University of Cape Town, feature prominently in the text. A brief overview of the history of the archive will be presented and its preservation as a key turning point in curating the intellectual history of the continent. ­­­The strategies of preservation, curation, publication and digitization are presented as complimentary interventions. Each materialization of the manuscripts contributes something significant; the complexity of the contribution is dependent primarily on the format of presentation. This integrated reading of the manuscripts is presented as a means to gain a more nuanced understanding of the past, which greatly surpasses how much information would be gleaned from relying on a single media format.

Keywords: archive, curatorship, cultural heritage, museum practice, Timbuktu manuscripts

Procedia PDF Downloads 114
3115 The Impact of Artificial Intelligence on Autism Attitude and Skills

Authors: Sara Fayez Fawzy Mikhael

Abstract:

Inclusive education services for students with autism are still developing in Thailand. Although many more children with intellectual disabilities have been attending school since the Thai government enacted the Education for Persons with Disabilities Act in 2008, facilities for students with disabilities and their families are generally inadequate. This comprehensive study used the Attitudes and Preparedness for Teaching Students with Autism Scale (APTSAS) to examine the attitudes and preparedness of 110, elementary teachers in teaching students with autism in the general education setting. Descriptive statistical analyzes showed that the most important factor in the formation of a negative image of teachers with autism is student attitudes. Most teachers also stated that their pre-service training did not prepare them to meet the needs of children with special needs who cannot speak. The study is important and provides directions for improving non-formal teacher education in Thailand.

Keywords: attitude, autism, teachers, thailandsports activates, movement skills, motor skills

Procedia PDF Downloads 66
3114 Fundamentals of Theorizing Power in International Relations

Authors: Djehich Mohamed Yousri

Abstract:

The field of political science is one of the sciences in which there is much controversy, in terms of the multiplicity of schools, trends, and goals. This overlap and complexity in the interpretation of the political phenomenon in political science has been linked to other disciplines associated with it, and the science of international relations and the huge amount of theories that have found a wide range and a decisive position after the national tide in the history of Western political thought, especially after the Westphalia Conference 1648, and as a result was approved The new foundations of international politics, the most important of which is respect for state sovereignty. Historical events continued and coincided with scientific, intellectual, and economic developments following the emergence of the industrial revolution, followed by the technological revolutions in all their contents, which led to the rooting and establishment of a comprehensive political system that is more complex and overlapping than it was in the past during the First and Second World Wars. The international situation has become dependent on the digital revolution and its aspirations in The comprehensive transformation witnessed by international political relations after the Cold War.

Keywords: theorizing, international relations, approaches to international relations, political science, the political system

Procedia PDF Downloads 104
3113 A New Modification of Nonlinear Conjugate Gradient Coefficients with Global Convergence Properties

Authors: Ahmad Alhawarat, Mustafa Mamat, Mohd Rivaie, Ismail Mohd

Abstract:

Conjugate gradient method has been enormously used to solve large scale unconstrained optimization problems due to the number of iteration, memory, CPU time, and convergence property, in this paper we find a new class of nonlinear conjugate gradient coefficient with global convergence properties proved by exact line search. The numerical results for our new βK give a good result when it compared with well-known formulas.

Keywords: conjugate gradient method, conjugate gradient coefficient, global convergence

Procedia PDF Downloads 463
3112 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes

Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen

Abstract:

Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.

Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades

Procedia PDF Downloads 164
3111 The Effect of Support Program Based on The Health Belief Model on Reproductive Health Behavior in Women with Orthopedic Disabled

Authors: Eda Yakit Ak, Ergül Aslan

Abstract:

The study was conducted using the quasi-experimental design to determine the influence of the nursing support program prepared according to the Health Belief Model on reproductive health behaviors of orthopedically disabled women in the physical therapy and rehabilitation clinic at a university hospital between August 2019-October, 2020. The research sample included 50 women (35 in the control group and 15 in the experimental group with orthopedic disability). A 3-week nursing support program was applied to the experimental group of women. To collect the data, Introductory Information Form and Scale for Determining the Protective Attitudes of Married Women towards Reproductive Health (SDPAMW) were applied. The evaluation was made with a follow-up form for four months. In the first evaluation, the total SDPAMW scores were 119.93±20.59 for the experimental group and 122.20±16.71 for the control group. In the final evaluation, the total SDPAMW scores were 144.27±11.95 for the experimental group and 118.00±16.43 for the control group. The difference between the groups regarding the first and final evaluations for the total SDPAMW scores was statistically significant (p<0.01). In the experimental group, between the first and final evaluations regarding the sub-dimensions of SDPAMW, an increase was found in the behavior of seeing the doctor on reproductive health issues, protection from reproductive organ and breast cancer, general health behaviors to protect reproductive health, and protection from genital tract infections (p<0.05). Consequently, the nursing support program based on the Health Belief Model applied to orthopedically disabled women positively affected reproductive health behaviors.

Keywords: orthopedically disabled, woman, reproductive health, nursing support program, health belief model

Procedia PDF Downloads 148
3110 Comparison of Mechanical Property of UNS C12200Joints Brazed by (Cu&Ag) Based Filler Metals

Authors: Ali Elhatmi, Mustafa Elshbo, Hussin Alosta

Abstract:

In this study the coper tube witch used in medical applications was brazed by Copper, Zink and Silver alloys, using BCuP2, RBCuZnAl and BAg2 filler metals. The sample of the medical tubes was chemically analyzed and the result matches the British standard. Tensile and hardness tests were carried out for brazed joints, and the tensile test results show that the BCuP2 has the hardest and the filler metal RBCuZnAl has the highest tensile strength.

Keywords: welding, Brazing, Copper tubes, Joints

Procedia PDF Downloads 228
3109 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
3108 Well-Defined Polypeptides: Synthesis and Selective Attachment of Poly(ethylene glycol) Functionalities

Authors: Cristina Lavilla, Andreas Heise

Abstract:

The synthesis of sequence-controlled polymers has received increasing attention in the last years. Well-defined polyacrylates, polyacrylamides and styrene-maleimide copolymers have been synthesized by sequential or kinetic addition of comonomers. However this approach has not yet been introduced to the synthesis of polypeptides, which are in fact polymers developed by nature in a sequence-controlled way. Polypeptides are natural materials that possess the ability to self-assemble into complex and highly ordered structures. Their folding and properties arise from precisely controlled sequences and compositions in their constituent amino acid monomers. So far, solid-phase peptide synthesis is the only technique that allows preparing short peptide sequences with excellent sequence control, but also requires extensive protection/deprotection steps and it is a difficult technique to scale-up. A new strategy towards sequence control in the synthesis of polypeptides is introduced, based on the sequential addition of α-amino acid-N-carboxyanhydrides (NCAs). The living ring-opening process is conducted to full conversion and no purification or deprotection is needed before addition of a new amino acid. The length of every block is predefined by the NCA:initiator ratio in every step. This method yields polypeptides with a specific sequence and controlled molecular weights. A series of polypeptides with varying block sequences have been synthesized with the aim to identify structure-property relationships. All of them are able to adopt secondary structures similar to natural polypeptides, and display properties in the solid state and in solution that are characteristic of the primary structure. By design the prepared polypeptides allow selective modification of individual block sequences, which has been exploited to introduce functionalities in defined positions along the polypeptide chain. Poly(ethylene glycol)(PEG) was the functionality chosen, as it is known to favor hydrophilicity and also yield thermoresponsive materials. After PEGylation, hydrophilicity of the polypeptides is enhanced, and their thermal response in H2O has been studied. Noteworthy differences in the behavior of the polypeptides having different sequences have been found. Circular dichroism measurements confirmed that the α-helical conformation is stable over the examined temperature range (5-90 °C). It is concluded that PEG units are the main responsible of the changes in H-bonding interactions with H2O upon variation of temperature, and the position of these functional units along the backbone is a factor of utmost importance in the resulting properties of the α-helical polypeptides.

Keywords: α-amino acid N-carboxyanhydrides, multiblock copolymers, poly(ethylene glycol), polypeptides, ring-opening polymerization, sequence control

Procedia PDF Downloads 200
3107 The Influence of Modern Islamic Thought Liberalization to the Improvement of Science

Authors: Muhammad Ilham Agus Salim

Abstract:

The liberalization of Islamic thought is not only an impact on the views of Muslim community regarding worldview, but has touched the stage reconstruction of contemporary general science. It can be seen from the emergence of Western and Eastern intellectual movements that try to reconstruct contemporary science arguing that scientific culture is not currently able to deliver audiences to change the order of the better society. Such Islamic thought liberalization has a huge influence on the multidimensional crisis in various sectors such as the economic, culture, politic, ecology, and other sectors. Therefore, this paper examines the effects of the liberalization of contemporary Islamic thought towards on the development of modern science. The method used in this paper is based on textual study of Al -Qur'an, Hadith (prophetic tradition), and the history of contemporary Islamic thought and comparing it with the reality of the development of science today. So the influence of Islamic thought liberalization has created a crisis and stagnation of the development of scientific disciplines can be found.

Keywords: liberalization, science, Islam, al-Qur’an textual studies

Procedia PDF Downloads 398
3106 Considering the Relationship between Architecture and Philosophy: Toyo Ito’s Conceptual Architecture

Authors: Serap Durmus

Abstract:

The aim of this paper is to exemplify the relation of architecture and philosophy over the Japanese architect Toyo Ito’s conceptual architecture. The study is practiced in ‘Architecture and Philosophy Readings’ elective course with 22 sophomore architecture students in Karadeniz Technical University Department of Architecture. It is planned as a workshop, which discusses the design philosophy of Toyo Ito’s buildings and the reflections of concept in his intellectual architecture. So, the paper contains Toyo Ito’s philosophy, his discourses and buildings and also thinking similarities with philosopher Gilles Deleuze. Thus, the workshop of course is about architecture and philosophy relationship. With this aspect, a holistic graphic representation is aimed for Toyo Ito who thinks that everything composes a whole. As a result, it can be said that architect and philosopher interaction in architecture and philosophy relation supports creative thinking. Conceptual architecture of Toyo Ito has philosophical roots and his philosophy can be read over his buildings and can be represent totally via a holistic pattern.

Keywords: architecture, conceptual architecture, Gilles Deleuze, philosophy, Toyo Ito

Procedia PDF Downloads 570
3105 Design and Māori Values: A Rebrand Project for the Social Enterprise Sector

Authors: M. Kiarna, S. Junjira, S. Casey, M. Nolwazi, M. S. Marcos, A. T. Tatiana, L. Cassandra

Abstract:

This paper details a rebrand design project developed for a non-profitable organization called Te Roopu Waiora (TRW), which is currently located in Auckland, Aotearoa New Zealand. This social enterprise is dedicated to supporting the Māori community living with sensorial, physical and intellectual disabilities (whānau hauā). As part of a year three bachelor design brief, the rebrand project enabled students to reflect on Kaupapa Māori principles and appropriately address the values of the organisation. As such, the methodology used a pragmatic paradigm approach and mixed methods design practices involving a human-centred design to problem solving. As result, the student project culminated in the development in a range of cohesive design artefacts, aiming to improve the rentability and perception of the brand with the audience and stakeholders.

Keywords: design in Aotearoa New Zealand, Kaupapa Māori, branding, design education, human-centered design

Procedia PDF Downloads 135