Search results for: adversarial defense
454 Learning Motivation Factors for Pre-Cadets in Armed Forces Academies Preparatory School, Ministry of Defense
Authors: Prachya Kamonphet
Abstract:
The purposes of this research were to study the learning motivation factors for Pre-cadets in Armed Forces Academies Preparatory School, Ministry of Defense. The subjects were 320 Pre-cadets (from all 3-year classes of Pre-cadets, the academic year 2015). The research instruments were questionnaires. The collected data were analyzed by means of Descriptive Statistic and One-Way Analysis of Variance. The results of this study were as follows: The relation between the Pre-cadets’ average grade and the motivation in studying was significance.In the aspect of the environment related to Pre-cadets’ families and the motivation in studying.In the aspect of the environment related to Pre-cadets’ studying, it was found that teaching method, learning place, educational media, relationship between teachers and Pre-cadets, relationship between Pre-cadets and their friends, and relationship between Pre-cadets and the commanders were significant.Keywords: learning motivation factors, learning motivation, armed forces academies preparatory school, learning
Procedia PDF Downloads 242453 Mycorrhizal Autochthonous Consortium Induced Defense-Related Mechanisms of Olive Trees against Verticillium dahliae
Authors: Hanane Boutaj, Abdelilah Meddich, Said Wahbi, Zainab El Alaoui-Talibi, Allal Douira, Abdelkarim Filali-Maltouf, Cherkaoui El Modafar
Abstract:
The present work aims to investigate the effect of arbuscular mycorrhizal fungi (AMF) in improving the olive tree resistance to Verticillium wilt caused by Verticillium dahliae. Inoculated plants with a mycorrhizal autochthonous consortium 'Rhizolive consortium' and pure strain 'Glomus irregulare' were infected after three months with V. dahliae. The improving of olive tree resistance was determined through disease severity, incidence, and defoliation. On the other hand, the defense mechanisms of olive plants were evaluated through lignin content, phenylalanine ammonia lyase (PAL) activity, and polyphenol content. The results revealed that both AMF significantly (p < 0.05) reduced disease development and the rate of defoliation in infected olive plants. Moreover, the contents of lignin were boosted after mycorrhizal inoculation in both the roots and the stems of olive plants, which remained significantly (p < 0.001) higher after the 90th days of V. dahliae inoculation. PAL activity was increased after V. dahliae inoculation in the stems of 'Rhizolive consortium' treatment that were 17 times higher than those in the roots of olive plants. The polyphenol content in the stems was about twice higher than those in the roots. The reduction of disease severity was accompanied by increased levels of lignin content, PAL activity, and polyphenol content, particularly in the stems of olive plants, indicating the strengthening of the olive plant immune system against V. dahliae.Keywords: olive tree, Mycorrhizal autochthonous consortium, Glomus irregulare, Verticillium dahliae, defense mechanisms
Procedia PDF Downloads 118452 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations
Authors: Chastiti Mediafira Wulolo
Abstract:
Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism
Procedia PDF Downloads 185451 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 115450 Statistically Accurate Synthetic Data Generation for Enhanced Traffic Predictive Modeling Using Generative Adversarial Networks and Long Short-Term Memory
Authors: Srinivas Peri, Siva Abhishek Sirivella, Tejaswini Kallakuri, Uzair Ahmad
Abstract:
Effective traffic management and infrastructure planning are crucial for the development of smart cities and intelligent transportation systems. This study addresses the challenge of data scarcity by generating realistic synthetic traffic data using the PeMS-Bay dataset, improving the accuracy and reliability of predictive modeling. Advanced synthetic data generation techniques, including TimeGAN, GaussianCopula, and PAR Synthesizer, are employed to produce synthetic data that replicates the statistical and structural characteristics of real-world traffic. Future integration of Spatial-Temporal Generative Adversarial Networks (ST-GAN) is planned to capture both spatial and temporal correlations, further improving data quality and realism. The performance of each synthetic data generation model is evaluated against real-world data to identify the best models for accurately replicating traffic patterns. Long Short-Term Memory (LSTM) networks are utilized to model and predict complex temporal dependencies within traffic patterns. This comprehensive approach aims to pinpoint areas with low vehicle counts, uncover underlying traffic issues, and inform targeted infrastructure interventions. By combining GAN-based synthetic data generation with LSTM-based traffic modeling, this study supports data-driven decision-making that enhances urban mobility, safety, and the overall efficiency of city planning initiatives.Keywords: GAN, long short-term memory, synthetic data generation, traffic management
Procedia PDF Downloads 29449 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service
Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla
Abstract:
With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.Keywords: compulsory, military, service, reinforcement, perception
Procedia PDF Downloads 170448 Automatic Near-Infrared Image Colorization Using Synthetic Images
Authors: Yoganathan Karthik, Guhanathan Poravi
Abstract:
Colorizing near-infrared (NIR) images poses unique challenges due to the absence of color information and the nuances in light absorption. In this paper, we present an approach to NIR image colorization utilizing a synthetic dataset generated from visible light images. Our method addresses two major challenges encountered in NIR image colorization: accurately colorizing objects with color variations and avoiding over/under saturation in dimly lit scenes. To tackle these challenges, we propose a Generative Adversarial Network (GAN)-based framework that learns to map NIR images to their corresponding colorized versions. The synthetic dataset ensures diverse color representations, enabling the model to effectively handle objects with varying hues and shades. Furthermore, the GAN architecture facilitates the generation of realistic colorizations while preserving the integrity of dimly lit scenes, thus mitigating issues related to over/under saturation. Experimental results on benchmark NIR image datasets demonstrate the efficacy of our approach in producing high-quality colorizations with improved color accuracy and naturalness. Quantitative evaluations and comparative studies validate the superiority of our method over existing techniques, showcasing its robustness and generalization capability across diverse NIR image scenarios. Our research not only contributes to advancing NIR image colorization but also underscores the importance of synthetic datasets and GANs in addressing domain-specific challenges in image processing tasks. The proposed framework holds promise for various applications in remote sensing, medical imaging, and surveillance where accurate color representation of NIR imagery is crucial for analysis and interpretation.Keywords: computer vision, near-infrared images, automatic image colorization, generative adversarial networks, synthetic data
Procedia PDF Downloads 46447 Modeling of a Small Unmanned Aerial Vehicle
Authors: Ahmed Elsayed Ahmed, Ashraf Hafez, A. N. Ouda, Hossam Eldin Hussein Ahmed, Hala Mohamed ABD-Elkader
Abstract:
Unmanned Aircraft Systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized,and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end, the model is checked by matching between the behavior of the states of the non-linear UAV and the resulted linear model with doublet at the control surfaces.Keywords: UAV, equations of motion, modeling, linearization
Procedia PDF Downloads 744446 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.Keywords: attacker, defender, game theory, information
Procedia PDF Downloads 469445 Early Modern Controversies of Mobility within the Spanish Empire: Francisco De Vitoria and the Peaceful Right to Travel
Authors: Beatriz Salamanca
Abstract:
In his public lecture ‘On the American Indians’ given at the University of Salamanca in 1538-39, Francisco de Vitoria presented an unsettling defense of freedom of movement, arguing that the Spanish had the right to travel and dwell in the New World, since it was considered part of the law of nations [ius gentium] that men enjoyed free mutual intercourse anywhere they went. The principle of freedom of movement brought hopeful expectations, promising to bring mankind together and strengthen the ties of fraternity. However, it led to polemical situations when those whose mobility was in question represented a harmful threat or was for some reason undesired. In this context, Vitoria’s argument has been seen on multiple occasions as a justification of the expansion of the Spanish empire. In order to examine the meaning of Vitoria’s defense of free mobility, a more detailed look at Vitoria’s text is required, together with the study of some of his earliest works, among them, his commentaries on Thomas Aquinas’s Summa Theologiae, where he presented relevant insights on the idea of the law of nations. In addition, it is necessary to place Vitoria’s work in the context of the intellectual tradition he belonged to and the responses he obtained from some of his contemporaries who were concerned with similar issues. The claim of this research is that the Spanish right to travel advocated by Vitoria was not intended to be interpreted in absolute terms, for it had to serve the purpose of bringing peace and unity among men, and could not contradict natural law. In addition, Vitoria explicitly observed that the right to travel was only valid if the Spaniards caused no harm, a condition that has been underestimated by his critics. Therefore, Vitoria’s legacy is of enormous value as it initiated a long lasting discussion regarding the question of the grounds under which human mobility could be restricted. Again, under Vitoria’s argument it was clear that this freedom was not absolute, but the controversial nature of his defense of Spanish mobility demonstrates how difficult it was and still is to address the issue of the circulation of peoples across frontiers, and shows the significance of this discussion in today’s globalized world, where the rights and wrongs of notions like immigration, international trade or foreign intervention still lack sufficient consensus. This inquiry about Vitoria’s defense of the principle of freedom of movement is being placed here against the background of the history of political thought, political theory, international law, and international relations, following the methodological framework of contextual history of the ‘Cambridge School’.Keywords: Francisco de Vitoria, freedom of movement, law of nations, ius gentium, Spanish empire
Procedia PDF Downloads 367444 Improving Fingerprinting-Based Localization System Using Generative AI
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 60443 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka
Procedia PDF Downloads 369442 Imidocloprid as a Systemic-Acquired Resistant (SAR) Inducer in Nicotiana tabacum Var. Samsun NN Infected with Tobacco Mild Green Mosaic Virus
Authors: Mohammad Reza Hossein Zadeh
Abstract:
Plants have different layers of defense responses against biotic and abiotic stresses. One of the well-defined defense mechanism in plants is systemic acquired resistance (SAR) against a broad-range of pathogens. Salicylic acid (SA) plays a crucial role in regulation of the SAR pathway. It has been proved that Chemically SA-like compounds can mimic the SA signaling role. Imidocloprid is an insecticide being used to control whiteflies on crop plants. In order to study the possible role of Imidocloprid as an elicitor of SAR in plants, experiments were conducted in a completely randomized design frame with three treatments and duplicates on the detached leaves and whole Nicotiana tabacum var. Samsun NN. plants inoculated with Tobacco mild green mosaic virus (TMGMV). Compared with the effect of other SAR-inducers such as SA, Imidoclorid conferred a robust SAR induction in the infected plants. The results suggested that Imidocloprid even more powerful than SA can be considered as strong SAR inducer in the infected plants with viruses, which develop the local lesion symptoms.Keywords: imidocloprid, Nicotiana tabacum var. Samsun NN, SAR, tobacco mild green, mosaic virus
Procedia PDF Downloads 588441 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace
Authors: Da Eun Sung
Abstract:
In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia
Procedia PDF Downloads 322440 Improving Chest X-Ray Disease Detection with Enhanced Data Augmentation Using Novel Approach of Diverse Conditional Wasserstein Generative Adversarial Networks
Authors: Malik Muhammad Arslan, Muneeb Ullah, Dai Shihan, Daniyal Haider, Xiaodong Yang
Abstract:
Chest X-rays are instrumental in the detection and monitoring of a wide array of diseases, including viral infections such as COVID-19, tuberculosis, pneumonia, lung cancer, and various cardiac and pulmonary conditions. To enhance the accuracy of diagnosis, artificial intelligence (AI) algorithms, particularly deep learning models like Convolutional Neural Networks (CNNs), are employed. However, these deep learning models demand a substantial and varied dataset to attain optimal precision. Generative Adversarial Networks (GANs) can be employed to create new data, thereby supplementing the existing dataset and enhancing the accuracy of deep learning models. Nevertheless, GANs have their limitations, such as issues related to stability, convergence, and the ability to distinguish between authentic and fabricated data. In order to overcome these challenges and advance the detection and classification of CXR normal and abnormal images, this study introduces a distinctive technique known as DCWGAN (Diverse Conditional Wasserstein GAN) for generating synthetic chest X-ray (CXR) images. The study evaluates the effectiveness of this Idiosyncratic DCWGAN technique using the ResNet50 model and compares its results with those obtained using the traditional GAN approach. The findings reveal that the ResNet50 model trained on the DCWGAN-generated dataset outperformed the model trained on the classic GAN-generated dataset. Specifically, the ResNet50 model utilizing DCWGAN synthetic images achieved impressive performance metrics with an accuracy of 0.961, precision of 0.955, recall of 0.970, and F1-Measure of 0.963. These results indicate the promising potential for the early detection of diseases in CXR images using this Inimitable approach.Keywords: CNN, classification, deep learning, GAN, Resnet50
Procedia PDF Downloads 89439 Generating Synthetic Chest X-ray Images for Improved COVID-19 Detection Using Generative Adversarial Networks
Authors: Muneeb Ullah, Daishihan, Xiadong Young
Abstract:
Deep learning plays a crucial role in identifying COVID-19 and preventing its spread. To improve the accuracy of COVID-19 diagnoses, it is important to have access to a sufficient number of training images of CXRs (chest X-rays) depicting the disease. However, there is currently a shortage of such images. To address this issue, this paper introduces COVID-19 GAN, a model that uses generative adversarial networks (GANs) to generate realistic CXR images of COVID-19, which can be used to train identification models. Initially, a generator model is created that uses digressive channels to generate images of CXR scans for COVID-19. To differentiate between real and fake disease images, an efficient discriminator is developed by combining the dense connectivity strategy and instance normalization. This approach makes use of their feature extraction capabilities on CXR hazy areas. Lastly, the deep regret gradient penalty technique is utilized to ensure stable training of the model. With the use of 4,062 grape leaf disease images, the Leaf GAN model successfully produces 8,124 COVID-19 CXR images. The COVID-19 GAN model produces COVID-19 CXR images that outperform DCGAN and WGAN in terms of the Fréchet inception distance. Experimental findings suggest that the COVID-19 GAN-generated CXR images possess noticeable haziness, offering a promising approach to address the limited training data available for COVID-19 model training. When the dataset was expanded, CNN-based classification models outperformed other models, yielding higher accuracy rates than those of the initial dataset and other augmentation techniques. Among these models, ImagNet exhibited the best recognition accuracy of 99.70% on the testing set. These findings suggest that the proposed augmentation method is a solution to address overfitting issues in disease identification and can enhance identification accuracy effectively.Keywords: classification, deep learning, medical images, CXR, GAN.
Procedia PDF Downloads 100438 Polish Adversarial Trial: Analysing the Fairness of New Model of Appeal Proceedings in the Context of Delivered Research
Authors: Cezary Kulesza, Katarzyna Lapinska
Abstract:
Regarding the nature of the notion of fair trial, one must see the source of the fair trial principle in the following acts of international law: art. 6 of the ECHR of 1950 and art.14 the International Covenant on Civil and Political Rights of 1966, as well as in art. 45 of the Polish Constitution. However, the problem is that the above-mentioned acts essentially apply the principle of a fair trial to the main hearing and not to appeal proceedings. Therefore, the main thesis of the work is to answer the question whether the Polish model of appeal proceedings is fair. The paper presents the problem of fair appeal proceedings in Poland in comparative perspective. Thus, the authors discuss the basic features of English, German and Russian appeal systems. The matter is also analysed in the context of the last reforms of Polish criminal procedure, because since 2013 Polish parliament has significantly changed criminal procedure almost three times: by the Act of 27th September, 2013, the Act of 20th February, 2015 which came into effect on 1st July, 2015 and the Act of 11th March, 2016. The most astonishing is that these three amendments have been varying from each other – changing Polish criminal procedure to more adversarial one and then rejecting all measures just involved in previous acts. Additional intent of the Polish legislator was amending the forms of plea bargaining: conviction of the defendant without trial or voluntary submission to a penalty, which were supposed to become tools allowing accelerating the criminal process and, at the same time, implementing the principle of speedy procedure. The next part of the paper will discuss the matter, how the changes of plea bargaining and the main trial influenced the appellate procedure in Poland. The authors deal with the right to appeal against judgments issued in negotiated case-ending settlements in the light of Art. 2 of Protocol No. 7 to the ECHR and the Polish Constitution. The last part of the presentation will focus on the basic changes in the appeals against judgments issued after the main trial. This part of the paper also presents the results of examination of court files held in the Polish Appeal Courts in Białystok, Łódź and Warsaw. From these considerations it is concluded that the Polish CCP of 1997 in ordinary proceedings basically meets both standards: the standard adopted in Protocol No. 7 of the Convention and the Polish constitutional standard. But the examination of case files shows in particular the following phenomena: low effectiveness of appeals and growing stability of the challenged judgments of district courts, extensive duration of appeal proceedings and narrow scope of evidence proceedings before the appellate courts. On the other hand, limitations of the right to appeal against the judgments issued in consensual modes of criminal proceedings justify the fear that such final judgments may violate the principle of criminal accurate response or the principle of material truth.Keywords: adversarial trial, appeal, ECHR, England, evidence, fair trial, Germany, Polish criminal procedure, reform, Russia
Procedia PDF Downloads 147437 Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 71436 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 76435 India’s Deterrence Program: Defense or Development
Authors: Aneri Mehta, Krunal Mehta
Abstract:
A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.Keywords: foreign policy, nuclear deterrence, nuclear policy, development
Procedia PDF Downloads 522434 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 455433 Defence Industry in the Political Economy of State and Business Relations
Authors: Hatice Idil Gorgen
Abstract:
Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.Keywords: defense industry, state and business relations, public private relations, arm industry
Procedia PDF Downloads 316432 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum
Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi
Abstract:
Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.Keywords: Defense responses, Fusarium culmorum, Wheat
Procedia PDF Downloads 540431 Generation of High-Quality Synthetic CT Images from Cone Beam CT Images Using A.I. Based Generative Networks
Authors: Heeba A. Gurku
Abstract:
Introduction: Cone Beam CT(CBCT) images play an integral part in proper patient positioning in cancer patients undergoing radiation therapy treatment. But these images are low in quality. The purpose of this study is to generate high-quality synthetic CT images from CBCT using generative models. Material and Methods: This study utilized two datasets from The Cancer Imaging Archive (TCIA) 1) Lung cancer dataset of 20 patients (with full view CBCT images) and 2) Pancreatic cancer dataset of 40 patients (only 27 patients having limited view images were included in the study). Cycle Generative Adversarial Networks (GAN) and its variant Attention Guided Generative Adversarial Networks (AGGAN) models were used to generate the synthetic CTs. Models were evaluated by visual evaluation and on four metrics, Structural Similarity Index Measure (SSIM), Peak Signal Noise Ratio (PSNR) Mean Absolute Error (MAE) and Root Mean Square Error (RMSE), to compare the synthetic CT and original CT images. Results: For pancreatic dataset with limited view CBCT images, our study showed that in Cycle GAN model, MAE, RMSE, PSNR improved from 12.57to 8.49, 20.94 to 15.29 and 21.85 to 24.63, respectively but structural similarity only marginally increased from 0.78 to 0.79. Similar, results were achieved with AGGAN with no improvement over Cycle GAN. However, for lung dataset with full view CBCT images Cycle GAN was able to reduce MAE significantly from 89.44 to 15.11 and AGGAN was able to reduce it to 19.77. Similarly, RMSE was also decreased from 92.68 to 23.50 in Cycle GAN and to 29.02 in AGGAN. SSIM and PSNR also improved significantly from 0.17 to 0.59 and from 8.81 to 21.06 in Cycle GAN respectively while in AGGAN SSIM increased to 0.52 and PSNR increased to 19.31. In both datasets, GAN models were able to reduce artifacts, reduce noise, have better resolution, and better contrast enhancement. Conclusion and Recommendation: Both Cycle GAN and AGGAN were significantly able to reduce MAE, RMSE and PSNR in both datasets. However, full view lung dataset showed more improvement in SSIM and image quality than limited view pancreatic dataset.Keywords: CT images, CBCT images, cycle GAN, AGGAN
Procedia PDF Downloads 84430 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density
Authors: Jill Round
Abstract:
In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.Keywords: risk management, structural equation model, supervisory practice, three lines of defense
Procedia PDF Downloads 225429 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law
Authors: Amalia Sholihati, Bambang Riyanto Trilaksono
Abstract:
As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).Keywords: RKX-200, guidance system, optimal guidance law, Hils
Procedia PDF Downloads 255428 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 357427 Detection of Viral-Plant Interaction Using Some Pathogenesis Related Protein Genes to Identify Resistant Genes against Potato LeafRoll Virus and Potato Virus Y in Egyptian Isolates
Authors: Dalia. G. Aseel, E. E. Hafez, S. M. Hammad
Abstract:
Viral RNAs of both potato leaf roll virus (PLRV) and potato virus Y (PVY) were extracted from infected potato leaves collected from different Egyptian regions. Differential Display Polymerase Chain Reaction (DD-PCR) using (Endogluconase, β-1,3-glucanases, Chitinase, Peroxidase and Polyphenol oxidase) primers (forward strand) for was performed. The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, a 58 up regulated and 19 down regulated genes were detected, while, 31 up regulated and 14 down regulated genes were observed in case of PVY. Based on the nucleotide sequencing, variable phylogenetic relationships were reported for the three sequenced genes coding for: Induced stolen tip protein, Disease resistance RPP-like protein and non-specific lipid-transfer protein. In a complementary approach, using the quantitative Real-time PCR, the expressions of PRs genes understudy were estimated in the infected leaves by PLRV and PVY of three potato cultivars (Spunta, Diamont and Cara). The infection with both viruses inhibited the expressions of the five PRs genes. On the contrary, infected leaves by PLRV or PVY elevated the expression of some defense genes. This interaction also may be enhanced and/or inhibited the expression of some genes responsible for the plant defense mechanisms.Keywords: PLRV, PVY, PR genes, DD-PCR, qRT-PCR, sequencing
Procedia PDF Downloads 340426 Embedded Hybrid Intuition: A Deep Learning and Fuzzy Logic Approach to Collective Creation and Computational Assisted Narratives
Authors: Roberto Cabezas H
Abstract:
The current work shows the methodology developed to create narrative lighting spaces for the multimedia performance piece 'cluster: the vanished paradise.' This empirical research is focused on exploring unconventional roles for machines in subjective creative processes, by delving into the semantics of data and machine intelligence algorithms in hybrid technological, creative contexts to expand epistemic domains trough human-machine cooperation. The creative process in scenic and performing arts is guided mostly by intuition; from that idea, we developed an approach to embed collective intuition in computational creative systems, by joining the properties of Generative Adversarial Networks (GAN’s) and Fuzzy Clustering based on a semi-supervised data creation and analysis pipeline. The model makes use of GAN’s to learn from phenomenological data (data generated from experience with lighting scenography) and algorithmic design data (augmented data by procedural design methods), fuzzy logic clustering is then applied to artificially created data from GAN’s to define narrative transitions built on membership index; this process allowed for the creation of simple and complex spaces with expressive capabilities based on position and light intensity as the parameters to guide the narrative. Hybridization comes not only from the human-machine symbiosis but also on the integration of different techniques for the implementation of the aided design system. Machine intelligence tools as proposed in this work are well suited to redefine collaborative creation by learning to express and expand a conglomerate of ideas and a wide range of opinions for the creation of sensory experiences. We found in GAN’s and Fuzzy Logic an ideal tool to develop new computational models based on interaction, learning, emotion and imagination to expand the traditional algorithmic model of computation.Keywords: fuzzy clustering, generative adversarial networks, human-machine cooperation, hybrid collective data, multimedia performance
Procedia PDF Downloads 143425 The Effect of Artesunate on Myeloperoxidase Activity of Human Polymorphonuclear Neutrophil
Authors: J. B. Minari, O. B. Oloyede, A. A. Odutuga
Abstract:
Myeloperoxidase is the most abundant enzyme found in the polymorphonuclear neutrophil and is known to play a central role in the host defense system of the leukocyte. The enzyme has been reported to interact with some drugs to generate free radical which inhibits its activity. This study investigated the effects of artesunate on the activity of the enzyme and the subsequent effect on the host immune system. In investigating the effects of the drugs on myeloperoxidase, the influence of concentration, pH, partition ratio estimation and kinetics of inhibition were studied. This study showed that artesunate is concentration-dependent inhibitor of myeloperoxidase with an IC50 of 0.078mM. Partition ratio estimation showed that 60 enzymatic turnover cycles are required for complete inhibition of myeloperoxidase in the presence of artesunate. The influence of pH on the effect of artesunate on the enzyme showed least activity of myeloperoxidase at physiological pH. The kinetic inhibition studies showed that artesunate caused a competitive inhibition with an increase in the Km value from 0.12mM to 0.26mM and no effect on the Vmax value. The Ki value was estimated to be 2.5mM. The results obtained from this study show that artesunate is a potent inhibitor of myeloperoxidase and it is capable of inactivating the enzyme. It is considered that the inhibition of myeloperoxidase in the presence of artesunate as revealed in this study may partly explain the impairment of polymorphonuclear neutrophil and consequent reduction of the strength of the host defense system against secondary infections.Keywords: myeloperoxidase, artesunate, inhibition, nuetrophill
Procedia PDF Downloads 369