Search results for: exploitation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 555

Search results for: exploitation

465 Government and Non-Government Policy Responses to Anti-Trafficking Initiatives: A Discursive Analysis of the Construction of the Problem of Human Trafficking in Australia and Thailand

Authors: Jessica J. Gillies

Abstract:

Human trafficking is a gross violation of human rights and thus invokes a strong response particularly throughout the global academic community. A longstanding tension throughout academic debate remains the question of a relationship between anti-trafficking policy and sex industry policy. In Australia, over the previous decade, many human trafficking investigations have related to the sexual exploitation of female victims, and convictions in Australia to date have often been for trafficking women from Thailand. Sex industry policy in Australia varies between states, providing a rich contextual landscape in which to explore this relationship. The purpose of this study was to deconstruct how meaning is constructed surrounding human trafficking throughout these supposedly related political discourses in Australia. In order to analyse the discursive construction of the problem of human trafficking in relation to sex industry policy, a discursive analysis was conducted. The methodology of the study was informed by a feminist theoretical framework, and included academic sources and grey literature such as organisational reports and policy statements regarding anti-trafficking initiatives. The scope of grey literature was restricted to Australian and Thai government and non-government organisation texts. The chosen methodology facilitated a qualitative exploration of the influence of feminist discourses over political discourse in this arena. The discursive analysis exposed clusters of active feminist debates interacting with sex industry policy within individual states throughout Australia. Additionally, strongly opposed sex industry perspectives were uncovered within these competing feminist frameworks. While the influence these groups may exert over policy differs, the debate constructs a discursive relationship between human trafficking and sex industry policy. This is problematic because anti-trafficking policy is drawn to some extent from this discursive construction, therefore affecting support services for survivors of human trafficking. The discursive analysis further revealed misalignment between government and non-government priorities, Australian government anti-trafficking policy appears to favour criminal justice priorities; whereas non-government settings preference human rights protections. Criminal justice priorities invoke questions of legitimacy, leading to strict eligibility policy for survivors seeking support following exploitation in the Australian sex industry, undermining women’s agency and human rights. In practice, these two main findings demonstrate a construction of policy that has serious outcomes on typical survivors in Australia following a lived experience of human trafficking for the purpose of sexual exploitation. The discourses constructed by conflicting feminist arguments influence political discourses throughout Australia. The application of a feminist theoretical framework to the discursive analysis of the problem of human trafficking is unique to this study. The study has exposed a longstanding and unresolved feminist debate that has filtered throughout anti-trafficking political discourse. This study illuminates the problematic construction of anti-trafficking policy, and the implications in practice on survivor support services. Australia has received international criticism for the focus on criminal justice rather than human rights throughout anti-trafficking policy discourse. The outcome of this study has the potential to inform future language and constructive conversations contributing to knowledge around how policy effects survivors in the post trafficking experience.

Keywords: Australia, discursive analysis, government, human trafficking, non-government, Thailand

Procedia PDF Downloads 119
464 Environment Problems of Energy Exploitation and Utilization in Nigeria

Authors: Aliyu Mohammed Lawal

Abstract:

The problems placed on the environment as a result of energy generation and usage in Nigeria is: potential damage to the environment health by CO, CO2, SOx, and NOx, effluent gas emissions and global warming. For instance in the year 2004 in Nigeria energy consumption was 58% oil and 34% natural gas but about 94 million metric tons of CO2 was emitted out of which 64% came from fossil fuels while about 35% came from fuel wood. The findings from this research on how to alleviate these problems are that long term sustainable development solutions should be enhanced globally; energy should be used more rationally renewable energy resources should be exploited and the existing emissions should be controlled to tolerate limits because the increase in energy demand in Nigeria places enormous strain on current energy facilities.

Keywords: effluent gas, emissions, NOx, SOx

Procedia PDF Downloads 381
463 The Conjugated Polymers in improving the Organic Solar Cells Efficiency

Authors: Samia Moulebhar, Chahrazed Bendenia, Souhila Bendenia, Hanaa Merad-dib, Sarra Merabet, Sid Ahmed Khantar, Baghdad Hadri

Abstract:

The photovoltaic solar field is today experiencing exponential advancement with the exploitation of new technological sectors of nanoparticles, namely the field of solar cells based on organic polymer materials. These cells are flexible, easy to process and low cost. This work includes a presentation of the conjugated polymer materials used in the design of photovoltaic technology devices while determining their properties and then the models used for the modeling of thin film photovoltaic cells heterojunction.

Keywords: photovoltaic, cells, nanoparticles, organic

Procedia PDF Downloads 85
462 Event Monitoring Based On Web Services for Heterogeneous Event Sources

Authors: Arne Koschel

Abstract:

This article discusses event monitoring options for heterogeneous event sources as they are given in nowadays heterogeneous distributed information systems. It follows the central assumption, that a fully generic event monitoring solution cannot provide complete support for event monitoring; instead, event source specific semantics such as certain event types or support for certain event monitoring techniques have to be taken into account. Following from this, the core result of the work presented here is the extension of a configurable event monitoring (Web) service for a variety of event sources. A service approach allows us to trade genericity for the exploitation of source specific characteristics. It thus delivers results for the areas of SOA, Web services, CEP and EDA.

Keywords: event monitoring, ECA, CEP, SOA, web services

Procedia PDF Downloads 742
461 Re-Victimization of Sex Trafficking Victims in Canada: Literature Review

Authors: Adrianna D. Hendricks

Abstract:

This paper examines the factors that contribute to the re-traumatization of victims of sex trafficking within the Canadian context. Sex trafficking occurring domestically in Canada is severely under-researched, stigmatized, and under-prosecuted, leading to the re-traumatization of victims by various levels of government. This is in part due to the Canadian criminal justice system unethically utilizing prostitution laws in cases of sex trafficking and partially due to the unaddressed stigmatization victims face within the justice system itself. Utilizing evidence from a current literature review, personal correspondence, and personal life experiences, this paper will demonstrate the need for victim involvement in policy reform. The current literature review was done through an academic database search using the terms: “Sex Trafficking, Exploitation, Canada”, with the limitation of articles written within the last 5 years and written within the Canadian context. Overall, from the results, only eight articles precisely matched the criteria. The current literature argues strongly and unanimously for more research and education of professionals who have close contact with high-risk populations (doctors, police officers, social workers, etc.) to protect both minors and adults from being sexually trafficked. Additionally, for women and girls who do not have Canadian citizenship, the fear of deportation becomes a barrier to disclosing exploitation experiences to professionals. There is a desperate need for more research done in tandem with survivors and victims to inform policymaking in a meaningful way. The researcher is a survivor of sex trafficking both as a youth and as an adult, giving the researcher a unique insight into the realities of the criminal justice system for victims of sex trafficking. There is a clear need for professionals in positions of power to be re-educated about the realities of sex-trafficking, and what it means for the victims. Congruent to the current research the author calls for: standardized professional training for people in healthcare, police officers, court officials, and victim services; with the additional layers of victim involvement in creation of professional education training, and victim involvement in research. Justice for victims/survivors can only be obtained if they have been consulted and believed. Without meaningful consultation with survivors, victims who are both minors and adults will continue to fall through the cracks in policy.

Keywords: Canadian policy, re-traumatization, sex-trafficking, stigmatization

Procedia PDF Downloads 66
460 GPU-Based Back-Projection of Synthetic Aperture Radar (SAR) Data onto 3D Reference Voxels

Authors: Joshua Buli, David Pietrowski, Samuel Britton

Abstract:

Processing SAR data usually requires constraints in extent in the Fourier domain as well as approximations and interpolations onto a planar surface to form an exploitable image. This results in a potential loss of data requires several interpolative techniques, and restricts visualization to two-dimensional plane imagery. The data can be interpolated into a ground plane projection, with or without terrain as a component, all to better view SAR data in an image domain comparable to what a human would view, to ease interpretation. An alternate but computationally heavy method to make use of more of the data is the basis of this research. Pre-processing of the SAR data is completed first (matched-filtering, motion compensation, etc.), the data is then range compressed, and lastly, the contribution from each pulse is determined for each specific point in space by searching the time history data for the reflectivity values for each pulse summed over the entire collection. This results in a per-3D-point reflectivity using the entire collection domain. New advances in GPU processing have finally allowed this rapid projection of acquired SAR data onto any desired reference surface (called backprojection). Mathematically, the computations are fast and easy to implement, despite limitations in SAR phase history data size and 3D-point cloud size. Backprojection processing algorithms are embarrassingly parallel since each 3D point in the scene has the same reflectivity calculation applied for all pulses, independent of all other 3D points and pulse data under consideration. Therefore, given the simplicity of the single backprojection calculation, the work can be spread across thousands of GPU threads allowing for accurate reflectivity representation of a scene. Furthermore, because reflectivity values are associated with individual three-dimensional points, a plane is no longer the sole permissible mapping base; a digital elevation model or even a cloud of points (collected from any sensor capable of measuring ground topography) can be used as a basis for the backprojection technique. This technique minimizes any interpolations and modifications of the raw data, maintaining maximum data integrity. This innovative processing will allow for SAR data to be rapidly brought into a common reference frame for immediate exploitation and data fusion with other three-dimensional data and representations.

Keywords: backprojection, data fusion, exploitation, three-dimensional, visualization

Procedia PDF Downloads 85
459 Combined Power Supply at Well Drilling in Extreme Climate Conditions

Authors: V. Morenov, E. Leusheva

Abstract:

Power supplying of well drilling on oil and gas fields at ambient air low temperatures is characterized by increased requirements of electric and heat energy. Power costs for heating of production facilities, technological and living objects may several times exceed drilling equipment electric power consumption. Power supplying of prospecting and exploitation drilling objects is usually done by means of local electric power structures based on diesel power stations. In the meantime, exploitation of oil fields is accompanied by vast quantities of extracted associated petroleum gas, and while developing gas fields there are considerable amounts of natural gas and gas condensate. In this regard implementation of gas-powered self-sufficient power units functioning on produced crude products for power supplying is seen as most potential. For these purposes gas turbines (GT) or gas reciprocating engines (GRE) may be used. In addition gas-powered units are most efficiently used in cogeneration mode - combined heat and power production. Conducted research revealed that GT generate more heat than GRE while producing electricity. One of the latest GT design are microturbines (MT) - devices that may be efficiently exploited in combined heat and power mode. In conditions of ambient air low temperatures and high velocity wind sufficient heat supplying is required for both technological process, specifically for drilling mud heating, and for maintaining comfortable working conditions at the rig. One of the main heat regime parameters are the heat losses. Due to structural peculiarities of the rig most of the heat losses occur at cold air infiltration through the technological apertures and hatchways and heat transition of isolation constructions. Also significant amount of heat is required for working temperature sustaining of the drilling mud. Violation of circulation thermal regime may lead to ice build-up on well surfaces and ice blockages in armature elements. That is why it is important to ensure heating of the drilling mud chamber according to ambient air temperature. Needed heat power will be defined by heat losses of the chamber. Noting heat power required for drilling structure functioning, it is possible to create combined heat and power complex based on MT for satisfying consumer power needs and at the same time lowering power generation costs. As a result, combined power supplying scheme for multiple well drilling utilizing heat of MT flue gases was developed.

Keywords: combined heat, combined power, drilling, electric supply, gas-powered units, heat supply

Procedia PDF Downloads 577
458 The Integrated Water Management of the Northern Saharan Aquifer System in a Climatic Changes Context

Authors: Mohamed Redha Menani

Abstract:

The Northern Saharan aquifer system “SASS” shared by Algeria, Libya, and Tunisia, covers a surface of about 1 100 000 km². It is composed of superposed aquifers; the upper one is the “Continental terminal – CT” (Eocene calcareous formation) situated at 400 m depth in average, while the” Continental Intercalaire – CI”(clay sands from Albian to Lower Cretaceous) is generally at 1500 m depth. This aquifer system is situated in a dry zone with a very weak current recharge but with a non-renewable big volume stored, estimated between 20 000 and 31 000 km³. From 1970 to nowadays, the exploitation of the SASS has increased from 0.6 to more than 2.5 km³/year. This situation provoked risks of water salinisation, reduction of the artesianisme, an increase of drawdowns, etc. which seriously threaten the sustainable socioeconomic development engaged in the SASS zone. Face the water shortage induced by the alarming dryness noted these last years, particularly in the MENA region, the joint management of this system by the three concerned countries, engaged for many years, needs a long-term strategy of integrated water resources management to meet the expected socio-economic goals projected not only in the SASS zone but also in other places, by water transfers. The sustainable management of this extensive aquifer system, aiming to satisfy various needs not only in the areas covered by the SASS but also in other areas through hydraulic transfers, can only be considered if this management is genuinely coordinated, incorporating schemes that primarily address the major constraint of climate change, which has been observed worldwide over the past two decades and is intensifying. In this particular climate context, management schemes must necessarily target several aspects, including (i) Updating the state of water resource exploitation in the SASS. (ii) Guiding agricultural usage as the primary consumer to ensure significant water savings. (iii) Constant monitoring through a network of piezometers to control the physicochemical parameters of the exploited aquifers. (iv) Other aspects related to governance within the framework of integrated management must also be taken into consideration, particularly environmental aspects and conflict resolution. However, problems, especially political ones as currently seen in Libya, may limit or at least disrupt the prospects of coordinated and sustainable management of this aquifer system, which is vital for the three countries.

Keywords: transboundary water resources, SASS, governance, climatic changes

Procedia PDF Downloads 82
457 Post 2014 Afghanistan and Its Implications on Pakistan

Authors: Naad-E-Ali Sulehria

Abstract:

This paper unfolds the facts and findings of Afghan scenario particularly its implications on Pakistan. At present, the Post 2014 withdrawal of US and ISAF combat forces from Afghan land is one of the up-to-the-minute issues among analysts of international relations. Deliberating from the current situation of Afghanistan towards its future prospects and the elements vibrating Afghanistan's internal dynamics, as well as exploitation of its resources by other states and non-state actors, are discussed accordingly. Moreover, the reasons behind such a paradigm shift in US foreign policy are tried to be contemplated with first hand knowledge. It is investigated that 'what is the current image of Afghanistan in today's world?', 'what will be its future aspects?', and 'what sort of Afghanistan does Pakistan foresees' as the concerned area of discussion.

Keywords: Afghanistan, Pakistan, new great game, taliban

Procedia PDF Downloads 300
456 Liberation as a Method for Monument Valorisation: The Case of the Defence Heritage Restoration

Authors: Donatella R. Fiorino, Marzia Loddo

Abstract:

The practice of freeing monuments from subsequent additions crosses the entire history of conservation and it is traditionally connected to the aim of valorisation, both for cultural and educational purpose and recently even for touristic exploitation. Defence heritage has been widely interested by these cultural and technical moods from philological restoration to critic innovations. A renovated critical analysis of Italian episodes and in particular the Sardinian case of the area of San Pancrazio in Cagliari, constitute an important lesson about the limits of this practice and the uncertainty in terms of results, towards the definition of a sustainable good practice in the restoration of military architectures.

Keywords: defensive architecture, liberation, Valorisation for tourism, historical restoration

Procedia PDF Downloads 342
455 Technological Exploitation and User Experience in Product Innovation: The Case Study of the High-Tech Mask

Authors: Venere Ferraro, Silvia Ferraris

Abstract:

We live in a world pervaded by new advanced technologies that have been changing the way we live and experience the surrounded. Besides, new technologies enable product innovation at different levels. Nevertheless, innovation does not lie just in the technological development and in its hard aspects but also in the meaningful use of it for the final user. In order to generate innovative products, a new perspective is needed: The shift from an instrument-oriented view of the technology towards a broader view that includes aspects like aesthetics, acceptance, comfort, and sociability. In many businesses, the user experience of the product is considered the key battlefield to achieve product innovation. (Holland 2011) The use of new technologies is indeed useless without paying attention to the user experience. This paper presents a workshop activity conducted at Design School of Politecnico di Milano in collaboration with Chiba University and aimed at generating innovative design concepts of high-tech mask. The students were asked to design the user experience of a new mask by exploiting emerging technologies such as wearable sensors and information communication technology (ICT) for a chosen field of application: safety or sport. When it comes to the user experience, the mask is a very challenging design product, because it covers aspects of product interaction and, most important, psychological and cultural aspects related to the impact on the facial expression. Furthermore, since the mask affects the face expression quite a lot, it could be a barrier to hide with, or it could be a mean to enhance user’s communication to others. The main request for the students was to take on a user-centered approach: To go beyond the instrumental aspects of product use and usability and focus on the user experience by shaping the technology in a desirable and meaningful way for the user reasoning on the metaphorical and cultural level of the product. During the one-week workshop students were asked to face the design process through (i) the research phase: an in-deep analysis of the user and field of application (safety or sport) to set design spaces (brief) and user scenario; (ii) the idea generation, (iii) the idea development. This text will shortly go through the meaning of the product innovation, the use and application of wearable technologies and will then focus on the user experience design in contrast with the technology-driven approach in the field of product innovation. Finally authors will describe the workshop activity and the concepts developed by the students stressing the important role of the user experience design in new product development.

Keywords: product innovation, user experience, technological exploitation, wearable technologies

Procedia PDF Downloads 345
454 Book Recommendation Using Query Expansion and Information Retrieval Methods

Authors: Ritesh Kumar, Rajendra Pamula

Abstract:

In this paper, we present our contribution for book recommendation. In our experiment, we combine the results of Sequential Dependence Model (SDM) and exploitation of book information such as reviews, tags and ratings. This social information is assigned by users. For this, we used CLEF-2016 Social Book Search Track Suggestion task. Finally, our proposed method extensively evaluated on CLEF -2015 Social Book Search datasets, and has better performance (nDCG@10) compared to other state-of-the-art systems. Recently we got the good performance in CLEF-2016.

Keywords: sequential dependence model, social information, social book search, query expansion

Procedia PDF Downloads 289
453 Root Causes of Child Labour in Hargeisa, Somaliland

Authors: Abdikarim Yusuf

Abstract:

This study uses data from Somalia to analyse child labour using a descriptive and qualitative method. The study set out to identify root causes of child labour in Hargeisa and its implications for children. The study shows that poverty, droughts, family separation, and loss of properties are primary drivers of child labour in Hargeisa. The study found that children work in very difficult jobs such as car wash, casual work, and shoe shining for boys while girls work as housemaids, selling tea, Khat and sometimes are at risk of exploitation such as sexual abuse, rape and harassment. The majority of the parents responded that they don’t know any policy, act or law that protects children. Men showed greater awareness than the women respondents in recognizing child labour as a child rights violation.

Keywords: abuse, child, violence, protection

Procedia PDF Downloads 151
452 Cultural Heritage Resources for Tourism, Two Countries – Two Approaches: A Comparative Analysis of Cultural Tourism Products in Turkey and Austria

Authors: Irfan Arikan, George Christian Steckenbauer

Abstract:

Turkey and Austria are examples for highly developed tourism destinations, where tourism providers use cultural heritage and regional natural resources to develop modern tourism products in order to be successful on increasingly competitive international tourism markets. The use and exploitation of these resources follow on the one hand international standards of tourism marketing (as ‘sustainability’). Therefore, we find highly comparable internationalized products in these destinations (like hotel products, museums, spas etc.). On the other hand, development standards and processes strongly depend on local, regional and national cultures, which influence the way how people work, cooperate, think and create. Thus, cultural factors also influence the attitude towards cultural heritage and natural resources and the way, how these resources are used for the creation of tourism products. This leads to differences in the development of tourism products on several levels: 1. In the selection of cultural heritage and natural resources for the product development process 2. In the processes, how tourism products are created 3. In the way, how providers and marketing organisations work with tourism products based on cultural heritage or natural resources. Aim of this paper is to discover differences in these dimensions by analysing and comparing examples of tourism products in Turkey and Austria, both countries with a highly developed, high professional tourism industry and rich experience of stakeholders in tourism industry in the field of product development and marketing. The cases are selected from the following fields: + Cultural tourism / heritage tourism + City tourism + Industrial heritage tourism + Nature and outdoor tourism + Health tourism The cases are analysed based on available secondary data (as several cases are scientifically described) and expert interviews with local and regional stakeholders of tourism industry and tourism experts. The available primary and secondary data will be analysed and displayed in a comparative structure that allows to derive answers to the above stated research question. The result of the project therefore will be a more precise picture about the influence of cultural differences on the use and exploitation of resources in the field of tourism that allows developing recommendations for tourism industry, which must be taken into consideration to assure cultural and natural resources are treated in a sustainable and responsible way. The authors will edit these culture-cross recommendations in form of a ‘check-list’ that can be used as a ‘guideline’ for tourism professionals in the field of product development and marketing and therefore connects theoretical research to the field of practical application and closes the gap between academic research and the field of tourism practice.

Keywords: cultural heritage, natural resources, Austria, Turkey

Procedia PDF Downloads 492
451 Bioeconomic Modeling for the Sustainable Exploitation of Three Key Marine Species in Morocco

Authors: I .Ait El Harch, K. Outaaoui, Y. El Foutayeni

Abstract:

This study aims to deepen the understanding and optimize fishing activity in Morocco by holistically integrating biological and economic aspects. We develop a biological equilibrium model in which these competing species present their natural growth by logistic equations, taking into account density and competition between them. The integration of human intervention adds a realistic dimension to our model. A company specifically targets the three species, thus influencing population dynamics according to their fishing activities. The aim of this work is to determine the fishing effort that maximizes the company’s profit, taking into account the constraints associated with conserving ecosystem equilibrium.

Keywords: bioeconomical modeling, optimization techniques, linear complementarity problem LCP, biological equilibrium, maximizing profits

Procedia PDF Downloads 24
450 Population Dynamics of Auchenoglanis Occidentalis From Dadin-Kowa Dam, Gombe State, Nigeria

Authors: Nazeef, Suleiman, Umar, Danladi Muhammad, Ja'afar Ali, Zaliha Adamu Umar

Abstract:

The population dynamics of Auchenoglanis occidentalis from the Dadin-Kowa reservoir were studied. Population dynamic parameters such as growth, mortality and recruitment patterns were analyzed using length frequency data over a 12-month period employing FiSAT II software. Findings revealed that LWR (b - constant) = 2.88, K = 0.72 -yr., L∞ = 40.91 cm and Tmax = 3.57 years and Ɵ’ = 3.14. Mortality indices revealed that natural mortality (M = 1.39), fishing mortality (F = 0.22) and exploitation ratio (E = 0.14), Lc/L∞ = 0.48, Emax = 0.64, while Lopt = 26.4 cm. Uni-modal recruitment peak observed with Lm = 27.3 cm. A restocking program is suitable to ensure its continuous existence as it seems to have a low population.

Keywords: fish population dynamics, auchenoglanis occidentalis, FISAT II, natural mortality

Procedia PDF Downloads 46
449 Scope of Heavy Oil as a Fuel of the Future

Authors: Kiran P. Chadayamuri, Saransh Bagdi

Abstract:

Increasing imbalance between energy supply and demand has made nations and companies involved in the energy sector to boost up their research and find suitable solutions. With the high rates at which conventional oil and gas resources are depleting, efficient exploration and exploitation of heavy oil could just be the answer. Heavy oil may be defined as crude oil having API gravity value of less than 20⁰. They are highly viscous, have low hydrogen to carbon ratios and are known to produce high carbon residues. They have high contents of asphaltenes, heavy metals, sulphur and nitrogen in them. Due to these properties extraction, transportation and refining of crude oil have its share of challenges. Lack of suitable technology has hindered its production in the past, but now things are going in a more positive direction. The aim of this paper is to study the various advantages of heavy oil, associated limitations and its feasibility as a fuel of the future.

Keywords: energy, heavy oil, fuel, future

Procedia PDF Downloads 285
448 The Effect of the Parameters of the Grinding on the Characteristics of the Deposit Phosphate Ore of Kef Es Sennoun, Djebel Onk-Tebessa, Algeria

Authors: N. Benabdeslam, N. Bouzidi, F. Atmani, R. Boucif, A. Sakhri

Abstract:

The objective of this study was to provide answers for a better understanding of the mechanisms involved during grinding. To obtain a phosphate powder, we carry out sieving - grinding circuits for each parameter influencing the process. The analysis of the average particle size of the different tests carried out served in the first place as a basis for the determination of the granulometric curve area, the characteristics and the granular coefficients, then the exploitation of the different results for the calculation of the energies consumed for the fragmentation of different ore types, the energy coefficients as well as the ability to grind. Indeed, a time of 5 to 10 minutes can be chosen as the optimal grinding time in a disc mill for a % in weight of the highest pass. However, grinding time can influence the granular characteristics of ore.

Keywords: characteristic granular, grinding, mineralogical composition, phosphate ore, parameters

Procedia PDF Downloads 202
447 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 138
446 Women-Hating Masculinities: How the Demand for Prostitution Fuels Sex Trafficking

Authors: Rosa M. Senent

Abstract:

Over the centuries, prostitution has been problematized from many sides, with women always at the center of the debate. However, prostitution is a gendered, demand-driven phenomenon. Thus, a focus must be put on the men who demand it, as an increasing number of studies have been done in the last few decades. The purpose of this paper is to expose how men's discourse online reveals the link between their demand for paid sex in prostitution and sex trafficking. The methodological tool employed was Critical Discourse Analysis (CDA). A critical analysis of sex buyers' discourse online showed that online communities of sex buyers are a useful tool in researching their behavior towards women, that their knowledge of sex trafficking and exploitation do not work as a deterrent for them to buy sex, and that the type of masculinity that sex buyers endorse is characterized by attitudes linked to the perpetuation of violence against women.

Keywords: masculinities, prostitution, sex trafficking, violence

Procedia PDF Downloads 139
445 Teaching Contemporary Power Distribution and Industrial Networks in Higher Education Vocational Studies

Authors: Rade M. Ciric

Abstract:

The paper shows the development and implementation of the syllabus of the subject 'Distribution and Industrial Networks', attended by the vocational specialist Year 4 students of the Electric Power Engineering study programme at the Higher Education Technical School of Vocational Studies in Novi Sad. The aim of the subject is to equip students with the knowledge necessary for planning, exploitation and management of distributive and industrial electric power networks in an open electricity market environment. The results of the evaluation of educational outcomes on the subject are presented and discussed.

Keywords: engineering education, power distribution network, syllabus implementation, outcome evaluation

Procedia PDF Downloads 402
444 Podemos Party Origin: From Social Protest to Spanish Parliament

Authors: Víctor Manuel Muñoz-Sánchez, Antonio Manuel Pérez-Flores

Abstract:

This paper analyzes the institutionalization of social protest in Spain. In the current crisis Podemos party seems to represent the political positions of the most affected citizens by the economic situation. It studies using quantitative techniques (statistical bivariate analysis), focusing on the exploitation of several bases of statistics data from the Center for Sociological and Research of Spanish Government, 15M movement characterization to its institutionalization in the Podemos party. Making a comparison between the participant's profile by the 15M and the social bases of Podemos votes. Data on the transformation of the socio-demographic profile of the fans, connoisseurs and 15M participants and voters are given.

Keywords: collective action, emerging parties, political parties, social protest

Procedia PDF Downloads 386
443 Anthropomorphism and Its Impact on the Implementation and Perception of AI

Authors: Marie Oldfield

Abstract:

Anthropomorphism is a technique used by humans to make sense of their surroundings. Anthropomorphism is a widely used technique used to influence consumers to purchase goods or services. These techniques can entice consumers into buying something to fulfill a gap or desire in their life, ranging from loneliness to the desire to be exclusive. By manipulating belief systems, consumer behaviour can be exploited. This paper examines a series of studies to show how anthropomorphism can be used as a basis for exploitation. The first set of studies in this paper examines how anthropomorphism is used in marketing and the effects on humans engaging with this technique. The second set of studies examines how humans can be potentially exploited by artificial agents. We then discuss the consequences of this type of activity within the context of dehumanisation. This research has found potential serious consequences for society and humanity, which indicate an urgent need for further research in this area.

Keywords: anthropomorphism, ethics, human-computer interaction, AI

Procedia PDF Downloads 89
442 Environmental Monitoring by Using Unmanned Aerial Vehicle (UAV) Images and Spatial Data: A Case Study of Mineral Exploitation in Brazilian Federal District, Brazil

Authors: Maria De Albuquerque Bercot, Caio Gustavo Mesquita Angelo, Daniela Maria Moreira Siqueira, Augusto Assucena De Vasconcellos, Rodrigo Studart Correa

Abstract:

Mining is an important socioeconomic activity in Brazil although it negatively impacts the environment. Mineral operations cause irreversible changes in topography, removal of vegetation and topsoil, habitat destruction, displacement of fauna, loss of biodiversity, soil erosion, siltation of watercourses and have potential to enhance climate change. Due to the impacts and its pollution potential, mining activity in Brazil is legally subjected to environmental licensing. Unlicensed mining operations or operations that not abide to the terms of an obtained license are taken as environmental crimes in the country. This work reports a case analyzed in the Forensic Institute of the Brazilian Federal District Civil Police. The case consisted of detecting illegal aspects of sand exploitation from a licensed mine in Federal District, nearby Brasilia city. The fieldwork covered an area of roughly 6 ha, which was surveyed with an unmanned aerial vehicle (UAV) (PHANTOM 3 ADVANCED). The overflight with UAV took about 20 min, with maximum flight height of 100 m. 592 UAV georeferenced images were obtained and processed in a photogrammetric software (AGISOFT PHOTOSCAN 1.1.4), which generated a mosaic of geo-referenced images and a 3D model in less than six working hours. The 3D model was analyzed in a forensic software for accurate modeling and volumetric analysis. (MAPTEK I-SITE FORENSIC 2.2). To ensure the 3D model was a true representation of the mine site, coordinates of ten control points and reference measures were taken during fieldwork and compared to respective spatial data in the model. Finally, these spatial data were used for measuring mining area, excavation depth and volume of exploited sand. Results showed that mine holder had not complied with some terms and conditions stated in the granted license, such as sand exploration beyond authorized extension, depth and volume. Easiness, the accuracy and expedition of procedures used in this case highlight the employment of UAV imagery and computational photogrammetry as efficient tools for outdoor forensic exams, especially on environmental issues.

Keywords: computational photogrammetry, environmental monitoring, mining, UAV

Procedia PDF Downloads 318
441 The Ideal for Building Reservior Under the Ground in Mekong Delta in Vietnam

Authors: Huu Hue Van

Abstract:

The Mekong Delta is the region in southwestern Vietnam where the Mekong River approaches and flow into the sea through a network of distributaries. The Climate Change Research Institute at University of Can Tho, in studying the possible consequences of climate change, has predicted that, many provinces in the Mekong Delta will be flooded by the year 2030. The Mekong Delta lacks fresh water in the dry season. Being served for daily life, industry and agriculture in the dry season, the water is mainly taken from layers of soil contained water under the ground (aquifers) depleted water; the water level in aquifers have decreased. Previously, the Mekong Delta can withstand two bad scenarios in the future: 1) The Mekong Delta will be submerged into the sea again: Due to subsidence of the ground (over-exploitation of groundwater), subsidence of constructions because of the low groundwater level (10 years ago, some of constructions were built on the foundation of Melaleuca poles planted in Mekong Delta, Melaleuca poles have to stay in saturated soil layer fully, if not, they decay easyly; due to the top of Melaleuca poles are higher than the groundwater level, the top of Melaleuca poles will decay and cause subsidence); erosion the river banks (because of the hydroelectric dams in the upstream of the Mekong River is blocking the flow, reducing the concentration of suspended substances in the flow caused erosion the river banks) and the delta will be flooded because of sea level rise (climate change). 2) The Mekong Delta will be deserted: People will migrate to other places to make a living because of no planting due to alum capillary (In Mekong Delta, there is a layer of alum soil under the ground, the elevation of groundwater level is lower than the the elevation of layer of alum soil, alum will be capillary to the arable soil layer); there is no fresh water for cultivation and daily life (because of saline intrusion and groundwater depletion in the aquifers below). Mekong Delta currently has about seven aquifers below with a total depth about 500 m. The water mainly has exploited in the middle - upper Pleistocene aquifer (qp2-3). The major cause of two bad scenarios in the future is over-exploitation of water in aquifers. Therefore, studying and building water reservoirs in seven aquifers will solve many pressing problems such as preventing subsidence, providing water for the whole delta, especially in coastal provinces, favorable to nature, saving land ( if we build the water lake on the surface of the delta, we will need a lot of land), pollution limitation (because when building some hydraulic structures for preventing the salt instrutions and for storing water in the lake on the surface, we cause polluted in the lake)..., It is necessary to build a reservoir under the ground in aquifers in the Mekong Delta. The super-sized reservoir will contribute to the existence and development of the Mekong Delta.

Keywords: aquifers, aquifers storage, groundwater, land subsidence, underground reservoir

Procedia PDF Downloads 85
440 Nineteenth Century Colonial Discourse and Marxist Theory

Authors: Nikolaos Mavropoulos

Abstract:

Imperialism and colonialism had and still have a predominantly negative nuisance. In many ways the two terms are synonyms of racist behavior, exploitation, and oppression, imposed by the supposedly civilized West at Africa’s and Asia’s expense. Paradoxically enough, imperialism was not thoroughly negative for some Marxist scholars. For them, in reality, it served a historical necessity as the only mean to liberate the backward societies from their millennial stagnation and to introduce them to industrialization and progress. To Marx as immoral and cruel the imposition of imperial rule and the eradication of traditional structures may have been, the process is still a progressive step towards the formation of class consciousness, global revolution and socialism in a world scale. Overlooking the fact that imperialism could actually delay and put an end to capitalist development, some Marxists proponents considered it as a positive development for the colonized peoples.

Keywords: Colonialism, , Marxist theory, Modern history, , 19th century Imperialism,

Procedia PDF Downloads 125
439 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 102
438 Novel GPU Approach in Predicting the Directional Trend of the S&P500

Authors: A. J. Regan, F. J. Lidgey, M. Betteridge, P. Georgiou, C. Toumazou, K. Hayatleh, J. R. Dibble

Abstract:

Our goal is development of an algorithm capable of predicting the directional trend of the Standard and Poor’s 500 index (S&P 500). Extensive research has been published attempting to predict different financial markets using historical data testing on an in-sample and trend basis, with many authors employing excessively complex mathematical techniques. In reviewing and evaluating these in-sample methodologies, it became evident that this approach was unable to achieve sufficiently reliable prediction performance for commercial exploitation. For these reasons, we moved to an out-of-sample strategy based on linear regression analysis of an extensive set of financial data correlated with historical closing prices of the S&P 500. We are pleased to report a directional trend accuracy of greater than 55% for tomorrow (t+1) in predicting the S&P 500.

Keywords: financial algorithm, GPU, S&P 500, stock market prediction

Procedia PDF Downloads 350
437 The Exploitation of Balancing an Inverted Pendulum System Using Sliding Mode Control

Authors: Sheren H. Salah, Ahmed Y. Ben Sasi

Abstract:

The inverted pendulum system is a classic control problem that is used in universities around the world. It is a suitable process to test prototype controllers due to its high non-linearities and lack of stability. The inverted pendulum represents a challenging control problem, which continually moves toward an uncontrolled state. This paper presents the possibility of balancing an inverted pendulum system using sliding mode control (SMC). The goal is to determine which control strategy delivers better performance with respect to pendulum’s angle and cart's position. Therefore, proportional-integral-derivative (PID) is used for comparison. Results have proven SMC control produced better response compared to PID control in both normal and noisy systems.

Keywords: inverted pendulum (IP), proportional-integral derivative (PID), sliding mode control (SMC), systems and control engineering

Procedia PDF Downloads 587
436 Risks in Forestry Operations, Analysis of Fatal Accidents

Authors: Rino Gubiani, Gianfranco Pergher

Abstract:

The work focused on the statistical analysis of accidents in the forestry sector (2000-2020) in Friuli-Venezia Giulia region, located in the North-East of Italy. The aim of the work was to analyse the evolution of the casualties throughout time and to evaluate possible improvements in the sector. It was shown that even nowadays the rate of accidents in forestry work is higher compared with all the other sectors, including agriculture; moreover, it was highlighted that some accidents remained present throughout the whole analysed range, such as slipping on the soil, being hit by trees and falling down from the plants. The results showed that an increase in forestry exploitation could even increase the total number of accidents, if advanced technological machines, such as cable cranes, would not implemented, given the fact that there is also a significant number of old people (above 50 years old) working in the sector.

Keywords: safety, forestry work, accidents, risk analysis, casualties, statistical analysis

Procedia PDF Downloads 131