Search results for: privacy loss
3831 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code
Authors: Deborah Garcia-Magna
Abstract:
The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting
Procedia PDF Downloads 1973830 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 953829 Evaluating Forecasts Through Stochastic Loss Order
Authors: Wilmer Osvaldo Martinez, Manuel Dario Hernandez, Juan Manuel Julio
Abstract:
We propose to assess the performance of k forecast procedures by exploring the distributions of forecast errors and error losses. We argue that non systematic forecast errors minimize when their distributions are symmetric and unimodal, and that forecast accuracy should be assessed through stochastic loss order rather than expected loss order, which is the way it is customarily performed in previous work. Moreover, since forecast performance evaluation can be understood as a one way analysis of variance, we propose to explore loss distributions under two circumstances; when a strict (but unknown) joint stochastic order exists among the losses of all forecast alternatives, and when such order happens among subsets of alternative procedures. In spite of the fact that loss stochastic order is stronger than loss moment order, our proposals are at least as powerful as competing tests, and are robust to the correlation, autocorrelation and heteroskedasticity settings they consider. In addition, since our proposals do not require samples of the same size, their scope is also wider, and provided that they test the whole loss distribution instead of just loss moments, they can also be used to study forecast distributions as well. We illustrate the usefulness of our proposals by evaluating a set of real world forecasts.Keywords: forecast evaluation, stochastic order, multiple comparison, non parametric test
Procedia PDF Downloads 923828 Investigation of the Decisive Factors on the Slump Loss: A Case Study of Cement Factors (Portland Cement Type 2)
Authors: M. B. Ahmadi, A. A. Kaffash B., B. Mobaraki
Abstract:
Slump loss, which refers to the gradual reduction of workability and the amount of slump in fresh concrete over time, is one of the significant challenges in the ready-mixed concrete industry. Therefore, having accurate knowledge of the factors affecting slump loss is a crucial solution in this field. In this paper, an attempt was made to investigate the effect of cement produced by different units on the slump of concrete in a laboratory setting. For this purpose, 12 cement samples were prepared from 6 different production units. Physical and chemical tests were performed on the cement samples. Subsequently, a laboratory concrete mix with a slump of 13 ± 1 cm was prepared with each cement sample, and the slump was measured at 0, 15, 30, 45, and 60 minutes. Although the environmental factors, mix design specifications, and execution conditions—factors that significantly influence the slump loss trend—were constant in all 12 laboratory concrete mixes, the slump loss trends differed among them. These trends were categorized based on the results, and the relationship between the slump loss percentage in 60 minutes, the water-cement ratio, and the LOI and K2O values of different cements were introduced.Keywords: concrete, slump loss, portland cement, efficiency
Procedia PDF Downloads 833827 Development of a Secured Telemedical System Using Biometric Feature
Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese
Abstract:
Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.Keywords: biometrics, telemedicine, privacy, patient information
Procedia PDF Downloads 2963826 Sexual Health Experiences of Older Men: Health Care Professionals' Perspectives
Authors: Andriana E. Tran, Anna Chur-Hansen
Abstract:
Sexual health is an important aspect of overall wellbeing. This study aimed to explore the sexual health experiences of men aged 50 years and over from the perspective of health care professional participants who were specializing in sexual health care and who consulted with older men. A total of ten interviews were conducted. Eleven themes were identified regarding men’s experiences with sexual health care as reported by participants. 1) Biologically focused: older male clients focus largely on the biological aspect of their sexual health without consideration of other factors which might affect their functioning. 2) Psychological concerns: there is an interaction between mental and sexual health but older male clients do not necessarily see this. 3) Medicalization of sexual functioning: advances in medicine that aid with erectile difficulties which consequently mean that older men tend to favor a medical solution to their sexual concerns. 4) Masculine identity: sexual health concerns are linked to older male clients’ sense of masculinity. 5) Penile functionality: most concerns that older male clients have center on their penile functionality. 6) Relationships: many male clients seek sexual help as they believe it improves relationships. Conversely, having supportive partners may mean older male clients focus less on the physicality of sex. 7) Grief and loss: men experience grief and loss – the loss of their sexual functioning, grief from loss of a long-term partner, and loss of intimacy and privacy when moving from independent living to residential care. 8) Social stigma: older male clients experience stigma around aging sexuality and sex in general. 9) Help-seeking behavior: older male clients will usually seek mechanistic solution for biological sexual concerns, such as medication used for penile dysfunction. 10) Dismissed by health care professionals: many older male clients seek specialist sexual health care without the knowledge of their doctors as they feel dismissed due to lack of expertise, lack of time, and the doctor’s personal attitudes and characteristics. Finally, 11) Lack of resources: there is a distinct lack of resources and training to understand sexuality for healthy older men. These findings may inform future research, professional training, public health campaigns and policies for sexual health in older men.Keywords: ageing, biopsychosocial model, men's health, sexual health
Procedia PDF Downloads 1753825 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 2363824 An Assessment of Vegetable Farmers’ Perceptions about Post-harvest Loss Sources in Ghana
Authors: Kofi Kyei, Kenchi Matsui
Abstract:
Loss of vegetable products has been a major constraint in the post-harvest chain. Sources of post-harvest loss in the vegetable industry start from the time of harvesting to its handling and at the various market centers. Identifying vegetable farmers’ perceptions about post-harvest loss sources is one way of addressing this issue. In this paper, we assessed farmers’ perceptions about sources of post-harvest losses in the Ashanti Region of Ghana. We also identified the factors that influence their perceptions. To clearly understand farmers’ perceptions, we selected Sekyere-Kumawu District in the Ashanti Region. Sekyere-Kumawu District is one of the major producers of vegetables in the Region. Based on a questionnaire survey, 100 vegetable farmers growing tomato, pepper, okra, cabbage, and garden egg were purposely selected from five communities in Sekyere-Kumawu District. For farmers’ perceptions, the five points Likert scale was employed. On a scale from 1 (no loss) to 5 (extremely high loss), we processed the scores for each vegetable harvest. To clarify factors influencing farmers’ perceptions, the Pearson Correlation analysis was used. Our findings revealed that farmers perceive post-harvest loss by pest infestation as the most extreme loss. However, vegetable farmers did not perceive loss during transportation as a serious source of post-harvest loss. The Pearson Correlation analysis results further revealed that farmers’ age, gender, level of education, and years of experience had an influence on their perceptions. This paper then discusses some recommendations to minimize the post-harvest loss in the region.Keywords: Ashanti Region, pest infestation, post-harvest loss, vegetable farmers
Procedia PDF Downloads 1913823 A Review of Encryption Algorithms Used in Cloud Computing
Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele
Abstract:
Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.Keywords: cloud computing, data integrity, confidentiality, privacy, availability
Procedia PDF Downloads 1433822 Efficient Model Selection in Linear and Non-Linear Quantile Regression by Cross-Validation
Authors: Yoonsuh Jung, Steven N. MacEachern
Abstract:
Check loss function is used to define quantile regression. In the prospect of cross validation, it is also employed as a validation function when underlying truth is unknown. However, our empirical study indicates that the validation with check loss often leads to choosing an over estimated fits. In this work, we suggest a modified or L2-adjusted check loss which rounds the sharp corner in the middle of check loss. It has a large effect of guarding against over fitted model in some extent. Through various simulation settings of linear and non-linear regressions, the improvement of check loss by L2 adjustment is empirically examined. This adjustment is devised to shrink to zero as sample size grows.Keywords: cross-validation, model selection, quantile regression, tuning parameter selection
Procedia PDF Downloads 4403821 Seasonal and Species Variations in Incidence of Foetal Loss at the Maiduguri Abattoir in Northern Nigeria
Authors: Abdulrazaq O. Raji, Abba Mohammed, Ibrahim D. Mohammed
Abstract:
This study was conducted to investigate foetal loss among slaughtered livestock species at the Maiduguri abattoir from 2009 to 2013. Record of animals slaughtered monthly and fetuses recovered were collected from the management of the Maiduguri abattoir. Data was subjected to Analysis of Variance using the General Linear Model of SPSS 13.0 with Season, Species and their interaction as fixed factors. Average yearly slaughter at the Maiduguri abattoir was 63,225 animals with cattle, camel, goat and sheep accounting for 19737, 7374, 19281 and 17540 of the total. The corresponding number of those pregnant were 3117, 839, 2281 and 2432 out of a total of 8522 animals. Thus, cattle, camel, goat and sheep accounted for 30.87, 11.53, 30.16 and 27.44%, respectively of the animals slaughtered at the Abattoir and 35.96, 9.68, 26.31 and 28.05% of the foetal loss. The effect of season and species on foetal loss was significant (P < 0.05). The number of pregnant animals slaughtered and foetal loss were higher during wet than dry season. Similarly, foetal loss at the abattoir was higher in the month of May in respect of camel, goat and sheep, and August for cattle. Camel was the least slaughtered animal and had the least number of pregnant females. Foetal loss (%) was higher (P < 0.05) for cattle compared to other species. The interaction showed that camel was the least slaughtered species in both seasons and cattle in the wet season had the highest foetal loss.Keywords: abattoir, foetal loss, season, species
Procedia PDF Downloads 5363820 Fair Federated Learning in Wireless Communications
Authors: Shayan Mohajer Hamidi
Abstract:
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy.Keywords: federated learning, wireless communications, fairness, imbalanced data, privacy preservation, resource allocation, differential privacy, optimization
Procedia PDF Downloads 793819 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Abstract:
The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning
Procedia PDF Downloads 1543818 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors
Authors: João Filipe Papel, Tatsuji Munaka
Abstract:
With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living
Procedia PDF Downloads 1083817 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey
Authors: Tolga Yazıcı
Abstract:
As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey
Procedia PDF Downloads 3453816 Soil Loss Assessment at Steep Slope: A Case Study at the Guthrie Corridor Expressway, Selangor, Malaysia
Authors: Rabiul Islam
Abstract:
The study was in order to assess soil erosion at plot scale Universal Soil Loss Equation (USLE) erosion model and Geographic Information System (GIS) technique have been used for the study 8 plots in Guthrie Corridor Expressway, Selangor, Malaysia. The USLE model estimates an average soil loss soil integrating several factors such as rainfall erosivity factor(R ), Soil erodibility factor (K), slope length and steepness factor (LS), vegetation cover factor as well as conservation practice factor (C &P) and Results shows that the four plots have very low rates of soil loss, i.e. NLDNM, NDNM, PLDM, and NDM having an average soil loss of 0.059, 0.106, 0.386 and 0.372 ton/ha/ year, respectively. The NBNM, PLDNM and NLDM plots had a relatively higher rate of soil loss, with an average of 0.678, 0.757 and 0.493ton/ha/year. Whereas, the NBM is one of the highest rate of soil loss from 0.842 ton/ha/year to maximum 16.466 ton/ha/year. The NBM plot was located at bare the land; hence the magnitude of C factor(C=0.15) was the highest one.Keywords: USLE model, GIS, Guthrie Corridor Expressway (GCE), Malaysia
Procedia PDF Downloads 5303815 Resilience among Children with and without Hearing Loss: A Comparative Study in Pakistan
Authors: Bushra Akram, Amina Tariq
Abstract:
Objective: This cross-sectional descriptive study aimed to compare the level of resilience among children with and without hearing loss. Methodology: In this descriptive cross sectional study total 500 children (with hearing loss = 250 and without hearing loss = 250) were recruited conveniently. Children with hearing loss were recruited from the special schools whereas children without hearing loss were selected from regular schools located in cities of Gujrat and Jhelum of Pakistan. Respondents’ age ranged from 9-14 years. Resiliency scale named RSCA (Resiliency Scales for children and adolescents) developed by Sandra Prince Embury (2006) was used. RSCA consist of three core theoretical areas: MAS (Sense of Mastery Scale), REL (Sense of Relatedness Scale) and REA (Emotional Reactivity Scale). Results: Findings indicated that there was a significant difference in the resilience level of participants with and without hearing loss. The mean comparison showed that the children with hearing loss showed lower scores on MAS (X̅ = 43.32, SD = 7.55) as well as on REL (X̅ = 49.96, SD = 7.65) as compared to their counterparts on MAS (X̅ = 53.96, SD = 9.90, t= -7.31***) and on REL (X̅ = 68.43, SD = 14.57,t= -10.18***). However children with hearing loss showed higher scores on REA (X̅ = 42.12, SD = 5.84) as compared to hearing participants (X̅ = 28.84, SD = 13.97, t = -8.20***). The findings revealed no significance difference in the resilience level of hearing and deaf children on the basis of their gender and age. Research Outcomes and Future Scope: Children with hearing loss showed a lower level of resilience, therefore, needs a program to develop resilience for better social-emotional adjustment and enhancement of their psychological well-being. In the end, the researcher gave recommendations for future research.Keywords: children with hearing loss, psychological Wellbeing, resiliency scales for children and adolescents, resilience
Procedia PDF Downloads 1933814 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 653813 House Price Index Predicts a Larger Impact of Habitat Loss than Primary Productivity on the Biodiversity of North American Avian Communities
Authors: Marlen Acosta Alamo, Lisa Manne, Richard Veit
Abstract:
Habitat loss due to land use change is one of the leading causes of biodiversity loss worldwide. This form of habitat loss is a non-random phenomenon since the same environmental factors that make an area suitable for supporting high local biodiversity overlap with those that make it attractive for urban development. We aimed to compare the effect of two non-random habitat loss predictors on the richness, abundance, and rarity of nature-affiliated and human-affiliated North American breeding birds. For each group of birds, we simulated the non-random habitat loss using two predictors: the House Price Index as a measure of the attractiveness of an area for humans and the Normalized Difference Vegetation Index as a proxy for primary productivity. We compared the results of the two non-random simulation sets and one set of random habitat loss simulations using an analysis of variance and followed up with a Tukey-Kramer test when appropriate. The attractiveness of an area for humans predicted estimates of richness loss and increase of rarity higher than primary productivity and random habitat loss for nature-affiliated and human-affiliated birds. For example, at 50% of habitat loss, the attractiveness of an area for humans produced estimates of richness at least 5% lower and of a rarity at least 40% higher than primary productivity and random habitat loss for both groups of birds. Only for the species abundance of nature-affiliated birds, the attractiveness of an area for humans did not outperform primary productivity as a predictor of biodiversity following habitat loss. We demonstrated the value of the House Price Index, which can be used in conservation assessments as an index of the risks of habitat loss for natural communities. Thus, our results have relevant implications for sustainable urban land-use planning practices and can guide stakeholders and developers in their efforts to conserve local biodiversity.Keywords: biodiversity loss, bird biodiversity, house price index, non-random habitat loss
Procedia PDF Downloads 933812 Effect of Non-Invasive Electrical Stimulation on Partial Hearing Loss: Pilot Study
Authors: Geetanjali Saggar
Abstract:
Background: Partial hearing loss is the inability to hear effectively as a normal hearing individual whose hearing threshold is 20 dB or better in both ears. Individuals with partial hearing loss may benefit from non-invasive electrical stimulation as a method of therapy and possible intervention. Objective: The project aims to assess and relate the efficacy of electrical stimulation on individuals with partial hearing loss. The study's goal was to evaluate the different sorts of non-invasive electrical stimulation in tinnitus and hearing loss in order to build the framework for future research. Method: In this pilot study, a total of five patients of age group above 50 years were selected with partial hearing loss. The electrical modality of Repetitive Transcranial Magnetic Stimulation (RTMS) was used among the patients and was evaluated using gold questionnaires- HHIA and APHAB for hearing at intervals of 0-7-14 days. The statistical data was analyzed by SPSS software-16. Results: There were not much significant changes in the hearing of the patients when non-invasive electrical modality was applied as an intervention in the partial hearing loss condition. However, there was minimal change in the daily functioning of the patient with the application of intervention. Conclusion: This study concluded that non-invasive electrical stimulation had minimal to no effect on the partial hearing of the patients.Keywords: non-invasive, hearing loss, transcranial magnetic stimulation, partial deafness, transcranial direct current stimulation, tinnitus
Procedia PDF Downloads 203811 Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria
Authors: Augustine Osayande
Abstract:
This research is on Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria. The primary objective was to identify notable gullies sites and quantify the volume of soil loss in the study area. Direct field observation and measurement of gullies dimensions was done with the help of research assistants using a measuring tape, Camera and 3percent accuracy Global Positioning System (GPS). The result revealed that notable gullies in the area have resulted in the loss of lives and properties, destruction of arable lands and wastage of large areas of usable lands. Gullies in Edo North have Mean Volume of Soil Loss of 614, 763.33 m³, followed by Edo South with 79,604.76 m³ and Edo Central is 46,242.98 m³ and as such an average of 1,772, 888.7m3 of soil is lost annually in the study area due to gully erosion problem. The danger of gully erosion in helpless regions like Edo State called for urgent remedies in order to arrest the further loss of soil, buildings and other properties.Keywords: Edo, magnitude, gully, volume, soil, sloss
Procedia PDF Downloads 1483810 A Low Insertion Loss Variation 10-35 GHz Phase Shifter
Authors: Soroush Rasti Boroujeni, S. Hassan Mousavi, Javad Ebrahimizadeh, Ardeshir Palizban, Mohammad-Reza Nezhad-Ahmadi, Safieddin Safavi-Naeini
Abstract:
This paper presents a wideband True Time Delay (TTD) phase shifter with low insertion loss variation. The circuit benefits from a controllable resistive load shunt with transmission line segments to optimize return loss variations, addressing the unbalanced capacitive nature of the varactor. The phase shifter reduces the complexity of the calibration process because the dependency of insertion loss on voltage controls is improved up to 3 dB. The TTD phase shifter provides a continuous changing delay time of 6.4 ps with low insertion loss (IL) in the 10-35 GHz frequency range. The proposed circuit benefits from lowloss phase shifters with a small footprint. Fabricated using a 65 nm CMOC process, the TTD phase shifter occupies only 388 × 615 μm² of chip area, achieving a 20% improvements compared to conventional TTD phase shifters.Keywords: millimeter-wave phased-array, true time delay phase shifter, insertion loss variation, compact size
Procedia PDF Downloads 273809 Using Nonhomogeneous Poisson Process with Compound Distribution to Price Catastrophe Options
Authors: Rong-Tsorng Wang
Abstract:
In this paper, we derive a pricing formula for catastrophe equity put options (or CatEPut) with non-homogeneous loss and approximated compound distributions. We assume that the loss claims arrival process is a nonhomogeneous Poisson process (NHPP) representing the clustering occurrences of loss claims, the size of loss claims is a sequence of independent and identically distributed random variables, and the accumulated loss distribution forms a compound distribution and is approximated by a heavy-tailed distribution. A numerical example is given to calibrate parameters, and we discuss how the value of CatEPut is affected by the changes of parameters in the pricing model we provided.Keywords: catastrophe equity put options, compound distributions, nonhomogeneous Poisson process, pricing model
Procedia PDF Downloads 1723808 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers
Authors: Pankhudi Khandelwal
Abstract:
The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.Keywords: data protection, dominance, ex ante regulation, ex post regulation
Procedia PDF Downloads 1873807 Raising Awareness to Health Professionals about Emotional Needs of Families Suffering Perinatal Loss through a Short Documentary
Authors: Elisenda Camprecios, Alicia Macarrila, Montse Albiol, Neus Garriga Garriga
Abstract:
The loss of a child during pregnancy, or shortly after birth, is not a common occurrence, but it is a prevalent fact in our society. When this loss happens, life and death walk together. The grief that parents experience following a perinatal loss is a devastating experience. Professionals are aware that the quality of care offered during this first period is crucial to support the families experiencing a perinatal loss and meet their needs. However, it is not always easy for the health care professionals to know what to say and what to do in these difficult circumstances. Given the complexity of the Health, painful process that a family must face when is affected by such loss, we believe that the creation of a protocol that pays special attention to the emotional needs of those couples can be a very valuable tool for the professionals. The short documentary named ‘When the illusion vanished’ was created as part of the material of this protocol, which focuses on the emotional needs of the families who have suffered a perinatal loss. This video is designed to see what impact has a perinatal death and to raise awareness among professionals working in this field. The methodology is based on interviews with couples who have experienced perinatal death and to professionals who accompany families suffering from perinatal loss. The use of sensitive and empathized words, being encouraged to express feelings, respect the time, appropriate training for the professionals are some of the issues reflected in this documentary. We believe that this video has contributed to help health care professionals to empathize and understand the need to be able to accompany these families with the appropriate care, respectful, empathetic attitude and professionalism so that they can start the path to a ‘healthy’ mourning.Keywords: neonatal loss, midwifery, perinatal bereavement, perinatal loss
Procedia PDF Downloads 1543806 The Act of Care: Reimagined Rituals towards Unattachment
Authors: Ioana G. Turcan
Abstract:
reimagined rituals towards unattachment wants to look at an ambiguous loss through the perspective of caregivers, those that accompany us at the beginning and possibly the end of life, those that observe, accumulate, and are impacted by our behavior and needs, but also those that are the witnesses of the human vulnerability. Someone taking care of a patient with dementia experiences ambiguous loss, being in a present of a person partially present, partially absent. The one offering care needs care, not isolation and the aim of the project is to consolidate existing communities or engage other possible ones using performance, storytelling, and other artistic methods. The long-term aim is that with community work, we will manage to co-create rituals in order to help us live with this kind of loss. Looking at them through the lens of different cultures and individuals exercises both the ability to extract the universal essence of a ritual, but also the need and freedom to express the specificity of each situation. To be seen and acknowledged by others, but more importantly, to see oneself from outside with dignity, is very powerful. Oftentimes we forget to express, look and appreciate our own stories, and instead, we choose to outcast them.Keywords: grief, socio-politics of loss, ambiguous loss, rituals
Procedia PDF Downloads 1833805 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens
Authors: Mohamed Saad, Huda Ismail
Abstract:
The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.Keywords: crime, cryptocurrency, money laundering, tokens.
Procedia PDF Downloads 933804 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant
Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park
Abstract:
CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method
Procedia PDF Downloads 2203803 Exploring Urbanization-Induced Wetland Loss within the Greater Toronto Area from 2005 to 2015
Authors: Kaushika Vinotheeswaran
Abstract:
The Greater Toronto Area (GTA), located in Ontario, Canada, is among the fastest-growing metropolitan areas in North America. Rapid urbanization within the GTA has led to increased imperviousness and surface runoff, contributing to wetland loss. Wetland cover and land cover data from the Southern Ontario Land Resource Information System were analyzed to characterize wetland loss to built-up areas and land conversions between 2005 and 2015, evaluating the extent of urbanization-induced wetland loss. Spatial analysis revealed a significant increase in the number of wetlands lost from 2005 to 2011 compared to the period from 2011 to 2015, with these losses attributed to increased urban expansions within the GTA. Non-wetland conversions, such as agricultural and impervious built-up uses to support urban expansions, played a significant role in wetland loss. Current approaches to wetland policy implementation and land-use planning strategies do not effectively identify or mitigate damage to wetlands in advance of development, resulting in significant wetland loss. Therefore, wetland conservation policies must be re-evaluated to address gaps in policy practice and focus on minimizing wetland loss.Keywords: wetland loss, urbanization, impervious, pervious, wetland conservation
Procedia PDF Downloads 753802 Using of Particle Swarm Optimization for Loss Minimization of Vector-Controlled Induction Motors
Authors: V. Rashtchi, H. Bizhani, F. R. Tatari
Abstract:
This paper presents a new online loss minimization for an induction motor drive. Among the many loss minimization algorithms (LMAs) for an induction motor, a particle swarm optimization (PSO) has the advantages of fast response and high accuracy. However, the performance of the PSO and other optimization algorithms depend on the accuracy of the modeling of the motor drive and losses. In the development of the loss model, there is always a trade off between accuracy and complexity. This paper presents a new online optimization to determine an optimum flux level for the efficiency optimization of the vector-controlled induction motor drive. An induction motor (IM) model in d-q coordinates is referenced to the rotor magnetizing current. This transformation results in no leakage inductance on the rotor side, thus the decomposition into d-q components in the steady-state motor model can be utilized in deriving the motor loss model. The suggested algorithm is simple for implementation.Keywords: induction machine, loss minimization, magnetizing current, particle swarm optimization
Procedia PDF Downloads 638