Search results for: hardware security evaluation
8297 Evaluation of the Pain of Patients with Chronic Renal Disease in Hemodialysis
Authors: Fabiana Souza Orlandi, Izabel Cristina Chavez Gomes, Barbara Isabela De Paula Morais, Ana Carolina Ottaviani
Abstract:
Chronic Kidney Disease (CKD) is considered a public health problem. Patients who present CKD in their more advanced stages usually present several biopsychosocial changes, which may include pain. Pain can be considered subjective and personal, and its perception is characterized as a multidimensional experience. The objective of this study was to evaluate the level and descriptors of pain of adults and elderly patients with chronic kidney disease, through the Multidimensional Pain Evaluation Scale (EMADOR). This is a descriptive cross-sectional study with a quantitative approach. The sample consisted of 100 subjects with CKD in hemodialysis treatment at a Renal Replacement Therapy Service in the interior of the state of São Paulo. Data were collected through an individual interview, using a Sociodemographic Characterization and Multidimensional Pain Evaluation Scale (EMADOR). All ethical precepts were respected. The majority of the respondents were men (61.0%), white (56.0%) and with a high school education (34.0%). Regarding the pain of the individuals, 89 patients reported pain, with Chronic Pain predominating (50.0%, n = 50), followed by Acute Pain (39.0%, n = 39). Of the subjects who presented acute pain most of the 89.0% described the pain felt as unbearable, and of those who presented chronic pain, 35.0% described the pain felt as painful, unbearable and uncomfortable. It was concluded that there was a significant presence of pain, being the chronic pain dominant in the studied population. Faced with such factors, the present study motivates researches in this population, in order to establish interventions with the objective of improving the quality of life of these individuals.Keywords: pain, chronic kidney disease, dialysis, evaluation
Procedia PDF Downloads 4528296 Biodiversity of the National Production through Companion Plants Analysis
Authors: Astrid Rivera, Diego Villatoro
Abstract:
The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.Keywords: biodiversity, food security, companion plats, nutrition
Procedia PDF Downloads 1988295 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035
Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo
Abstract:
This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases
Procedia PDF Downloads 948294 Efficient Position Based Operation Code Authentication
Authors: Hashim Ali, Sheheryar Khan
Abstract:
Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication
Procedia PDF Downloads 2728293 Pyrolysis of the Reed (Phragmites australis) and Evaluation of Pyrolysis Products
Authors: Ahmet Helvaci, Selcuk Dogan
Abstract:
Reed in especially almost all the lakes in Western Anatolia grows naturally. Due to the abundance of reed, pyrolysis of reed is very economical and practical application. In this study, it is aimed to determine the optimum conditions for the pyrolysis of the reed which is a cheap and abundant raw material and to evaluate pyrolysis products. For this purpose, reed was used obtained from Eber Lake located in the borders of Bolvadin county of Afyonkarahisar. Optimum pyrolysis conditions have been determined by examining the effects of changes in pyrolysis temperature and pyrolysis time. The evaluation of the obtained liquid and solid pyrolysis products has been investigated. Especially evaluability of solid carbon black production of tires has been investigated. Tire samples were prepared with carbon black samples obtained as a result of the pyrolysis process at different temperatures. Then, performance tests were made and compared with reference carbon blacks, used in the market and standards. At the same time, surface area measurement analysis of carbon black samples was made and compared again with reference carbon blacks. In addition, the fuel values of liquid products were also determined by calorimeter. It has been determined that the best surface area (about 370 m²/g) for carbon black samples, for tire production is 40 minutes at 500ᵒC. It was also found that the best result for evaluation studies in tire production was carbon black samples obtained at 450ᵒC pyrolysis temperature. In addition, it was seen that the calorimetry results of the liquid product obtained during 60 minutes of pyrolysis were quite good (around 5500 kcal/kg).Keywords: evaluation of products, optimization, pyrolysis, reed
Procedia PDF Downloads 1938292 ESL Material Evaluation: The Missing Link in Nigerian Classrooms
Authors: Abdulkabir Abdullahi
Abstract:
The paper is a pre-use evaluation of grammar activities in three primary English course books (two of which are international primary English course books and the other a popular Nigerian primary English course book). The titles are - Cambridge Global English, Collins International Primary English, and Nigeria Primary English – Primary English. Grammar points and grammar activities in the three-course books were identified, grouped, and evaluated. The grammar activity which was most common in the course books, simple past tense, was chosen for evaluation, and the units which present simple past tense activities were selected to evaluate the extent to which the treatment of simple past tense in each of the course books help the young learners of English as a second language in Nigeria, aged 8 – 11, level A1 to A2, who lack the basic grammatical knowledge, to know grammar/communicate effectively. A bespoke checklist was devised, through the modification of existing checklists for the purpose of the evaluation, to evaluate the extent to which the grammar activities promote the communicative effectiveness of Nigerian learners of English as a second language. The results of the evaluation and the analysis of the data reveal that the treatment of grammar, especially the treatment of the simple past tense, is evidently insufficient. While Cambridge Global English’s, and Collins International Primary English’s treatment of grammar, the simple past tense, is underpinned by state-of-the-art theories of learning, language learning theories, second language learning principles, second language curriculum-syllabus design principles, grammar learning and teaching theories, the grammar load is insignificantly low, and the grammar tasks do not promote creative grammar practice sufficiently. Nigeria Primary English – Primary English, on the other hand, treats grammar, the simple past tense, in the old-fashioned direct way. The book does not favour the communicative language teaching approach; no opportunity for learners to notice and discover grammar rules for themselves, and the book lacks the potency to promote creative grammar practice. The research and its findings, therefore, underscore the need to improve grammar contents and increase grammar activity types which engage learners effectively and promote sufficient creative grammar practice in EFL and ESL material design and development.Keywords: evaluation, activity, second language, activity-types, creative grammar practice
Procedia PDF Downloads 818291 Social Appearance Concerns among College Students
Authors: Koninika Mukherjee, Dilwar Hussain
Abstract:
Introduction: One of the most prevalent psychopathologies among the youth is social anxiety. The presence of comorbid disorders further complicates diagnosis and treatment. One of the most commonly co-occurring disorders, along with social anxiety, is related to eating behavior. Objective: Identifying the risk and protective factors and the mechanism through which the effect of these disorders might help in treatment and prevention. So, the stated objective of the present study is to investigate the role of fear of negative evaluation and social appearance anxiety in the relationship of parental bonding with social anxiety and comorbid disordered eating. Method: A cross-sectional study was conducted with 411 Indian undergraduates. Data collection was done with the help of self-report measures like the social interaction anxiety scale, parental bonding instrument, brief fear of negative evaluation, social appearance anxiety scale, and the eating attitudes test. SPSS Amos 22.0 version was used for path analyses. Results: Out of the different dimensions of parental bonding, only maternal care and the father’s granting of behavioural freedom proved significant in the development and maintenance of social anxiety and disordered eating behaviour and symptoms. Fear of negative evaluation and social appearance anxiety mediated the impact of the mother’s care on social anxiety and comorbid disordered eating. However, only fear of negative evaluation seemed to mediate the effect of paternal granting of behavioral freedom on social anxiety and comorbid issues. Implications: One of the vital contributions of this study is looking at perceived maternal and paternal bonding separately in the path model. Identifying parenting dimensions significantly related to social anxiety and comorbid disorders can aid in establishing consensus around operational definitions and in the formulation of comprehensive assessments. Future Directions: Future research can include both participant and parental perceptions of parental bonding.Keywords: social anxiety, disordered eating, fear of negative evaluation, social appearance anxiety
Procedia PDF Downloads 678290 Towards A New Maturity Model for Information System
Authors: Ossama Matrane
Abstract:
Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.Keywords: information system, maturity models, information security management, OPM3, IT governance
Procedia PDF Downloads 4478289 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 1218288 Evaluation of JCI Accreditation for Medical Technology in Saudi Arabian Hospitals: A Study Case of PSMMC
Authors: Hamad Albadr
Abstract:
Joint Commission International (JCI) accreditation process intent to improve the safety and quality of care in the international community through the provision of education, publications, consultation, and evaluation services. These standards apply to the entire organization as well as to each department, unit, or service within the organization. Medical Technology that contains both medical equipment and devices, is an essential part of health care. Appropriate management of equipment maintenance for ensuring medical technology safe, the equipment life is maximized, and the total costs are minimized. JCI medical technology evaluation and accreditation use standards, intents, and measurable elements. The paper focuses on evaluation of JCI standards for medical technology in Saudi Arabian hospitals: a Study Case of PSMMC that define the performance expectation, structures, or functions that must be in place for a hospital to be accredited by JCI through measurable elements that indicate a score during the survey process that identify the requirements for full compliance with the standard specially through Facility Management and Safety (FMS) section that require the hospital establishes and implements a program for inspecting, testing, and maintaining medical technology and documenting the results, to ensure that medical technology is available for use and functioning properly, the hospital performs and documents; an inventory of medical technology; regular inspections of medical technology; testing of medical technology according to its use and manufacturers’ requirements; and performance of preventive maintenance.Keywords: joint commission international (JCI) accreditation, medical technology, Saudi Arabia, Saudi Arabian hospitals
Procedia PDF Downloads 5578287 [Keynote Speech]: Competitive Evaluation of Power Plants in Energy Policy
Authors: Beril Tuğrul
Abstract:
Electrical energy is the most important form of energy and electrical power plants have highest impact factor in energy policy. This study is in relation with evaluation of various power plants including fossil fuels, nuclear and renewable energy based power plants. The power plants evaluated with regard to their overall impact that considered for establishing of the plants. Both positive and negative impacts of power plant operation are compared view of different arguments. Then calculate the impact factor by using variation linear extrapolation for each argument. With this study, power plants assessed with the different point of view and clarified objectively. Procedia PDF Downloads 5248286 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 3848285 A Practical and Efficient Evaluation Function for 3D Model Based Vehicle Matching
Authors: Yuan Zheng
Abstract:
3D model-based vehicle matching provides a new way for vehicle recognition, localization and tracking. Its key is to construct an evaluation function, also called fitness function, to measure the degree of vehicle matching. The existing fitness functions often poorly perform when the clutter and occlusion exist in traffic scenarios. In this paper, we present a practical and efficient fitness function. Unlike the existing evaluation functions, the proposed fitness function is to study the vehicle matching problem from both local and global perspectives, which exploits the pixel gradient information as well as the silhouette information. In view of the discrepancy between 3D vehicle model and real vehicle, a weighting strategy is introduced to differently treat the fitting of the model’s wireframes. Additionally, a normalization operation for the model’s projection is performed to improve the accuracy of the matching. Experimental results on real traffic videos reveal that the proposed fitness function is efficient and robust to the cluttered background and partial occlusion.Keywords: 3D-2D matching, fitness function, 3D vehicle model, local image gradient, silhouette information
Procedia PDF Downloads 3998284 Cross-Cultural Variations in Creative Perception Modulate Creative Performance
Authors: Anatoliy Kharkhurin
Abstract:
The study argues that variations in creative performance may be stipulated by cross-cultural differences in perception of the creativity construct. In Experiment 1, 50 Russian and 50 Emirati college students received structured imagination test that requires producing a drawing of an alien creature. In Experiment 2, 53 Russian and 53 Emirati college students (different from Experiment 1) on 5-point Likert-type scale evaluated the level of creativity of the drawings produced in the Experiment I. Repeated-measure ANOVA revealed an interaction between the country where the drawings were produced and the country where they were evaluated. Russians evaluated their country mates’ drawings as more creative than the Emiratis evaluated their country mates’ drawings. Regression analysis revealed that the creativity level of the drawings was positively predicted by the Russians’ evaluation and negatively predicted by the Emiratis’ evaluation. Finally, the evaluation of the drawings by the Russians predicted divergent thinking performance.Keywords: creativity, culture, cross-cultural, perception, production
Procedia PDF Downloads 3318283 Climate Smart Agriculture: Nano Technology in Solar Drying
Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu
Abstract:
Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.Keywords: energy, renewable energy, solar collector, solar drying
Procedia PDF Downloads 2258282 Integrated Farming Barns as a Strategy for National Food Security
Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif
Abstract:
The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.Keywords: agriculture, self-sufficiency, technology, productivity
Procedia PDF Downloads 2498281 Identifying the Phases of Indian Agriculture Towards Desertification: An Introspect of Karnataka State, India
Authors: Arun Das
Abstract:
Indian agriculture is acclaimed from the dates of Indus civilization (2500 BC). Since this time until the day, there were tremendous expansion in terms of space and technology has taken place. Abrupt growth in technology took place past one and half century. Consequent to this development, the land which was brought under agriculture in the initial stages of introducing agriculture for the first time, that land is not possessing the same physical condition. Either it has lost the productive capacity or modified into semi agriculture land. On the grounds of its capacity and interwoven characteristics seven phases of agriculture scenario has been identified. Most of the land is on the march of desertification. Identifying the stages and the phase of the agriculture scenario is most relevant from the point of view of food security at regional, national and at global level. Secondly decisive measure can put back the degenerating environmental condition into arrest. GIS and Remote sensing applications have been used to identify the phases of agriculture.Keywords: agriculture phases, desertification, deforestation, foods security, transmigration
Procedia PDF Downloads 4338280 N-Heptane as Model Molecule for Cracking Catalyst Evaluation to Improve the Yield of Ethylene and Propylene
Authors: Tony K. Joseph, Balasubramanian Vathilingam, Stephane Morin
Abstract:
Currently, the refiners around the world are more focused on improving the yield of light olefins (propylene and ethylene) as both of them are very prominent raw materials to produce wide spectrum of polymeric materials such as polyethylene and polypropylene. Henceforth, it is desirable to increase the yield of light olefins via selective cracking of heavy oil fractions. In this study, zeolite grown on SiC was used as the catalyst to do model cracking reaction of n-heptane. The catalytic cracking of n-heptane was performed in a fixed bed reactor (12 mm i.d.) at three different temperatures (425, 450 and 475 °C) and at atmospheric pressure. A carrier gas (N₂) was mixed with n-heptane with ratio of 90:10 (N₂:n-heptane), and the gaseous mixture was introduced into the fixed bed reactor. Various flow rate of reactants was tested to increase the yield of ethylene and propylene. For the comparison purpose, commercial zeolite was also tested in addition to Zeolite on SiC. The products were analyzed using an Agilent gas chromatograph (GC-9860) equipped with flame ionization detector (FID). The GC is connected online with the reactor and all the cracking tests were successfully reproduced. The entire catalytic evaluation results will be presented during the conference.Keywords: cracking, catalyst, evaluation, ethylene, heptane, propylene
Procedia PDF Downloads 1368279 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System
Authors: Cara Williams
Abstract:
In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.Keywords: disability, employment, social security, welfare
Procedia PDF Downloads 1688278 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence
Procedia PDF Downloads 4508277 Impression Evaluation by Design Change of Anthropomorphic Agent
Authors: Kazuko Sakamoto
Abstract:
Anthropomorphic agents have been successful in areas where there are many human interactions, such as education and medical care. The persuasive effect is also expected in e-shopping sites on the web. This indicates that customer service is not necessarily human but can play that role. However, the 'humanity' in anthropomorphism sometimes has a risk of working negatively. In general, as the appearance of anthropomorphic agents approaches humans, it is thought that their affinity with humans increases. However, when the degree of similarity reaches a certain level, it gives the user a weird feeling. This is the 'eerie valley' phenomenon. This is a concept used in the world of robotics, but it seems to be applicable to anthropomorphic agents such as characters. Then what kind of design can you accept as an anthropomorphic agent that gives you a feeling of friendliness or good feeling without causing discomfort or fear to people? This study focused on this point and examined what design and characteristics would be effective for marketing communication. As a result of the investigation, it was found that there is no need for gaze and blinking, the size of the eyes is normal or large, and the impression evaluation is higher when the structure is as simple as possible. Conversely, agents with high eye-gaze and white-eye ratios had low evaluations, and the negative impact on eye-gaze was particularly large.Keywords: anthropomorphicgents, design evaluation, marketing communication, customer service
Procedia PDF Downloads 1138276 Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence
Authors: Feisal Khudher Mahmood, Abdul Samad Rahman Sultan
Abstract:
Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system.Keywords: internal displacement, Iraq, ISIS, human security, human rights, GIS, spatial-statical analysis
Procedia PDF Downloads 5258275 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 4218274 Parent’s Evaluation of the Services Offered to Their Children with Autism in UAE Centres
Authors: Mohammad Ali Fteiha, Ghanem Al Bustami
Abstract:
The study aimed to identify the assessment of parents of children with Autism for services provided by the Center for special care in the United Arab Emirates, in terms of quality, comprehensive and the impact of some factors related to the diagnosis and place of service provision and efficient working procedures of service and the child age. In order to achieve the objective of the study, researchers used Parent’s Satisfaction Scale, and Parents Evaluation of Services Effectiveness, both the scale and the parents reports provided with accepted level of validity and reliability. Sample includes 300 families of children with Autism receiving educational and rehabilitation services, treatment and support services in both governmental and private centers in United Arab Emirates. ANOVA test was used through SPSS program to analyze the collected data. The results of the study have indicated that there are significant differences in the assessment of services provided by centers due to a place of service, the nature of the diagnosis, child's age at the time of the study, as well as statistically significance differences due to age when first diagnosed. The results also showed positive evaluation for the good level of services as international standard, and the quality of these services provided by autism centers in the United Arab Emirates, especially in governmental centers. At the same time, the results showed the presence of many needs problems faced by the parents do not have appropriate solutions. Based on the results the recommendations were stated.Keywords: autism, evaluation, diagnosis, parents, autism programs, supportive services, government centers, private centers
Procedia PDF Downloads 5588273 Switched Uses of a Bidirectional Microphone as a Microphone and Sensors with High Gain and Wide Frequency Range
Authors: Toru Shionoya, Yosuke Kurihara, Takashi Kaburagi, Kajiro Watanabe
Abstract:
Mass-produced bidirectional microphones have attractive characteristics. They work as a microphone as well as a sensor with high gain over a wide frequency range; they are also highly reliable and economical. We present novel multiple functional uses of the microphones. A mathematical model for explaining the high-pass-filtering characteristics of bidirectional microphones was presented. Based on the model, the characteristics of the microphone were investigated, and a novel use for the microphone as a sensor with a wide frequency range was presented. In this study, applications for using the microphone as a security sensor and a human biosensor were introduced. The mathematical model was validated through experiments, and the feasibility of the abovementioned applications for security monitoring and the biosignal monitoring were examined through experiments.Keywords: bidirectional microphone, low-frequency, mathematical model, frequency response
Procedia PDF Downloads 5458272 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security
Authors: Felix O. Akinboyewa
Abstract:
To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.Keywords: consolidation, democracy, peace, security, terrorism, violence
Procedia PDF Downloads 1248271 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 1488270 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 2908269 Controller Design and Experimental Evaluation of a Motorized Assistance for a Patient Transfer Floor Lift
Authors: Donatien Callon, Ian Lalonde, Mathieu Nadeau, Alexandre Girard
Abstract:
Patient transfer is a challenging, critical task because it exposes caregivers to injury risks. Available transfer devices, like floor lifts, lead to improvements but are far from perfect. They do not eliminate the caregivers’ risk of musculoskeletal disorders, and they can be burdensome to use due to their poor maneuverability. This paper presents a new motorized floor lift with a single central motorized wheel connected to an instrumented handle. Admittance controllers are designed to 1) improve the device maneuverability, 2) reduce the required caregiver effort, and 3) ensure the security and comfort of patients. Two controller designs, one with a linear admittance law and a non-linear admittance law with variable damping, were developed and implemented on a prototype. Tests were performed on seven participants to evaluate the performance of the assistance system and the controllers. The experimental results show that 1) the motorized assistance with the variable damping controller improves maneuverability by 28%, 2) reduces the amount of effort required to push the lift by 66%, and 3) provides the same level of patient comfort compared to a standard unassisted floor lift.Keywords: floor lift, human robot interaction, admittance controller, variable admittance
Procedia PDF Downloads 1118268 Exploring Students’ Self-Evaluation on Their Learning Outcomes through an Integrated Cumulative Grade Point Average Reporting Mechanism
Authors: Suriyani Ariffin, Nor Aziah Alias, Khairil Iskandar Othman, Haslinda Yusoff
Abstract:
An Integrated Cumulative Grade Point Average (iCGPA) is a mechanism and strategy to ensure the curriculum of an academic programme is constructively aligned to the expected learning outcomes and student performance based on the attainment of those learning outcomes that is reported objectively in a spider web. Much effort and time has been spent to develop a viable mechanism and trains academics to utilize the platform for reporting. The question is: How well do learners conceive the idea of their achievement via iCGPA and whether quality learner attributes have been nurtured through the iCGPA mechanism? This paper presents the architecture of an integrated CGPA mechanism purported to address a holistic evaluation from the evaluation of courses learning outcomes to aligned programme learning outcomes attainment. The paper then discusses the students’ understanding of the mechanism and evaluation of their achievement from the generated spider web. A set of questionnaires were distributed to a group of students with iCGPA reporting and frequency analysis was used to compare the perspectives of students on their performance. In addition, the questionnaire also explored how they conceive the idea of an integrated, holistic reporting and how it generates their motivation to improve. The iCGPA group was found to be receptive to what they have achieved throughout their study period. They agreed that the achievement level generated from their spider web allows them to develop intervention and enhance the programme learning outcomes before they graduate.Keywords: learning outcomes attainment, iCGPA, programme learning outcomes, spider web, iCGPA reporting skills
Procedia PDF Downloads 208