Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4445

Search results for: security safe

3245 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 71
3244 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 72
3243 Women Perception of Spatial Safety Relating to Working in Historic Cairo’s Retail Street Markets

Authors: Toka M. Abufarag

Abstract:

This research primarily studies the correlation between the existence of different spatial factors in relation to the perception of females towards safely participating in the labor force within selected areas of economic bustle in Historic Cairo. This research measures the following independent variables: (1) perception regarding spatial safety on the street as controlled by street network, (2) vegetation as a facilitator and inhibitor of feeling safe in public places, and (3) outdoor lighting; in relation to the following dependent variable: the perception of females towards safely participating in the labor force in Historic Cairo. The objective of this research lies within adding to the design guidelines of urban design and planning in terms of design recommendations, making them more inclusive, especially those dealing with conserving and enhancing the built environment of old and historic cities. It is hypothesized that a balanced male-to-female ratio in terms of street activity, increased visibility of street in terms of its volume, a decrease in street obstacles, creation of open sighted vegetation, and increased visibility due to proper lighting will show up as positive response relating to the female perception of safety. The site chosen as an area to host this exercise of data collection is Al-Ataba. The site is within the borders of Historic Cairo and was chosen for two reasons: firstly, it provides a major source of economic bustle in Historic Cairo; and secondly, it hosts retail economic activities. This is a cross-sectional study. The data collected will consist of three parts: (1) observations by the researcher regarding the percentage of female participation, as well as perception of females on site, (2) interviews with women working on-site regarding the percentage of female participation, as well as their perception on participating, and (3) an anonymous online survey that studies the perception of a random sample of women towards the site as a place to exist in. The survey will aid in producing design recommendations on how to design an open 'souk' that suits women’s perception of a safe space.

Keywords: urban design, women empowerment, safety perception, street markets, historic Cairo

Procedia PDF Downloads 132
3242 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 38
3241 Phytochemicals Quatification, Trace Metal Accumulation Pattern and Contamination Risk Assessment of Different Variety of Tomatoes Cultivated on Municipal Waste Sludge Treated Soil

Authors: Mathodzi Nditsheni, Olawole Emmanuel Aina, Joshua Oluwole Olowoyo

Abstract:

The ever-increasing world population is putting extreme pressure on the already limited agricultural resources for food production. Different soil enhancers were introduced by famers to meet the need of the ever-increasing population demand for food. One of the soil enhancers is the municipal waste sludge. This research investigated the differences in the concentrations of trace metals and levels of phytochemicals in four different tomato varieties cultivated on soil treated with municipal waste sludge in Pretoria, South Africa. Fruits were harvested at maturity and analyzed for trace metals and phytochemicals contents using Inductively Coupled Plasma Optical Emission Spectrometry (ICP-OES) and a High-Performance Liquid Chromatography (HPLC) respectively. A one-way analysis of variance (ANOVA) was used to determine the differences in the concentrations of trace metals and phytochemical from different tomato varieties were significant. From the study, Rodade tomato bioaccumulated the highest concentrations of Mn, Cr, Cu and Ni, Roma bioaccumulated the highest concentrations of, Cd, Fe and Pb while Heinz bioaccumulated the highest concentrations of As and Zn. Cherry tomato on the other hand, recorded the lowest concentrations for most metals, Cd, Cr, Cu, Mn, Ni, Pb and Zn. The results of the study further showed that phenolic and flavonoids content were higher in the Solanum lycopersicum fruit grown in soils treated with municipal waste sludge. The study also showed that there was an inverse relationship between the levels of trace metals and phytochemicals. The calculated contamination factor values of trace metals like Cr, Cu, Pb and Zn were above the safe value of 1 which indicated that the tomato fruits may be unsafe for human consumption. However, the contamination factor values for the remaining trace metals were well below the safe value of 1. From the results obtained either for the control group or the treatment, the tomato varieties used in the study, bioaccumulated the toxic trace metals in their fruits and some of the values obtained were higher than the acceptable limit, which may then imply that the varieties of tomato used in this study bio accumulated the toxic trace metals from the soil, hence care should be taken when these tomato varieties are either cultivated or harvested from polluted areas

Keywords: trace metals, flavonoids, phenolics, waste sludge, tomato, contamination factors

Procedia PDF Downloads 76
3240 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 271
3239 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 342
3238 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 322
3237 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 394
3236 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle

Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang

Abstract:

The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.

Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids

Procedia PDF Downloads 274
3235 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 347
3234 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 200
3233 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 494
3232 Diagnostic Contribution of the MMSE-2:EV in the Detection and Monitoring of the Cognitive Impairment: Case Studies

Authors: Cornelia-Eugenia Munteanu

Abstract:

The goal of this paper is to present the diagnostic contribution that the screening instrument, Mini-Mental State Examination-2: Expanded Version (MMSE-2:EV), brings in detecting the cognitive impairment or in monitoring the progress of degenerative disorders. The diagnostic signification is underlined by the interpretation of the MMSE-2:EV scores, resulted from the test application to patients with mild and major neurocognitive disorders. The original MMSE is one of the most widely used screening tools for detecting the cognitive impairment, in clinical settings, but also in the field of neurocognitive research. Now, the practitioners and researchers are turning their attention to the MMSE-2. To enhance its clinical utility, the new instrument was enriched and reorganized in three versions (MMSE-2:BV, MMSE-2:SV and MMSE-2:EV), each with two forms: blue and red. The MMSE-2 was adapted and used successfully in Romania since 2013. The cases were selected from current practice, in order to cover vast and significant neurocognitive pathology: mild cognitive impairment, Alzheimer’s disease, vascular dementia, mixed dementia, Parkinson’s disease, conversion of the mild cognitive impairment into Alzheimer’s disease. The MMSE-2:EV version was used: it was applied one month after the initial assessment, three months after the first reevaluation and then every six months, alternating the blue and red forms. Correlated with age and educational level, the raw scores were converted in T scores and then, with the mean and the standard deviation, the z scores were calculated. The differences of raw scores between the evaluations were analyzed from the point of view of statistic signification, in order to establish the progression in time of the disease. The results indicated that the psycho-diagnostic approach for the evaluation of the cognitive impairment with MMSE-2:EV is safe and the application interval is optimal. The alternation of the forms prevents the learning phenomenon. The diagnostic accuracy and efficient therapeutic conduct derive from the usage of the national test norms. In clinical settings with a large flux of patients, the application of the MMSE-2:EV is a safe and fast psycho-diagnostic solution. The clinicians can draw objective decisions and for the patients: it doesn’t take too much time and energy, it doesn’t bother them and it doesn’t force them to travel frequently.

Keywords: MMSE-2, dementia, cognitive impairment, neuropsychology

Procedia PDF Downloads 517
3231 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 432
3230 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 212
3229 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 453
3228 Incorporation of Safety into Design by Safety Cube

Authors: Mohammad Rajabalinejad

Abstract:

Safety is often seen as a requirement or a performance indicator through the design process, and this does not always result in optimally safe products or systems. This paper suggests integrating the best safety practices with the design process to enrich the exploration experience for designers and add extra values for customers. For this purpose, the commonly practiced safety standards and design methods have been reviewed and their common blocks have been merged forming Safety Cube. Safety Cube combines common blocks for design, hazard identification, risk assessment and risk reduction through an integral approach. An example application presents the use of Safety Cube for design of machinery.

Keywords: safety, safety cube, product, system, machinery, design

Procedia PDF Downloads 252
3227 The Provision of a Safe Face-to-Face Teaching Program for Final Year Medical Students during the COVID-19 Pandemic

Authors: Rachel Byrne

Abstract:

Background: Due to patient and student safety concerns, combined with clinical teachers being redeployed to clinical practice, COVID-19 has resulted in a reduction in face-to-face teaching sessions for medical students. Traditionally such sessions are particularly important for final year medical students, especially in preparing for their final practical exams. A reduced student presence on the wards has also resulted in fewer opportunities for junior doctors to provide teaching sessions. This has implications for junior doctors achieving their own curriculum outcomes for teaching, as well as potentially hindering the development of a future interest in medical education. Aims: The aims of the study are 1) To create a safe face-to-face teaching environment during COVID-19 which focussed on exam preparation for final year medical students, 2) To provide a platform for doctors to gain teaching experience, 3 ) to enable doctors to gain feedback or assessments on their teaching, 4) To create beginners guide to designing a new teaching program for future junior doctors. Methods: We created a program of timed clinical stations consisting of four sessions every five weeks during the student’s medicine attachment. Each session could be attended by 6 students and consisted of 6 stations ran by junior doctors, with each station following social distancing and personal protective equipment requirements. Junior doctors were asked to design their own stations. The sessions ran out-of-hours on weekday evenings and were optional for the students. Results: 95/95 students and 20/40 doctors involved in the programme completed feedback. 100% (n=95) of students strongly agreed/agreed that sessions were aimed at an appropriate level and provided constructive feedback. 100% (n=95) of students stated they felt more confident in their abilities and would recommend the session to peers. 90% (n=18) of the teachers strongly agreed/agreed that they felt more confident in their teaching abilities and that the sessions had improved their own medical knowledge. 85% (n=17) of doctors had a teaching assessment completed, and 83% (n=16) said the program had made them consider a career in medical education. The difficulties of creating such a program were highlighted throughout, and a beginner’s guide was created with the hopes of helping future doctors who are interested in teaching address the common obstacles.

Keywords: COVID-19, education, safety, medical

Procedia PDF Downloads 195
3226 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 139
3225 Sustainable Development in Orthodontics: Orthodontic Archwire Waste

Authors: Saarah Juman, Ilona Johnson, Stephen Richmond, Brett Duane, Sheelagh Rogers

Abstract:

Introduction: Researchers suggest that within 50 years or less, the available supply of a range of metals will be exhausted, potentially leading to increases in resource conflict and largescale production shortages. The healthcare, dental and orthodontic sectors will undoubtedly be affected as stainless steel instruments are generally heavily relied on. Although changing orthodontic archwires are unavoidable and necessary to allow orthodontic tooth movement through the progression of an archwire sequence with fixed appliances, they are thought to be manufactured in excess of what is needed. Furthermore, orthodontic archwires require trimming extraorally to allow safe intraoral insertion, thus contributing to unnecessary waste of natural resources. Currently, there is no evidence to support the optimisation of archwire length according to orthodontic fixed appliance stage. As such, this study aims to quantify archwire excess (extraoral archwire trimmings) for different stages of orthodontic fixed appliance treatment. Methodology: This prospective, observational, quantitative study observed trimmings made extraorally against pre-treatment study models by clinicians over a 3-month period. Archwires were categorised into one of three categories (initial aligning, sequence, working/finishing arcwhires) within the orthodontic fixed appliance archwire sequence. Data collection included archwire material composition and the corresponding length and weight of excess archwire. Data was entered using a Microsoft Excel spreadsheet and imported into statistical software to obtain simple descriptive statistics. Results: Measurements were obtained for a total of 144 archwires. Archwire materials included nickel titanium and stainless steel. All archwires observed required extraorally trimming to allow safe intraoral insertion. The manufactured lengths of orthodontic initial aligning, sequence, and working/finishing arcwhires were at least 31%, 26%, and 39% in excess, respectively. Conclusions: Orthodontic archwires are manufactured to be excessively long at all orthodontic archwire sequence stages. To conserve natural resources, this study’s findings support the optimisation of orthodontic archwire lengths by manufacturers according to the typical stages of an orthodontic archwire sequence.

Keywords: archwire, orthodontics, sustainability, waste

Procedia PDF Downloads 202
3224 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 196
3223 Food Package Design To Preserve The Food Temperature

Authors: Sugiono, Wuwus Ardiatna, Himma Firdaus, Nanang Kusnandar, Bayu Utomo, Jimmy Abdel Kadar

Abstract:

This study was aimed to explore the best design of single-used hot food packaging through various package designs. It examined how designed packages keep some local hot food reasonably longer than standard packages. The food packages were realized to consist of the outer and the inner layers of food-grade materials. The packages were evaluated to keep the hot food decreased to the minimum temperature of safe food. This study revealed a significant finding that the transparent plastic box with thin film aluminum foil is the best package.

Keywords: hot food, local food, one used, packaging, aluminum foil

Procedia PDF Downloads 153
3222 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 67
3221 The Analysis and Simulation of TRACE in the Ultimate Response Guideline for Chinshan BWR/4 Nuclear Power Plant

Authors: J. R. Wang, H. T. Lin, H. C. Chen, C. Shih, S. W. Chen, S. C. Chiang, C. C. Liu

Abstract:

In this research, TRACE model of Chinshan BWR/4 Nuclear Power Plant (NPP) has been developed for the simulation and analysis of Ultimate Response Guideline (URG). The main actions of URG are the depressurization and low pressure water injection of reactor and containment venting. This research focuses to verify the URG efficiency under Fukushima-like conditions. Trace analysis results show that the URG can keep the PCT below the criteria 1088.7 K under Fukushima-like conditions. It indicated that Chinshan NPP was safe.

Keywords: BWR, trace, safety analysis, URG

Procedia PDF Downloads 623
3220 Opportunities in Self-care Abortion and Telemedicine: Findings from a Study in Colombia

Authors: Paola Montenegro, Maria de los Angeles Balaguera Villa

Abstract:

In February 2022 Colombia achieved a historic milestone in ensuring universal access to abortion rights with ruling C-055 of 2022 decriminalising abortion up to 24 weeks of gestation. In the context of this triumph and the expansion of telemedicine services in the wake of the COVID-19 pandemic, this research studied the acceptability of self-care abortion in young people (13 - 28 years) through a telemedicine service and also explored the primary needs that should be the focus of such care. The results shine light on a more comprehensive understanding of opportunities and challenges of teleabortion practices in a context that combines overall higher access to technology and low access to reliable information of safe abortion, stigma, and scarcity especially felt by transnational migrants, racialised people, trans men and non-binary people. Through a mixed methods approach, this study collected 5.736 responses to a virtual survey disseminated nationwide in Colombia and 47 in-person interviews (24 of them with people who were assigned female at birth and 21 with local key stakeholders in the abortion ecosystem). Quantitative data was analyzed using Stata SE Version 16.0 and qualitative analysis was completed through NVivo using thematic analysis. Key findings of the research suggest that self-care abortion is practice with growing acceptability among young people, but important adjustments must be made to meet quality of care expectations of users. Elements like quick responses from providers, lower costs, and accessible information were defined by users as decisive factors to choose over the abortion service provider. In general, the narratives in participants about quality care were centred on the promotion of autonomy and the provision of accompaniment and care practices, also perceived as transformative and currently absent of most health care services. The most staggering findings from the investigation are related to current barriers faced by young people in abortion contexts even when the legal barriers have: high rates of scepticism and distrust associated with pitfalls of telehealth and structural challenges associated with lacking communications infrastructure, among a few of them. Other important barriers to safe self-care abortion identified by participants surfaced like lack of privacy and confidentiality (especially in rural areas of the country), difficulties accessing reliable information, high costs of procedures and expenses related to travel costs or having to cease economic activities, waiting times, and stigma are among the primary barriers to abortion identified by participants. Especially in a scenario marked by unprecedented social, political and economic disruptions due to the COVID-19 pandemic, the commitment to design better care services that can be adapted to the identities, experiences, social contexts and possibilities of the user population is more necessary than ever. In this sense, the possibility of expanding access to services through telemedicine brings us closer to the opportunity to rethink the role of health care models in transforming the role of individuals and communities to make autonomous, safe and informed decisions about their own health and well-being.

Keywords: contraception, family planning, premarital fertility, unplanned pregnancy

Procedia PDF Downloads 75
3219 Penetration Depth Study of Linear Siloxanes through Human Skin

Authors: K. Szymkowska, K. Mojsiewicz- Pieńkowska

Abstract:

Siloxanes are a common ingredients in medicinal products used on the skin, as well as cosmetics. It is widely believed that the silicones are not capable of overcoming the skin barrier. The aim of the study was to verify the possibility of penetration and permeation of linear siloxanes through human skin and determine depth penetration limit of these compounds. Based on the results it was found that human skin is not a barrier for linear siloxanes. PDMS 50 cSt was not identified in the dermis suggests that this molecular size of silicones (3780Da) is safe when it is used in the skin formulations.

Keywords: linear siloxanes, methyl siloxanes, skin penetration, skin permeation

Procedia PDF Downloads 406
3218 Employee Well-being in the Age of AI: Perceptions, Concerns, Behaviors, and Outcomes

Authors: Soheila Sadeghi

Abstract:

— The growing integration of Artificial Intelligence (AI) into Human Resources (HR) processes has transformed the way organizations manage recruitment, performance evaluation, and employee engagement. While AI offers numerous advantages—such as improved efficiency, reduced bias, and hyper-personalization—it raises significant concerns about employee well-being, job security, fairness, and transparency. The study examines how AI shapes employee perceptions, job satisfaction, mental health, and retention. Key findings reveal that: (a) while AI can enhance efficiency and reduce bias, it also raises concerns about job security, fairness, and privacy; (b) transparency in AI systems emerges as a critical factor in fostering trust and positive employee attitudes; and (c) AI systems can both support and undermine employee well-being, depending on how they are implemented and perceived. The research introduces an AI-employee well-being Interaction Framework, illustrating how AI influences employee perceptions, behaviors, and outcomes. Organizational strategies, such as (a) clear communication, (b) upskilling programs, and (c) employee involvement in AI implementation, are identified as crucial for mitigating negative impacts and enhancing positive outcomes. The study concludes that the successful integration of AI in HR requires a balanced approach that (a) prioritizes employee well-being, (b) facilitates human-AI collaboration, and (c) ensures ethical and transparent AI practices alongside technological advancement.

Keywords: artificial intelligence, human resources, employee well-being, job satisfaction, organizational support, transparency in AI

Procedia PDF Downloads 49
3217 Cyber Operational Design and Military Decision Making Process

Authors: M. Karaman, H. Catalkaya

Abstract:

Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.

Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state

Procedia PDF Downloads 591
3216 Eco-Survivalism and Nomadic Pastoralism: An Exploratory Study on the Dialectics of Herder-Farmer Conflict in Nigeria

Authors: Francis N. Okpaleke

Abstract:

The threat of Fulani herder militancy in Nigeria has led to a volatile security situation characterized by communal strife, arms proliferation, rural banditry, and insurgency. The exigency of this situation resonates in the eco-survivalist theory of farmer-herder conflict which holds that the herder deems the farmers’ unwarranted incursions into his grazing terrain as an effrontery that must reprised and a call to war. In spite of the rising incidence of Fulani militancy in Nigeria, only little is known concerning the phenomenon. The bulk of prevailing ideas on the subject has been largely and unnecessarily journalistic and anecdotal, lacking in intellectual depth, fecundity and rigour. The issue has remained scarcely documented by way of organized research. There is therefore a need for a systematic investigation that would leverage scholarly and policy insights on the subject which is the purpose of this study. The study will therefore, seek to examine the nexus between nomadic pastoralism and the incidence of herder-farmer conflicts in Nigeria with particular reference to the central region of the country. By means of qualitative descriptive analysis predicated on the theory of eco-violence, the paper explores the contemporary historical and structural drivers of this conflict, its relationship with the dynamics of climate change in Nigeria and its implication of human security in Nigeria. The paper also proffers theoretical and policy recommendations to mitigate the onto ward conflict.

Keywords: eco-survivalism, conflict, pastoralism, nomads

Procedia PDF Downloads 323