Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4424

Search results for: emotional security

3194 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 292
3193 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 31
3192 Undergraduates Learning Preferences: A Comparison of Science, Technology and Social Science Academic Disciplines in Relations to Teaching Designs and Strategies

Authors: Salina Budin, Shaira Ismail

Abstract:

Students learn effectively in a learning environment with a suitable teaching approach that matches their learning preferences. The main objective of the study is to examine the learning preferences amongst the students in the Science and Technology (S&T), and Social Science (SS) fields of study at the Universiti Teknologi Mara (UiTM), Pulau Pinang. The measurement instrument is based on the Dunn and Dunn Learning Styles which measure five elements of learning styles; environmental, sociological, emotional, physiological and psychological. Questionnaires are distributed amongst undergraduates in the Faculty of Mechanical Engineering and Faculty of Business Management. The respondents comprise of 131 diploma students of the Faculty of Mechanical Engineering and 111 degree students of the Faculty of Business Management. The results indicate that, both S&T and SS students share a similar learning preferences on the environmental aspect, emotional preferences, motivational level, learning responsibility, persistent level in learning and learning structure. Most of the S&T students are concluded as analytical learners and the majority of SS students are global learners. Both S&T and SS students are concluded as visual learners, preferred to be in an active mobility in a relaxing and enjoying mode with some light of refreshments during the learning process and exhibited reflective characteristics in learning. Obviously, the S&T students are considered as left brain dominant, whereas the SS students are right brain dominant. The findings highlighted that both categories of students exhibited similar learning preferences except on psychological preferences.

Keywords: learning preferences, Dunn and Dunn learning style, teaching approach, science and technology, social science

Procedia PDF Downloads 245
3191 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 349
3190 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 36
3189 Association of Sociodemographic Factors and Loneliness of Adolescents in China

Authors: Zihan Geng, Yifan Hou

Abstract:

Background: Loneliness is the feeling of being isolated, which is becoming increasingly common among adolescents. A cross-sectional study was performed to determine the association between loneliness and different demographics. Methods: To identify the presence of loneliness, the UCLA Loneliness Scale (Version 3) was employed. The "Questionnaire Star" in Chinese version, as the online survey on the official website, was used to distribute the self-rating questionnaires to the students in Beijing from Grade 7 to Grade 12. The questionnaire includes sociodemographic items and the UCLA Loneliness Scale. Results: Almost all of the participants exhibited “caseness” for loneliness, as defined by UCLA. Out of 266 questionnaires, 2.6% (7 in 266) students fulfilled the presence criteria for a low degree of loneliness. 29.7% (79 in 266) of adolescents met the criteria for a moderate degree of loneliness. Moreover, 62.8% (167 in 266) and 4.9% (13 in 266) of students fulfilled the presence criteria for a moderately high and high degree of loneliness, respectively. In the Pearson χ2 test, there were significant associations between loneliness and some demographic factors, including grade (P<0.001), the number of adults in the family (P=0.001), the evaluation of appearance (P=0.034), the evaluation of self-satisfaction (P<0.001), the love in family (P<0.001), academic performance (P=0.001) and emotional support from friends (P<0.001). In the multivariate logistic analysis, the number of adults (2 vs.≤1, OR=0.319, P=0.015), time spent on social media (≥4h vs. ≤1h, OR=4.862, P=0.029), emotional support of friends (more satisfied vs. dissatisfied, OR=0.363, P=0.027) were associated with loneliness. Conclusions: Our results suggest the relationship between loneliness and some sociodemographic factors, which raise the possibility to reduce the loneliness among adolescents. Therefore, the companionship of family, the encouragement from friends and regulating the time spent on social media may decrease the loneliness in adolescents.

Keywords: loneliness, adolescents, demographic factors, UCLA loneliness scale

Procedia PDF Downloads 77
3188 A Behavioral Approach of Impulse Buying: Application to Algerian Food Stores

Authors: Amel Graa, Maachou Dani El Kebir

Abstract:

This paper investigates the impulse buying behavior of Algerian consumer. In that purpose, we try to better understand processes underlying impulsive buying experiences by examining the theoretical framework and using Mehrabian and Russell’s structure. A model is then proposed and tested on a sample of 1500 shoppers who were recruited among customers of food stores. This model aims to explain the role of some situational variables, personal variables, variables linked to the product characteristics and emotional states on the impulse buying behavior. Following to this empirical study, it was possible to conclude that Algerian consumer has a weak tendency toward impulse buying of food products. The results indicate that seller guidance has a significant impact on the impulse buying, whereas the price of the product was negatively related. According to the results; perception of crowding was associated with scarcity and it was positively linked with impulse buying behavior. This study can help marketers determine the in-store factors that impact purely spontaneous purchases of items that otherwise would not end up in the shopping cart. Our research findings offer important information for benchmarking managerial expectations with regard to product selection and merchandising decisions. As futures perspectives, we propose new research areas related to the impulse buying behavior such as studying different types of stores (for example supermarket), or other types of product (clothing), or studying consumption of food products in religious month of Muslims (Ramadan).

Keywords: impulse buying, situational variables, personal variables, emotional states, PAD model of Merhabian and Russell, Algerian consumer

Procedia PDF Downloads 420
3187 Mindfulness, Acceptance and Meaning in Life for Adults with Cancer

Authors: Fernanda F. Zimmermann, Beverley Burrell, Jennifer Jordan

Abstract:

Introduction: Supportive care for people affected by cancer is recognised as a priority for research but yet there is little solid evidence of the effectiveness of psychological treatments for those with advanced cancer. The literature suggests that mindfulness-based interventions may be acceptable and beneficial for this population. This study aims to develop a mindfulness intervention to provide emotional support for advanced cancer population. The treatment package includes mindfulness meditation, developing an acceptance attitude and reflections on meaning in life. Methods: This study design is a one-group pre-post test with a mixed methods approach. Participants are recruited through public and private hospitals in Christchurch, NZ. Quantitative measures are the Acceptance and Action Questionnaire-II, Mindful Coping Scale and, the Meaning in Life Questionnaire. Qualitative semi-structured interviews enquire about emotional support before and after the diagnosis, participants’ thoughts about meaning in life, expectations and reflections on the mindfulness training. Qualitative data will be analysed using thematic analysis. Treatment consists of one to one 30 minutes session weekly for 4 weeks using a pre-recorded CD/podcast of the mindfulness training. This research is part of the presenter’s PhD study. Findings: This project is currently underway. The presenter will provide preliminary data on the acceptability of the mindfulness training package being delivered to participants along with the recruitment strategies. We anticipate that this novel treatment used as a self-management tool will reduce psychological distress and enable better coping for patients with advanced cancer.

Keywords: acceptance, cancer, meaning in life, mindfulness

Procedia PDF Downloads 353
3186 Creativity and Innovation in a Military Unit of South America: Decision Making Process, Socio-Emotional Climate, Shared Flow and Leadership

Authors: S. da Costa, D. Páez, E. Martínez, A. Torres, M. Beramendi, D. Hermosilla, M. Muratori

Abstract:

This study examined the association between creative performance, organizational climate and leadership, affectivity, shared flow, and group decision making. The sample consisted of 315 cadets of a military academic unit of South America. Satisfaction with the decision-making process during a creative task was associated with the usefulness and effectiveness of the ideas generated by the teams with a weighted average correlation of r = .18. Organizational emotional climate, positive and innovation leadership were associated with this group decision-making process r = .25, with shared flow, r = .29 and with positive affect felt during the performance of the creative task, r = .12. In a sequential mediational analysis positive organizational leadership styles were significantly associated with decision-making process and trough cohesion with utility and efficacy of the solution of a creative task. Satisfactory decision-making was related to shared flow during the creative task at collective or group level, and positive affect with flow at individual level.This study examined the association between creative performance, organizational climate and leadership, affectivity, shared flow, and group decision making. The sample consisted of 315 cadets of a military academic unit of South America. Satisfaction with the decision-making process during a creative task was associated with the usefulness and effectiveness of the ideas generated by the teams with a weighted average correlation of r = .18. Organizational emotional climate, positive and innovation leadership were associated with this group decision-making process r = .25, with shared flow, r = .29 and with positive affect felt during the performance of the creative task, r = .12. In a sequential mediational analysis positive organizational leadership styles were significantly associated with decision-making process and trough cohesion with utility and efficacy of the solution of a creative task. Satisfactory decision-making was related to shared flow during the creative task at collective or group level, and positive affect with flow at individual level.

Keywords: creativity, innovation, military, organization, teams

Procedia PDF Downloads 123
3185 Protecting the Democracy of Children through Sustainable Risk Management: An Investigation into Risk Assessment and Nature-Based Play

Authors: Molly Gerrish

Abstract:

This work explores the physical, emotional, social, and cognitive risks and benefits related to nature-based teaching and highlights the importance of promoting a sustainable workforce within early childhood programs. Assessing and managing risks can help programs reimagine their approach to teaching, learning, recruitment, family connectivity, and staff motivation. The importance of staff sustainability and motivation/engagement related to social justice and the environment will be discussed. We will explore ways to manage fears and limitations faced by early childhood programs regarding nature experiences and risky play in a variety of locations using a lens of place-based learning. We will also examine the alignment of sustainability and social-emotional development, mental health supports, social awareness, and risk assessment. The work will discuss the varied perceptions of risk in diverse areas and the impact on the early childhood workforce. Motivational theory and compassion resiliency are hallmarks of both recruiting and retaining high-quality early childhood educators; the work will discuss how to balance programmatic constraints and healthy motivation for students and teachers while empowering individuals to advocate for their mental health and well-being. Finally, the work will highlight the positive impact of nature-based teaching practices and the overall benefit to young children and their educators.

Keywords: child’s rights, inclusion, nature-based education, risk assessment

Procedia PDF Downloads 60
3184 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 145
3183 Speech Detection Model Based on Deep Neural Networks Classifier for Speech Emotions Recognition

Authors: Aisultan Shoiynbek, Darkhan Kuanyshbay, Paulo Menezes, Akbayan Bekarystankyzy, Assylbek Mukhametzhanov, Temirlan Shoiynbek

Abstract:

Speech emotion recognition (SER) has received increasing research interest in recent years. It is a common practice to utilize emotional speech collected under controlled conditions recorded by actors imitating and artificially producing emotions in front of a microphone. There are four issues related to that approach: emotions are not natural, meaning that machines are learning to recognize fake emotions; emotions are very limited in quantity and poor in variety of speaking; there is some language dependency in SER; consequently, each time researchers want to start work with SER, they need to find a good emotional database in their language. This paper proposes an approach to create an automatic tool for speech emotion extraction based on facial emotion recognition and describes the sequence of actions involved in the proposed approach. One of the first objectives in the sequence of actions is the speech detection issue. The paper provides a detailed description of the speech detection model based on a fully connected deep neural network for Kazakh and Russian. Despite the high results in speech detection for Kazakh and Russian, the described process is suitable for any language. To investigate the working capacity of the developed model, an analysis of speech detection and extraction from real tasks has been performed.

Keywords: deep neural networks, speech detection, speech emotion recognition, Mel-frequency cepstrum coefficients, collecting speech emotion corpus, collecting speech emotion dataset, Kazakh speech dataset

Procedia PDF Downloads 26
3182 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 146
3181 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 259
3180 The Balancing Act: India and Maldives in the Quest for Regional Prosperity

Authors: Arya S. S.

Abstract:

India is one of the powerful country in the world .India and Maldives having common interests in regional security and economic growth, this relationship has seen substantial change in recent years. This paper examines the complex dynamics of this bilateral relationship, emphasizing the careful balancing act that both countries perform in order to advance regional prosperity. It looks at historical connections, geopolitical factors, and current issues like economic cooperation, climate change, and marine security. The study highlights how India's involvement in the Maldives contributes to both bilateral ties and regional stability by examining important initiatives including trade agreements and infrastructure projects. It also discusses the effects of outside factors and the necessity for both nations to strategically manage their interests. In order to contribute to a more affluent and stable Indian Ocean area, this study ultimately seeks to shed light on how India and the Maldives may cooperate to promote sustainable development while tackling security issues. The India Maldives relation is very crucial in the regional stability of Indian ocean region. The initiatives like building infrastructure, giving financial support, and establishing the India-Maldives Friendship Bridge demonstrate India's dedication to Maldivian prosperity. In addition to boosting the Maldives' economy, these investments strengthen India's clout in the area, which is essential for preserving its maritime security interests in the face of growing Chinese dominance. Both India and China involved in a strategic tug of war in order to enhance their dominance in Maldives. There are difficulties with this collaboration including, political unrest in the Maldives has occasionally resulted in changes to foreign policy, particularly under regimes that support stronger ties with China. India has expressed concern about losing strategic footholds in the Indian Ocean as a result of China's extension of influence through debt diplomacy and infrastructure projects. India must therefore strike a balance between advancing its objectives and upholding Maldivian sovereignty as well as the goals of its people and government. In summary, the partnership between India and the Maldives is a complex balancing act that is marked by cultural links, security cooperation, and economic dependency. Both countries must negotiate the complexity of international relations as they work for regional prosperity, especially in light of both internal and external factors. India and the Maldives can strengthen their positions as key actors in the changing dynamics of the Indian Ocean by promoting cooperation and communication. This would not only protect their particular interests but also help create a stable and prosperous South Asian region.

Keywords: regional security, balancing act, debt trap diplomacy, strategic tug of war

Procedia PDF Downloads 16
3179 Effect of Online Mindfulness Training to Tertiary Students’ Mental Health: An Experimental Research

Authors: Abigaile Rose Mary R. Capay, Janne Ly Castillon-Gilpo, Sheila A. Javier

Abstract:

The transition to online learning has been a challenging feat on the mental health of tertiary students. This study investigated whether learning mindfulness strategies online would help in improving students’ imagination, conscientiousness, extraversion, agreeableness and emotional stability, as measured by the International Personality Item Pool (IPIP) Big Five Factor Markers, as well as their dispositional mindfulness as measured by the Mindfulness Attention Awareness Scale (MAAS). Fifty-two college students participated in the experiment. The 23 participants assigned to the treatment condition received 6-weekly experiential sessions of online mindfulness training and were advised to follow a daily mindfulness practice, while the 29 participants from the control group only received a 1-hour lecture. Scores were collected at pretest and posttest. Findings show that there was a significant difference in the pretest and posttest scores of students assigned in the treatment group, likewise medium effect sizes in the variables: dispositional mindfulness (t (22) = 2.64, p = 0.015, d = .550), extraversion (t (22) = 2.76, p = 0.011, d = 0.575), emotional stability (t (22) = 2.99, p = 0.007, d = .624), conscientiousness (t (22) = 2.74, p = 0.012, d = .572) and imagination (t (22) = 4.08, p < .001), but not for agreeableness (t (22) = 2.01, p = 0.057, d = .419). No significant differences were observed on the scores of the control group. Educational institutions are recommended to consider teaching basic mindfulness strategies to tertiary students, as a valuable resource in improving their mental health as they navigate through adjustments in online learning.

Keywords: mindfulness, school-based interventions, MAAS, IPIP Big Five Markers, experiment

Procedia PDF Downloads 58
3178 The Effects of Lighting Environments on the Perception and Psychology of Consumers of Different Genders in a 3C Retail Store

Authors: Yu-Fong Lin

Abstract:

The main purpose of this study is to explore the impact of different lighting arrangements that create different visual environments in a 3C retail store on the perception, psychology, and shopping tendencies of consumers of different genders. In recent years, the ‘emotional shopping’ model has been widely accepted in the consumer market; in addition to the emotional meaning and value of a product, the in-store ‘shopping atmosphere’ has also been increasingly regarded as significant. The lighting serves as an important environmental stimulus that influences the atmosphere of a store. Altering the lighting can change the color, the shape, and the atmosphere of a space. A successful retail lighting design can not only attract consumers’ attention and generate their interest in various goods, but it can also affect consumers’ shopping approach, behavior, and desires. 3C electronic products have become mainstream in the current consumer market. Consumers of different genders may demonstrate different behaviors and preferences within a 3C store environment. This study tests the impact of a combination of lighting contrasts and color temperatures in a 3C retail store on the visual perception and psychological reactions of consumers of different genders. The research design employs an experimental method to collect data from subjects and then uses statistical analysis adhering to a 2 x 2 x 2 factorial design to identify the influences of different lighting environments. This study utilizes virtual reality technology as the primary method by which to create four virtual store lighting environments. The four lighting conditions are as follows: high contrast/cool tone, high contrast/warm tone, low contrast/cool tone, and low contrast/warm tone. Differences in the virtual lighting and the environment are used to test subjects’ visual perceptions, emotional reactions, store satisfaction, approach-avoidance intentions, and spatial atmosphere preferences. The findings of our preliminary test indicate that female subjects have a higher pleasure response than male subjects in a 3C retail store. Based on the findings of our preliminary test, the researchers modified the contents of the questionnaires and the virtual 3C retail environment with different lighting conditions in order to conduct the final experiment. The results will provide information about the effects of retail lighting on the environmental psychology and the psychological reactions of consumers of different genders in a 3C retail store lighting environment. These results will enable useful practical guidelines about creating 3C retail store lighting and atmosphere for retailers and interior designers to be established.

Keywords: 3C retail store, environmental stimuli, lighting, virtual reality

Procedia PDF Downloads 390
3177 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 298
3176 Commitment Dynamics: Generational Variations in Romantic Relationships among Gen X, Millennials and Gen Z

Authors: Ispreha Bailung

Abstract:

Background: Romantic commitment has evolved across generations, influenced by societal, cultural, and technological changes. This study explores how Generation X, Millennials, and Gen Z perceive, develop, and sustain commitment, with a focus on family, society, and technology. The objectives are to uncover generational differences, identify barriers to commitment, and examine cultural influences, offering insights to foster healthier relationships in a shifting world. Method: A phenomenological approach was used to examine generational differences in romantic commitment dynamics. Fifteen participants (five from each generation) were recruited online. Inclusion criteria required participants to identify with a specified generation and have romantic relationship experience. Semi-structured interviews (60–90 minutes) were conducted, focusing on personal experiences, values, and technology's influence on commitment. Interviews were recorded, transcribed, and analyzed thematically. Ethical protocols ensured participant well-being and data integrity. Findings: Generational shifts in commitment were observed, with Gen X emphasizing traditional values like marriage and loyalty, Millennials balancing tradition with personal fulfillment, and Gen Z prioritizing autonomy and mental well-being. Technology, such as dating apps and social media, created option overload and skepticism about authenticity. Despite increasing individualization, family influence remained significant. Key barriers to commitment included emotional detachment, career priorities, and trust issues, reflecting a broader shift toward more flexible and individualized relationships. Conclusion: This study provides valuable insights into generational differences in commitment dynamics, highlighting shifts in how commitment is viewed and enacted. While the study contributes to understanding evolving perspectives, the findings are limited by a small sample size, potential cultural biases, and the short-term nature of the research, limiting generalizability. Future Implications: Future research should focus on cross-cultural and longitudinal studies to track changes in commitment perceptions. Examining digital communication’s impact on relationship satisfaction and exploring new frameworks for assessing relationship success will further inform understanding and policymaking in the context of evolving romantic dynamics.

Keywords: generational differences, commitment dynamics, romantic relationships, emotional compatibility, social media

Procedia PDF Downloads 0
3175 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 432
3174 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 155
3173 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 126
3172 Experiencing Scarred Body among Thai Women Living with Breast Cancer

Authors: Dusanee Suwankhong, Pranee Liamputtong

Abstract:

Breast surgery leaves undesirable scars to all women who experienced mastectomy, despite the fact that this could be a principle approach to save one life. This paper explores how Thai women living with breast cancer perceived and experienced a scarred body after breast surgery. In-depth interviews and drawing methods were employed among 20 women diagnosed with breast cancer. The interviewed data were analysed using thematic analysis method. The results showed that all women with breast cancer who underwent breast surgery perceived and experienced scar as a persisting and visible side-effect. This disfigurement appearance presented a negative image of feminine identity and led to emotional burdens among women. They responded to being scarred in different ways relating to their perceptions of body and changes. The older group had less embarrassed feelings towards being scarred comparing to the younger one. All women tried to seek means to cope with such physical impairment and keep balance life related to their condition. For example, they relied on Buddhism practice and tried to heal the keloid using natural products. Scars appeared to be an unpleasant effect for women who underwent breast mastectomy. Nurses and health care professionals in the local health service sectors need to pay close attention to how the women see the scarred body and their experiences of living with the distorted feminine appearance, and to provide sensitive support that meets the needs of these vulnerable women. The suitable supports can reduce the sense of embarrassment and increase their sense of self-confidence about their social femininity.

Keywords: breast surgery, emotional response, qualitative study, scars, Thai women

Procedia PDF Downloads 168
3171 Reasons for Adhesion of Membership: A Case Study of Brazilian Soccer Team

Authors: Alexandre Olkoski, Marcelo Curth

Abstract:

Football in Brazil is considered a passion, being the most popular sport in the country, both by the consumer public and by the means of communication that divulge it individually, when compared with other sports modalities. In the last two decades, the soccer teams have given greater importance to the management, since they understood that the same should be managed as a company, but with peculiarities related to the business. In this sense, Brazilian soccer clubs started to make bigger investments for the adhesion of fans in their social frames, allowing a greater need of understanding about the profile of this group of fans/clients. Thus, this work aims to understand the reasons that cause the fans to join the club and identify variables present in the process of intention to join the club. For that, a qualitative exploratory research was conducted, in which thirty-one membership of a soccer club from southern Brazil were interviewed. Based on the interviews, five categories were classified as emotional aspects (passion and love), cognitive aspects (easy access to the stadium and promotional values in tickets), external influences (family and friends), situational aspects (club moment) and aspects related to the event (engagement by modality). As results found in the analysis, it can be highlighted that the motivation of the majority of the respondents to become a member of the analyzed club, is related to the emotional aspects, such as passion and love. Thus, it is perceived that sport, in the case of soccer, generates in the involved ones (fans and leaders) different manifestations, suggesting that the management of this type of business has great complexity and should not be observed only by the spectrum of the club like a business.

Keywords: consumer behavior, marketing, membership, soccer

Procedia PDF Downloads 333
3170 Affects Associations Analysis in Emergency Situations

Authors: Joanna Grzybowska, Magdalena Igras, Mariusz Ziółko

Abstract:

Association rule learning is an approach for discovering interesting relationships in large databases. The analysis of relations, invisible at first glance, is a source of new knowledge which can be subsequently used for prediction. We used this data mining technique (which is an automatic and objective method) to learn about interesting affects associations in a corpus of emergency phone calls. We also made an attempt to match revealed rules with their possible situational context. The corpus was collected and subjectively annotated by two researchers. Each of 3306 recordings contains information on emotion: (1) type (sadness, weariness, anxiety, surprise, stress, anger, frustration, calm, relief, compassion, contentment, amusement, joy) (2) valence (negative, neutral, or positive) (3) intensity (low, typical, alternating, high). Also, additional information, that is a clue to speaker’s emotional state, was annotated: speech rate (slow, normal, fast), characteristic vocabulary (filled pauses, repeated words) and conversation style (normal, chaotic). Exponentially many rules can be extracted from a set of items (an item is a previously annotated single information). To generate the rules in the form of an implication X → Y (where X and Y are frequent k-itemsets) the Apriori algorithm was used - it avoids performing needless computations. Then, two basic measures (Support and Confidence) and several additional symmetric and asymmetric objective measures (e.g. Laplace, Conviction, Interest Factor, Cosine, correlation coefficient) were calculated for each rule. Each applied interestingness measure revealed different rules - we selected some top rules for each measure. Owing to the specificity of the corpus (emergency situations), most of the strong rules contain only negative emotions. There are though strong rules including neutral or even positive emotions. Three examples of the strongest rules are: {sadness} → {anxiety}; {sadness, weariness, stress, frustration} → {anger}; {compassion} → {sadness}. Association rule learning revealed the strongest configurations of affects (as well as configurations of affects with affect-related information) in our emergency phone calls corpus. The acquired knowledge can be used for prediction to fulfill the emotional profile of a new caller. Furthermore, a rule-related possible context analysis may be a clue to the situation a caller is in.

Keywords: data mining, emergency phone calls, emotional profiles, rules

Procedia PDF Downloads 408
3169 Use of Social Support for Fathers with Developmental Disabilities in Japan

Authors: Shiori Ishida, Hiromi Okuno, Hisato Igarashi, Akemi Yamazaki, Hiroko Takahashi

Abstract:

The purpose of this study was to clarify the differences and similarities regarding the social support of fathers and mothers towards considering increased assistance for the paternity of children with developmental disabilities. Written questionnaires were completed by fathers (n=85) and mothers (n=101) of children using rehabilitation facilities between infancy and 5 years of age. The survey contained multiple-choice questions on four categories: information support (6 items), emotional support (7 items), evaluation support (3 items), and daily living support (3 items). Regarding information support, fathers answered ‘spouse’ as the provider in over 50% of cases for all 6 items, which was significantly different compared with mothers (all p < 0.001). For emotional support, fathers were significantly more likely to get support from the workplace (p < 0.001) and from spouse (p < 0.001). The ‘evaluation support’ did not have significant differences for fathers in all the items, but the most frequent support providers were ‘spouses’. ‘Daily living support’ was significantly different from fathers in the workplace (p < 0.000) in terms of make allowances for work and duties. Thus, it appeared that fathers had fewer social support sources as compared with mothers and limited non-spouse support. The understanding of developmental disabilities, acquisition of methods of rehabilitation, and sources of support might have been inadequately addressed among fathers, which could be a hindrance to the involvement of fathers in the rearing of children with developmental disabilities. On the other hand, we also observed that some fathers were involved in the care of developmentally troubled children while providing mental support for their spouse, cooperating with housework, and adjusting their work life. However, the results on the external and social backgrounds of fathers indicated a necessity for greater empowerment and peer support to improve the paternal care of children with developmental disabilities in the family survey.

Keywords: children with developmental disabilities, family support, father, social support

Procedia PDF Downloads 132
3168 Application of Infrared Thermal Imaging, Eye Tracking and Behavioral Analysis for Deception Detection

Authors: Petra Hypšová, Martin Seitl

Abstract:

One of the challenges of forensic psychology is to detect deception during a face-to-face interview. In addition to the classical approaches of monitoring the utterance and its components, detection is also sought by observing behavioral and physiological changes that occur as a result of the increased emotional and cognitive load caused by the production of distorted information. Typical are changes in facial temperature, eye movements and their fixation, pupil dilation, emotional micro-expression, heart rate and its variability. Expanding technological capabilities have opened the space to detect these psychophysiological changes and behavioral manifestations through non-contact technologies that do not interfere with face-to-face interaction. Non-contact deception detection methodology is still in development, and there is a lack of studies that combine multiple non-contact technologies to investigate their accuracy, as well as studies that show how different types of lies produced by different interviewers affect physiological and behavioral changes. The main objective of this study is to apply a specific non-contact technology for deception detection. The next objective is to investigate scenarios in which non-contact deception detection is possible. A series of psychophysiological experiments using infrared thermal imaging, eye tracking and behavioral analysis with FaceReader 9.0 software was used to achieve our goals. In the laboratory experiment, 16 adults (12 women, 4 men) between 18 and 35 years of age (SD = 4.42) were instructed to produce alternating prepared and spontaneous truths and lies. The baseline of each proband was also measured, and its results were compared to the experimental conditions. Because the personality of the examiner (particularly gender and facial appearance) to whom the subject is lying can influence physiological and behavioral changes, the experiment included four different interviewers. The interviewer was represented by a photograph of a face that met the required parameters in terms of gender and facial appearance (i.e., interviewer likability/antipathy) to follow standardized procedures. The subject provided all information to the simulated interviewer. During follow-up analyzes, facial temperature (main ROIs: forehead, cheeks, the tip of the nose, chin, and corners of the eyes), heart rate, emotional expression, intensity and fixation of eye movements and pupil dilation were observed. The results showed that the variables studied varied with respect to the production of prepared truths and lies versus the production of spontaneous truths and lies, as well as the variability of the simulated interviewer. The results also supported the assumption of variability in physiological and behavioural values during the subject's resting state, the so-called baseline, and the production of prepared and spontaneous truths and lies. A series of psychophysiological experiments provided evidence of variability in the areas of interest in the production of truths and lies to different interviewers. The combination of technologies used also led to a comprehensive assessment of the physiological and behavioral changes associated with false and true statements. The study presented here opens the space for further research in the field of lie detection with non-contact technologies.

Keywords: emotional expression decoding, eye-tracking, functional infrared thermal imaging, non-contact deception detection, psychophysiological experiment

Procedia PDF Downloads 99
3167 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 198
3166 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 94
3165 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 272