Search results for: social networks security issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17188

Search results for: social networks security issues

15928 Community Policing Interventions in the Tribal Hamlets as a Positive Criminal Justice and Social Justice Strategy: A Study Based on the Community Policing Project of the Government of Kerala

Authors: Bharathadas Sandhya

Abstract:

Janamaithri Suraksha Project is the community policing project of Kerala police, fully sponsored by the Government of Kerala and in vogue in Kerala for the last ten years. The socio-economically weaker areas in the hilly terrains consisting of tribal hamlets are given special importance under the project. These hamlets are visited by the beat police officers, and they intervene in various issues in the hamlets. This study is based on data collected from 350 respondents living in the tribal hamlets of the Nilambur area in the District of Malappuram. The respondents were personally interviewed by the research team using a questionnaire consisting of 183 questions, seeking the details regarding their interaction with beat police officers, their ability to prevent or detect crimes, the menace of Maoists (extremist) presence, their interventions in other socio-economic problems like alcoholism, school dropout issues, lack of facilities for preparation for competitive examinations for educated youth, etc. The perception of the tribal population regarding the effectiveness of police intervention in their criminal justice complaints, the attitude of the police officers towards the tribal population when they approach the police station with a criminal complaint, are also studied. The general socio-economic problems of the tribal population as perceived by them are also brought out. Being the visible agency of the government, the police person coming on beat duty to the hamlet is generally seen by the tribal population as a representative to whom they can communicate the issues, even if it’s solution rests with another department like the forest or agriculture. The analysis of the primary data is carried out using computer applications. The amount of social justice benefits the tribal hamlets received through various government schemes, and their deficiencies are brought out in the study. From the conclusions of the study, certain suggestions for positive criminal justice and social justice intervention strategies are made out. The need for various government departments to work in tandem with each other so as to bring out more effectiveness in the socio-economic projects is evident from the study. Whether it is the need to obtain a transport to go to school or problem of drinking water or even opening a bank account, at least occasionally, the visiting beat police officer is of help to the tribal population. Mostly the tribal population feels free to approach the police with a criminal complaint without any inhibitions.

Keywords: community policing, beat police officer, criminal justice, social justice

Procedia PDF Downloads 153
15927 Review of Energy Efficiency Routing in Ad Hoc Wireless Networks

Authors: P. R. Dushantha Chaminda, Peng Kai

Abstract:

In this review paper, we enclose the thought of wireless ad hoc networks and particularly mobile ad hoc network (MANET), their field of study, intention, concern, benefit and disadvantages, modifications, with relation of AODV routing protocol. Mobile computing is developing speedily with progression in wireless communications and wireless networking protocols. Making communication easy, we function most wireless network devices and sensor networks, movable, battery-powered, thus control on a highly constrained energy budget. However, progress in battery technology presents that only little improvements in battery volume can be expected in the near future. Moreover, recharging or substitution batteries is costly or unworkable, it is preferable to support energy waste level of devices low.

Keywords: wireless ad hoc network, energy efficient routing protocols, AODV, EOAODV, AODVEA, AODVM, AOMDV, FF-AOMDV, AOMR-LM

Procedia PDF Downloads 214
15926 Cross-Cultural Experiences of South Asian Students in Chinese Universities: Predictors of the Students' Social-Media Engagements

Authors: Nadeem Akhtar, An Ran, Cornelius B. Pratt

Abstract:

China’s President Xi' vision of Belt and Road Initiative, an infrastructural project of development and connectivity, is attracting international students to Chinese universities, with Pakistan and India among the top-10 countries of origin of those students (Ministry of Education China, 2018). An additional factor in international students’ interest in Chinese universities is their improving global rankings of Chinese universities. Against that backdrop, this study addresses two overarching questions: (a) What factors explain South Asian students’ study-away experiences, particularly in their multicultural environments? and (b) What role do new media play in their adaptation to that environment? This study is guided by Stephen’s (2011) theoretical model, which suggests that social networks influence immigrants’ interactions with host and home culture. The present study used a structured questionnaire distributed through both WeChat and other online platforms to international students studying in Chinese universities. Preliminary results are threefold: (a) that the frequency of use of social media is a predictor of the level of adjustment of the students to their multicultural environment; (b) that social engagement with their international-student peers is a moderating factor in their experiential outcomes; and (c) length of stay in Chinese universities, surprisingly, was not a predictor of adaptation. A major implication of these findings is that, even though social media tend to be criticized for contributing to anomie and to diminishing social capital among youths and millennials, they can be poignant tools for cultural adaptation, particularly among international students in China. It remains to be seen if such outcomes occur among international students in other countries or world regions.

Keywords: adaptation, China's Belt and Road Initiative, international students, social media

Procedia PDF Downloads 124
15925 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 125
15924 Design for Error-Proofing Assembly: A Systematic Approach to Prevent Assembly Issues since Early Design Stages, an Industrial Case Study

Authors: Gabriela Estrada, Joaquim Lloveras

Abstract:

Design for error-proofing assembly is a new DFX approach to prevent assembly issues since early design stages. Assembly issues that can happen during the life phases of a system such as: production, installation, operation, and replacement phases. This prevention is possible by designing the product with poka-yoke or error-proofing characteristics. This approach guide designers to make decisions based on poka-yoke assembly design requirements. As a result of applying these requirements designers are able to create solutions to prevent assembly issues for the product in development stage. This paper integrates the needs to design products in an error proofing way into the systematic approach of design process by Pahl and Beitz. A case study is presented applying this approach.

Keywords: poka-yoke, error-proofing, assembly issues, design process, life phases of a system

Procedia PDF Downloads 376
15923 Design for Error-Proofing Assembly: A Systematic Approach to Prevent Assembly Issues since Early Design Stages. An Industry Case Study

Authors: Gabriela Estrada, Joaquim Lloveras

Abstract:

Design for error-proofing assembly is a new DFX approach to prevent assembly issues since early design stages. Assembly issues that can happen during the life phases of a system such as: production, installation, operation and replacement phases. This prevention is possible by designing the product with poka-yoke or error-proofing characteristics. This approach guide designers to make decisions based on poka-yoke assembly design requirements. As a result of applying these requirements designers are able to create solutions to prevent assembly issues for the product in development stage. This paper integrates the needs to design products in an error proofing way into the systematic approach of design process by Pahl and Beitz. A case study is presented applying this approach.

Keywords: poka-yoke, error-proofing, assembly issues, design process, life phases of a system

Procedia PDF Downloads 323
15922 Bringing Feminist Critical Pedagogy to the ESP Higher Education Classes: Feasibility and Challenges

Authors: Samira Essabari

Abstract:

What, unfortunately, governs the Moroccan educational philosophy and policy today is a concerning neoliberal discourse with its obsession with market logics and individualism. Critical education has been advocated to resist the neoliberal hegemony since it holds the promise to reclaim the social function of education. Significantly, the mounting forms of sexism and discrimination against women combined with hegemonic educational practices are jeopardizing the social function of teaching and learning, hence the relevance of feminist critical pedagogy. A substantial body of research worldwide has explored the ways in which feminist pedagogy can develop feminist consciousness and examine power relations in different educational contexts. In Morocco, however, the feasibility of feminist pedagogy has not been researched despite the overwhelming interest in gender issues in different educational settings. The research on critical pedagogies in Morocco remains very promising. Yet, most studies were conducted in contexts which are already engaged with issues of theory, discourse, and discourse analysis. The field of ESP ( English for Specific Purposes) is pragmatic by nature, and priority in research has been given to questions that adhere to the mainstream concerns of need analysis and study skills and ignore issues of power, gender power relations, and intersectional forms of oppression. To address these gaps in the existing literature, this participatory action research seeks to investigate the feasibility of Feminist pedagogy in ESP higher education and how it can foster feminist critical consciousness among ESP students without compromising their language learning needs. The findings of this research will contribute to research on critical applied linguistics and critical ESP more specifically and add to the practice of critical pedagogies in Moroccan higher education by providing in-depth insights into the enablers and barriers to the implementation of feminist critical pedagogy, which is still feeling its way into the educational scene in Morocco.

Keywords: feminist pedagogy, critical pedagogy, power relations, gender, ESP, intersectionality

Procedia PDF Downloads 129
15921 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 141
15920 The Effect of Research Unit Clique-Diversity and Power Structure on Performance and Originality

Authors: Yue Yang, Qiang Wu, Xingyu Gao

Abstract:

"Organized research units" have always been an important part of academia. According to the type of organization, there are public research units, university research units, and corporate research units. Existing research has explored the research unit in some depth from several perspectives. However, there is a research gap on the closer interaction between the three from a network perspective and the impact of this interaction on their performance as well as originality. Cliques are a special kind of structure under the concept of cohesive subgroups in the field of social networks, representing particularly tightly knit teams in a network. This study develops the concepts of the diversity of clique types and the diversity of clique geography based on cliques, starting from the diversity of collaborative activities characterized by them. Taking research units as subjects and assigning values to their power in cliques based on occupational age, we explore the impact of clique diversity and clique power on their performance as well as originality and the moderating role of clique relationship strength and structural holes in them. By collecting 9094 articles published in the field of quantum communication at WoSCC over the 15 years 2007-2021, we processed them to construct annual collaborative networks between a total of 533 research units and measured the network characteristic variables using Ucinet. It was found that the type and geographic diversity of cliques promoted the performance and originality of the research units, and the strength of clique relationships positively moderated the positive effect of the diversity of clique types on performance and negatively affected the promotional relationship between the geographic diversity of cliques and performance. It also negatively affected the positive effects of clique-type diversity and clique-geography diversity on originality. Structural holes positively moderated the facilitating effect of both types of factional diversity on performance and originality. Clique power promoted the performance of the research unit, but unfavorably affected its performance on novelty. Faction relationship strength facilitated the relationship between faction rights and performance and showed negative insignificance for clique power and originality. Structural holes positively moderated the effect of clique power on performance and originality.

Keywords: research unit, social networks, clique structure, clique power, diversity

Procedia PDF Downloads 59
15919 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 241
15918 Automatic Detection and Filtering of Negative Emotion-Bearing Contents from Social Media in Amharic Using Sentiment Analysis and Deep Learning Methods

Authors: Derejaw Lake Melie, Alemu Kumlachew Tegegne

Abstract:

The increasing prevalence of social media in Ethiopia has exacerbated societal challenges by fostering the proliferation of negative emotional posts and comments. Illicit use of social media has further exacerbated divisions among the population. Addressing these issues through manual identification and aggregation of emotions from millions of users for swift decision-making poses significant challenges, particularly given the rapid growth of Amharic language usage on social platforms. Consequently, there is a critical need to develop an intelligent system capable of automatically detecting and categorizing negative emotional content into social, religious, and political categories while also filtering out toxic online content. This paper aims to leverage sentiment analysis techniques to achieve automatic detection and filtering of negative emotional content from Amharic social media texts, employing a comparative study of deep learning algorithms. The study utilized a dataset comprising 29,962 comments collected from social media platforms using comment exporter software. Data pre-processing techniques were applied to enhance data quality, followed by the implementation of deep learning methods for training, testing, and evaluation. The results showed that CNN, GRU, LSTM, and Bi-LSTM classification models achieved accuracies of 83%, 50%, 84%, and 86%, respectively. Among these models, Bi-LSTM demonstrated the highest accuracy of 86% in the experiment.

Keywords: negative emotion, emotion detection, social media filtering sentiment analysis, deep learning.

Procedia PDF Downloads 23
15917 A Short Survey of Integrating Urban Agriculture and Environmental Planning

Authors: Rayeheh Khatami, Toktam Hanaei, Mohammad Reza Mansouri Daneshvar

Abstract:

The growth of the agricultural sector is known as an essential way to achieve development goals in developing countries. Urban agriculture is a way to reduce the vulnerability of urban populations of the world toward global environmental change. It is a sustainable and efficient system to respond to the environmental, social and economic needs of the city, which leads to urban sustainability. Today, many local and national governments are developing urban agriculture as an effective tool in responding to challenges such as poverty, food security, and environmental problems. In this study, we follow a perspective based on urban agriculture literature in order to indicate the urban agriculture’s benefits in environmental planning strategies in non-western countries like Iran. The methodological approach adopted is based on qualitative approach and documentary studies. A total of 35 articles (mixed quantitative and qualitative methods studies) were studied in final analysis, which are published in relevant journals that focus on this subject. Studies show the wide range of positive benefits of urban agriculture on food security, nutrition outcomes, health outcomes, environmental outcomes, and social capital. However, there was no definitive conclusion about the negative effects of urban agriculture. This paper provides a conceptual and theoretical basis to know about urban agriculture and its roles in environmental planning, and also conclude the benefits of urban agriculture for researchers, practitioners, and policymakers who seek to create spaces in cities for implementation urban agriculture in future.

Keywords: urban agriculture, environmental planning, urban planning, literature

Procedia PDF Downloads 143
15916 Evaluating the Role of Cinema in the Formation of Cultural Schemas of Iranian Families by Studying the Opinions of Critics at the Venice Film Festival

Authors: Elahe Zavareian

Abstract:

Cinema is a powerful medium that can depict and critique sociological and cultural issues, contributing to the expansion of important societal issues and raising awareness. Family crises and challenges are significant concerns faced by societies worldwide. The family serves as the central core for societal formation, and the challenges experienced within this small social group have implications not only for individuals within a country but also for the wider culture. The concept of the family represents the entire society in relation to other countries, shaping ideas and prejudices regarding interpersonal culture and relationships. The representation of society's problems through cinema influences the formation of cultural schemas within the country producing the films and among the societies that view them.

Keywords: interpersonal culture, representation, society, family, cultural schemas

Procedia PDF Downloads 68
15915 Review of Hydrologic Applications of Conceptual Models for Precipitation-Runoff Process

Authors: Oluwatosin Olofintoye, Josiah Adeyemo, Gbemileke Shomade

Abstract:

The relationship between rainfall and runoff is an important issue in surface water hydrology therefore the understanding and development of accurate rainfall-runoff models and their applications in water resources planning, management and operation are of paramount importance in hydrological studies. This paper reviews some of the previous works on the rainfall-runoff process modeling. The hydrologic applications of conceptual models and artificial neural networks (ANNs) for the precipitation-runoff process modeling were studied. Gradient training methods such as error back-propagation (BP) and evolutionary algorithms (EAs) are discussed in relation to the training of artificial neural networks and it is shown that application of EAs to artificial neural networks training could be an alternative to other training methods. Therefore, further research interest to exploit the abundant expert knowledge in the area of artificial intelligence for the solution of hydrologic and water resources planning and management problems is needed.

Keywords: artificial intelligence, artificial neural networks, evolutionary algorithms, gradient training method, rainfall-runoff model

Procedia PDF Downloads 454
15914 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 354
15913 Entrepreneurial Intention and Social Entrepreneurship among Students in Malaysian Higher Education

Authors: Radin Siti Aishah Radin A Rahman, Norasmah Othman, Zaidatol Akmaliah Lope Pihie, Hariyaty Ab. Wahid

Abstract:

The recent instability in economy was found to be influencing the situation in Malaysia whether directly or indirectly. Taking that into consideration, the government needs to find the best approach to balance its citizen’s socio-economic strata level urgently. Through education platform is among the efforts planned and acted upon for the purpose of balancing the effects of the influence, through the exposure of social entrepreneurial activity towards youth especially those in higher institution level. Armed with knowledge and skills that they gained, with the support by entrepreneurial culture and environment while in campus; indirectly, the students will lean more on making social entrepreneurship as a career option when they graduate. Following the issues of marketability and workability of current graduates that are becoming dire, research involving how far the willingness of student to create social innovation that contribute to the society without focusing solely on personal gain is relevant enough to be conducted. With that, this research is conducted with the purpose of identifying the level of entrepreneurial intention and social entrepreneurship among higher institution students in Malaysia. Stratified random sampling involves 355 undergraduate students from five public universities had been made as research respondents and data were collected through surveys. The data was then analyzed descriptively using min score and standard deviation. The study found that the entrepreneurial intention of higher education students are on moderate level, however it is the contrary for social entrepreneurship activities, where it was shown on a high level. This means that while the students only have moderate level of willingness to be a social entrepreneur, they are very committed to created social innovation through the social entrepreneurship activities conducted. The implication from this study can be contributed towards the higher institution authorities in prediction the tendency of student in becoming social entrepreneurs. Thus, the opportunities and facilities for realizing the courses related to social entrepreneurship must be created expansively so that the vision of creating as many social entrepreneurs as possible can be achieved.

Keywords: entrepreneurial intention, higher education institutions (HEIs), social entrepreneurship, social entrepreneurial activity, gender

Procedia PDF Downloads 261
15912 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 166
15911 Women from the Margins: An Exploration of the African Women Marginalization in the South African Context from Postcolonial Feminist Perspective

Authors: Goodness Thandi Ntuli

Abstract:

As one of the sub-Saharan African countries, South Africa has a majority of women living at the receiving end of all ferocious atrocities, afflictions and social ills such as utter poverty, unemployment, morbidity, sexual exploitation and abuse, gender-based and domestic violence. The response to these social ills that permeate the South African context like wildfire requires postcolonial feminism as a lens which needs to directly address this particular context. In the empirical study that was conducted among the Zulu people about Zulu young women in the South African context, it was found that a postcolonial young woman has a lot of social challenges that militate against her. In her struggle to liberate herself, there are layers of oppression that she has to deal with before attaining emancipation of any kind. These layers of oppression emanate from postcolonial effects on cultural norms that come with patriarchal issues, racial issues as the woman of colour and socio-economic issues as the poverty-stricken marginalised woman. Such layers also render marginalized women voiceless on many occasions, and hence the kind of feminism that needs to be applied in this context has to give them a voice, worth and human dignity that they deserve. From the postcolonial feminist perspective, this paper examines the condition of women from the margins and seeks the ways in which the layers of oppression could be disengaged. In the process of the severed layers of oppression, these women can be uplifted to becoming the women of worth, restored to life-giving dignity from the inferiority complex of racial discrimination and liberation from all forms of patriarchy and its upshots that keep them bound by gender inequality. This requires, in particular, postcolonial feminism that would find profound ways of reaching into the deep-seated socialization and internalization of every kind of prejudice against women. It is the kind of feminism that questions the status core even among those who consider themselves feminists. With the ruination of all postcolonial layers of oppression, women in the margins could find real emancipation that they have always longed for through feminism that will take into consideration their context. This calls for the rethinking of feminism in different contexts because the conditions of the oppressed woman of the South cannot be the same as the conditions of the woman who considers herself oppressed in the North.

Keywords: exploration, feminism, postcolonial, margins, South African, women

Procedia PDF Downloads 223
15910 Exploring the Connectedness of Ad Hoc Mesh Networks in Rural Areas

Authors: Ibrahim Obeidat

Abstract:

Reaching a fully-connected network of mobile nodes in rural areas got a great attention between network researchers. This attention rose due to the complexity and high costs while setting up the needed infrastructures for these networks, in addition to the low transmission range these nodes has. Terranet technology, as an example, employs ad-hoc mesh network where each node has a transmission range not exceed one kilometer, this means that every two nodes are able to communicate with each other if they are just one kilometer far from each other, otherwise a third-party will play the role of the “relay”. In Terranet, and as an idea to reduce network setup cost, every node in the network will be considered as a router that is responsible of forwarding data between other nodes which result in a decentralized collaborative environment. Most researches on Terranet presents the idea of how to encourage mobile nodes to become more cooperative by letting their devices in “ON” state as long as possible while accepting to play the role of relay (router). This research presents the issue of finding the percentage of nodes in ad-hoc mesh network within rural areas that should play the role of relay at every time slot, relating to what is the actual area coverage of nodes in order to have the network reach the fully-connectivity. Far from our knowledge, till now there is no current researches discussed this issue. The research is done by making an implementation that depends on building adjacency matrix as an indicator to the connectivity between network members. This matrix is continually updated until each value in it refers to the number of hubs that should be followed to reach from one node to another. After repeating the algorithm on different area sizes, different coverage percentages for each size, and different relay percentages for several times, results extracted shows that for area coverage less than 5% we need to have 40% of the nodes to be relays, where 10% percentage is enough for areas with node coverage greater than 5%.

Keywords: ad-hoc mesh networks, network connectivity, mobile ad-hoc networks, Terranet, adjacency matrix, simulator, wireless sensor networks, peer to peer networks, vehicular Ad hoc networks, relay

Procedia PDF Downloads 282
15909 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 312
15908 A Qualitative Evaluation of a Civic Curriculum to Increase Global Citizenship Competences in University Students in the Netherlands

Authors: Park Eri, Sklad Marcin, Tsirogianni Stavroula

Abstract:

In a world where there is increasing exchange and movement of populations groups, and interconnectedness, there are plenty of opportunities for mutual cultural enrichment. However, in everyday life, relations among different cultural groups do not go that smoothly often resulting in discrimination, inequalities and violence. The increasing differentiation of roles, values and worldviews raise a lot of tensions and dilemmas for the state and people -especially in western liberal societies- about issues of acceptance, fairness, justice, autonomy, plurality, freedom, equality and cohesion. Cultural diversity requires a deeper understanding of the roots, meaning and consequences of group differences. We argue, that a psychology from the standpoint of the subject needs to be developed further according to new societal needs. This means within a globalised society, issues regarding the construction of the other as another have become of utmost importance. In constructing the other human beings construct their ideal and possible worlds and meanings about their lives and their significance by drawing on a set of cultural norms, beliefs and values embedded in the different contexts whereby they find themselves in. In this article, we are describing a series of exercises developed in collaboration with University students in the Netherlands that have been piloted with undergraduate 2nd year University Psychology students. These exercises aimed at making tangible and obvious how students apply different moral principles and norms to regulate relationships, which are linked to hegemonic ideological forces. The exercises were in the form of thought experiments that included 8 moral dilemmas, inspired by the moral foundations theory, that touched on different moral principles. The moral dilemmas were built onto each other in incremental steps: from a very tangible/hands-on level to more challenging and demanding ones which require to step into pre-existing networks on knowledge and discourses. After the execution of every dilemma, a discussion followed, which is focused on building links between the ‘theme of the exercise’ and participants’ own lives experiences. In this paper, we provide an evaluation of the methodology used through a discursive analysis of the discussion between the students and the teacher.

Keywords: citizenship, moral dilemmas, social justice, education

Procedia PDF Downloads 322
15907 Implicature of Jokes in Broadcast Messages

Authors: Yuli Widiana

Abstract:

The study of implicature which is one of the discussions of pragmatics is an interesting and challenging topic to discuss. Implicature is a meaning which is implied in an utterance which is not the same as its literal meaning. The rapid development of information technology results in social networks as media to broadcast messages. The broadcast messages may be in the form of jokes which contain implicature. The research applies the pragmatic equivalent method to analyze the topics of jokes based on the implicatures contained in them. Furthermore, the method is also applied to reveal the purpose of creating implicature in jokes. The findings include the kinds of implicature found in jokes which are classified into conventional implicature and conversational implicature. Then, in detailed analysis, implicature in jokes is divided into implicature related to gender, culture, and social phenomena. Furthermore, implicature in jokes may not only be used to give entertainment but also to soften criticisms or satire so that it does not sound rude and harsh.

Keywords: implicature, broadcast messages, conventional implicature, conversational implicature

Procedia PDF Downloads 359
15906 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: authentication, enterprise IoT cybersecurity, PKI/TTP, IoT space

Procedia PDF Downloads 169
15905 Accessible Mobile Augmented Reality App for Art Social Learning Based on Technology Acceptance Model

Authors: Covadonga Rodrigo, Felipe Alvarez Arrieta, Ana Garcia Serrano

Abstract:

Mobile augmented reality technologies have become very popular in the last years in the educational field. Researchers have studied how these technologies improve the engagement of the student and better understanding of the process of learning. But few studies have been made regarding the accessibility of these new technologies applied to digital humanities. The goal of our research is to develop an accessible mobile application with embedded augmented reality main characters of the art work and gamification events accompanied by multi-sensorial activities. The mobile app conducts a learning itinerary around the artistic work, driving the user experience in and out the museum. The learning design follows the inquiry-based methodology and social learning conducted through interaction with social networks. As for the software application, it’s being user-centered designed, following the universal design for learning (UDL) principles to assure the best level of accessibility for all. The mobile augmented reality application starts recognizing a marker from a masterpiece of a museum using the camera of the mobile device. The augmented reality information (history, author, 3D images, audio, quizzes) is shown through virtual main characters that come out from the art work. To comply with the UDL principles, we use a version of the technology acceptance model (TAM) to study the easiness of use and perception of usefulness, extended by the authors with specific indicators for measuring accessibility issues. Following a rapid prototype method for development, the first app has been recently produced, fulfilling the EN 301549 standard and W3C accessibility guidelines for mobile development. A TAM-based web questionnaire with 214 participants with different kinds of disabilities was previously conducted to gather information and feedback on user preferences from the artistic work on the Museo del Prado, the level of acceptance of technology innovations and the easiness of use of mobile elements. Preliminary results show that people with disabilities felt very comfortable while using mobile apps and internet connection. The augmented reality elements seem to offer an added value highly engaging and motivating for the students.

Keywords: H.5.1 (multimedia information systems), artificial, augmented and virtual realities, evaluation/methodology

Procedia PDF Downloads 135
15904 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 283
15903 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches

Authors: B. O. Diyaolu

Abstract:

The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.

Keywords: adequate security, fans attendance, football fans, football stadium, Nigeria professional football league

Procedia PDF Downloads 115
15902 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 76
15901 An Approach to Control Electric Automotive Water Pumps Deploying Artificial Neural Networks

Authors: Gabriel S. Adesina, Ruixue Cheng, Geetika Aggarwal, Michael Short

Abstract:

With the global shift towards sustainability and technological advancements, electric Hybrid vehicles (EHVs) are increasingly being seen as viable alternatives to traditional internal combustion (IC) engine vehicles, which also require efficient cooling systems. The electric Automotive Water Pump (AWP) has been introduced as an alternative to IC engine belt-driven pump systems. However, current control methods for AWPs typically employ fixed gain settings, which are not ideal for the varying conditions of dynamic vehicle environments, potentially leading to overheating issues. To overcome the limitations of fixed gain control, this paper proposes implementing an artificial neural network (ANN) for managing the AWP in EHVs. The proposed ANN provides an intelligent, adaptive control strategy that enhances the AWP's performance, supported through MATLAB simulation work illustrated in this paper. Comparative analysis demonstrates that the ANN-based controller surpasses conventional PID and fuzzy logic-based controllers (FLC), exhibiting no overshoot, 0.1secs rapid response, and 0.0696 IAE performance. Consequently, the findings suggest that ANNs can be effectively utilized in EHVs.

Keywords: automotive water pump, cooling system, electric hybrid vehicles, artificial neural networks, PID control, fuzzy logic control, IAE, MATLAB

Procedia PDF Downloads 34
15900 Voice Liveness Detection Using Kolmogorov Arnold Networks

Authors: Arth J. Shah, Madhu R. Kamble

Abstract:

Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.

Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection

Procedia PDF Downloads 39
15899 Feasibility Study on the Application of Waste Materials for Production of Sustainable Asphalt Mixtures

Authors: Farzaneh Tahmoorian, Bijan Samali, John Yeaman

Abstract:

Road networks are expanding all over the world during the past few decades to meet the increasing freight volumes created by the population growth and industrial development. At the same time, the rate of generation of solid wastes in the society is increasing with the population growth, technological development, and changes in the lifestyle of people. Thus, the management of solid wastes has become an acute problem. Accordingly, there is a need for greater efficiency in the construction and maintenance of road networks, in reducing the overall cost, especially the utilization of natural materials such as aggregates. An efficient means to reduce construction and maintenance costs of road networks is to replace natural (virgin) materials by secondary, recycled materials. Recycling will also help to reduce pressure on landfills and demand for extraction of natural virgin materials thus ensuring sustainability. Application of solid wastes in asphalt layer reduces not only environmental issues associated with waste disposal but also the demand for virgin materials which will subsequently result in sustainability. Therefore, this research aims to investigate the feasibility of the application of some of the waste materials such as glass, construction and demolition wastes, etc. as alternative materials in pavement construction, particularly flexible pavements. To this end, various combination of different waste materials in certain percentages is considered in designing the asphalt mixture. One of the goals of this research is to determine the optimum percentage of all these materials in the mixture. This is done through a series of tests to evaluate the volumetric properties and resilient modulus of the mixture. The information and data collected from these tests are used to select the adequate samples for further assessment through advanced tests such as triaxial dynamic test and fatigue test, in order to investigate the asphalt mixture resistance to permanent deformation and also cracking. This paper presents the results of these investigations on the application of waste materials in asphalt mixture for production of a sustainable asphalt mix.

Keywords: asphalt, glass, pavement, recycled aggregate, sustainability

Procedia PDF Downloads 236