Search results for: emotional security
3104 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability
Procedia PDF Downloads 653103 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 1973102 Validity and Reliability of a Questionaire for Measuring Behaviour Change of Low Performance Employee
Authors: Hazaila Binti Hassan, Abu Yazid Bin Abu Bakar, Salleh Amat
Abstract:
This study is to get the validity and reliability of the questionnaire for behaviour change on low-performing officers. This study aimed to develop and evaluate the behaviour of low performing officers. There are 75 items in this questionnaire which involves 5 subscales, which are the 5 dimensions intended to be studied: 1st emotional stability, 2nd psycho-spiritual enhancement, 3rd social skills development, 4th cognitive and rationality improvement and 5th behavioural alignment and adjustment. There are 2 processes in this research whereby to check the validity and reliability. Both use quantitative methods. Validity content testing has been conducted to validate the behavioural change questionnaire of the low performing officers. For the face validity, 4 people are involved, two are psychologists who carried out the program and the other two are officers of the same rank, i.e. supporting officers. They are involved in correction of sentences, languages, and grammar as well as the sentence structures so that it tallies with the purpose of studies. The questionnaire underwent content validity by the experts. Five experts are appointed to attend this session, 3 are directly involved in the construction of this questionnaire and 2 others are experts from the university with a background in questionnaire development. The result shows that the content validity obtained a high coefficient of 0.745 with a minimum and maximum value of more than 0.60 which satisfies the characteristic of Content Value Ratio. The Cronbach’s alpha result is 0.867. The highest scores are the behavioural alignment and adjustment sub-scale recorded the highest value, followed by social skills development sub-scale, cognitive and rational improvements sub-scale, psycho-spiritual enhancement sub-scale, and lastly emotional stability. Therefore, both of validity and reliability result were accepted that this questionnaire is valid and reliable can be used in the study of behaviour changes of low performing officers in the civil service.Keywords: content validity, reliability, five dimension, low-performing officers, questionnaire
Procedia PDF Downloads 2843101 An Exploration of the Provision of Government-Subsidised Housing without Title Deeds: A Recipient’s Interpretation of Security of Tenure
Authors: Maléne Maria Magdalena Campbell, Jeremiah Mholo
Abstract:
Low-income households earning less than 3,500 ZAR (about 175 GBP) per month can apply to the South African government, through the National Housing Subsidy, for fully subsidised houses. An objective of this subsidy is to enable low-income households’ participation in the formal housing market; however, the beneficiaries received houses without title deeds. As such, if the beneficiaries did not have a secured tenure at the time of their death then surviving family may face possible eviction. Therefore, an aim of this research was to determine how these beneficiaries interpret tenure security. The research focused on government subsidised housing in the Dithlake settlement of a rural hamlet named Koffiefontein, in the Letsemeng Local Municipality of South Africa. Quantitative data on the beneficiaries were collected from the local municipality, while qualitative data were collected from a sample of 45 beneficiaries.Keywords: low-income families, subsidised housing, titling, housing market
Procedia PDF Downloads 4073100 Introduction to Multi-Agent Deep Deterministic Policy Gradient
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents
Procedia PDF Downloads 243099 Smart Kids Coacher: Model for Childhood Obesity in Thailand
Authors: Pornwipa Daoduong, Jairak Loysongkroa, Napaphan Viriyautsahakul, Wachira Pengjuntr
Abstract:
Obesity is on of serious health problem in many countries including Thailand where the prevalence of childhood obesity has increased from 8.8 % in 2014 to 9.5 % in 2015 and 12.9 % in 2016. The Ministry of Public Health’s objective is to reduce prevalence of childhood Obesity to 10% or lower in 2017, by implementing the measure in relation to nutrition, physical activity (PA) and environment in 6,405 targeted school with proportion of school children with obesity is higher than 10 %. Smart Kids Coacher (SKC)” is a new innovative intervention created by Department of Health and consists of 252 regional and provincial officers. The SKC aims to train the super trainers about food and nutrition.PA and emotional control through implementing three learning activities including 1) Food for Fun is about Nutrition flag, Nutrition label, food portion and Nutrition surveillance; 2) Fun for Fit includes intermediated- and advanced level workouts within 60 minutes such as kangaroo dance, Chair stretching; and 3) Control emotional is about to prevent probability of access to unhealthy food, to ensure for having meal in appropriate time, and to recruit peers and family member to increase awareness among target groups. Apart from providing SKC lesson for 3,828 officers at district level, a number of students (2,176) as role model are selected through implementing “Smart Kids Leader: (SKL)”.Consequently. The SKC lowers proportion of childhood obesity from 17% in 2012 to 12.9% in 2016. Further, the SKC coverage should be expanded to other setting. Policy maker should be aware of the important of reduction of the prevalence of childhood obesity, and it’s related risk. Network and Collaboration between stakeholders are essential as well as an improvement of holistic intervention and knowledge “NuPETHS” for kids in the future.Keywords: childhood obesity, model, obesity, smart kids coacher
Procedia PDF Downloads 2443098 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3683097 Youth Branches of the Ruling Political Party as an Intersection Point: An Examination in Context of Capital Type
Authors: Merve Ak Efe
Abstract:
Youth branches in Turkey are one of the sub-fields where political ideologies are intersected with daily life practices. When the youth branches are examined within the framework of daily life practices, a social area can be defined where many types of capital turn into gains. The relationship between politics and capital is not only financial but can also be observed in the form of social, cultural, or emotional capital. This paper examines the political mobilization of young people who are members of the Youth Branch of the Justice and Development Party. The reason why JDP (Adalet ve Kalkınma Partisi) was chosen is that they have been the ruling party for twenty years, and there is a considerable number of young members within the party. Since Bayrampaşa is a district where JDP is politically active, This study is based on Bayrampaşa youth branches. The study examines how young people who are members of the party are mobilized and the everyday life practices and emotions underlying this mobilization. The data was collected through in-depth interviews with 13 young people, and the participant observation method was applied at the weekly meetings of the Justice and Development Party Bayrampaşa Youth Branch. Youth Branches represent a political space in which emotions turn into action for the young people who are involved in the party. During the field study at the micro level, it has been observed that the Bayrampaşa JDP Youth Branch hosted a transformation that incorporates political and social practices into modern tactics. One of the other results shows that being a member of youth branches causes a significant rise in social capital for young people. On the other hand, for the members with low cultural capital, there is an increase in social capital; however, an increase in cultural capital is not prominent.Keywords: political mobilization, everyday practices, emotional capital, social capital, cultural capital
Procedia PDF Downloads 1253096 An Interpretative Phenomenological Analysis on the Concept of Friends of Children in Conflict with the Law
Authors: Karla Kristine Bay, Jovie Ann Gabin, Allana Joyce Sasotona
Abstract:
This research employed an Interpretative Phenomenological Analysis to explore the experiences of Children in Conflict with the Law (CICL) which gave light to their concept of ‘friends’. Derived from this context are the following objectives of the study: 1) determining the differentiation of the forms of friends of the CICL; 2) presenting the process of attachment towards detachment in the formation of friendship; and 3) discussing the experiences, and reflections of the CICL on the ‘self’ out of their encounter with friendship. Using the data gathered from the individual drawings of the CICL of their representations of the self, family, friends, community, and Bahay Kalinga as subjects in the meaning-making process utilizing Filipino Psychology methods of pagtatanong-tanong (interview), and pakikipagkwentuhan (conversation), data analysis produced a synthesis of seventeen individual cases. Overall results generated three superordinate themes on the differentiation of the forms of friends which include friends with good influences, friends with bad influences, and friends within the family. While two superordinate themes were produced on the process of attachment towards detachment, namely social, emotional, and psychological experiences on the process of attachment, and emotional and psychological experiences on the process of detachment. Lastly, two superordinate themes were created on the experiences, and reflections of the CICL on the ‘self’ out of their encounter with friendship. This consists of the recognition of the ‘self’ as a responsible agent in developing healthy relationships between the self and others, and reconstruction of the self from the collective experiences of healing, forgiveness, and acceptance. These findings, together with supporting theories discussed the impact of friendship on the emergence of criminal behavior and other dispositions; springing from the child’s dissociation from the family that led to finding belongingness from an external group called friends.Keywords: children in conflict with the law, criminal behavior, friends, interpretative phenomenological analysis
Procedia PDF Downloads 2353095 Evolution of Web Development Progress in Modern Information Technology
Authors: Abdul Basit Kiani
Abstract:
Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design
Procedia PDF Downloads 543094 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems
Authors: M. Mutemwa
Abstract:
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies
Procedia PDF Downloads 1533093 Russian ‘Active Measures’: An Applicable Supporting Tool for Russia`s Foreign Policy Objectives in the 21st Century
Authors: Håkon Riiber
Abstract:
This paper explores the extent to which Russian ‘Active Measures’ play a role in contemporary Russian foreign policy and in what way the legacy of the Soviet Union is still apparent in these practices. The analysis draws on a set of case studies from the 21st century to examine these aspects, showing which ‘Active Measures’ features are old and which are new in the post-Cold War era. The paper highlights that the topic has gained significant academic and political interest in recent years, largely due to the aggressive posture of the Russian Federation on the world stage, exemplified through interventions in Estonia, Georgia, and Ukraine and interference in several democratic elections in the West. However, the paper argues that the long-term impact of these measures may have unintended implications for Russia. While Russia is unlikely to stop using Active Measures, increased awareness of the exploitation of weaknesses, institutions, or other targets may lead to greater security measures and an ability to identify and defend against these activities. The paper contends that Soviet-style ‘Active Measures’ from the Cold War era have been modernized and are now utilized to create an advantageous atmosphere for further exploitation to support contemporary Russian foreign policy. It offers three key points to support this argument: the reenergized legacy of the Cold War era, the use of ‘Active Measures’ in a number of cases in the 21st century, and the applicability of AM to the Russian approach to foreign policy. The analysis reveals that while this is not a new Russian phenomenon, it is still oversimplified and inaccurately understood by the West, which may result in a decreased ability to defend against these activities and limit the unwarranted escalation of the ongoing security situation between the West and Russia. The paper concludes that the legacy of Soviet-era Active Measures continues to influence Russian foreign policy, and modern technological advances have only made them more applicable to the current political climate. Overall, this paper sheds light on the important issue of Russian ‘Active Measures’ and the role they play in contemporary Russian foreign policy. It emphasizes the need for increased awareness, understanding, and security measures to defend against these activities and prevent further escalation of the security situation between the West and Russia.Keywords: Russian espionage, active measures, disinformation, Russian intelligence
Procedia PDF Downloads 1033092 A Typology System to Diagnose and Evaluate Environmental Affordances
Authors: Falntina Ahmad Alata, Natheer Abu Obeid
Abstract:
This paper is a research report of an experimental study on a proposed typology system to diagnose and evaluate the affordances of varying architectural environments. The study focused on architectural environments which have been developed with a shift in their use of adaptive reuse. The novelty in the newly developed environments was tested in terms of human responsiveness and interaction using a variety of selected cases. The study is a follow-up on previous research by the same authors, in which a typology of 16 categories of environmental affordances was developed and introduced. The current study introduced other new categories, which together with the previous ones establish what could be considered a basic language of affordance typology. The experiment was conducted on ten architectural environments while adopting two processes: 1. Diagnostic process, in which the environments were interpreted in terms of their affordances using the previously developed affordance typology, 2. The evaluation process, in which the diagnosed environments were evaluated using measures of emotional experience and architectural evaluation criteria of beauty, economy and function. The experimental study demonstrated that the typology system was capable of diagnosing different environments in terms of their affordances. It also introduced new categories of human interaction: “multiple affordances,” “conflict affordances,” and “mix affordances.” The different possible combinations and mixtures of categories demonstrated to be capable of producing huge numbers of other newly developed categories. This research is an attempt to draw a roadmap for designers to diagnose and evaluate the affordances within different architectural environments. It is hoped to provide future guidance for developing the best possible adaptive reuse according to the best affordance category within their proposed designs.Keywords: affordance theory, affordance categories, architectural environments, architectural evaluation criteria, adaptive reuse environment, emotional experience, shift in use environment
Procedia PDF Downloads 1933091 World Agricultural Commodities Prices Dynamics and Volatilities Impacts on Commodities Importation and Food Security in West African Economic and Monetary Union Countries
Authors: Baoubadi Atozou, Koffi Akakpo
Abstract:
Since the decade 2000, the use of foodstuffs such as corn, wheat, and soybeans in biofuel production has been growing sharply in the United States, Canada, and Europe. Thus, prices for these agricultural products are rising in the world market. These cereals are the most important source of calorific energy for West African Economic and Monetary Union (WAEMU) countries members’ population. These countries are highly dependent on imports of most of these products. Thereby, rising prices can have an important impact on import levels and consequently on food security in these countries. This study aims to analyze the interrelationship between the prices of these commodities and their volatilities, and their effects on imports of these agricultural products by each WAEMU ’country member. The Autoregressive Distributed Lag (ARDL) model, the GARCH Multivariate model, and the Granger Causality Test are used in this investigation. The results show that import levels are highly and significantly sensitive to price changes as well as their volatility. In the short term as well as in the long term, there is a significant relationship between the prices of these products. There is a positive relationship in general between price volatility. And these volatilities have negative effects on the level of imports. The market characteristics affect food security in these countries, especially access to food for vulnerable and low-income populations. The policies makers must adopt viable strategies to increase agricultural production and limit their dependence on imports.Keywords: price volatility, import of agricultural products, food safety, WAEMU
Procedia PDF Downloads 1913090 A Blockchain-Based Privacy-Preserving Physical Delivery System
Authors: Shahin Zanbaghi, Saeed Samet
Abstract:
The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme
Procedia PDF Downloads 1503089 Implementation of a Quality Management Approach in the Laboratory of Quality Control and the Repression of Fraud (CACQE) of the Wilaya of Bechar
Authors: Khadidja Mebarki, Naceur Boussouar, Nabila Ihaddadene, M. Akermi
Abstract:
Food products are particularly sensitive, since they concern the health of the consumer, whether it’s be from the health point of view or commercial, this kind of product must be subjected to rigorous controls, in order to prevent any fraud. Quality and safety are essential for food security, public health and economic development. The strengthening of food security is essential to increase food security which is considered reached when all individuals can at any time access safe and nutritious food they need to lead healthy and active lives. The objective of this project is to initiate a quality approach in the laboratories of the quality control and the repression of fraud. It will be directed towards the application of good laboratory practices, traceability, management of quality documents (quality, procedures and specification manual) and quality audits. And to prepare the ground for a possible accreditation by ISO 17025 standard of BECHAR laboratory’s. The project will take place in four main stages: 1- Preparation of an audit grid; 2- Realization of a quality audit according to the method of 5 M completed by a section on quality documentation; 3- Drafting of an audit report and proposal for recommendations; 4- Implementation of corrective actions on the ground. This last step consisted in the formalization of the cleaning disinfection plan; work on good hygiene practices, establishment of a mapping of processes and flow charts of the different processes of the laboratory, classifying quality documents and formalizing the process of document management. During the period of the study within the laboratory, all facets of the work were almost appreciated, as we participated in the expertise performed in within it.Keywords: quality, management, ISO 17025 accreditation, GLP
Procedia PDF Downloads 5163088 Food Strategies in the Mediterranean Basin, Possible for Food Safety and Security
Authors: Lorenza Sganzetta, Nunzia Borrelli
Abstract:
The research intends to reflect on the current mapping of the Food Strategies, on the reasons why in the planning objectives panorama, such sustainability priorities are located in those geographic areas and on the evolutions of these priorities of the Mediterranean planning dispositions. The whirling population growth that is affecting global cities is causing an enormous challenge to conventional resource-intensive food production and supply and the urgent need to face food safety, food security and sustainability concerns. Urban or Territorial Food Strategies can provide an interesting path for the development of this new agenda within the imperative principle of sustainability. In the specific, it is relevant to explore what ‘sustainability’ means within these policies. Most of these plans include actions related to four main components and interpretations of sustainability that are food security and safety, food equity, environmental sustainability itself and cultural identity and, at the designing phase, they differ slightly from each other according to the degree of approximation to one of these dimensions. Moving from these assumptions, the article would analyze some practices and policies representatives of different Food Strategies of the world and focus on the Mediterranean ones, on the problems and negative externalities from which they start, on the first interventions that are implementing and on their main objectives. We will mainly use qualitative data from primary and secondary collections. So far, an essential observation could have been made about the relationship between these sustainability dimensions and geography. In statistical terms, the US and Canadian policies tended to devote a large research space to health issues and access to food; those northern European showed a special attention to the environmental issues and the shortening of the chain; and finally the policies that, even in limited numbers, were being developed in the Mediterranean basin, were characterized by a strong territorial and cultural imprint and their major aim was to preserve local production and the contact between the productive land and the end consumer. Recently, though, Mediterranean food planning strategies are focusing more on health related and food accessibility issues and analyzing our diets not just as a matter of culture and territorial branding but as tools for reducing public health costs and accessibility to fresh food for everyone. The article would reflect then on how Food Safety, Food Security and Health are entering the new agenda of the Mediterranean Food Strategies. The research hypothesis suggests that the economic crisis that in the last years invested both producers and consumers had a significant impact on the nutrition habits and on the redefinition of food poverty, even in the fatherland of the healthy Mediterranean diet. This trend and other variables influenced the orientation and the objectives of the food strategies.Keywords: food security, food strategy, health, sustainability
Procedia PDF Downloads 2233087 Happiness, Media and Sustainability of Communities in Donkeaw, Mearim District, Chiang Mai, Thailand
Authors: Panida Jongsuksomsakul
Abstract:
This study of the ‘happiness’ and ‘sustainability’ in the community of Donkeaw, Amphoe Mae Rim, Chiang Mai Province during the non-election period in Thailand, noted that their happiness levels are in the middle-average range. This was found using a mixed approach of qualitative and quantitative methods (N = 386, α = 0.05). The study explores indicators for six aspects of well-being and happiness, including, good local governance, administrative support for the health system that maintains people’s mental and physical health, environment and weather, job security and a regular income aids them in managing a sustainable lifestyle. The impact of economic security and community relationships on social and cultural capital, and the way these aspects impact on the life style of the community, affects the sustainable well-being of people. Moreover, living with transparency and participatory communication led to diverse rewards in many areas.Keywords: communication, happiness, well-being, Donkeaw community, social and cultural capital
Procedia PDF Downloads 2343086 The Moderating Roles of Bedtime Activities and Anxiety and Depression in the Relationship between Attention-Deficit/Hyperactivity Disorder and Sleep Problems in Children
Authors: Lian Tong, Yan Ye, Qiong Yan
Abstract:
Background: Children with attention-deficit/hyperactivity disorder (ADHD) often experience sleep problems, but the comorbidity mechanism has not been sufficiently studied. This study aimed to determine the comorbidity of ADHD and sleep problems as well as the moderating effects of bedtime activities and depression/anxiety symptoms on the relationship between ADHD and sleep problems. Methods: We recruited 934 primary students from third to fifth grade and their parents by stratified random sampling from three primary schools in Shanghai, China. This study used parent-reported versions of the ADHD Rating Scale-IV, Children’s Sleep Habits Questionnaire, and Achenbach Child Behavior Checklist. We used hierarchical linear regression analysis to clarify the moderating effects of bedtime activities and depression/anxiety symptoms. Results: We found that children with more ADHD symptoms had shorter sleep durations and more sleep problems on weekdays. Screen time before bedtime strengthened the relationship between ADHD and sleep-disordered breathing. Children with more screen time were more likely to have sleep onset delay, while those with less screen time had more sleep onset problems with increasing ADHD symptoms. The high bedtime eating group experienced more night waking with increasing ADHD symptoms compared with the low bedtime eating group. Anxiety/depression exacerbated total sleep problems and further interacted with ADHD symptoms to predict sleep length and sleep duration problems. Conclusions: Bedtime activities and emotional problems had important moderating effects on the relationship between ADHD and sleep problems. These findings indicate that appropriate bedtime management and emotional management may reduce sleep problems and improve sleep duration for children with ADHD symptoms.Keywords: ADHD, sleep problems, anxiety/depression, bedtime activities, children
Procedia PDF Downloads 2043085 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 103084 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography
Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo
Abstract:
Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding
Procedia PDF Downloads 2043083 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)
Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo
Abstract:
Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop
Procedia PDF Downloads 4033082 Millennials' Career Expectations: Exploring Attitudes and Individual Differences in Croatia
Authors: Lovorka Galetić, Maja Klindžić, Ivana Načinović Braje
Abstract:
Generation Y individuals or Millennials are known for their unique views, work values and motivational needs which implies that, in order to attract and retain those individuals, activities in the area of career management should be given special attention by HRM managers. After a theoretical background on Millennials’ life and work attitudes, an empirical research on career preferences of Millennials in Croatia was described. Empirical research was conducted among 249 members of generation Y. The data analysis revealed that respondents generally perceive promotion opportunities as the most important career aspect; however, job security and work-life balance are almost as important. Furthermore, it was shown that Generation Y is not necessarily a homogenous group. More precisely, women assign greater importance than men to work-life balance and job security. Therefore, HRM managers should adapt career planning activities not only with respect to generational preferences, but individual characteristics as well.Keywords: career, individual differences, millennials, work values
Procedia PDF Downloads 3983081 Unraveling the Complexity of Postpartum Distress: Examining the Influence of Alexithymia, Social Support, Partners' Support, and Birth Satisfaction on Postpartum Distress among Bulgarian Mothers
Authors: Stela Doncheva
Abstract:
Postpartum distress, encompassing depressive symptoms, obsessions, and anxiety, remains a subject of significant scientific interest due to its prevalence among individuals giving birth. This critical and transformative period presents a multitude of factors that impact women's health. On the one hand, variables such as social support, satisfaction in romantic relationships, shared newborn care, and birth satisfaction directly affect the mental well-being of new mothers. On the other hand, the interplay of hormonal changes, personality characteristics, emotional difficulties, and the profound life adjustments experienced by mothers can profoundly influence their self-esteem and overall physical and emotional well-being. This paper extensively explores the factors of alexithymia, social support, partners' support, and birth satisfaction to gain deeper insights into their impact on postpartum distress. Utilizing a qualitative survey consisting of six self-reflective questionnaires, this study collects valuable data regarding the individual postpartum experiences of Bulgarian mothers. The primary objective is to enrich our understanding of the complex factors involved in the development of postpartum distress during this crucial period. The results shed light on the intricate nature of the problem and highlight the significant influence of bio-psycho-social elements. By contributing to the existing knowledge in the field, this research provides valuable implications for the development of interventions and support systems tailored to the unique needs of mothers in the postpartum period. Ultimately, this study aims to improve the overall well-being of new mothers and promote optimal maternal health during the postpartum journey.Keywords: maternal mental health, postpartum distress, postpartum depression, postnatal mothers
Procedia PDF Downloads 623080 The Effect of Psychosocial, Behavioral and Disease Specific Characteristics on Health-Related Quality of Life after Primary Surgery for Colorectal Cancer: A Cross Sectional Study of a Regional Australian Population
Authors: Lakmali Anthony, Madeline Gillies
Abstract:
Background: Colorectal cancer (CRC) is usually managed with surgical resection. Many of the outcomes traditionally used to define successful operative management, such as resection margin, do not adequately reflect patients’ experience. Patient-reported outcomes (PRO), such as Health-Related Quality of life (HRQoL), provide a means by which the impact of surgery for cancer can be reported in a patient-centered way. HRQoL has previously been shown to be impacted by psychosocial, behavioral and disease-specific characteristics. This exploratory cross-sectional study aims to; (1) describe postoperative HRQoL in patients who underwent primary resection in a regional Australian hospital; (2) describe the prevalence of anxiety, depression and clinically significant fear of cancer recurrence (FCR) in this population; and (3) identify demographic, psychosocial, disease and treatment factors associated with poorer self-reported HRQoL. Methods: Consecutive patients who had resection of colorectal cancer in a single regional Australian hospital between 2015 and 2022 were eligible. Participants were asked to complete a survey instrument designed to assess HRQoL, as well as validated instruments that assess several other psychosocial PROs hypothesized to be associated with HRQoL; emotional distress, fear of cancer recurrence, social support, dispositional optimism, body image and spirituality. Demographic and disease-specific data were also collected via medical record review. Results: Forty-six patients completed the survey. Clinically significant levels of fear of recurrence as well as emotional distress, were present in this group. Many domains of HRQoL were significantly worse than an Australian reference population for CRC. Demographic and disease factors associated with poor HRQoL included smoking and ongoing adjuvant systemic therapy. The primary operation was not associated with HRQoL; however, the operative approach (laparoscopic vs. open) was associated with HRQoL for these patients. All psychosocial factors measured were associated with HRQoL, including cancer worry, emotional distress, body image and dispositional optimism. Conclusion: HRQoL is an important outcome in surgery for both research and clinical practice. This study provides an overview of the quality of life in a regional Australian population of postoperative colorectal cancer patients and the factors that affect it. Understanding HRQoL and awareness of patients particularly vulnerable to poor outcomes should be used to aid the informed consent and shared decision-making process between surgeon and patient.Keywords: surgery, colorectal, cancer, PRO, HRQoL
Procedia PDF Downloads 703079 Reimagining Landscapes: Psychological Responses and Behavioral Shifts in the Aftermath of the Lytton Creek Fire
Authors: Tugba Altin
Abstract:
In an era where the impacts of climate change resonate more pronouncedly than ever, communities globally grapple with events bearing both tangible and intangible ramifications. Situating this within the evolving landscapes of Psychological and Behavioral Sciences, this research probes the profound psychological and behavioral responses evoked by such events. The Lytton Creek Fire of 2021 epitomizes these challenges. While tangible destruction is immediate and evident, the intangible repercussions—emotional distress, disintegration of cultural landscapes, and disruptions in place attachment (PA)—require meticulous exploration. PA, emblematic of the emotional and cognitive affiliations individuals nurture with their environments, emerges as a cornerstone for comprehending how environmental cataclysms influence cultural identity and bonds to land. This study, harmonizing the core tenets of an interpretive phenomenological approach with a hermeneutic framework, underscores the pivotal nature of this attachment. It delves deep into the realm of individuals' experiences post the Lytton Creek Fire, unraveling the intricate dynamics of PA amidst such calamity. The study's methodology deviates from conventional paradigms. Instead of traditional interview techniques, it employs walking audio sessions and photo elicitation methods, granting participants the agency to immerse, re-experience, and vocalize their sentiments in real-time. Such techniques shed light on spatial narratives post-trauma and capture the otherwise elusive emotional nuances, offering a visually rich representation of place-based experiences. Central to this research is the voice of the affected populace, whose lived experiences and testimonies form the nucleus of the inquiry. As they renegotiate their bonds with transformed environments, their narratives reveal the indispensable role of cultural landscapes in forging place-based identities. Such revelations accentuate the necessity of integrating both tangible and intangible trauma facets into community recovery strategies, ensuring they resonate more profoundly with affected individuals. Bridging the domains of environmental psychology and behavioral sciences, this research accentuates the intertwined nature of tangible restoration with the imperative of emotional and cultural recuperation post-environmental disasters. It advocates for adaptation initiatives that are rooted in the lived realities of the affected, emphasizing a holistic approach that recognizes the profundity of human connections to landscapes. This research advocates the interdisciplinary exchange of ideas and strategies in addressing post-disaster community recovery strategies. It not only enriches the climate change discourse by emphasizing the human facets of disasters but also reiterates the significance of an interdisciplinary approach, encompassing psychological and behavioral nuances, for fostering a comprehensive understanding of climate-induced traumas. Such a perspective is indispensable for shaping more informed, empathetic, and effective adaptation strategies.Keywords: place attachment, community recovery, disaster response, restorative landscapes, sensory response, visual methodologies
Procedia PDF Downloads 593078 Resilience and Mindfulness as Individual Resources Building Communication Skills for Physicians
Authors: Malgorzata Sekulowicz, Krystyna Boron-Krupinska, Paulina Morga, Blazej Cieslik
Abstract:
Burnout is highly prevalent in health care employees, especially in physicians. It significantly reduces the efficiency of these employees, which can have negative consequences for both physicians and patients. Resilience and mindfulness enhancing positive emotions, leading to sustainable development and personal commitment, can have a significant impact on burnout. Therefore, the aim of this study was to determine the relationship between burnout symptoms and mindfulness and resilience among physicians. The authors conducted a cross-sectional survey study among seventy-four polish physicians. Participants filled out the following psychometric tools: the Maslach Burnout Inventory - Human Services Survey (MBI-HSS), Five Facet Mindfulness Questionnaire (FFMQ), Areas of Work-Life Survey (AWS), International Personality Item Pool (IPIP), the Resilience Assessment Scale (SPP-25) and the Mini-COPE Inventory. The relationship between burnout and resilience and mindfulness was assessed with path analysis. Analyzing the relationship between MBI-HSS components and mindfulness, a significant negative correlation of the FFMQ score with emotional exhaustion (-0.50, p < 0.05) and depersonalization (-0.43, p < 0.05) and a positive correlation with personal accomplishment (0.50, p < 0.05) was demonstrated. Analyzing resilience, a statistically significant relationship of SPP-25 with all tested components of MBI-HSS was demonstrated: emotional exhaustion (-0.54, p < 0.05), depersonalization (-0.31, p < 0.05) and personal accomplishment (0.35, p < 0.05). In the group of medical doctors, the higher the level of mindfulness and resilience, the lower the risk of burnout. Furthermore, the more frequently used active coping strategies (planning, acceptance), the lower the risk of burnout, while the use of passive, evasive strategies increases the risk of burnout. It may be worth considering implementing mindfulness intervention to effectively manage burnout symptoms in this group.Keywords: burnout, medical doctors, mindfulness, physicians, resilience
Procedia PDF Downloads 1053077 Food Insecurity and Other Correlates of Individual Components of Metabolic Syndrome in Women Living with HIV (WLWH) in the United States
Authors: E. Wairimu Mwangi, Daniel Sarpong
Abstract:
Background: Access to effective antiretroviral therapy in the United States has resulted in the rise in longevity in people living with HIV (PLHIV). Despite the progress, women living with HIV (WLWH) experience increasing rates of cardiometabolic disorders compared with their HIV-negative counterparts. Studies focusing on the predictors of metabolic disorders in this population have largely focused on the composite measure of metabolic syndrome (METs). This study seeks to identify the predictors of composite and individual METs factors in a nationally representative sample of WLWH. In particular, the study also examines the role of food security in predicting METs. Methods: The study comprised 1800 women, a subset of participants from the Women’s Interagency HIV Study (WIHS). The primary exposure variable, food security, was measured using the U.S. 10-item Household Food Security Survey Module. The outcome measures are the five metabolic syndrome indicators (elevated blood pressure [systolic BP > 130 mmHg and diastolic BP ≥ 85 mmHg], elevated fasting glucose [≥ 110 mg/dL], elevated fasting triglyceride [≥ 150 mg/dL], reduced HDL cholesterol [< 50 mg/dL], and waist circumference > 88 cm) and the composite measure - Metabolic Syndrome (METs) Status. Each metabolic syndrome indicator was coded one if yes and 0 otherwise. The values of the five indicators were summed, and participants with a total score of 3 or greater were classified as having metabolic syndrome. Participants classified as having metabolic syndrome were assigned a code of 1 and 0 otherwise for analysis. The covariates accounted for in this study fell into sociodemographic factors and behavioral and health characteristics. Results: The participants' mean (SD) age was 47.1 (9.1) years, with 71.4% Blacks and 10.9% Whites. About a third (33.1%) had less than a high school (HS) diploma, 60.4% were married, 32.8% were employed, and 53.7% were low-income. The prevalence of worst dietary diversity, low, moderate, and high food security were 24.1%, 26.6%, 17.0%, and 56.4%, respectively. The correlate profile of the five individual METs factors plus the composite measure of METs differ significantly, with METs based on HDL having the most correlates (Age, Education, Drinking Status, Low Income, Body Mass Index, and Health Perception). Additionally, metabolic syndrome based on waist circumference was the only metabolic factor where food security was significantly correlated (Food Security, Age, and Body Mass Index). Age was a significant predictor of all five individual METs factors plus the composite METs measure. Except for METs based on Fasting Triglycerides, body mass index (BMI) was a significant correlate of the various measures of metabolic syndrome. Conclusion: High-density Lipoprotein (HDL) cholesterol significantly correlated with most predictors. BMI was a significant predictor of all METs factors except Fasting Triglycerides. Food insecurity, the primary predictor, was only significantly associated with waist circumference.Keywords: blood pressure, food insecurity, fasting glucose, fasting triglyceride, high-density lipoprotein, metabolic syndrome, waist circumference, women living with HIV
Procedia PDF Downloads 583076 The Causes and Potential Solutions for Foodborne Illness, Food Security, and Food Safety: In the Case of the East Harerghe Region of Oromia, Ethiopia
Authors: Tuji Jemal Ahmed, Abdi Mohammed, Geremew Geidare Kailo
Abstract:
Food security, foodborne illness, and food safety are critical issues that affect the East Harerghe region of Oromia, Ethiopia. Despite the region's potential for agriculture, food insecurity remains a significant problem, with many households experiencing chronic hunger and malnutrition. The region also experiences high rates of foodborne illnesses, including cholera, typhoid, and diarrhea, which are caused by poor hygiene and sanitation practices. Additionally, food safety is a significant challenge, particularly in rural areas, where there is a lack of infrastructure, inadequate food storage facilities, and limited access to information about food safety. There are several factors that contribute to the current situation in the East Harerghe region; firstly, the region is susceptible to natural disasters, for instance, drought, which affects crop yields and livestock production. Secondly, the region also experiences poor infrastructure, which affects the storage and transportation of food, particularly in rural areas. Thirdly, there is a lack of awareness and knowledge on good hygiene and sanitation practices, specifically during food handling, processing, and storage. Fourthly, unitability due to conflict and other forms of land degradation exacerbates food insecurity and malnutrition. Finally, limited access to financial resources and markets commonly affects smallholder farmers by their ability to produce and sell food. To address the current situation in that area, several potential solutions can be implemented; investment in infrastructure is necessary, especially in rural areas, to improve the storage and transportation of food. Education and awareness programs on good hygiene and sanitation practices should target local communities, smallholder farmers, and food vendors. Financial resources and markets should be made more accessible to smallholder farmers, particularly through the provision of credit and improved access to markets. Addressing the underlying causes of conflict and promoting peaceful coexistence can help to reduce displacement and loss of livelihoods. Finally, the enforcement of food safety regulations and the implementation of standards for food processing and storage facilities are necessary to ensure food safety. In conclusion, addressing the challenges of food security, foodborne illness, and food safety in the East Harerghe region requires a coordinated effort from various stakeholders, including the government, non-governmental organizations, and local communities. By implementing the solutions outlined above, the region can improve its food security, prevent foodborne illnesses, and keep food safe for its population. Eventually, building the resilience of communities to shocks such as droughts, floods, and conflict is necessary to ensure long-term food security in the region.Keywords: foodborne illness, food handling, food safety, food security
Procedia PDF Downloads 1013075 Emotion Detection in Twitter Messages Using Combination of Long Short-Term Memory and Convolutional Deep Neural Networks
Authors: Bahareh Golchin, Nooshin Riahi
Abstract:
One of the most significant issues as attended a lot in recent years is that of recognizing the sentiments and emotions in social media texts. The analysis of sentiments and emotions is intended to recognize the conceptual information such as the opinions, feelings, attitudes and emotions of people towards the products, services, organizations, people, topics, events and features in the written text. These indicate the greatness of the problem space. In the real world, businesses and organizations are always looking for tools to gather ideas, emotions, and directions of people about their products, services, or events related to their own. This article uses the Twitter social network, one of the most popular social networks with about 420 million active users, to extract data. Using this social network, users can share their information and opinions about personal issues, policies, products, events, etc. It can be used with appropriate classification of emotional states due to the availability of its data. In this study, supervised learning and deep neural network algorithms are used to classify the emotional states of Twitter users. The use of deep learning methods to increase the learning capacity of the model is an advantage due to the large amount of available data. Tweets collected on various topics are classified into four classes using a combination of two Bidirectional Long Short Term Memory network and a Convolutional network. The results obtained from this study with an average accuracy of 93%, show good results extracted from the proposed framework and improved accuracy compared to previous work.Keywords: emotion classification, sentiment analysis, social networks, deep neural networks
Procedia PDF Downloads 137