Search results for: human factor in security
13839 Environmental Consequences of Metal Concentrations in Stream Sediments of Atoyac River Basin, Central Mexico: Natural and Industrial Influences
Authors: V. C. Shruti, P. F. Rodríguez-Espinosa, D. C. Escobedo-Urías, Estefanía Martinez Tavera, M. P. Jonathan
Abstract:
Atoyac River, a major south-central river flowing through the states of Puebla and Tlaxcala in Mexico is significantly impacted by the natural volcanic inputs in addition with wastewater discharges from urban, agriculture and industrial zones. In the present study, core samples were collected from R. Atoyac and analyzed for sediment granularity, major (Al, Fe, Ca, Mg, K, P and S) and trace elemental concentrations (Ba, Cr, Cd, Mn, Pb, Sr, V, Zn, Zr). The textural studies reveal that the sediments are mostly sand sized particles exceeding 99% and with very few to no presence of mud fractions. It is observed that most of the metals like (avg: all values in μg g-1) Ca (35,528), Mg (10,789), K (7453), S (1394), Ba (203), Cr (30), Cd (4), Pb (11), Sr (435), Zn (76) and Zr (88) are enriched throughout the sediments mainly sourced from volcanic inputs, source rock composition of Atoyac River basin and industrial influences from the Puebla city region. Contamination indices, such as anthropogenic factor (AF), enrichment factor (EF) and geoaccumulation index (Igeo), were used to investigate the level of contamination and toxicity as well as quantitatively assess the influences of human activities on metal concentrations. The AF values (>1) for Ba, Ca, Mg, Na, K, P and S suggested volcanic inputs from the study region, where as Cd and Zn are attributed to the impacts of industrial inputs in this zone. The EF and Igeo values revealed an extreme enrichment of S and Cd. The ecological risks were evaluated using potential ecological risk index (RI) and the results indicate that the metals Cd and V pose a major hazard for the biological community.Keywords: Atoyac River, contamination indices, metal concentrations, Mexico, textural studies
Procedia PDF Downloads 29213838 Gender Recognition with Deep Belief Networks
Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang
Abstract:
A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs
Procedia PDF Downloads 45313837 Human Rights and Counter-Terrorism in Nigeria: A Systematic Review
Authors: Tarela J. Ike
Abstract:
Over the years, the hemorrhagic acts of Boko Haram have led to the adoption of counter-terrorism measures which mostly takes the form of military repressive measures. These measures have wrought flagrant violation of human rights worthy of concern. Hence, the need to examine the efficacy of the counter-terrorism measures adopted by the Nigeria government in combatting terrorism. This article addresses this issue by relying on a systematic literature review which examines the impact of Nigeria counter-terrorism measures from 2009 to 2016 in combating terrorism. The review of literature includes 42 article. Of the 42 articles, 14 met the peer-reviewed requirement which finds that most of Nigeria’s counter-terrorism policies are geared toward the use of state repressive military approach which violates the human right. Thus, the study concludes that to effectively address the terrorist uprising; Nigeria should adopt a non-aggressive counter-terrorism approach which incorporates religious clerics, and community active engagement strategy in combatting terrorism as opposed to military retaliation which violates human right and so far proved ineffective.Keywords: Boko Haram, counter-terrorism, human rights, military retaliation
Procedia PDF Downloads 41113836 English Language Acquisition and Flipped Classroom
Authors: Yuqing Sun
Abstract:
Nowadays, English has been taught in many countries as a second language. One of the major ways to learn this language is through the class teaching. As in the field of second language acquisition, there are many factors to affect its acquisition processes, such as the target language itself, a learner’s personality, cognitive factor, language transfer, and the outward factors (teaching method, classroom, environmental factor, teaching policy, social environment and so on). Flipped Classroom as a newly developed classroom model has been widely used in language teaching classroom, which was, to some extent, accepted by teachers and students for its effect. It distinguishes itself from the traditional classroom for its focus on the learner and its great importance attaching to the personal learning process and the application of technology. The class becomes discussion-targeted, and the class order is somewhat inverted since the teaching process is carried out outside the class, while the class is only for knowledge-internalization. This paper will concentrate on the influences of the flipped classroom, as a classroom affecting factor, on the the process of English acquisition by the way of case studies (English teaching class in China), and the analysis of the mechanism of the flipped classroom itself to propose some feasible advice of promoting the the effectiveness of English acquisition.Keywords: second language acquisition, English, flipped classroom, case
Procedia PDF Downloads 40013835 Computational Neurosciences: An Inspiration from Biological Neurosciences
Authors: Harsh Sadawarti, Kamal Malik
Abstract:
Humans are the unique and the most powerful creature on this planet just because of the high level of intelligence gifted by nature. Computational Intelligence is highly influenced by the term natural intelligence, neurosciences and mathematics. To deal with the in-depth study of computational intelligence and to utilize it in real-life applications, it is quite important to understand its simulation with the human brain. In this paper, the three important parts, Frontal Lobe, Occipital Lobe and Parietal Lobe of the human brain, are compared with the ANN(Artificial Neural Network), CNN(Convolutional Neural network), and RNN(Recurrent Neural Network), respectively. Intelligent computational systems are created by combining deductive reasoning, logical concepts and high-level algorithms with the simulation and study of the human brain. Human brain is a combination of Physiology, Psychology, emotions, calculations and many other parameters which are of utmost importance that determines the overall intelligence. To create intelligent algorithms, smart machines and to simulate the human brain in an effective manner, it is quite important to have an insight into the human brain and the basic concepts of biological neurosciences.Keywords: computational intelligence, neurosciences, convolutional neural network, recurrent neural network, artificial neural network, frontal lobe, occipital lobe, parietal lobe
Procedia PDF Downloads 11113834 The Impact of Environment Psychology on Customer Primary Emotions with Special Reference to Conference Travellers to Sri Lanka
Authors: Koswaththage Dilushika Sewwandi, Aminda Lakmal
Abstract:
From an activity reserved for the privileged few only some decades ago, tourism today moves more than one billion people across international borders each year. As the main part of the tourism industry, MICE tourism came to the floor and nowadays it became the main part of tourism especially in developing countries. Currently due to the fast development projects and infrastructure building, focus on tourism development in Sri Lanka could earn a global identity by practicing MICE tourism especially international conferences. Examine the behavior of conference travelers who looking for Sri Lanka as a conference destination must be required. Since the tourism industry highly involved with the personal factor and the destination selections taken by human beings it is vital to explore the factors affecting to their primary emotions which are shaped up with environmental factors. The Environmental Psychology studies the cognitive and affective behavior of human beings and based on that this study was carried out to examine the impact of environment psychology on customer primary emotions; with special reference to conference travelers to Sri Lanka. Finally, the study concludes with identifying the number of environmental factors as Accommodation, Travel Mode and Hotel Atmosphere that could impact the customer primary emotions of conference travelers to Sri Lanka.Keywords: MICE tourism, envionmental psychology, primary emotions, destination selection
Procedia PDF Downloads 41013833 Securing Online Voting With Blockchain and Smart Contracts
Authors: Anant Mehrotra, Krish Phagwani
Abstract:
Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.Keywords: electronic voting, smart contracts, blockchain nased voting, security
Procedia PDF Downloads 913832 Changing Human Resources Policies in Companies after the COVID-19 Pandemic
Authors: Murat Çolak, Elifnaz Tanyıldızı
Abstract:
Today, human mobility with globalization has increased the interaction between countries significantly; although this contact has advanced societies in terms of civilization, it has also increased the likelihood of pandemics. The coronavirus (COVID-19) pandemic, which caused the most loss of life among them, turned into a global epidemic by covering the whole world in a short time. While there was an explosion in demand in some businesses around the world, some businesses temporarily stopped or had to stop their activities. The businesses affected by the crisis had to adapt to the new legal regulations but had to make changes in matters such as their working styles, human resources practices, and policies. One of the measures taken into account is the reduction of the workforce. The current COVID-19 crisis has posed serious challenges for many organizations and has generated an unprecedented wave of termination notices. This study examined examples of companies affected by the pandemic process and changed their working policies after the pandemic. This study aims to reveal the impact of the global COVID-19 pandemic on human resources policies and employees and how these situations will affect businesses in the future.Keywords: human resource management, crisis management, COVID-19, business function
Procedia PDF Downloads 9613831 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa
Authors: Saska Alexandria Hayes
Abstract:
Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.Keywords: domestic policy, immigration, migration, New Zealand
Procedia PDF Downloads 10213830 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22713829 Performance Estimation of Small Scale Wind Turbine Rotor for Very Low Wind Regime Condition
Authors: Vilas Warudkar, Dinkar Janghel, Siraj Ahmed
Abstract:
Rapid development experienced by India requires huge amount of energy. Actual supply capacity additions have been consistently lower than the targets set by the government. According to World Bank 40% of residences are without electricity. In 12th five year plan 30 GW grid interactive renewable capacity is planned in which 17 GW is Wind, 10 GW is from solar and 2.1 GW from small hydro project, and rest is compensated by bio gas. Renewable energy (RE) and energy efficiency (EE) meet not only the environmental and energy security objectives, but also can play a crucial role in reducing chronic power shortages. In remote areas or areas with a weak grid, wind energy can be used for charging batteries or can be combined with a diesel engine to save fuel whenever wind is available. India according to IEC 61400-1 belongs to class IV Wind Condition; it is not possible to set up wind turbine in large scale at every place. So, the best choice is to go for small scale wind turbine at lower height which will have good annual energy production (AEP). Based on the wind characteristic available at MANIT Bhopal, rotor for small scale wind turbine is designed. Various Aero foil data is reviewed for selection of airfoil in the Blade Profile. Airfoil suited of Low wind conditions i.e. at low Reynold’s number is selected based on Coefficient of Lift, Drag and angle of attack. For designing of the rotor blade, standard Blade Element Momentum (BEM) Theory is implanted. Performance of the Blade is estimated using BEM theory in which axial induction factor and angular induction factor is optimized using iterative technique. Rotor performance is estimated for particular designed blade specifically for low wind Conditions. Power production of rotor is determined at different wind speeds for particular pitch angle of the blade. At pitch 15o and velocity 5 m/sec gives good cut in speed of 2 m/sec and power produced is around 350 Watts. Tip speed of the Blade is considered as 6.5 for which Coefficient of Performance of the rotor is calculated 0.35, which is good acceptable value for Small scale Wind turbine. Simple Load Model (SLM, IEC 61400-2) is also discussed to improve the structural strength of the rotor. In SLM, Edge wise Moment and Flap Wise moment is considered which cause bending stress at the root of the blade. Various Load case mentioned in the IEC 61400-2 is calculated and checked for the partial safety factor of the wind turbine blade.Keywords: annual energy production, Blade Element Momentum Theory, low wind Conditions, selection of airfoil
Procedia PDF Downloads 33713828 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs
Procedia PDF Downloads 9713827 Determination of Non-CO2 Greenhouse Gas Emission in Electronics Industry
Authors: Bong Jae Lee, Jeong Il Lee, Hyo Su Kim
Abstract:
Both developed and developing countries have adopted the decision to join the Paris agreement to reduce greenhouse gas (GHG) emissions at the Conference of the Parties (COP) 21 meeting in Paris. As a result, the developed and developing countries have to submit the Intended Nationally Determined Contributions (INDC) by 2020, and each country will be assessed for their performance in reducing GHG. After that, they shall propose a reduction target which is higher than the previous target every five years. Therefore, an accurate method for calculating greenhouse gas emissions is essential to be presented as a rational for implementing GHG reduction measures based on the reduction targets. Non-CO2 GHGs (CF4, NF3, N2O, SF6 and so on) are being widely used in fabrication process of semiconductor manufacturing, and etching/deposition process of display manufacturing process. The Global Warming Potential (GWP) value of Non-CO2 is much higher than CO2, which means it will have greater effect on a global warming than CO2. Therefore, GHG calculation methods of the electronics industry are provided by Intergovernmental Panel on climate change (IPCC) and U.S. Environmental Protection Agency (EPA), and it will be discussed at ISO/TC 146 meeting. As discussed earlier, being precise and accurate in calculating Non-CO2 GHG is becoming more important. Thus this study aims to discuss the implications of the calculating methods through comparing the methods of IPCC and EPA. As a conclusion, after analyzing the methods of IPCC & EPA, the method of EPA is more detailed and it also provides the calculation for N2O. In case of the default emission factor (by IPCC & EPA), IPCC provides more conservative results compared to that of EPA; The factor of IPCC was developed for calculating a national GHG emission, while the factor of EPA was specifically developed for the U.S. which means it must have been developed to address the environmental issue of the US. The semiconductor factory ‘A’ measured F gas according to the EPA Destruction and Removal Efficiency (DRE) protocol and estimated their own DRE, and it was observed that their emission factor shows higher DRE compared to default DRE factor of IPCC and EPA Therefore, each country can improve their GHG emission calculation by developing its own emission factor (if possible) at the time of reporting Nationally Determined Contributions (NDC). Acknowledgements: This work was supported by the Korea Evaluation Institute of Industrial Technology (No. 10053589).Keywords: non-CO2 GHG, GHG emission, electronics industry, measuring method
Procedia PDF Downloads 28913826 The Effects of an Immigration Policy on the Economic Integration of Migrants and on Natives’ Attitudes: The Case of Syrian Refugees in Turkey
Authors: S. Zeynep Siretioglu Girgin, Gizem Turna Cebeci
Abstract:
Turkey’s immigration policy is a controversial issue considering its legal, economic, social, and political and human rights dimensions. Formulation of an immigration policy goes hand in hand with political processes, where natives’ attitudes play a significant role. On the other hand, as was the case in Turkey, radical changes made in immigration policy or policies lacking transparency may cause severe reactions by the host society. The underlying discussion paper aims to analyze quantitatively the effects of the existing ‘open door’ immigration policy on the economic integration of Syrian refugees in Turkey, and on the perception of the native population of refugees. For the analysis, semi-structured in-depth interviews and focus group interviews have been conducted. After the introduction, a literature review is provided, followed by theoretical background on the explanation of natives’ attitudes towards immigrants. In the next section, a qualitative analysis of natives’ attitudes towards Syrian refugees is presented with the subtopics of (i) awareness, general opinions and expectations, (ii) open-door policy and management of the migration process, (iii) perception of positive and negative impacts of immigration, (iv) economic integration, and (v) cultural similarity. Results indicate that, natives concurrently have social, economic and security concerns regarding refugees, while difficulties regarding security and economic integration of refugees stand out. Socio-economic characteristics of the respondents, such as the educational level and employment status, are not sufficient to explain the overall attitudes towards refugees, while they can be used to explain the awareness of the respondents and the priority of the concerns felt.Keywords: economic integration, immigration policy, integration policies, migrants, natives’ sentiments, perception, Syrian refugees, Turkey
Procedia PDF Downloads 35513825 Strip Size Optimization for Spiral Type Actuator Coil Used in Electromagnetic Flat Sheet Forming Experiment
Authors: M. A. Aleem, M. S. Awan
Abstract:
Flat spiral coil for electromagnetic forming system has been modelled in FEMM 4.2 software. Copper strip was chosen as the material for designing the actuator coil. Relationship between height to width ratio (S-factor) of the copper strip and coil’s performance has been studied. Magnetic field intensities, eddy currents, and Lorentz force were calculated for the coils that were designed using six different 'S-factor' values (0.65, 0.75, 1.05, 1.25, 1.54 and 1.75), keeping the cross-sectional area of strip the same. Results obtained through simulation suggest that actuator coil with S-factor ~ 1 shows optimum forming performance as it exerts maximum Lorentz force (84 kN) on work piece. The same coils were fabricated and used for electromagnetic sheet forming experiments. Aluminum 6061 sheets of thickness 1.5 mm have been formed using different voltage levels of capacitor bank. Smooth forming profiles were obtained with dome heights 28, 35 and 40 mm in work piece at 800, 1150 and 1250 V respectively.Keywords: FEM modelling, electromagnetic forming, spiral coil, Lorentz force
Procedia PDF Downloads 28613824 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia
Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro
Abstract:
Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.Keywords: border security, defense, energy, national interest, threat
Procedia PDF Downloads 48213823 Online Pose Estimation and Tracking Approach with Siamese Region Proposal Network
Authors: Cheng Fang, Lingwei Quan, Cunyue Lu
Abstract:
Human pose estimation and tracking are to accurately identify and locate the positions of human joints in the video. It is a computer vision task which is of great significance for human motion recognition, behavior understanding and scene analysis. There has been remarkable progress on human pose estimation in recent years. However, more researches are needed for human pose tracking especially for online tracking. In this paper, a framework, called PoseSRPN, is proposed for online single-person pose estimation and tracking. We use Siamese network attaching a pose estimation branch to incorporate Single-person Pose Tracking (SPT) and Visual Object Tracking (VOT) into one framework. The pose estimation branch has a simple network structure that replaces the complex upsampling and convolution network structure with deconvolution. By augmenting the loss of fully convolutional Siamese network with the pose estimation task, pose estimation and tracking can be trained in one stage. Once trained, PoseSRPN only relies on a single bounding box initialization and producing human joints location. The experimental results show that while maintaining the good accuracy of pose estimation on COCO and PoseTrack datasets, the proposed method achieves a speed of 59 frame/s, which is superior to other pose tracking frameworks.Keywords: computer vision, pose estimation, pose tracking, Siamese network
Procedia PDF Downloads 15313822 The Continuing Saga of Poverty Reduction and Food Security in the Philippines
Authors: Shienna Marie Esteban
Abstract:
The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.Keywords: agriculture, food security, policy, poverty
Procedia PDF Downloads 31113821 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 19213820 The Research on Human Resource Management Problem of Turkish Fast Food Company
Authors: Mai Maitiaili Tuerdi
Abstract:
Turkey is one of the countries in which fast food service is growing increasingly in the world. The emergence of KFC and McDonald's to Turkish market is affecting every aspects of local fast-food services. The Turkey's famous catering companies named "Simit Sarayi" and "Güllüoğlu" are famous for accepting the Western fast food management service and skills in order to increase their market share. Also, they have created their unique management skills in this field. In this paper, through empirical and comparative study method we will analyze the famous Turkish local fast-food companies and western human resource management. We will argue how to create and adapt the human resource management while the company is economically and socially growing.Keywords: human resources management, Turkey, fast food, management
Procedia PDF Downloads 34813819 Green Human Recourse Environment Performance, Circular Performance Environment Reputation and Economics Performance: The Moderating Role of CEO Ethical Leadership
Authors: Muhammad Umair Ahmed, Aftab Shoukat
Abstract:
Today the global economy has become one of the key strategies in dealing with environmental issues. To allow for a round economy, organizations have begun to work to improve their sustainability management. The contribution of green resource management to the transformation of the global economy has not been investigated. The purpose of the study was to evaluate the effects of green labor management on the global economy, environmental and economic performance, and the organisation's environmental dignity. We strongly evaluate the different roles of the various processes of green personnel management (i.e., green recruitment, training, and engagement green, as well as green performance management and reward) in organizational operations. We are also investigating the leadership role of CEO Ethical. Our outcome will have a positive impact on the performance of the organization. Green Human Resource Management contributes to the evolution of a roundabout economy without the influence of different external factors such as market demand and commitment. Finally, the results of our research will provide a few aspects for future research, both academic and human.Keywords: sustainability, green human resource management, circular economy, human capital
Procedia PDF Downloads 9013818 Relevant LMA Features for Human Motion Recognition
Authors: Insaf Ajili, Malik Mallem, Jean-Yves Didier
Abstract:
Motion recognition from videos is actually a very complex task due to the high variability of motions. This paper describes the challenges of human motion recognition, especially motion representation step with relevant features. Our descriptor vector is inspired from Laban Movement Analysis method. We propose discriminative features using the Random Forest algorithm in order to remove redundant features and make learning algorithms operate faster and more effectively. We validate our method on MSRC-12 and UTKinect datasets.Keywords: discriminative LMA features, features reduction, human motion recognition, random forest
Procedia PDF Downloads 19513817 Anticancer Lantadene Derivatives: Synthesis, Cytotoxic and Docking Studies
Authors: A. Monika, Manu Sharma, Hong Boo Lee, Richa Dhingra, Neelima Dhingra
Abstract:
Nuclear factor-κappa B serve as a molecular lynchpin that links persistent infections and chronic inflammation to increased cancer risk. Inflammation has been recognized as a hallmark and cause of cancer. Natural products present a privileged source of inspiration for chemical probe and drug design. Herbal remedies were the first medicines used by humans due to the many pharmacologically active secondary metabolites produced by plants. Some of the metabolites like Lantadene (pentacyclic triterpenoids) from the weed Lantana camara has been known to inhibit cell division and showed anti-antitumor potential. The C-3 aromatic esters of lantadenes were synthesized, characterized and evaluated for cytotoxicity and inhibitory potential against Tumor necrosis factor alpha-induced activation of Nuclear factor-κappa B in lung cancer cell line A549. The 3-methoxybenzoyloxy substituted lead analogue inhibited kinase activity of the inhibitor of nuclear factor-kappa B kinase in a single-digit micromolar concentration. At the same time, the lead compound showed promising cytotoxicity against A549 lung cancer cells with IC50 ( half maximal inhibitory concentration) of 0.98l µM. Further, molecular docking of 3-methoxybenzoyloxy substituted analogue against Inhibitor of nuclear factor-kappa B kinase (Protein data bank ID: 3QA8) showed hydrogen bonding interaction involving oxygen atom of 3-methoxybenzoyloxy with the Arginine-31 and Glutamine-110. Encouraging results indicate the Lantadene’s potential to be developed as anticancer agents.Keywords: anticancer, lantadenes, pentacyclic triterpenoids, weed
Procedia PDF Downloads 15613816 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 37213815 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings
Authors: Vanda Božić, Željko Nikač
Abstract:
Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights
Procedia PDF Downloads 35913814 Silica Nanoparticles Induced Oxidative Stress and Inflammation in MRC-5 Human Lung Fibroblasts
Authors: Anca Dinischiotu, Sorina Nicoleta Voicu
Abstract:
Silica nanoparticles (SiO2-NPs) are widely used in consumer products such as paints, plastics, insulation materials, tires, concrete production, as well as in gene delivery systems and imaging procedures. Environmental human exposure to them occurs during utilization of these products, in a time-dependent manner, the uptake being by topic and inhalation route especially. SiO2-NPs enter cells and induce membrane damage, oxidative stress and inflammatory reactions in a concentration-dependent manner. In this study, MRC-5 cells (human fetal lung fibroblasts) were exposed to amorphous SiO2-NPs at a dose of 62.5 μg/ml for 24, 48 and 72 hours. The size distribution of NPs was a lognormal function, in the range 3-14 nm. A time-dependent decrease of total reduced glutathione concentration by 36%, 50%, and 78% and an increase of NO level by 62%, 32%, respectively 24% compared to control were noticed. An up-regulation of NF-kB expression by 20%, 50% respectively 10% and of Nrf-2 by 139%, 58%, and 16% compared to control after 24, 48 and 72 hours was noticed also. The expression of IL-1β, IL-6, IL-8, and COX-2 was up-regulated in a time-dependent manner. Also, the expression of MMP-2 and MMP-9 were down-regulated after 48 and 72 hours, whereas their activities raised in a time-dependent manner. Exposure of cells to NPs up-regulated the expression of inducible NO synthase, as previously was shown, and probably this is the reason for the increased level of NO, that can react with the thiol groups of reduced glutathione molecules, diminishing its concentration Nrf2 is a transcription factor translocated in nucleus, under oxidative stress, where downstream gene expression activates in order to modulate the adaptive intracellular response against oxidative stress. The cross-talk between Nrf2 and NF-kB activities regulates the inflammatory processes. The activation of NF-kB could activate up-regulation of IL-1β, IL-6, and IL-8. The increase of COX-2 expression could be correlated with IL-1β one. Also, probably in response to the pro-inflammatory cytokines, MMP-2 and MMP-9 were induced and activated. In conclusion, the exposure of MRC-5 cells to SiO2-NPs generated inflammation in a time-dependent manner.Keywords: inflammation, MRC-5 cells, oxidative stress, silica nanoparticles
Procedia PDF Downloads 14613813 The Human Right to a Safe, Clean and Healthy Environment in Corporate Social Responsibility's Strategies: An Approach to Understanding Mexico's Mining Sector
Authors: Thalia Viveros-Uehara
Abstract:
The virtues of Corporate Social Responsibility (CSR) are explored widely in the academic literature. However, few studies address its link to human rights, per se; specifically, the right to a safe, clean and healthy environment. Fewer still are the research works in this area that relate to developing countries, where a number of areas are biodiversity hotspots. In Mexico, despite the rise and evolution of CSR schemes, grave episodes of pollution persist, especially those caused by the mining industry. These cases set up the question of the correspondence between the current CSR practices of mining companies in the country and their responsibility to respect the right to a safe, clean and healthy environment. The present study approaches precisely such a bridge, which until now has not been fully tackled in light of Mexico's 2011 constitutional human rights amendment and the United Nation's Guiding Principles on Business and Human Rights (UN Guiding Principles), adopted by the Human Rights Council in 2011. To that aim, it initially presents a contextual framework; it then explores qualitatively the adoption of human rights’ language in the CSR strategies of the three main mining companies in Mexico, and finally, it examines their standing with respect to the UN Guiding Principles. The results reveal that human rights are included in the RSE strategies of the analysed businesses, at least at the rhetoric level; however, they do not embrace the right to a safe, clean and healthy environment as such. Moreover, we conclude that despite the finding that corporations publicly express their commitment to respect human rights, some operational weaknesses that hamper the exercise of such responsibility persist; for example, the systematic lack of human rights impact assessments per mining unit, the denial of actual and publicly-known negative episodes on the environment linked directly to their operations, and the absence of effective mechanisms to remediate adverse impacts.Keywords: corporate social responsibility, environmental impacts, human rights, right to a safe, clean and healthy environment, mining industry
Procedia PDF Downloads 32913812 The Mitigation of Human Trafficking through Agricultural Development: A Proactive International Approach
Authors: Brianna Douglas
Abstract:
A literary Meta-Analysis was conducted in order to form a proactive solution to the systematic issue of international human trafficking stemming from the Asia-Pacific region. This approach seeks to resolve the low economic prospect for women in the region, along with other identified drivers, to mitigate human trafficking before it begins. Through the reallocation of aid in agriculture, implementation of an education-for-education model, and provision of access to market information to the women in rural regions, the retraction of both the supply and international demand curves of trafficked humans is possible; resulting in the shutdown of the market as a whole. This report provides a basic and adaptable proposal to mitigation the selling of Asia Pacific women within international trafficking schemes with byproduct effects of increasing food, sustainability and decreasing government spending.Keywords: human trafficking, agricultural development, Asia Pacific, women's empowerment
Procedia PDF Downloads 15313811 Financial and Human Resources of Terrorism
Authors: Abdurrahman Karacabey
Abstract:
Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.Keywords: financial resources, human resources, isis, terrorism
Procedia PDF Downloads 41213810 Anti-Melanogenic Effect of Fisetin through Activating Connective Tissue Growth Factor in vivo Mice Model
Authors: Ryeong-Hyeon Kim, Ah-Reum Lee, Seong-Soo Roh, Gyo-Nam Kim
Abstract:
Appropriate regulation of melanogenesis is important for the management of skin pigmentation-related disease. Although several beneficial effects of fisetin (3,7,3’,4’-tetrahydroxyflavone) have been reported, the precise role and molecular mechanisms of fisetin in skin health both remain unclear. Here, we induced melanogenesis of HRM2 mice (n=7/group) by UVB irradiation for 20 days. UVB-induced HRM2 mice showed that the significantly increased melanin accumulation, however, fisetin treatment (25mg and 50mg/kg of body weight) dose-dependently and significantly inhibits UVB-induced melanogenesis. In line with this, fisetin treatment effectively down-regulated m RNA and expression levels of tyrosinase, TRP2, and MITF. In addition, our inhibitor assay revealed the down-regulated melanogenic marker genes by fisetin treatment were mediated with connective tissue growth factor (CCN2)/TGF-β signaling pathway. Useful information is provided for development of functional foods using fisetin for skin health.Keywords: connective tissue growth factor, fisetin, melanogenesis, skin, TGF-beta
Procedia PDF Downloads 236