Search results for: human factor in security
13782 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 1613781 The Effect of Principled Human Resource Management and Training Based on Existing Standards in Order to Improve the Quality of Construction Projects
Authors: Arsalan Salahi
Abstract:
Today, the number of changes in the construction industry and urban mass house building is increasing, which makes you need to pay more attention to targeted planning for human resource management and training. The human resources working in the construction industry have various problems and deficiencies, and in order to solve these problems, there is a need for basic management and training of these people in order to lower the construction costs and increase the quality of the projects, especially in mass house building projects. The success of any project in reaching short and long-term professional goals depends on the efficient combination of work tools, financial resources, raw materials, and most importantly, human resources. Today, due to the complexity and diversity of each project, specialized management fields have emerged to maximize the potential benefits of each component of that project. Human power is known as the most important resource in construction projects for its successful implementation, but unfortunately, due to the low cost of human power compared to other resources, such as materials and machinery, little attention is paid to it. With the correct management and training of human resources, which depends on its correct planning and development, it is possible to improve the performance of construction projects. In this article, the training and motivation of construction industry workers and their effects on the effectiveness of projects in this industry have been researched. In this regard, some barriers to the training and motivation of construction workers and personnel have been identified and solutions have been provided for construction companies. Also, the impact of workers and unskilled people on the efficiency of construction projects is investigated. The results of the above research show that by increasing the use of correct and basic training for human resources, we will see positive results and effects on the performance of construction projects.Keywords: human resources, construction industry, principled training, skilled and unskilled workers
Procedia PDF Downloads 9613780 The Impact of Technology on Cultural Heritage among Preschool Children
Authors: Adenike Akinrotimi
Abstract:
Globally, education has been identified as vital tool for any form of development for any society (community); be it economic, social, political and cultural development. It is the determinant level of prosperity, welfare, security and sustenance of the people of a particular community. Education could be formal, informal and non-formal. Cultural development of an individual and of the community as it were is a lifelong process, where individual learns from daily experiences, exposure to the environment at home, at work, at play and it enriches human and environmental potentials. This type of education can be referred to as cultural heritage. It is built on learner participation and assimilation. Preschool programme also referred to as Early Childhood Education is critical to holistic development of a child cultural development inclusive. This paper examines the impact that technology has on cultural heritage among preschool children.Keywords: cultural heritage, education, pre-school, technology
Procedia PDF Downloads 39913779 Therapeutic Potential of mAb KP52 in Human and Feline Cancers
Authors: Abigail Tan, Heng Liang Tan, Vanessa Ding, James Hui, Eng Hin Lee, Andre Choo
Abstract:
Introduction: Comparative oncology investigates the similarities in spontaneous carcinogenesis between humans and animals, in order to identify treatments that can benefit these patients. Companion animals (CA), like canines and felines, are of special interest when it comes to studying human cancers due to their exposure to the same environmental factors and develop tumours with similar features. The purpose of this study is to explore the cross-reactivity of monoclonal antibodies (mAbs) across cancers in humans and CA. Material and Methods: A panel of CA mAbs generated in the lab was screened on multiple human cancer cell lines through flow cytometry to identify for positive binders. Shortlisted candidates were then characterised by biochemical and functional assays e.g., antibody-drug conjugate (ADC) and western blot assays, including glycan studies. Results: Candidate mAb KP52 was generated from whole-cell immunisation using feline mammary carcinoma. KP52 showed strong positive binding to human cancer cells, such as breast cancer and ovarian cancer. Furthermore, KP52 demonstrated strong killing ( > 50%) as an ADC with Saporin as the payload. Western blot results revealed the molecular weight of the antigen targets to be approximately 45kD and 50kD under reduced conditions. Glycan studies suggest that the epitope is glycan in nature, specifically an O-linked glycan. Conclusion: Candidate mAb KP52 has a therapeutic potential as an ADC against feline mammary cancer, human ovarian cancer, human mammary cancer, human pancreatic cancer, and human gastric cancer.Keywords: ADC, comparative oncology, mAb, therapeutic
Procedia PDF Downloads 17313778 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 12413777 Role of Human Epididymis Protein 4 as a Biomarker in the Diagnosis of Ovarian Cancer
Authors: Amar Ranjan, Julieana Durai, Pranay Tanwar
Abstract:
Background &Introduction: Ovarian cancer is one of the most common malignant tumor in the female. 70% of the cases of ovarian cancer are diagnosed at an advanced stage. The five-year survival rate associated with ovarian cancer is less than 30%. The early diagnosis of ovarian cancer becomes a key factor in improving the survival rate of patients. Presently, CAl25 (carbohydrate antigen125) is used for the diagnosis and therapeutic monitoring of ovarian cancer, but its sensitivity and specificity is not ideal. The introduction of HE4, human epididymis protein 4 has attracted much attention. HE4 has a sensitivity and specificity of 72.9% and 95% for differentiating between benign and malignant adnexal masses, which is better than CA125 detection. Methods: Serum HE4 and CA -125 were estimated using the chemiluminescence method. Our cases were 40 epithelial ovarian cancer, 9 benign ovarian tumor, 29 benign gynaecological diseases and 13 healthy individuals. This group include healthy woman those who have undergoing family planning and menopause-related medical consultations and they are negative for ovarian mass. Optimal cut off values for HE4 and CA125 were 55.89pmol/L and 40.25U/L respectively (determined by statistical analysis). Results: The level of HE4 was raised in all ovarian cancer patients (n=40) whereas CA125 levels were normal in 6/40 ovarian cancer patients, which were the cases of OC confirmed by histopathology. There is a significant decrease in the level of HE4 with comparison to CA125 in benign ovarian tumor cases. Both the levels of HE4 and CA125 were raised in the nonovarian cancer group, which includes cancer of endometrium and cervix. In the healthy group, HE4 was normal in all patients except in one case of the rudimentary horn, and the reason for this raised HE4 level is due to the incomplete development of uterus whereas CA125 was raised in 3 cases. Conclusions: Findings showed that the serum level of HE4 is an important indicator in the diagnosis of ovarian cancer, and it also distinguishes between benign and malignant pelvic masses. However, a combination of HE4 and CA125 panel will be extremely valuable in improving the diagnostic efficiency of ovarian cancer. These findings of our study need to be validated in the larger cohort of patients.Keywords: human epididymis protein 4, ovarian cancer, diagnosis, benign lesions
Procedia PDF Downloads 13113776 The Study of Thai Consumer Behavior toward Buying Goods on the Internet
Authors: Pichamon Chansuchai
Abstract:
The study of Thai consumer behavior toward buying goods on the Internet is a survey research. The five-level rating scale and open-ended questionnaire are applied for this research procedure, which has more than 400 random sampling of Thai people aged between 15-40 years old. The summary findings are: The analysis of respondents profile were female 55.3% and male 44.8% , 35.3% aged between 20-30 years old, had been employed 29.5% with average income up to 11,000 baht/month 50.2% and expenditure more than 11,000 baht per month 29.3%. The internet usage behavior of respondents mostly found that objectives of the internet usage are: 1) Communication 93.3% 2) the categories of websites usage was trading 42.8% 3) The marketing mix effected to trading behavior via internet which can be analyzed in term of marketing factor as following: Product focused on product quality was the most influenced factor with average value 4.75. The cheaper price than overview market was the most effect factor to internet shopping with mean value 4.53. The average value 4.67 of the available place that could reduce spending time for shopping. The effective promotion of the buy 1 get 1 was the stimulus factor for internet shopping with mean value 4.60. For hypothesis testing, the different sex has relationship with buying decision. It presented that male and female have vary purchasing decision via internet with value of significant difference 0.05. Furthermore, the variety occupations of respondents related to the use of selected type of website. It also found that the vary of personal occupation effected to the type of website selection dissimilar with value of significant difference 0.05.Keywords: behavior, internet, consumer, goods
Procedia PDF Downloads 24913775 Geometric Morphometric Analysis of Allometric Variation in the Hand Morphology of Adults
Authors: Aleksandr S. Ermolenko
Abstract:
Allometry is an important factor of morphological integration, contributing to the organization of the phenotype and its variability. The allometric change in the shape of the hand is particularly important in primate evolution, as the hand has important taxonomic features. Some of these features are known to parts with the shape, especially the ratio of the lengths of the index and ring fingers (2d: 4d ratio). The hand is a fairly well-studied system in the context of the evolutionary development of complex morphological structures since it consists of various departments (basipodium, metapodium, acropodium) that form a single structure –autopodium. In the present study, we examined the allometric variability of acropodium. We tested the null hypothesis that there would be no difference in allometric variation between the two components. Geometric morphometry based on a procrustation of 16 two-dimensional (2D) landmarks was analyzed using multivariate shape-by-size regressions in samples from 100 people (50 men and 50 women). The results obtained show that men have significantly greater allometric variability for the ring finger (variability in the transverse axis prevails), while women have significantly greater allometric variability for the index finger (variability in the longitudinal axis prevails). The influence of the middle finger on the shape of the hand is typical for both men and women. The influence of the little finger on the shape of the hand, regardless of gender, was not revealed. The results of this study support the hypothesis that allometry contributes to the organization of variation in the human hand.Keywords: human hand, size and shape, 2d:4d ratio, geometric morphometry
Procedia PDF Downloads 15813774 Kidnapping of Migrants by Drug Cartels in Mexico as a New Trend in Contemporary Slavery
Authors: Itze Coronel Salomon
Abstract:
The rise of organized crime and violence related to drug cartels in Mexico has created serious challenges for the authorities to provide security to those who live within its borders. However, to achieve a significant improvement in security is absolute respect for fundamental human rights by the authorities. Irregular migrants in Mexico are at serious risk of abuse. Research by Amnesty International as well as reports of the NHRC (National Human Rights) in Mexico, have indicated the major humanitarian crisis faced by thousands of migrants traveling in the shadows. However, the true extent of the problem remains invisible to the general population. The fact that federal and state governments leave no proper record of abuse and do not publish reliable data contributes to ignorance and misinformation, often spread by the media that portray migrants as the source of crime rather than their victims. Discrimination and intolerance against irregular migrants can generate greater hostility and exclusion. According to the modus operandi that has been recorded criminal organizations and criminal groups linked to drug trafficking structures deprive migrants of their liberty for forced labor and illegal activities related to drug trafficking, even some have been kidnapped for be trained as murderers . If the victim or their family cannot pay the ransom, the kidnapped person may suffer torture, mutilation and amputation of limbs or death. Migrant women are victims of sexual abuse during her abduction as well. In 2011, at least 177 bodies were identified in the largest mass grave found in Mexico, located in the town of San Fernando, in the border state of Tamaulipas, most of the victims were killed by blunt instruments, and most seemed to be immigrants and travelers passing through the country. With dozens of small graves discovered in northern Mexico, this may suggest a change in tactics between organized crime groups to the different means of obtaining revenue and reduce murder profile methods. Competition and conflict over territorial control drug trafficking can provide strong incentives for organized crime groups send signals of violence to the authorities and rival groups. However, as some Mexican organized crime groups are increasingly looking to take advantage of income and vulnerable groups, such as Central American migrants seem less interested in advertising his work to authorities and others, and more interested in evading detection and confrontation. This paper pretends to analyze the introduction of this new trend of kidnapping migrants for forced labors by drug cartels in Mexico into the forms of contemporary slavery and its implications.Keywords: international law, migration, transnational organized crime
Procedia PDF Downloads 41613773 Systematic Identification and Quantification of Substrate Specificity Determinants in Human Protein Kinases
Authors: Manuel A. Alonso-Tarajano, Roberto Mosca, Patrick Aloy
Abstract:
Protein kinases participate in a myriad of cellular processes of major biomedical interest. The in vivo substrate specificity of these enzymes is a process determined by several factors, and despite several years of research on the topic, is still far from being totally understood. In the present work, we have quantified the contributions to the kinase substrate specificity of i) the phosphorylation sites and their surrounding residues in the sequence and of ii) the association of kinases to adaptor or scaffold proteins. We have used position-specific scoring matrices (PSSMs), to represent the stretches of sequences phosphorylated by 93 families of kinases. We have found negative correlations between the number of sequences from which a PSSM is generated and the statistical significance and the performance of that PSSM. Using a subset of 22 statistically significant PSSMs, we have identified specificity determinant residues (SDRs) for 86% of the corresponding kinase families. Our results suggest that different SDRs can function as positive or negative elements of substrate recognition by the different families of kinases. Additionally, we have found that human proteins with known function as adaptors or scaffolds (kAS) tend to interact with a significantly large fraction of the substrates of the kinases to which they associate. Based on this characteristic we have identified a set of 279 potential adaptors/scaffolds (pAS) for human kinases, which is enriched in Pfam domains and functional terms tightly related to the proposed function. Moreover, our results show that for 74.6% of the kinase– pAS association found, the pAS colocalize with the substrates of the kinases they are associated to. Finally, we have found evidence suggesting that the association of kinases to adaptors and scaffolds, may contribute significantly to diminish the in vivo substrate crossed- specificity of protein kinases. In general, our results indicate the relevance of several SDRs for both the positive and negative selection of phosphorylation sites by kinase families and also suggest that the association of kinases to pAS proteins may be an important factor for the localization of the enzymes with their set of substrates.Keywords: kinase, phosphorylation, substrate specificity, adaptors, scaffolds, cellular colocalization
Procedia PDF Downloads 34313772 Slowness in Architecture: The Pace of Human Engagement with the Built Environment
Authors: Jaidev Tripathy
Abstract:
A human generation’s lifestyle, behaviors, habits, and actions are governed heavily by homogenous mindsets. But the current scenario is witnessing a rapid gap in this homogeneity as a result of an intervention, or rather, the dominance of the digital revolution in the human lifestyle. The current mindset for mass production, employment, multi-tasking, rapid involvement, and stiff competition to stay above the rest has led to a major shift in human consciousness. Architecture, as an entity, is being perceived differently. The screens are replacing the skies. The pace at which operation and evolution is taking place has increased. It is paradoxical, that time seems to be moving faster despite the intention to save time. Parallelly, there is an evident shift in architectural typologies spanning across different generations. The architecture of today is now seems influenced heavily from here and there. Mass production of buildings and over-exploitation of resources giving shape to uninspiring algorithmic designs, ambiguously catering to multiple user groups, has become a prevalent theme. Borrow-and-steal replaces influence, and the diminishing depth in today’s designs reflects a lack of understanding and connection. The digitally dominated world, perceived as an aid to connect and network, is making humans less capable of real-life interactions and understanding. It is not wrong, but it doesn’t seem right either. The engagement level between human beings and the built environment is a concern which surfaces. This leads to a question: Does human engagement drive architecture, or does architecture drive human engagement? This paper attempts to relook at architecture's capacity and its relativity with pace to influence the conscious decisions of a human being. Secondary research, supported with case examples, helps in understanding the translation of human engagement with the built environment through physicality of architecture. The procedure, or theme, is pace and the role of slowness in the context of human behaviors, thus bridging the widening gap between the human race and the architecture themselves give shape to, avoiding a possible future dystopian world.Keywords: junkspace, pace, perception, slowness
Procedia PDF Downloads 10913771 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 12013770 Measurement and Analysis of Human Hand Kinematics
Authors: Tamara Grujic, Mirjana Bonkovic
Abstract:
Measurements and quantitative analysis of kinematic parameters of human hand movements have an important role in different areas such as hand function rehabilitation, modeling of multi-digits robotic hands, and the development of machine-man interfaces. In this paper the assessment and evaluation of the reach-to-grasp movement by using computerized and robot-assisted method is described. Experiment involved the measurements of hand positions of seven healthy subjects during grasping three objects of different shapes and sizes. Results showed that three dominant phases of reach-to-grasp movements could be clearly identified.Keywords: human hand, kinematics, measurement and analysis, reach-to-grasp movement
Procedia PDF Downloads 46413769 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 13913768 Factor Analysis Based on Semantic Differential of the Public Perception of Public Art: A Case Study of the Malaysia National Monument
Authors: Yuhanis Ibrahim, Sung-Pil Lee
Abstract:
This study attempts to address factors that contribute to outline public art factors assessment, memorial monument specifically. Memorial monuments hold significant and rich message whether the intention of the art is to mark and commemorate important event or to inform younger generation about the past. Public monument should relate to the public and raise awareness about the significant issue. Therefore, by investigating the impact of the existing public memorial art will hopefully shed some lights to the upcoming public art projects’ stakeholders to ensure the lucid memorial message is delivered to the public directly. Public is the main actor as public is the fundamental purpose that the art was created. Perception is framed as one of the reliable evaluation tools to assess the public art impact factors. The Malaysia National Monument was selected to be the case study for the investigation. The public’s perceptions were gathered using a questionnaire that involved (n-115) participants to attain keywords, and next Semantical Differential Methodology (SDM) was adopted to evaluate the perceptions about the memorial monument. These perceptions were then measured with Reliability Factor and then were factorised using Factor Analysis of Principal Component Analysis (PCA) method to acquire concise factors for the monument assessment. The result revealed that there are four factors that influence public’s perception on the monument which are aesthetic, audience, topology, and public reception. The study concludes by proposing the factors for public memorial art assessment for the next future public memorial projects especially in Malaysia.Keywords: factor analysis, public art, public perception, semantical differential methodology
Procedia PDF Downloads 50113767 Impact of Similarity Ratings on Human Judgement
Authors: Ian A. McCulloh, Madelaine Zinser, Jesse Patsolic, Michael Ramos
Abstract:
Recommender systems are a common artificial intelligence (AI) application. For any given input, a search system will return a rank-ordered list of similar items. As users review returned items, they must decide when to halt the search and either revise search terms or conclude their requirement is novel with no similar items in the database. We present a statistically designed experiment that investigates the impact of similarity ratings on human judgement to conclude a search item is novel and halt the search. 450 participants were recruited from Amazon Mechanical Turk to render judgement across 12 decision tasks. We find the inclusion of ratings increases the human perception that items are novel. Percent similarity increases novelty discernment when compared with star-rated similarity or the absence of a rating. Ratings reduce the time to decide and improve decision confidence. This suggests the inclusion of similarity ratings can aid human decision-makers in knowledge search tasks.Keywords: ratings, rankings, crowdsourcing, empirical studies, user studies, similarity measures, human-centered computing, novelty in information retrieval
Procedia PDF Downloads 13113766 Analysis of Human Mental and Behavioral Models for Development of an Electroencephalography-Based Human Performance Management System
Authors: John Gaber, Youssef Ahmed, Hossam A. Gabbar, Jing Ren
Abstract:
Accidents at Nuclear Power Plants (NPPs) occur due to various factors, notable among them being poor safety management and poor safety culture. During abnormal situations, the likelihood of human error is many-fold higher due to the higher cognitive workload. The most common cause of human error and high cognitive workload is mental fatigue. Electroencephalography (EEG) is a method of gathering the electromagnetic waves emitted by a human brain. We propose a safety system by monitoring brainwaves for signs of mental fatigue using an EEG system. This requires an analysis of the mental model of the NPP operator, changes in brain wave power in response to certain stimuli, and the risk factors on mental fatigue and attention that NPP operators face when performing their tasks. We analyzed these factors and developed an EEG-based monitoring system, which aims to alert NPP operators when levels of mental fatigue and attention hinders their ability to maintain safety.Keywords: brain imaging, EEG, power plant operator, psychology
Procedia PDF Downloads 10113765 Activation of TNF-α from Human Endothelial Cells by Exposure of the Mitochondrial Stress Protein (Hsp60) Secreted from THP-1 Monocytes to High Glucose
Authors: Ryan D. Martinus
Abstract:
Inflammation of the endothelium is an important process leading to diabetic atherosclerosis. However, the molecular mechanisms by which diabetes contributes to endothelial inflammation remain to be established. Using In-vitro cultured Human cells and Hsp60 specific ELISA assays, we show that Hsp60 is not only induced in Human monocyte cells under hyperglycaemic conditions but that the Hsp60 is also secreted from these cells. Furthermore, we also demonstrate that the Hsp60 secreted from these monocyte cells is also able to activate Toll-like receptor-4 (TLR4) from Human endothelial cells. This suggests that a potential link may exist between the hyperglycaemia-induced expression of Hsp60 in monocyte cells and vascular inflammation. Circulating levels of Hsp60 due to mitochondrial stress in diabetes patients could, therefore, be an important modulator of inflammation in endothelial cells and thus contribute to the increased incidences of atherosclerosis in diabetes mellitus.Keywords: mitochondria, Hsp60, inflammation, diabetes mellitus
Procedia PDF Downloads 18113764 Elongation Factor 1 Alpha Molecular Phylogenetic Analysis for Anastrepha fraterculus Complex
Authors: Pratibha Srivastava, Ayyamperumal Jeyaprakash, Gary Steck
Abstract:
Exotic, invasive tephritid fruit flies (Diptera: Tephritidae) are a major concern to fruit and vegetable production in the USA. Timely detection and identification of these agricultural pests facilitate the possibility of eradication from newly invaded areas. They spread primarily as larvae in infested fruits carried in commerce or personal baggage. Identification of larval stages to species level is difficult but necessary to determine pest loads and their pathways into the USA. The main focus of this study is the New World genus, Anastrepha. Many of its constituent taxa are pests of major economic importance. This study is significant for national quarantine use, as morphological diagnostics to separate larvae of the various members remain poorly developed. Elongation factor 1 alpha sequences were amplified from Anastrepha fraterculus specimens collected from South America (Ecuador and Peru). Phylogenetic analysis was performed to characterize the Anastrepha fraterculus complex at a molecular level.Keywords: anastrepha, diptera, elongation factor, fruit fly
Procedia PDF Downloads 20513763 Researching the Impact of Entrepreneurship on Economic Growth: Making Traditional Products Suitable for Our Age with E-Commerce
Authors: GüLcan Keskin
Abstract:
In a globalizing world, it is more difficult for developing counties to gain a competitive advantage compared to developed countries. Entrepreneurship is an important factor for economic growth in developing countries. Entrepreneurship is not only in the success of an entrepreneur’s own businesses, but also plays an important role in regional and national development. Entrepreneurship is the factor that triggers change for the country to accelerate the creation, dissemination, and implementation of new thoughts, leading to the emergence of industries that supports economic growth and development as it increases productivity by creating a competitive advantage. Therefore, it is an important factor for countries to develop economically and socially in a global world. As the know-how of the local products belongs to the region, it is a value that should not be lost. Having know-how provides a competitive advantage to the region. On the other hand, traditional products can be tailored to today’s trade understanding to appeal to more audiences. The primary aim of the study is to examine the interaction mechanism between traditional products and innovation in the context of related literature. The second aim of the study is to show the effect the traditional products to competitive advantage.Keywords: e-commerce, economic growth, entrepreneurship, traditional products
Procedia PDF Downloads 12213762 Reduction in the Metabolic Cost of Human Walking Gaits Using Quasi-Passive Upper Body Exoskeleton
Authors: Nafiseh Ebrahimi, Gautham Muthukumaran, Amir Jafari
Abstract:
Human walking gait is considered to be the most efficient biped walking gait. There are various types of gait human follows during locomotion and arm swing is one of the most important factors which controls and differentiates human gaits. Earlier studies declared a 7% reduction in the metabolic cost due to the arm swing. In this research, we compared different types of arm swings in terms of metabolic cost reduction and then suggested, designed, fabricated and tested a quasi-passive upper body exoskeleton to study the metabolic cost reduction in the folded arm walking gate scenarios. Our experimental results validate a 10% reduction in the metabolic cost of walking aided by the application of the proposed exoskeleton.Keywords: arm swing, MET (metabolic equivalent of a task), calorimeter, oxygen consumption, upper body quasi-passive exoskeleton
Procedia PDF Downloads 15713761 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments
Authors: Katja Wiedemann, Melinda Gainschnigg
Abstract:
This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.Keywords: employment issues, gender inequality , women's studies, workplace
Procedia PDF Downloads 24913760 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
Abstract:
The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.Keywords: hospital, light fidelity, Li-Fi, medical devices, security
Procedia PDF Downloads 10213759 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 22613758 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 18213757 Pastoral Care and Counseling and Psychology as Sciences of Human Caring: Exploring the Interconnectedness of the Two Disciplines
Authors: Baloyi Gift Tlharihani
Abstract:
This paper explores the relationship between pastoral care and counselling and psychology. It will critically review the variety of views and debates regarding this relationship while acknowledging the different sides of the debates on the sameness and difference of these notions, this paper argues for the inevitable interconnectedness of the two. There has always been a close relationship, between pastoral care and counselling and psychology, although these are two totally different notions. Even though pastoral care and counselling are thought of as more spiritually focused and psychology with emotional and mental challenges, the components that connect these two sciences are represented by the care of human being. Therefore, this paper is interested in the interconnectedness of these two science as they both makes a vital contribution to human caring. It indicates that whether we take the dualistic difference between the body and soul, the trichotomous difference between the body, soul and spirit, our essential nature is found in the unity of those constituent elements.Keywords: anthropology, human care, pastoral care and counseling, psychology
Procedia PDF Downloads 29113756 Application of Smplify-X Algorithm with Enhanced Gender Classifier in 3D Human Pose Estimation
Authors: Jiahe Liu, Hongyang Yu, Miao Luo, Feng Qian
Abstract:
The widespread application of 3D human body reconstruction spans various fields. Smplify-X, an algorithm reliant on single-image input, employs three distinct body parameter templates, necessitating gender classification of individuals within the input image. Researchers employed a ResNet18 network to train a gender classifier within the Smplify-X framework, setting the threshold at 0.9, designating images falling below this threshold as having neutral gender. This model achieved 62.38% accurate predictions and 7.54% incorrect predictions. Our improvement involved refining the MobileNet network, resulting in a raised threshold of 0.97. Consequently, we attained 78.89% accurate predictions and a mere 0.2% incorrect predictions, markedly enhancing prediction precision and enabling more precise 3D human body reconstruction.Keywords: SMPLX, mobileNet, gender classification, 3D human reconstruction
Procedia PDF Downloads 9913755 Determine Causal Factors Affecting the Responsiveness and Productivity of Non-Governmental Universities
Authors: Davoud Maleki
Abstract:
Today, education and investment in human capital is a long-term investment without which the economy will be stagnant Stayed. Higher education represents a type of investment in human resources by providing and improving knowledge, skills and Attitudes help economic development. Providing efficient human resources by increasing the efficiency and productivity of people and on the other hand with Expanding the boundaries of knowledge and technology and promoting technology such as the responsibility of training human resources and increasing productivity and efficiency in High specialized levels are the responsibility of universities. Therefore, the university plays an infrastructural role in economic development and growth because education by creating skills and expertise in people and improving their ability.In recent decades, Iran's higher education system has been faced with many problems, therefore, scholars have looked for it is to identify and validate the causal factors affecting the responsiveness and productivity of non-governmental universities. The data in the qualitative part is the result of semi-structured interviews with 25 senior and middle managers working in the units It was Islamic Azad University of Tehran province, which was selected by theoretical sampling method. In data analysis, stepwise method and Analytical techniques of Strauss and Corbin (1992) were used. After determining the central category (answering for the sake of the beneficiaries) and using it in order to bring the categories, expressions and ideas that express the relationships between the main categories and In the end, six main categories were identified as causal factors affecting the university's responsiveness and productivity.They are: 1- Scientism 2- Human resources 3- Creating motivation in the university 4- Development based on needs assessment 5- Teaching process and Learning 6- University quality evaluation. In order to validate the response model obtained from the qualitative stage, a questionnaire The questionnaire was prepared and the answers of 146 students of Master's degree and Doctorate of Islamic Azad University located in Tehran province were received. Quantitative data in the form of descriptive data analysis, first and second stage factor analysis using SPSS and Amos23 software were analyzed. The findings of the research indicated the relationship between the central category and the causal factors affecting the response The results of the model test in the quantitative stage confirmed the generality of the conceptual model.Keywords: accountability, productivity, non-governmental, universities, foundation data theory
Procedia PDF Downloads 5913754 Human Posture Estimation Based on Multiple Viewpoints
Authors: Jiahe Liu, HongyangYu, Feng Qian, Miao Luo
Abstract:
This study aimed to address the problem of improving the confidence of key points by fusing multi-view information, thereby estimating human posture more accurately. We first obtained multi-view image information and then used the MvP algorithm to fuse this multi-view information together to obtain a set of high-confidence human key points. We used these as the input for the Spatio-Temporal Graph Convolution (ST-GCN). ST-GCN is a deep learning model used for processing spatio-temporal data, which can effectively capture spatio-temporal relationships in video sequences. By using the MvP algorithm to fuse multi-view information and inputting it into the spatio-temporal graph convolution model, this study provides an effective method to improve the accuracy of human posture estimation and provides strong support for further research and application in related fields.Keywords: multi-view, pose estimation, ST-GCN, joint fusion
Procedia PDF Downloads 7013753 The Applications of Four Fingers Theory: The Proof of 66 Acupoints under the Human Elbow and Knee
Authors: Chih-I. Tsai, Yu-Chien. Lin
Abstract:
Through experiences of clinical practices, it is discovered that locations on the body at a level of four fingerbreadth above and below the joints are the points at which muscles connect to tendons, and since the muscles and tendons possess opposite characteristics, muscles are full of blood but lack qi, while tendons are full of qi but lack blood, these points on our body become easily blocked. It is proposed that through doing acupuncture or creating localized pressure to the areas four fingerbreadths above and below our joints, with an elastic bandage, we could help the energy, also known as qi, to flow smoothly in our body and further improve our health. Based on the Four Fingers Theory, we understand that human height is 22 four fingerbreadths. In addition, qi and blood travel through 24 meridians, 50 times each day, and they flow through 6 cun with every human breath. We can also understand the average number of human heartbeats is 75 times per minute. And the function of qi-blood circulation system in Traditional Chinese Medicine is the same as the blood circulation in Western Medical Science. Informed by Four Fingers Theory, this study further examined its applications in acupuncture practices. The research question is how Four Fingers Theory proves what has been mentioned in Nei Jing that there are 66 acupoints under a human’s elbow and knee. In responding to the research question, there are 66 acupoints under a human’s elbow and knee. Four Fingers Theory facilitated the creation of the acupuncture naming and teaching system. It is expected to serve as an approachable and effective way to deliver knowledge of acupuncture to the public worldwide.Keywords: four fingers theory, meridians circulation, 66 acupoints under human elbow and knee, acupuncture
Procedia PDF Downloads 296