Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5277

Search results for: security awareness

3867 Availability of TB Infection Control Plans at Rural Hospitals of South Africa

Authors: Takalani Tshitangano

Abstract:

Background: In Limpopo province the rate of new tuberculosis (TB) cases increase daily. The Infection Control (IC) plan is one of the essential actions for TB IC. This study aimed to establish the availability of these plans at health care facilities. Objectives: The objectives were to explore and describe the awareness and knowledge of health care workers (HCWs) of the availability and content of TB IC plan; and to identity the role of infection control committees from the perspective of HCWs. Method: A qualitative approach using a cross-sectional descriptive design was adopted. The target population was all HCWs from the seven hospitals of Vhembe district. A purposive sampling approach was used to select 57 participants. The approval to conduct this study was obtained from the relevant authorities and participants. Data were collected through seven focus group discussions comprising five to 10 members. An unstructured discussion guide was used to collect data, and an open-coding method was used to analyse the data. Lincoln and Guba’s criteria ensured trustworthiness of the study findings. Results: Findings revealed that HCWs were not aware of the availability and the information contained in the TB IC plans. No person was designated as TB IC officer at hospital level. There was lack of a TB IC Committee and teams as well as ineffective utilisation of those that did exist. Conclusions: It was concluded that if the TB IC plans are not available at health care facilities, then the TB IC practices implemented by HCWs vary, resulting in TB nosocomial infection transmission. It was recommended that the World Health Organisation’s TB IC plans be adopted and implemented in Vhembe district.

Keywords: health care workers' awareness, health care workers' knowledge, availability of TB infection control plans, rural hospitals

Procedia PDF Downloads 217
3866 Disaster Preparedness for People with Disabilities through EPPO's Educational Awareness Initiative

Authors: A. Kourou, A. Ioakeimidou, E. Pelli, M. Panoutsopoulou, V. Abramea

Abstract:

Worldwide there is a growing recognition that education is a critical component of any disaster impacts reduction effort and a great challenge too. Given this challenge, a broad range of awareness raising projects at all levels are implemented and are continuously evaluated by Earthquake Planning and Protection Organization (EPPO). This paper presents an overview of EPPO educational initiative (seminars, lectures, workshops, campaigns and educational material) and its evaluation results. The abovementioned initiative is focused to aware the public, train teachers and civil protection staff, inform students and educate people with disabilities on subjects related to earthquake reduction issues. The better understating of how human activity can link to disaster and what can be done at the individual, family or workplace level to contribute to seismic reduction are the main issues of EPPO projects. Survey results revealed that a high percentage of teachers (included the ones of special schools) from all over the country have taken the appropriate preparedness measures at schools. On the other hand, the implementation of earthquake preparedness measures at various workplaces (kindergartens, banks, utilities etc.) has still significant room for improvement. Results show that the employees in banks and public utilities have substantially higher rates in preventive and preparedness actions in their workplaces than workers in kindergartens and other workplaces. One of the EPPO educational priorities is to enhance earthquake preparedness of people with disabilities. Booklets, posters and applications have been created with the financial support of the Council of Europe, addressed to people who have mobility impairments, learning difficulties or cognitive disability (ή intellectual disabilities). Part of the educational material was developed using the «easy-to-read» method and Makaton language program with the collaboration of experts on special needs education and teams of people with cognitive disability. Furthermore, earthquake safety seminars and earthquake drills have been implemented in order to develop children’s, parents’ and teachers abilities and skills on earthquake impacts reduction. To enhance the abovementioned efforts, EPPO is a partner at prevention and preparedness projects supported by EU Civil Protection Financial Instrument. One of them is E-PreS’ project (Monitoring and Evaluation of Natural Hazard Preparedness at School Environment). The main objectives of E-PreS project are: 1) to create smart tools which define, simulate and evaluate drills procedure at schools, centers of vocational training of people with disabilities or other workplaces, and 2) to involve students or adults with disabilities in the E-PreS system evacuation procedure in case of earthquake, flood, or volcanic occurrence. Two other EU projects (RACCE educational kit and EVANDE educational platform) are also with the aim of contributing to raising awareness among people with disabilities, students, teachers, volunteers etc. It is worth mentioning that even though in Greece many efforts have been done till now to build awareness towards earthquakes and establish preparedness status for prospective earthquakes, there are still actions to be taken.

Keywords: earthquake, emergency plans, E-PreS project, people with disabilities, special needs education

Procedia PDF Downloads 263
3865 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 295
3864 A Case Report on Diaphragm Disease of Small Bowel Following Usage of Non-Steroidal Anti-Inflammatory Drugs

Authors: Shivani Kuttuva, Bridget Fergie, Andrew Mishreki, Shovkat Mir, Fintan Bergin

Abstract:

Diaphragm disease (DD) of the small bowel is a condition wherein the bowel lumen is divided into a series of short compartments by multiple circumferential membranes of mucosa and submucosa, leading to pinhole lumen and subsequent obstruction. It is a rare condition commonly attributed to non-steroidal anti-inflammatory drugs (NSAIDs) usage. Herein we present a 31-yr-old-female with a history of NSAIDs usage for one year following neurosurgery, who presented with recurrent idiopathic small bowel obstruction, recalcitrant anaemia, and impaction of capsule endoscope on investigating for anaemia. The capsule endoscopy images demonstrated multiple circumferential strictures with ulcers at its tip and villous atrophy in the proximal bowel, suggestive of NSAIDs related damage. However, due to the lack of awareness of the detrimental effects of NSAIDs on bowel mucosa distal to the duodenum, the underlying aetiology of this clinical presentation remained a mystery for a significant duration. The patient had to undergo repeated laparotomies in order to relieve the symptoms of recurring acute small bowel obstruction. Upon examining the resected specimen under microscopy, the histopathological hallmark of expanded, fibrotic, and congested submucosa was picked up, leading to the confirmation of diaphragm disease. Thus, this case report aims to widen the awareness among clinicians and aid surgeons in devising a management plan for young individuals presenting with recurring episodes of obstruction due to Diaphragm disease.

Keywords: capsule endoscopy, diaphragm disease, NSAIDs, recurrent small bowel obstruction

Procedia PDF Downloads 165
3863 Knowledge and Attitude towards Helicobacter pylori: Awareness about Health Impacts of H. pylori Gastric Ulcer and Its Carcinogenic Potential among Adults in Sharjah

Authors: Abdullah Malek, Muzn Al Khaldi, Lian Odeh, Atheer Tariq, Mohammad Al Fardan, Hiba Barqawi

Abstract:

H. pylori bacterium is a known underlying agent for gastritis, peptic ulcer disease, and gastric cancer and is believed to infect half of the world’s population. Even with the ubiquity of H. pylori bacterium, there is lack of knowledge regarding its modes of transmission, associated diseases, carcinogenic effect and means of prevention; especially in the UAE. A cross sectional study of 500 participants, of which 58% (n= 289) of the respondents were female, and 42% (n=210) were male, was conducted in Sharjah to assess the knowledge, and explore the attitudes and practices among UAE residents towards Helicobacter Pylori and its associated PUD as well as its carcinogenic nature. A structured self-administered questionnaire was distributed to the target population to establish their demographic background and selected aspects of their lifestyle. General knowledge about H. Pylori was poor, only 24.6% stated they have heard of H. pylori. Attitudes towards prevention and practices were relatively poor as well. Subjects who suffered from severe symptoms (ALARM symptoms) had significantly lower habit scores than those with mild and moderate symptoms (p=0.0078**). To the authours’ knowledge, no previous studies were conducted in the United Arab Emirates regarding the epidemiology of the infection to detect the extent of H. Pylori’s impact on the public health. The results of this study can be used to draw conclusions about the average knowledge of the UAE population regarding H. pylori. It can also be a starting point to devise new education programs and campaigns that raise awareness of this health issue which could be easily avoided with early diagnosis and antibiotic treatment.

Keywords: chronic gastritis, community health, gastric cancer, Helicobacter pylori, peptic ulcers

Procedia PDF Downloads 257
3862 Improving Healthcare Readiness to Respond to Human Trafficking: A Case Study

Authors: Traci A. Hefner

Abstract:

Limited research exists on the readiness of emergency departments to respond to human trafficking (HT). The purpose of this qualitative case study was to improve the readiness of a Department of Emergency Medicine (ED), located in the southeast region of the United States, in identifying, assessing, and responding to trafficked individuals. The research objectives were to 1) provide an organizing framework to understand the ED’s readiness to respond to HT, using the Transtheoretical Model’s stages of change construct, 2) explain the readiness of the ED through a three-pronged contextual approach that included policies and procedures, patient data collection processes, and clinical practice methods, and 3) develop recommendations to respond to HT. Content analysis was used for document reviews and on-site observations, while thematic analysis identified themes of staff perceptions of the ED’s readiness in interviews of over 30 clinical and non-clinical healthcare professionals. Results demonstrated low levels of readiness to identify HT through the ED’s policies and procedures, data collection processes, and clinical practice methods. Clinical practice-related factors consisted of limited awareness of HT warning signs and low-levels of knowledge about community resources for possible HT referrals. Policy and practice recommendations to increase the ED’s readiness to respond to HT included: developing staff trainings across the ED system to enhance awareness of HT warning signs, incorporating HT into current policies and procedures for vulnerable patient populations as well as creating a HT protocol that addresses policies and procedures, screening tools, and community referrals.

Keywords: emergency medicine, human trafficking, organizational assessment, stages of change

Procedia PDF Downloads 142
3861 Reactive Learning about Food Waste Reduction in a Food Processing Plant in Gauteng Province, South Africa

Authors: Nesengani Elelwani Clinton

Abstract:

This paper presents reflective learning as an opportunity commonly available and used for food waste learning in a food processing company in the transition to sustainable and just food systems. In addressing how employees learn about food waste during food processing, the opportunities available for food waste learning were investigated. Reflective learning appeared to be the most used approach to learning about food waste. In the case of food waste learning, reflective learning was a response after employees wasted a substantial amount of food, where process controllers and team leaders would highlight the issue to employees who wasted food and explain how food waste could be reduced. This showed that learning about food waste is not proactive, and there continues to be a lack of structured learning around food waste. Several challenges were highlighted around reflective learning about food waste. Some of the challenges included understanding the language, lack of interest from employees, set times to reach production targets, and working pressures. These challenges were reported to be hindering factors in understanding food waste learning, which is not structured. A need was identified for proactive learning through structured methods. This is because it was discovered that in the plant, where food processing activities happen, the signage and posters that are there are directly related to other sustainability issues such as food safety and health. This indicated that there are low levels of awareness about food waste. Therefore, this paper argues that food waste learning should be proactive. The proactive learning approach should include structured learning materials around food waste during food processing. In the structuring of the learning materials, individual trainers should be multilingual. This will make it possible for those who do not understand English to understand in their own language. And lastly, there should be signage and posters in the food processing plant around food waste. This will bring more awareness around food waste, and employees' behaviour can be influenced by the posters and signage in the food processing plant. Thus, will enable a transition to a just and sustainable food system.

Keywords: sustainable and just food systems, food waste, food waste learning, reflective learning approach

Procedia PDF Downloads 119
3860 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 261
3859 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 89
3858 Authentic Engagement for Institutional Leadership: Implications for Educational Policy and Planning

Authors: Simeon Adebayo Oladipo

Abstract:

Institutional administrators are currently facing pressure and challenges in their daily operations. Reasons for this may include the increasing multiplicity, uncertainty and tension that permeate institutional leadership. Authentic engagement for institutional leadership is premised on the ethical foundation that the leaders in the schools are engaged. The institutional effectiveness is dependent on the relationship that exists between the leaders and employees in the workplace. Leader’s self-awareness, relational transparency, emotional control, strong moral code and accountability have a positive influence on authentic engagement which variably determines leadership effectiveness. This study therefore examined the role of authentic engagement in effective school leadership; explored the interrelationship of authentic engagement indices in school leadership. The study adopted the descriptive research of the survey type using a quantitative method to gather data through a questionnaire among school leaders in Lagos State Tertiary Institutions. The population for the study consisted of all Heads of Departments, Deans and Principal Officers in Lagos State Tertiary Institutions. A sample size of 255 Heads of Departments, Deans and Principal Officers participated in the study. The data gathered were analyzed using descriptive and inferential statistical tools. The findings indicated that authentic engagement plays a crucial role in increasing leadership effectiveness amongst Heads of Departments, Deans and Principal Officers. The study recommended among others that there is a need for effective measures to enhance authentic engagement of institutional leadership practices through relevant educational support systems and effective quality control.

Keywords: authentic engagement, self-awareness, relational transparency, emotional control

Procedia PDF Downloads 67
3857 A Study on Interaction between Traditional Culture and Modern Womenswear

Authors: Yu-Wei Chu, Marie Aja-Herrera, Denis Antoine, Mengjie Di

Abstract:

The purpose of this paper is to explore the innovative perspective of the local traditional culture of garments from different continents. The relationship between the local culture, the indigenous traditional technique of textile manufacture, and modern womenswear will be investigated. This will include exploring and discussing traditional techniques to create textiles reflecting different cultures and relevant handicrafts, including the history of these different peoples and regions. However, along with the improvement of technology, the diversity of culture is usually unified into a single aesthetic element, which makes fashion lack traditional cultural layers. Local cultural awareness has been gradually emerging in womenswear in recent years with the strong sweep of globalization. The possible loss of traditional art and crafts became an awareness for different cultures, who realized the necessity to protect and preserve their individual uniqueness. Modern womenswear is one of the largest markets in the fashion and apparel marketplace. Therefore, the commonalities of traditional textiles and garments for modern womenswear will be researched. Localized traditional fabrics have some elements, such as weaving techniques and other related crafts, in common with more modern manufacturing methods. In addition, the common point of traditional clothing is the use of draping, construction, and fabric manipulation. This paper aims to explore these factors, as discussed above, and also apply, in an innovative and creative manner, some of these traditional arts and crafts to modern womenswear. The combination of textile manipulation and different construction techniques can support the development of innovative womenswear to include a diversity of aesthetics. The main contribution of the paper is to find out the solution to bring local culture into the formal womenswear market with modern aesthetics to realize the ideal of traditional culture reconstruction.

Keywords: traditional culture, modern womenswear, diversity, aesthetics

Procedia PDF Downloads 113
3856 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey

Authors: Fatih Ercin Guney, Hami Karagol

Abstract:

Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.

Keywords: Middle East, natural gas, oil, Turkey

Procedia PDF Downloads 295
3855 Physicians’ Knowledge and Perception of Gene Profiling in Malaysia: A Pilot Study

Authors: Farahnaz Amini, Woo Yun Kin, Lazwani Kolandaiveloo

Abstract:

Availability of different genetic tests after completion of Human Genome Project increases the physicians’ responsibility to keep themselves update on the potential implementation of these genetic tests in their daily practice. However, due to numbers of barriers, still many of physicians are not either aware of these tests or are not willing to offer or refer their patients for genetic tests. This study was conducted an anonymous, cross-sectional, mailed-based survey to develop a primary data of Malaysian physicians’ level of knowledge and perception of gene profiling. Questionnaire had 29 questions. Total scores on selected questions were used to assess the level of knowledge. The highest possible score was 11. Descriptive statistics, one way ANOVA and chi-squared test was used for statistical analysis. Sixty three completed questionnaires was returned by 27 general practitioners (GPs) and 36 medical specialists. Responders’ age range from 24 to 55 years old (mean 30.2 ± 6.4). About 40% of the participants rated themselves as having poor level of knowledge in genetics in general whilst 60% believed that they have fair level of knowledge. However, almost half (46%) of the respondents felt that they were not knowledgeable about available genetic tests. A majority (94%) of the responders were not aware of any lab or company which is offering gene profiling services in Malaysia. Only 4% of participants were aware of using gene profiling for detection of dosage of some drugs. Respondents perceived greater utility of gene profiling for breast cancer (38%) compared to the colorectal familial cancer (3%). The score of knowledge ranged from 2 to 8 (mean 4.38 ± 1.67). Non-significant differences between score of knowledge of GPs and specialists were observed, with score of 4.19 and 4.58 respectively. There was no significant association between any demographic factors and level of knowledge. However, those who graduated between years 2001 to 2005 had higher level of knowledge. Overall, 83% of participants showed relatively high level of perception on value of gene profiling to detect patient’s risk of disease. However, low perception was observed for both statements of using gene profiling for general population in order to alter their lifestyle (25%) as well as having the full sequence of a patient genome for the purpose of determining a patient’s best match for treatment (18%). The lack of clinical guidelines, limited provider knowledge and awareness, lack of time and resources to educate patients, lack of evidence-based clinical information and cost of tests were the most barriers of ordering gene profiling mentioned by physicians. In conclusion Malaysian physicians who participate in this study had mediocre level of knowledge and awareness in gene profiling. The low exposure to the genetic questions and problems might be a key predictor of lack of awareness and knowledge on available genetic tests. Educational and training workshop might be useful in helping Malaysian physicians incorporate genetic profiling into practice for eligible patients.

Keywords: gene profiling, knowledge, Malaysia, physician

Procedia PDF Downloads 322
3854 Social Perception of the Benefits of Using a Solar Dryer to Conserve Fruits and Vegetables in Rural Communities in Manica - Mozambique

Authors: Constâncio Augusto Machanguana, Luís Miguel Estevão Cristóvão

Abstract:

In Mozambique, over 80% of the rural population relies on agriculture, livestock, and silviculture for their livelihoods. Unfortunately, these communities face persistent food shortages, which are exacerbated by natural disasters and post-harvest losses due to inadequate storage facilities. Addressing post-harvest loss is critical not only for ensuring food security but also for preventing financial hardships faced by farmers. The study delves into the perceptions of beneficiary communities regarding the construction of three food dryer models made from metal, wood, and clay brick. These solar dryers are part of the project titled ‘Solar Dryer Integrated with Natural Rocks as Energy Storage for Drying Fruits and Vegetables in Mozambique.’ The overarching goal is to enhance food availability beyond the typical growing season, particularly for fruits and vegetables, while simultaneously combating hunger. Given the context of climate change impacts on agriculture, this project becomes even more relevant. Structured interviews conducted with 45 members of beneficiary associations in Manica Province—primarily female heads of households—revealed that rural communities are aware of various food drying alternatives. However, reliance on traditional methods often comes at a cost: compromised product quality and reduced shelf life. To address these challenges, the project implemented energy storage solutions like rock-based thermal energy storage for food drying. This result underscores the urgent need to foster innovation and extend these sustainable practices —such as solar dryers integrated with thermal energy-storage systems made of locally abundant and affordable materials— to more local communities, especially those with significant agricultural potential within the country. By taking these actions, we can improve food security and alleviate hunger.

Keywords: solar dryer, food security, rural community, small technology

Procedia PDF Downloads 20
3853 [Keynote Talk]: Unlocking Transformational Resilience in the Aftermath of a Flood Disaster: A Case Study from Cumbria

Authors: Kate Crinion, Martin Haran, Stanley McGreal, David McIlhatton

Abstract:

Past research has demonstrated that disasters are continuing to escalate in frequency and magnitude worldwide, representing a key concern for the global community. Understanding and responding to the increasing risk posed by disaster events has become a key concern for disaster managers. An emerging trend within literature, acknowledges the need to move beyond a state of coping and reinstatement of the status quo, towards incremental adaptive change and transformational actions for long-term sustainable development. As such, a growing interest in research concerns the understanding of the change required to address ever increasing and unpredictable disaster events. Capturing transformational capacity and resilience, however is not without its difficulties and explains the dearth in attempts to capture this capacity. Adopting a case study approach, this research seeks to enhance an awareness of transformational resilience by identifying key components and indicators that determine the resilience of flood-affected communities within Cumbria. Grounding and testing a theoretical resilience framework within the case studies, permits the identification of how perceptions of risk influence community resilience actions. Further, it assesses how levels of social capital and connectedness impacts upon the extent of interplay between resources and capacities that drive transformational resilience. Thus, this research seeks to expand the existing body of knowledge by enhancing the awareness of resilience in post-disaster affected communities, by investigating indicators of community capacity building and resilience actions that facilitate transformational resilience during the recovery and reconstruction phase of a flood disaster.

Keywords: capacity building, community, flooding, transformational resilience

Procedia PDF Downloads 285
3852 A Theoretical Framework: The Influence of Luxury Companies' Corporate Social Activities on Consumer Purchase Intention

Authors: Kveta Olsanova, Gina Cook, Marija Zlatic

Abstract:

This paper discusses the theoretical framework suggesting the dependencies between luxury brands’ CSR (Corporate Social Responsibility) variables and the purchase intention of luxury shoppers. The framework is based on a literature review and in-depth individual interviews with a sample of luxury users and buyers. The measures of the model are based on existing research and the authors' qualitative research results. The model suggests that purchase intention in the luxury segment is dependent on the luxury values (symbolic, experiential, functional and social), individual sustainable dimension (composed of societal, environmental and economic variables) and awareness of the brand’s CSR, the last two relationships being potentially moderated by certain conditions such as demographics and general attitudes towards CSR and sustainability. The model’s output is in the formulation of several hypotheses, to be tested in an upcoming quantitative study. The qualitative phase indicated that the perceived symbolic, functional and experiential value dimensions of luxury brands were stronger drivers of purchase intention compared to the sustainable dimension. The contribution of the research consists of highlighting CSR’s impact on customer purchase intent as a potential implication for luxury brand management due to two aspects: (i) consumer awareness of the existing CSR activities of luxury brands is low, and this might be challenged by the demands of Gen Z entrants into the lux industry as they are known for their positive approach to CSR; (ii) the UN’s SDGs will bring CSR to the attention of all industries, including currently 'CSR silent' segments represented by luxury. Our research should contribute to incorporation of strategic CSR into the policies and strategies of the luxury segment by providing evidence that luxury customers do care.

Keywords: CSR, luxury shoppers, purchase intention, sustainability

Procedia PDF Downloads 147
3851 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 213
3850 Fashion Appropriation: A Study in Awareness of Crossing Cultural Boundaries in Design

Authors: Anahita Suri

Abstract:

Myriad cultures form the warp and weft of the fabric of this world. The last century saw mass migration of people across geographical boundaries, owing to industrialization and globalization. These people took with them their cultures, costumes, traditions, and folklore, which mingled with the local cultures to create something new and place it in a different context to make it contemporary. With the surge in population and growth of the fashion industry, there has been an increasing demand for innovative and individual fashion, from street markets to luxury brands. Exhausted by local influences, designers take inspiration from the so called ‘low’ culture and create artistic products, place it in a different context, and the end-product is categorized as ‘high’ culture. It is challenging as to why a design/culture is ‘high’ or ‘low’. Who decides which works, practices, activities, etc., are ‘high’ and which are ‘low’? The justification for this distinction is often found not in the design itself but the context attached to it. Also, the concept of high/ low is relative to time- what is ‘high’ today can be ‘low’ tomorrow and ‘high’ again the day after. This raises certain concerns. Firstly, it is sad that a culture which offers inspiration is looked down upon as ‘low’ culture. Secondly, it is ironic because the so designated ‘high’ culture is a manipulation of the truth from the authentic ‘low’ culture, which is capable of true expression. When you borrow from a different culture, you pretend to be authentic because you actually are not. Finally, it is important to be aware of crossing cultural boundaries and the context attached to a design/product so as to use it a responsible way that communicates the design without offending anyone. Is it ok for a person’s cultural identity to become another person’s fashion accessory? This essay explores the complex, multi-layered subject of fashion appropriation and aims to provoke debate over cultural ‘borrowing’ and create awareness that commodification of cultural symbols and iconography in fashion is inappropriate and offensive and not the same as ‘celebrating cultural differences’.

Keywords: context, culture, fashion appropriation, inoffensive, responsible

Procedia PDF Downloads 121
3849 Understanding the Dynamics of Human-Snake Negative Interactions: A Study of Indigenous Perceptions in Tamil Nadu, Southern India

Authors: Ramesh Chinnasamy, Srishti Semalty, Vishnu S. Nair, Thirumurugan Vedagiri, Mahesh Ganeshan, Gautam Talukdar, Karthy Sivapushanam, Abhijit Das

Abstract:

Snakes form an integral component of ecological systems. Human population explosion and associated acceleration of habitat destruction and degradation, has led to a rapid increase in human-snake encounters. The study aims at understanding the level of awareness, knowledge, and attitude of the people towards human-snake negative interaction and role of awareness programmes in the Moyar river valley, Tamil Nadu. The study area is part of the Mudumalai and the Sathyamangalam Tiger Reserves, which are significant wildlife corridors between the Western Ghats and the Eastern Ghats in the Nilgiri Biosphere Reserve. The data was collected using questionnaire covering 644 respondents spread across 18 villages between 2018 and 2019. The study revealed that 86.5% of respondents had strong negative perceptions towards snakes which were propelled by fear, superstitions, and threat of snakebite which was common and did not vary among different villages (F=4.48; p = <0.05) and age groups (X2 = 1.946; p = 0.962). Cobra 27.8% (n = 294) and rat snake 21.3% (n = 225) were the most sighted species and most snake encounter occurred during the monsoon season i.e., July 35.6 (n = 218), June 19.1% (n = 117) and August 18.4% (n = 113). At least 1 out of 5 respondents was reportedly bitten by snakes during their lifetime. The most common species of snakes that were the cause of snakebite were Saw scaled viper (32.6%, n = 42) followed by Cobra 17.1% (n = 22). About 21.3% (n = 137) people reported livestock loss due to pythons and other snakes 21.3% (n = 137). Most people, preferred medical treatment for snakebite (87.3%), whereas 12.7%, still believed in traditional methods. The majority (82.3%) used precautionary measure by keeping traditional items such as garlic, kerosene, and snake plant to avoid snakes. About 30% of the respondents expressed need for technical and monetary support from the forest department that could aid in reducing the human-snake conflict. It is concluded that the general perception in the study area is driven by fear and negative attitude towards snakes. Though snakes such as Cobra were widely worshiped in the region, there are still widespread myths and misconceptions that have led to the irrational killing of snakes. Awareness and innovative education programs rooted in the local context and language should be integrated at the village level, to minimize risk and the associated threat of snakebite among the people. Results from this study shall help policy makers to devise appropriate conservation measures to reduce human-snake conflicts in India.

Keywords: Envenomation, Health-Education, Human-Wildlife Conflict, Neglected Tropical Disease, Snakebite Mitigation, Traditional Practitioners

Procedia PDF Downloads 220
3848 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 22
3847 Technology, Ethics and Experience: Understanding Interactions as Ethical Practice

Authors: Joan Casas-Roma

Abstract:

Technology has become one of the main channels through which people engage in most of their everyday activities; from working to learning, or even when socializing, technology often acts as both an enabler and a mediator of such activities. Moreover, the affordances and interactions created by those technological tools determine the way in which the users interact with one another, as well as how they relate to the relevant environment, thus favoring certain kinds of actions and behaviors while discouraging others. In this regard, virtue ethics theories place a strong focus on a person's daily practice (understood as their decisions, actions, and behaviors) as the means to develop and enhance their habits and ethical competences --such as their awareness and sensitivity towards certain ethically-desirable principles. Under this understanding of ethics, this set of technologically-enabled affordances and interactions can be seen as the possibility space where the daily practice of their users takes place in a wide plethora of contexts and situations. At this point, the following question pops into mind: could these affordances and interactions be shaped in a way that would promote behaviors and habits basedonethically-desirable principles into their users? In the field of game design, the MDA framework (which stands for Mechanics, Dynamics, Aesthetics) explores how the interactions enabled within the possibility space of a game can lead to creating certain experiences and provoking specific reactions to the players. In this sense, these interactions can be shaped in ways thatcreate experiences to raise the players' awareness and sensitivity towards certain topics or principles. This research brings together the notions of technological affordances, the notions of practice and practical wisdom from virtue ethics, and the MDA framework from game design in order to explore how the possibility space created by technological interactions can be shaped in ways that enable and promote actions and behaviors supporting certain ethically-desirable principles. When shaped accordingly, interactions supporting certain ethically-desirable principlescould allow their users to carry out the kind of practice that, according to virtue ethics theories, provides the grounds to develop and enhance their awareness, sensitivity, and ethical reasoning capabilities. Moreover, and because ethical practice can happen collaterally in almost every context, decision, and action, this additional layer could potentially be applied in a wide variety of technological tools, contexts, and functionalities. This work explores the theoretical background, as well as the initial considerations and steps that would be needed in order to harness the potential ethically-desirable benefits that technology can bring, once it is understood as the space where most of their users' daily practice takes place.

Keywords: ethics, design methodology, human-computer interaction, philosophy of technology

Procedia PDF Downloads 153
3846 Patterns of Self-Medication with Over-the-Counter Pain Relievers (Acetaminophen, Ibuprofen, and Aspirin) among the Kuwaiti Population

Authors: Nabil Ahmed Kamal Badawy, Ali Falah Alhajraf, Mawaheb Falah Alsamdan

Abstract:

Objectives: To estimate the prevalence of self-medication with over-the-counter pain relievers (acetaminophen, ibuprofen, and aspirin) among Kuwaiti citizens above the age of 16 years old and describe their patterns of use, perceived awareness of, and concerns about the drugs’ potential side effects. Design: A descriptive cross-sectional questionnaire-based survey. Setting: Samples were selected from the six Kuwaiti governorates. Subjects: The data were collected over a four-month period in 2012, from 850 subjects who identified as Kuwaiti citizens. These subjects were recruited using stratified random sampling. Results: Overall, a 67% response rate was obtained. In total, 68% (573) of the respondents reported the use of over-the-counter pain relievers. Women, middle-aged or single individuals, and those who had completed higher education used these drugs more than any other subgroup (p<0.05). We found evidence of inappropriate use of these drugs, with 15% (88) of the consumers using them almost daily. Further, 19% (111) of the consumers exceeded the recommended dosage at least once. Not only were 81% of the consumers unaware of the potential side effects, but also more than 61% were not concerned about them. Women were more knowledgeable than men regarding the maximum dose (p=0.036, OR 1.49, CI 1.03–2.17). Consumers with higher levels of education did not show distinct knowledge regarding the maximum allowed dose of the drugs (p=0.252, OR 1.71, CI 0.68-4.25). Conclusion: The results showed a high prevalence of self-medication with over-the-counter pain relievers among Kuwaiti citizens. The subjects showed marked unawareness and a lack of concern regarding the potential complications resulting from the inappropriate use of these analgesics. This demonstrates the need for educational interventions directed toward both patients and health care workers.

Keywords: awareness of side effects, concern, patterns of use, prevalence

Procedia PDF Downloads 495
3845 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District

Authors: Abha Gupta, Deepak K. Mishra

Abstract:

Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.

Keywords: dietary diversity, food Security, India, socio-economic groups

Procedia PDF Downloads 337
3844 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 106
3843 Assessment and Evaluation Resilience of Urban Neighborhoods in Coping with Natural Disasters in in the Metropolis of Tabriz (Case Study: Region 6 of Tabriz)

Authors: Ali panahi-Kosar Khosravi

Abstract:

Earthquake resilience is one of the most important theoretical and practical concepts in crisis management. Over the past few decades, the rapid growth of urban areas and developing lower urban areas (especially in developing countries) have made them more vulnerable to human and natural crises. Therefore, the resilience of urban communities, especially low-income and unhealthy neighborhoods, is of particular importance. The present study seeks to assess and evaluate the resilience of neighborhoods in the center of district 6 of Tabriz in terms of awareness, knowledge and personal skills, social and psychological capital, managerial-institutional, and the ability to return to appropriate and sustainable conditions. The research method in this research is descriptive-analytical. The authors used library and survey methods to collect information and a questionnaire to assess resilience. The statistical population of this study is the total households living in the four neighborhoods of Shanb Ghazan, Khatib, Gharamalek, and Abuzar alley. Three hundred eighty-four families from four neighborhoods were selected based on the Cochran formula using a simple random sampling method. A one-sample t-test, simple linear regression, and structural equations were used to test the research hypotheses. Findings showed that only two social and psychological awareness and capital indicators in district 6 of Tabriz had a favorable and approved status. Therefore, considering the multidimensional concept of resilience, district 6 of Tabriz is in an unfavorable resilience situation. Also, the findings based on the analysis of variance indicated no significant difference between the neighborhoods of district 6 in terms of resilience, and most neighborhoods are in an unfavorable situation.

Keywords: resilience, statistical analysis, earthquake, district 6 of tabriz

Procedia PDF Downloads 73
3842 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa

Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba

Abstract:

The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.

Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)

Procedia PDF Downloads 348
3841 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 63
3840 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 63
3839 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 24
3838 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 263