Search results for: maritime security intelligence
2890 Sustainable Energy Supply through the Microgrid Concept: A Case Study of University of Nigeria, Nsukka
Authors: Christian Ndubisi Madu, Benjamin C. Ozumba, Ifeanyi E. Madu, Valentine E. Nnadi, Ikenna C. Ezeasor
Abstract:
The ability to generate power and achieve energy security is one of the driving forces behind the emerging ‘microgrid’ concept. Traditional power supply often operates with centralized infrastructure for generating, transmitting and distributing electricity. The inefficiency and the incessant power outages associated with the centralized power supply system in Nigeria has alienated many users who frequently turn to electric power generator sets to power their homes and offices. Such acts are unsustainable and lead to increase in the use of fossil fuels, generation of carbon dioxide emissions and other gases, and noise pollution. They also pose significant risks as they entail random purchases and storage of gasolines which are fire hazards. It is therefore important that organizations rethink their relationships to centralized power suppliers in other to improve energy accessibility and security. This study explores the energy planning processes and learning taking place at the University of Nigeria Enugu Campus as the school lead microgrid feasibility studies in its community. There is need to develop community partners to deal with the issue of energy efficiency and also to create a strategic alliance to confront political, regulatory and economic barriers to locally-based energy planning. Community-based microgrid can help to reduce the cost of adoption and diversify risks. This study offers insights into the ways in which microgrids can further democratize energy planning, procurement, and access, while simultaneously promoting efficiency and sustainability.Keywords: microgrid, energy efficiency, sustainability, energy security
Procedia PDF Downloads 3752889 Revised Technology Acceptance Model Framework for M-Commerce Adoption
Authors: Manish Gupta
Abstract:
Following the E-Commerce era, M-Commerce is the next big phase in the technology involvement and advancement. This paper intends to explore how Indian consumers are influenced to adopt the M-commerce. In this paper, the revised Technology Acceptance Model (TAM) has been presented on the basis of the most dominant factors that affect the adoption of M-Commerce in Indian scenario. Furthermore, an analytical questionnaire approach was carried out to collect data from Indian consumers. These collected data were further used for the validation of the presented model. Findings indicate that customization, convenience, instant connectivity, compatibility, security, download speed in M-Commerce affect the adoption behavior. Furthermore, the findings suggest that perceived usefulness and attitude towards M-Commerce are positively influenced by number of M-Commerce drivers (i.e. download speed, compatibility, convenience, security, customization, connectivity, and input mechanism).Keywords: M-Commerce, perceived usefulness, technology acceptance model, perceived ease of use
Procedia PDF Downloads 3122888 Generative Pre-Trained Transformers (GPT-3) and Their Impact on Higher Education
Authors: Sheelagh Heugh, Michael Upton, Kriya Kalidas, Stephen Breen
Abstract:
This article aims to create awareness of the opportunities and issues the artificial intelligence (AI) tool GPT-3 (Generative Pre-trained Transformer-3) brings to higher education. Technological disruptors have featured in higher education (HE) since Konrad Klaus developed the first functional programmable automatic digital computer. The flurry of technological advances, such as personal computers, smartphones, the world wide web, search engines, and artificial intelligence (AI), have regularly caused disruption and discourse across the educational landscape around harnessing the change for the good. Accepting AI influences are inevitable; we took mixed methods through participatory action research and evaluation approach. Joining HE communities, reviewing the literature, and conducting our own research around Chat GPT-3, we reviewed our institutional approach to changing our current practices and developing policy linked to assessments and the use of Chat GPT-3. We review the impact of GPT-3, a high-powered natural language processing (NLP) system first seen in 2020 on HE. Historically HE has flexed and adapted with each technological advancement, and the latest debates for educationalists are focusing on the issues around this version of AI which creates natural human language text from prompts and other forms that can generate code and images. This paper explores how Chat GPT-3 affects the current educational landscape: we debate current views around plagiarism, research misconduct, and the credibility of assessment and determine the tool's value in developing skills for the workplace and enhancing critical analysis skills. These questions led us to review our institutional policy and explore the effects on our current assessments and the development of new assessments. Conclusions: After exploring the pros and cons of Chat GTP-3, it is evident that this form of AI cannot be un-invented. Technology needs to be harnessed for positive outcomes in higher education. We have observed that materials developed through AI and potential effects on our development of future assessments and teaching methods. Materials developed through Chat GPT-3 can still aid student learning but lead to redeveloping our institutional policy around plagiarism and academic integrity.Keywords: artificial intelligence, Chat GPT-3, intellectual property, plagiarism, research misconduct
Procedia PDF Downloads 892887 The Role of Artificial Intelligence in Creating Personalized Health Content for Elderly People: A Systematic Review Study
Authors: Mahnaz Khalafehnilsaz, Rozina Rahnama
Abstract:
Introduction: The elderly population is growing rapidly, and with this growth comes an increased demand for healthcare services. Artificial intelligence (AI) has the potential to revolutionize the delivery of healthcare services to the elderly population. In this study, the various ways in which AI is used to create health content for elderly people and its transformative impact on the healthcare industry will be explored. Method: A systematic review of the literature was conducted to identify studies that have investigated the role of AI in creating health content specifically for elderly people. Several databases, including PubMed, Scopus, and Web of Science, were searched for relevant articles published between 2000 and 2022. The search strategy employed a combination of keywords related to AI, personalized health content, and the elderly. Studies that utilized AI to create health content for elderly individuals were included, while those that did not meet the inclusion criteria were excluded. A total of 20 articles that met the inclusion criteria were identified. Finding: The findings of this review highlight the diverse applications of AI in creating health content for elderly people. One significant application is the use of natural language processing (NLP), which involves the creation of chatbots and virtual assistants capable of providing personalized health information and advice to elderly patients. AI is also utilized in the field of medical imaging, where algorithms analyze medical images such as X-rays, CT scans, and MRIs to detect diseases and abnormalities. Additionally, AI enables the development of personalized health content for elderly patients by analyzing large amounts of patient data to identify patterns and trends that can inform healthcare providers in developing tailored treatment plans. Conclusion: AI is transforming the healthcare industry by providing a wide range of applications that can improve patient outcomes and reduce healthcare costs. From creating chatbots and virtual assistants to analyzing medical images and developing personalized treatment plans, AI is revolutionizing the way healthcare is delivered to elderly patients. Continued investment in this field is essential to ensure that elderly patients receive the best possible care.Keywords: artificial intelligence, health content, older adult, healthcare
Procedia PDF Downloads 692886 Accountability of Artificial Intelligence: An Analysis Using Edgar Morin’s Complex Thought
Authors: Sylvie Michel, Sylvie Gerbaix, Marc Bidan
Abstract:
Artificial intelligence (AI) can be held accountable for its detrimental impacts. This question gains heightened relevance given AI's pervasive reach across various domains, magnifying its power and potential. The expanding influence of AI raises fundamental ethical inquiries, primarily centering on biases, responsibility, and transparency. This encompasses discriminatory biases arising from algorithmic criteria or data, accidents attributed to autonomous vehicles or other systems, and the imperative of transparent decision-making. This article aims to stimulate reflection on AI accountability, denoting the necessity to elucidate the effects it generates. Accountability comprises two integral aspects: adherence to legal and ethical standards and the imperative to elucidate the underlying operational rationale. The objective is to initiate a reflection on the obstacles to this "accountability," facing the challenges of the complexity of artificial intelligence's system and its effects. Then, this article proposes to mobilize Edgar Morin's complex thought to encompass and face the challenges of this complexity. The first contribution is to point out the challenges posed by the complexity of A.I., with fractional accountability between a myriad of human and non-human actors, such as software and equipment, which ultimately contribute to the decisions taken and are multiplied in the case of AI. Accountability faces three challenges resulting from the complexity of the ethical issues combined with the complexity of AI. The challenge of the non-neutrality of algorithmic systems as fully ethically non-neutral actors is put forward by a revealing ethics approach that calls for assigning responsibilities to these systems. The challenge of the dilution of responsibility is induced by the multiplicity and distancing between the actors. Thus, a dilution of responsibility is induced by a split in decision-making between developers, who feel they fulfill their duty by strictly respecting the requests they receive, and management, which does not consider itself responsible for technology-related flaws. Accountability is confronted with the challenge of transparency of complex and scalable algorithmic systems, non-human actors self-learning via big data. A second contribution involves leveraging E. Morin's principles, providing a framework to grasp the multifaceted ethical dilemmas and subsequently paving the way for establishing accountability in AI. When addressing the ethical challenge of biases, the "hologrammatic" principle underscores the imperative of acknowledging the non-ethical neutrality of algorithmic systems inherently imbued with the values and biases of their creators and society. The "dialogic" principle advocates for the responsible consideration of ethical dilemmas, encouraging the integration of complementary and contradictory elements in solutions from the very inception of the design phase. Aligning with the principle of organizing recursiveness, akin to the "transparency" of the system, it promotes a systemic analysis to account for the induced effects and guides the incorporation of modifications into the system to rectify deviations and reintroduce modifications into the system to rectify its drifts. In conclusion, this contribution serves as an inception for contemplating the accountability of "artificial intelligence" systems despite the evident ethical implications and potential deviations. Edgar Morin's principles, providing a lens to contemplate this complexity, offer valuable perspectives to address these challenges concerning accountability.Keywords: accountability, artificial intelligence, complexity, ethics, explainability, transparency, Edgar Morin
Procedia PDF Downloads 632885 Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use
Authors: Ronald Mraz, Gary C. Kessler, Ethan Gold, John G. Cline
Abstract:
The International Ice Patrol (IIP) continually monitors iceberg activity in the North Atlantic by direct observation using ships, aircraft, and satellite imagery. Daily reports detailing navigational boundaries of icebergs have significantly reduced the risk of iceberg contact. What is currently lacking is formatting this data for automatic transmission and display of iceberg navigational boundaries in commercial navigation equipment. This paper describes the methodology and implementation of a system to format iceberg limit information for dissemination through existing radio network communications. This information will then automatically display on commercial navigation equipment. Additionally, this information is reformatted for Google Earth rendering of iceberg track line limits. Having iceberg limit information automatically available in standard navigation equipment will help support full autonomous operation of sailing vessels.Keywords: iceberg, iceberg risk, iceberg track lines, AIS messaging, international ice patrol, North American ice service, google earth, autonomous surface vessels
Procedia PDF Downloads 1372884 A Study on Personnel Commitment Factors in Hafes Hospital
Authors: Farzaneh Bayat
Abstract:
Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy
Procedia PDF Downloads 3402883 Composite Distributed Generation and Transmission Expansion Planning Considering Security
Authors: Amir Lotfi, Seyed Hamid Hosseini
Abstract:
During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.Keywords: planning, transmission, distributed generation, power security, power systems
Procedia PDF Downloads 4802882 Comprehensive Study of Data Science
Authors: Asifa Amara, Prachi Singh, Kanishka, Debargho Pathak, Akshat Kumar, Jayakumar Eravelly
Abstract:
Today's generation is totally dependent on technology that uses data as its fuel. The present study is all about innovations and developments in data science and gives an idea about how efficiently to use the data provided. This study will help to understand the core concepts of data science. The concept of artificial intelligence was introduced by Alan Turing in which the main principle was to create an artificial system that can run independently of human-given programs and can function with the help of analyzing data to understand the requirements of the users. Data science comprises business understanding, analyzing data, ethical concerns, understanding programming languages, various fields and sources of data, skills, etc. The usage of data science has evolved over the years. In this review article, we have covered a part of data science, i.e., machine learning. Machine learning uses data science for its work. Machines learn through their experience, which helps them to do any work more efficiently. This article includes a comparative study image between human understanding and machine understanding, advantages, applications, and real-time examples of machine learning. Data science is an important game changer in the life of human beings. Since the advent of data science, we have found its benefits and how it leads to a better understanding of people, and how it cherishes individual needs. It has improved business strategies, services provided by them, forecasting, the ability to attend sustainable developments, etc. This study also focuses on a better understanding of data science which will help us to create a better world.Keywords: data science, machine learning, data analytics, artificial intelligence
Procedia PDF Downloads 822881 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region
Authors: Muzammil Dar
Abstract:
The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China
Procedia PDF Downloads 1532880 Marine Environmental Peace-Building Initiatives: Factors of Success and Failure
Authors: Yael Teff-Seker
Abstract:
More often than not, ecosystems do not follow anthropogenic political borders. Thus, transboundary environmental protection or rehabilitation initiatives can be beneficial and at times even vital for supporting healthy ecosystems. Marine areas demand unique considerations and challenges for such initiatives, as maritime borders tend to be less defined, less fortified and less visible. In areas of recent conflict, cross-border environmental initiatives can also improve relations between states and promote peace-building efforts, in addition to their environmental benefits. The current study reviews the current literature on transboundary marine environmental protection initiatives that take place in these areas and focuses on joint initiatives in Israel-Jordan and Croatia-Slovenia. In addition to factors described in the literature such as funding and third-party involvement, findings suggest that the peripheral location of marine environmental initiatives can be beneficial for the success of such initiatives, as well as facilitating border crossing and the extent to which such initiatives advance other governmental goals. A sense of urgency, environmental or other, has also been found to be highly relevant to project success.Keywords: environmental cooperation, environmental peacebuilding, marine environment, environmental conflict, environmental management
Procedia PDF Downloads 1802879 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education
Authors: Mohammed A. M. Ibrahim
Abstract:
This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption
Procedia PDF Downloads 3372878 Analyzing Environmental Emotive Triggers in Terrorist Propaganda
Authors: Travis Morris
Abstract:
The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.Keywords: propaganda analysis, emotive triggers environmental security, frames
Procedia PDF Downloads 1382877 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan
Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam
Abstract:
Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.Keywords: climate change, crop insurance, heatwave, wheat yield punjab
Procedia PDF Downloads 832876 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship
Authors: Theo Neethling
Abstract:
The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations
Procedia PDF Downloads 3032875 Smart Surveillance with 5G: A Performance Study in Adama City
Authors: Shenko Chura Aredo, Hailu Belay, Kevin T. Kornegay
Abstract:
In light of Adama City’s smart city development vision, this study thoroughly investigates the performance of smart security systems with Fifth Generation (5G) network capabilities. It can be logistically difficult to install a lot of cabling, particularly in big or dynamic settings. Moreover, latency issues might affect linked systems, making it difficult for them to monitor in real time. Through a focused analysis that employs Adama City as a case study, the performance has been evaluated in terms of spectrum and energy efficiency using empirical data and basic signal processing formulations at different frequency resources. The findings also demonstrate that cameras working at higher 5G frequencies have more capacity than those operating at sub-6 GHz, notwithstanding frequency-related issues. It has also been noted that when the beams of such cameras are adaptively focussed based on the distance of the last cell edge user rather than the maximum cell radius, less energy is required than with conventional fixed power ramping.Keywords: 5G, energy efficiency, safety, smart security, spectral efficiency
Procedia PDF Downloads 192874 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack
Procedia PDF Downloads 1612873 Revolutionizing Higher Education: AI-Powered Gamification for Enhanced Learning
Authors: Gina L. Solano
Abstract:
This project endeavors to enhance learning experiences for undergraduate pre-service teachers and graduate K-12 educators by leveraging artificial intelligence (AI). Firstly, the initiative delves into integrating AI within undergraduate education courses, fostering traditional literacy skills essential for academic success and extending their applicability beyond the classroom. Education students will explore AI tools to design literacy-focused activities aligned with their curriculum. Secondly, the project investigates the utilization of AI to craft instructional materials employing gamification strategies (e.g., digital and classic games, badges, quests) to amplify student engagement and motivation in mastering course content. Lastly, it aims to create a professional repertoire that can be applied by pre-service and current teachers in P-12 classrooms, promoting seamless integration for those already in teaching positions. The project's impact extends to benefiting college students, including pre-service and graduate teachers, as they enhance literacy and digital skills through AI. It also benefits current P-12 educators who can integrate AI into their classrooms, fostering innovative teaching practices. Moreover, the project contributes to faculty development, allowing them to cultivate low-risk and engaging classroom environments, ultimately enriching the learning journey. The insights gained from this project can be shared within and beyond the discipline to advance the broader field of study.Keywords: artificial intelligence, gamification, learning experiences, literacy skills, engagement
Procedia PDF Downloads 632872 Relationship between Mental Health and Food Access among Healthcare College Students in a Snowy Area in Japan
Authors: Yuki Irie, Shota Ogawa, Hitomi Kosugi, Hiromitsu Shinozaki
Abstract:
Background: Dropout from higher educational institutions is a major problem both for students and institutions, and poor mental health is one of the risk factors. Medical college students are at higher risk of poor mental health than general students because of their hard academic schedules. On the other hand, food insecurity has negative impacts on mental health. The healthcare college of the project site is located heavily snowy area. The students without own vehicles may be at higher risk of food insecurity, especially in the winter season. Therefore, they have many risks to mental health. The aim of the study is to clarify the relationship between mental health and its risk factors to promote students’ mental well-being. Method: A cross-sectional design was used to investigate the relationship between mental health status and lifestyle, including diet and food security among the students (n=421, 147 male, 274 females; 20.7 ± 2.8 years old). Participants were required to answer 3 questionnaires which consisted of diet, lifestyle, food security, and mental health. The survey was conducted during the snowy season from Dec. 2022 to Jan. 2023. Results: Mean mental score was 6.7±4.6 (max. score 27, a higher score means worse mental health). Significant risk factors in mental health were breakfast habit (p=0.02), subjective dietary habit (p=0.00), subjective health (p=0.00), exercise habit (p=0.02), food insecurity in the winter season (p=0.01), and vitamin A intakes (p=0.03). Conclusions: Nutrients intakes are not associated with mental health except vitamin A; however, some other lifestyle factors are significantly associated with mental health. Nutrition doesn’t lead to poor mental health directly; however, the promotion of a healthy lifestyle and improved food security in winter may be effective in better mental health.Keywords: mental health, winter, lifestyle, students
Procedia PDF Downloads 922871 Exploring the Applications of Modular Forms in Cryptography
Authors: Berhane Tewelday Weldhiwot
Abstract:
This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory
Procedia PDF Downloads 172870 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear
Authors: Grant Bifolchi
Abstract:
As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology
Procedia PDF Downloads 972869 Factors Affecting Employee Decision Making in an AI Environment
Authors: Yogesh C. Sharma, A. Seetharaman
Abstract:
The decision-making process in humans is a complicated system influenced by a variety of intrinsic and extrinsic factors. Human decisions have a ripple effect on subsequent decisions. In this study, the scope of human decision making is limited to employees. In an organisation, a person makes a variety of decisions from the time they are hired to the time they retire. The goal of this research is to identify various elements that influence decision-making. In addition, the environment in which a decision is made is a significant aspect of the decision-making process. Employees in today's workplace use artificial intelligence (AI) systems for automation and decision augmentation. The impact of AI systems on the decision-making process is examined in this study. This research is designed based on a systematic literature review. Based on gaps in the literature, limitations and the scope of future research have been identified. Based on these findings, a research framework has been designed to identify various factors affecting employee decision making. Employee decision making is influenced by technological advancement, data-driven culture, human trust, decision automation-augmentation, and workplace motivation. Hybrid human-AI systems require the development of new skill sets and organisational design. Employee psychological safety and supportive leadership influences overall job satisfaction.Keywords: employee decision making, artificial intelligence (AI) environment, human trust, technology innovation, psychological safety
Procedia PDF Downloads 1082868 The Differences and Similarities between the Ship Waste Tracking Regulations of Turkey and Particular European Union Member Countries
Authors: Kaan Koyuncu, Umut Celen Arican, Sevilay Can
Abstract:
In the maritime industry, there have been regulations to prevent pollution, and the first attempt to offer a legal basis was Marpol Convention which was held in 1973 in order to provide a framework for the disposal of ship wastes. Based on this convention, ports are obliged to build waste receiving facilities. European Union regulations make several member countries to follow these directions, In Turkey, under Blue Card System, the quantity and types of wastes, the delivery time, the capacity of the receiving facilities, and other required information can be monitored online. Therefore, yachts and other boats with the bilge, sewage, and waste which illegally discharge into the sea, can be blocked. This system is an outcome of the law adopted from European Union regulations. In this study, the present systems in Turkey which occurred in 2010 after the integration of the system, which has been put in the force in 2000 in Europe will be analyzed and interpreted to provide a useful comparison, a practical guide, and a roadmap for potential improvements.Keywords: Europe-Turkey, blue card, marine environment, ship waste tracking system
Procedia PDF Downloads 4962867 Decoding Gender Disparities in AI: An Experimental Exploration Within the Realm of AI and Trust Building
Authors: Alexander Scott English, Yilin Ma, Xiaoying Liu
Abstract:
The widespread use of artificial intelligence in everyday life has triggered a fervent discussion covering a wide range of areas. However, to date, research on the influence of gender in various segments and factors from a social science perspective is still limited. This study aims to explore whether there are gender differences in human trust in AI for its application in basic everyday life and correlates with human perceived similarity, perceived emotions (including competence and warmth), and attractiveness. We conducted a study involving 321 participants using a two-subject experimental design with a two-factor (masculinized vs. feminized voice of the AI) multiplied by a two-factor (pitch level of the AI's voice) between-subject experimental design. Four contexts were created for the study and randomly assigned. The results of the study showed significant gender differences in perceived similarity, trust, and perceived emotion of the AIs, with females rating them significantly higher than males. Trust was higher in relation to AIs presenting the same gender (e.g., human female to female AI, human male to male AI). Mediation modeling tests indicated that emotion perception and similarity played a sufficiently mediating role in trust. Notably, although trust in AIs was strongly correlated with human gender, there was no significant effect on the gender of the AI. In addition, the study discusses the effects of subjects' age, job search experience, and job type on the findings.Keywords: artificial intelligence, gender differences, human-robot trust, mediation modeling
Procedia PDF Downloads 452866 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 1652865 Design and Fabrication of a Smart Quadruped Robot
Authors: Shivani Verma, Amit Agrawal, Pankaj Kumar Meena, Ashish B. Deoghare
Abstract:
Over the decade robotics has been a major area of interest among the researchers and scientists in reducing human efforts. The need for robots to replace human work in different dangerous fields such as underground mining, nuclear power station and war against terrorist attack has gained huge attention. Most of the robot design is based on human structure popularly known as humanoid robots. However, the problems encountered in humanoid robots includes low speed of movement, misbalancing in structure, poor load carrying capacity, etc. The simplification and adaptation of the fundamental design principles seen in animals have led to the creation of bio-inspired robots. But the major challenges observed in naturally inspired robot include complexity in structure, several degrees of freedom and energy storage problem. The present work focuses on design and fabrication of a bionic quadruped walking robot which is based on different joint of quadruped mammals like a dog, cheetah, etc. The design focuses on the structure of the robot body which consists of four legs having three degrees of freedom per leg and the electronics system involved in it. The robot is built using readily available plastics and metals. The proposed robot is simple in construction and is able to move through uneven terrain, detect and locate obstacles and take images while carrying additional loads which may include hardware and sensors. The robot will find possible application in the artificial intelligence sector.Keywords: artificial intelligence, bionic, quadruped robot, degree of freedom
Procedia PDF Downloads 2152864 The Artificial Intelligence Driven Social Work
Authors: Avi Shrivastava
Abstract:
Our world continues to grapple with a lot of social issues. Economic growth and scientific advancements have not completely eradicated poverty, homelessness, discrimination and bias, gender inequality, health issues, mental illness, addiction, and other social issues. So, how do we improve the human condition in a world driven by advanced technology? The answer is simple: we will have to leverage technology to address some of the most important social challenges of the day. AI, or artificial intelligence, has emerged as a critical tool in the battle against issues that deprive marginalized and disadvantaged groups of the right to enjoy benefits that a society offers. Social work professionals can transform their lives by harnessing it. The lack of reliable data is one of the reasons why a lot of social work projects fail. Social work professionals continue to rely on expensive and time-consuming primary data collection methods, such as observation, surveys, questionnaires, and interviews, instead of tapping into AI-based technology to generate useful, real-time data and necessary insights. By leveraging AI’s data-mining ability, we can gain a deeper understanding of how to solve complex social problems and change lives of people. We can do the right work for the right people and at the right time. For example, AI can enable social work professionals to focus their humanitarian efforts on some of the world’s poorest regions, where there is extreme poverty. An interdisciplinary team of Stanford scientists, Marshall Burke, Stefano Ermon, David Lobell, Michael Xie, and Neal Jean, used AI to spot global poverty zones – identifying such zones is a key step in the fight against poverty. The scientists combined daytime and nighttime satellite imagery with machine learning algorithms to predict poverty in Nigeria, Uganda, Tanzania, Rwanda, and Malawi. In an article published by Stanford News, Stanford researchers use dark of night and machine learning, Ermon explained that they provided the machine-learning system, an application of AI, with the high-resolution satellite images and asked it to predict poverty in the African region. “The system essentially learned how to solve the problem by comparing those two sets of images [daytime and nighttime].” This is one example of how AI can be used by social work professionals to reach regions that need their aid the most. It can also help identify sources of inequality and conflict, which could reduce inequalities, according to Nature’s study, titled The role of artificial intelligence in achieving the Sustainable Development Goals, published in 2020. The report also notes that AI can help achieve 79 percent of the United Nation’s (UN) Sustainable Development Goals (SDG). AI is impacting our everyday lives in multiple amazing ways, yet some people do not know much about it. If someone is not familiar with this technology, they may be reluctant to use it to solve social issues. So, before we talk more about the use of AI to accomplish social work objectives, let’s put the spotlight on how AI and social work can complement each other.Keywords: social work, artificial intelligence, AI based social work, machine learning, technology
Procedia PDF Downloads 1022863 Development of Fault Diagnosis Technology for Power System Based on Smart Meter
Authors: Chih-Chieh Yang, Chung-Neng Huang
Abstract:
In power system, how to improve the fault diagnosis technology of transmission line has always been the primary goal of power grid operators. In recent years, due to the rise of green energy, the addition of all kinds of distributed power also has an impact on the stability of the power system. Because the smart meters are with the function of data recording and bidirectional transmission, the adaptive Fuzzy Neural inference system, ANFIS, as well as the artificial intelligence that has the characteristics of learning and estimation in artificial intelligence. For transmission network, in order to avoid misjudgment of the fault type and location due to the input of these unstable power sources, combined with the above advantages of smart meter and ANFIS, a method for identifying fault types and location of faults is proposed in this study. In ANFIS training, the bus voltage and current information collected by smart meters can be trained through the ANFIS tool in MATLAB to generate fault codes to identify different types of faults and the location of faults. In addition, due to the uncertainty of distributed generation, a wind power system is added to the transmission network to verify the diagnosis correctness of the study. Simulation results show that the method proposed in this study can correctly identify the fault type and location of fault with more efficiency, and can deal with the interference caused by the addition of unstable power sources.Keywords: ANFIS, fault diagnosis, power system, smart meter
Procedia PDF Downloads 1392862 The Lethal Autonomy and Military Targeting Process
Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk
Abstract:
The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)
Procedia PDF Downloads 4282861 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 250