Search results for: social networks security issues
15684 Proposing a Boundary Coverage Algorithm for Underwater Sensor Network
Authors: Seyed Mohsen Jameii
Abstract:
Wireless underwater sensor networks are a type of sensor networks that are located in underwater environments and linked together by acoustic waves. The application of these kinds of network includes monitoring of pollutants (chemical, biological, and nuclear), oil fields detection, prediction of the likelihood of a tsunami in coastal areas, the use of wireless sensor nodes to monitor the passing submarines, and determination of appropriate locations for anchoring ships. This paper proposes a boundary coverage algorithm for intrusion detection in underwater sensor networks. In the first phase of the proposed algorithm, optimal deployment of nodes is done in the water. In the second phase, after the employment of nodes at the proper depth, clustering is executed to reduce the exchanges of messages between the sensors. In the third phase, the algorithm of "divide and conquer" is used to save energy and increase network efficiency. The simulation results demonstrate the efficiency of the proposed algorithm.Keywords: boundary coverage, clustering, divide and conquer, underwater sensor nodes
Procedia PDF Downloads 34115683 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?
Authors: Abdoulahad Allamine
Abstract:
The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data
Procedia PDF Downloads 38915682 Optimization of Vertical Axis Wind Turbine Based on Artificial Neural Network
Authors: Mohammed Affanuddin H. Siddique, Jayesh S. Shukla, Chetan B. Meshram
Abstract:
The neural networks are one of the power tools of machine learning. After the invention of perceptron in early 1980's, the neural networks and its application have grown rapidly. Neural networks are a technique originally developed for pattern investigation. The structure of a neural network consists of neurons connected through synapse. Here, we have investigated the different algorithms and cost function reduction techniques for optimization of vertical axis wind turbine (VAWT) rotor blades. The aerodynamic force coefficients corresponding to the airfoils are stored in a database along with the airfoil coordinates. A forward propagation neural network is created with the input as aerodynamic coefficients and output as the airfoil co-ordinates. In the proposed algorithm, the hidden layer is incorporated into cost function having linear and non-linear error terms. In this article, it is observed that the ANNs (Artificial Neural Network) can be used for the VAWT’s optimization.Keywords: VAWT, ANN, optimization, inverse design
Procedia PDF Downloads 32415681 Some Aspects of Social Media Marketing (Georgian Case)
Authors: Nugzar Todua, Charita Jashi
Abstract:
This paper is focusing on the attitude of Georgian consumers toward social media, influence of social media on consumer buying behavior. The purpose of this paper is to explore the impact and usage of social media marketing strategies for Georgian companies and consumers in the new reality of Georgia. There is a lack of research on social media marketing in Georgia, especially the topic which analyzes the possible purchase influence of consumers. The result of marketing research has revealed that social webs are mostly used by Georgian consumers, but they have little impact on the buying decision. The research method was exploratory in nature in the sense that there is no previous academic research about consumers’ attitude towards social media marketing.Keywords: marketing research, purchasing behavior, social media marketing, social networking sites
Procedia PDF Downloads 51615680 Implementation of Chlorine Monitoring and Supply System for Drinking Water Tanks
Authors: Ugur Fidan, Naim Karasekreter
Abstract:
Healthy and clean water should not contain disease-causing micro-organisms and toxic chemicals and must contain the necessary minerals in a balanced manner. Today, water resources have a limited and strategic importance, necessitating the management of water reserves. Water tanks meet the water needs of people and should be regularly chlorinated to prevent waterborne diseases. For this purpose, automatic chlorination systems placed in water tanks for killing bacteria. However, the regular operation of automatic chlorination systems depends on refilling the chlorine tank when it is empty. For this reason, there is a need for a stock control system, in which chlorine levels are regularly monitored and supplied. It has become imperative to take urgent measures against epidemics caused by the fact that most of our country is not aware of the end of chlorine. The aim of this work is to rehabilitate existing water tanks and to provide a method for a modern water storage system in which chlorination is digitally monitored by turning the newly established water tanks into a closed system. A sensor network structure using GSM/GPRS communication infrastructure has been developed in the study. The system consists of two basic units: hardware and software. The hardware includes a chlorine level sensor, an RFID interlock system for authorized personnel entry into water tank, a motion sensor for animals and other elements, and a camera system to ensure process safety. It transmits the data from the hardware sensors to the host server software via the TCP/IP protocol. The main server software processes the incoming data through the security algorithm and informs the relevant unit responsible (Security forces, Chlorine supply unit, Public health, Local Administrator) by e-mail and SMS. Since the software is developed base on the web, authorized personnel are also able to monitor drinking water tank and report data on the internet. When the findings and user feedback obtained as a result of the study are evaluated, it is shown that closed drinking water tanks are built with GRP type material, and continuous monitoring in digital environment is vital for sustainable health water supply for people.Keywords: wireless sensor networks (WSN), monitoring, chlorine, water tank, security
Procedia PDF Downloads 16015679 Reducing Stigma and Discrimination among Islamic Religious Officers Towards People Living with HIV/AIDS in Malaysia
Authors: Hazlin Kadir Shahar, Razaleigh Muhamat Kawangit, Badlihisham Mohd Nasir, Rosmawati Mohamad Rasit
Abstract:
Stigma and discrimination have become the main topic of discussion when dealing with HIV/AIDS issues. They affect the daily life of People Living With HIV(PLHIV), families, friends and people around them indirectly. This paper discusses the potential measurement in helping to reduce stigma and discrimination existence among Islamic Religious Officers towards PLHIV in Malaysia. These people have been trained with special programmes to tackle the HIV/AIDS issues by using a manual, namely as ‘The Manual of Islam and HIV/AIDS’, specifically designed by the Islamic Development Department of Malaysia (JAKIM). The objectives of the training programmes are to give the accurate information about HIV/AIDS and to suggest ways on how to handle the PLHIV issues in Islamic perspective. This research used quantitative methodology by survey. A pilot test had been done over thirty (30) trained Islamic Religious Officers in Malaysia. The findings have shown that the trainings have given a positive impact for them as they managed to acquire the knowledge of HIV/AIDS from both primer and authorized sources such as medical practitioners, Muslim chaplains and social workers. The knowledge they have acquired from the trainings has guided them in changing their perception, thus helping to reduce their own stigma and discrimination towards PLHIV. The training programmes have given them opportunities to practice what they have learned through several outreach sessions as they have had the opportunities to approach PLHIV directly.Keywords: Islamic religious officers, people with HIV, stigma and discrimination, training programmes
Procedia PDF Downloads 50515678 Fault Tree Analysis and Bayesian Network for Fire and Explosion of Crude Oil Tanks: Case Study
Authors: B. Zerouali, M. Kara, B. Hamaidi, H. Mahdjoub, S. Rouabhia
Abstract:
In this paper, a safety analysis for crude oil tanks to prevent undesirable events that may cause catastrophic accidents. The estimation of the probability of damage to industrial systems is carried out through a series of steps, and in accordance with a specific methodology. In this context, this work involves developing an assessment tool and risk analysis at the level of crude oil tanks system, based primarily on identification of various potential causes of crude oil tanks fire and explosion by the use of Fault Tree Analysis (FTA), then improved risk modelling by Bayesian Networks (BNs). Bayesian approach in the evaluation of failure and quantification of risks is a dynamic analysis approach. For this reason, have been selected as an analytical tool in this study. Research concludes that the Bayesian networks have a distinct and effective method in the safety analysis because of the flexibility of its structure; it is suitable for a wide variety of accident scenarios.Keywords: bayesian networks, crude oil tank, fault tree, prediction, safety
Procedia PDF Downloads 66015677 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East
Authors: Kenneth Christie
Abstract:
Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.Keywords: human security, migration, Syria and Iraq, conflict and development
Procedia PDF Downloads 36515676 Message Framework for Disaster Management: An Application Model for Mines
Authors: A. Baloglu, A. Çınar
Abstract:
Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.Keywords: crisis response and management, XML messaging, web services, XML compression, mining
Procedia PDF Downloads 33915675 Positive Bias and Length Bias in Deep Neural Networks for Premises Selection
Authors: Jiaqi Huang, Yuheng Wang
Abstract:
Premises selection, the task of selecting a set of axioms for proving a given conjecture, is a major bottleneck in automated theorem proving. An array of deep-learning-based methods has been established for premises selection, but a perfect performance remains challenging. Our study examines the inaccuracy of deep neural networks in premises selection. Through training network models using encoded conjecture and axiom pairs from the Mizar Mathematical Library, two potential biases are found: the network models classify more premises as necessary than unnecessary, referred to as the ‘positive bias’, and the network models perform better in proving conjectures that paired with more axioms, referred to as ‘length bias’. The ‘positive bias’ and ‘length bias’ discovered could inform the limitation of existing deep neural networks.Keywords: automated theorem proving, premises selection, deep learning, interpreting deep learning
Procedia PDF Downloads 18315674 The Ethical Imperative of Corporate Social Responsibility Practice and Disclosure by Firms in Nigeria Delta Swamplands: A Qualitative Analysis
Authors: Augustar Omoze Ehighalua, Itotenaan Henry Ogiri
Abstract:
As a mono-product economy, Nigeria relies largely on oil revenues for its foreign exchange earnings and the exploration activities of firms operating in the Niger Delta region have left in its wake tales of environmental degradation, poverty and misery. This, no doubt, have created corporate social responsibility issues in the region. The focus of this research is the critical evaluation of the ethical response to Corporate Social Responsibility (CSR) practice by firms operating in Nigeria Delta Swamplands. While CSR is becoming more popular in developed society with effective practice guidelines and reporting benchmark, there is a relatively low level of awareness and selective applicability of existing international guidelines to effectively support CSR practice in Nigeria. This study, haven identified the lack of CSR institutional framework attempts to develop an ethically-driven CSR transparency benchmark laced within a regulatory framework based on international best practices. The research adopts a qualitative methodology and makes use of primary data collected through semi-structured interviews conducted across the six core states of the Niger Delta Region. More importantly, the study adopts an inductive, interpretivist philosophical paradigm that reveal deep phenomenological insights into what local communities, civil society and government officials consider as good ethical benchmark for responsible CSR practice by organizations. The institutional theory provides for the main theoretical foundation, complemented by the stakeholder and legitimacy theories. The Nvivo software was used to analyze the data collected. This study shows that ethical responsibility is lacking in CSR practice by firms in the Niger Delta Region of Nigeria. Furthermore, findings of the study indicate key issues of environmental, health and safety, human rights, and labour as fundamental in developing an effective CSR practice guideline for Nigeria. The study has implications for public policy formulation as well as managerial perspective.Keywords: corporate social responsibility, CSR, ethics, firms, Niger-Delta Swampland, Nigeria
Procedia PDF Downloads 10615673 Contemporary Issues in Teacher Education in Nigeria
Authors: Salisu Abdu Bagga
Abstract:
This paper attempts to discuss contemporary issues in teacher education and address challenges therein within the context of the Nigeria society. Teacher education is an educational programme aimed at producing the right crop of people (teachers) who will teach at various levels of schooling i.e. primary, secondary and tertiary. The programme targets to inculcate desirable knowledge, skills, attitudes, values and competencies in teachers with the prime motive of keeping them fully abreast with contemporary challenges such as overcrowded classrooms, inadequate instructional materials, ineffective teaching methodology in the teaching industry in Nigeria. Nigeria needs competent, skilful, knowledgeable and innovative classroom teachers for better teaching and learning.Keywords: teacher education, contemporary issues, competencies, higher education
Procedia PDF Downloads 46515672 Social Movements and the Diffusion of Tactics and Repertoires: Activists' Network in Anti-Globalism Movement
Authors: Kyoko Tominaga
Abstract:
Non-Government Organizations (NGOs), Non-Profit Organizations (NPOs), Social Enterprises and other actors play an important role in political decisions in governments at the international levels. Especially, such organizations’ and activists’ network in civil society is quite important to effect to the global politics. To solve the complex social problems in global era, diverse actors should corporate each other. Moreover, network of protesters is also contributes to diffuse tactics, information and other resources of social movements. Based on the findings from the study of International Trade Fairs (ITFs), the author analyzes the network of activists in anti-globalism movement. This research focuses the transition of 54 activists’ whole network in the “protest event” against 2008 G8 summit in Japan. Their network is examined at the three periods: Before protest event phase, during protest event phase and after event phase. A mixed method is used in this study: the author shows the hypothesis from social network analysis and evaluates that with interview data analysis. This analysis gives the two results. Firstly, the more protesters participate to the various events during the protest event, the more they build the network. After that, active protesters keep their network as well. From interview data, we can understand that the active protesters can build their network and diffuse the information because they communicate with other participants and understand that diverse issues are related. This paper comes to same conclusion with previous researches: protest events activate the network among the political activists. However, some participants succeed to build their network, others do not. “Networked” activists are participated in the various events for short period of time and encourage the diffusion of information and tactics of social movements.Keywords: social movement, global justice movement, tactics, diffusion
Procedia PDF Downloads 38315671 Photovoltaic Maximum Power-Point Tracking Using Artificial Neural Network
Authors: Abdelazziz Aouiche, El Moundher Aouiche, Mouhamed Salah Soudani
Abstract:
Renewable energy sources now significantly contribute to the replacement of traditional fossil fuel energy sources. One of the most potent types of renewable energy that has developed quickly in recent years is photovoltaic energy. We all know that solar energy, which is sustainable and non-depleting, is the best knowledge form of energy that we have at our disposal. Due to changing weather conditions, the primary drawback of conventional solar PV cells is their inability to track their maximum power point. In this study, we apply artificial neural networks (ANN) to automatically track and measure the maximum power point (MPP) of solar panels. In MATLAB, the complete system is simulated, and the results are adjusted for the external environment. The results are better performance than traditional MPPT methods and the results demonstrate the advantages of using neural networks in solar PV systems.Keywords: modeling, photovoltaic panel, artificial neural networks, maximum power point tracking
Procedia PDF Downloads 8815670 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 4115669 Analyzing Migration Patterns Using Public Disorder Event Data
Authors: Marie E. Docken
Abstract:
At some point in the lifecycle of a country, patterns of political and social unrest of varying degrees are observed. Events involving public disorder or civil disobedience may produce effects that range a wide spectrum of varying outcomes, depending on the level of unrest. Many previous studies, primarily theoretical in nature, have attempted to measure public disorder in answering why or how it occurs in society by examining causal factors or underlying issues in the social or political position of a population. The main objective in doing so is to understand how these activities evolve or seek some predictive capability for the events. In contrast, this research involves the fusion of analytics and social studies to provide more knowledge of the public disorder and civil disobedience intensity in populations. With a greater understanding of the magnitude of these events, it is believed that we may learn how they relate to extreme actions such as mass migration or violence. Upon establishing a model for measuring civil unrest based upon empirical data, a case study on various Latin American countries is performed. Interpretations of historical events are combined with analytical results to provide insights regarding the magnitude and effect of social and political activism.Keywords: public disorder, civil disobedience, Latin America, metrics, data analysis
Procedia PDF Downloads 14615668 Solving the Quadratic Programming Problem Using a Recurrent Neural Network
Authors: A. A. Behroozpoor, M. M. Mazarei
Abstract:
In this paper, a fuzzy recurrent neural network is proposed for solving the classical quadratic control problem subject to linear equality and bound constraints. The convergence of the state variables of the proposed neural network to achieve solution optimality is guaranteed.Keywords: REFERENCES [1] Xia, Y, A new neural network for solving linear and quadratic programming problems. IEEE Transactions on Neural Networks, 7(6), 1996, pp.1544–1548. [2] Xia, Y., & Wang, J, A recurrent neural network for solving nonlinear convex programs subject to linear constraints. IEEE Transactions on Neural Networks, 16(2), 2005, pp. 379–386. [3] Xia, Y., H, Leung, & J, Wang, A projection neural network and its application to constrained optimization problems. IEEE Transactions Circuits and Systems-I, 49(4), 2002, pp.447–458.B. [4] Q. Liu, Z. Guo, J. Wang, A one-layer recurrent neural network for constrained seudoconvex optimization and its application for dynamic portfolio optimization. Neural Networks, 26, 2012, pp. 99-109.
Procedia PDF Downloads 64415667 The Role of Leisure in Older Adults Transitioning to New Homes
Authors: Kristin Prentice, Carri Hand
Abstract:
As the Canadian population ages and chronic health conditions continue to escalate, older adults will require various types of housing, such as long term care or retirement homes. Moving to a new home may require a change in leisure activities and social networks, which could be challenging to maintain identity and create a sense of home. Leisure has been known to help older adults maintain or increase their quality of life and life satisfaction and may help older adults in moving to new homes. Sense of home and identity within older adults' transitions to new homes are concepts that may also relate to leisure engagement. Literature is scant regarding the role of leisure in older adults moving to new homes and how the sense of home and identity inter-relate. This study aims to explore how leisure may play a role in older adults' transitioning to new homes, including how sense of home and identity inter-relate. An ethnographic approach will be used to understand the culture of older adults transitioning to new homes. This study will involve older adults who have recently relocated to a mid-sized city in Ontario, Canada. The study will focus on the older adult’s interactions with and connections to their home environment through leisure. Data collection will take place via video-conferencing and will include a narrative interview and two other interviews to discuss an activity diary of leisure engagement pre and post move and mental maps to capture spaces where participants engaged in leisure. Participants will be encouraged to share photographs of leisure engagement taken inside and outside their home to help understand the social spaces the participants refer to in their activity diaries and mental maps. Older adults attempt to adjust to their new homes by maintaining their identity, developing a sense of home through creating attachment to place, and maintaining social networks, all of which have been linked to engaging in leisure. This research will provide insight into the role of leisure in this transition process and the extent that the home and community can contribute to aiding their transition to the new home. This research will contribute to existing literature on the inter-relationships of leisure, sense of home, and identity and how they relate to older adults moving to new homes. This research also has potential for influencing policy and practice for meeting the housing needs of older adults.Keywords: leisure, older adults, transition, identity
Procedia PDF Downloads 12015666 Design an Architectural Model for Deploying Wireless Sensor Network to Prevent Forest Fire
Authors: Saurabh Shukla, G. N. Pandey
Abstract:
The fires have become the most serious disasters to forest resources and the human environment. In recent years, due to climate change, human activities and other factors the frequency of forest fires has increased considerably. The monitoring and prevention of forest fires have now become a global concern for forest fire prevention organizations. Currently, the methods for forest fire prevention largely consist of patrols, observation from watch towers. Thus, software like deployment of the wireless sensor network to prevent forest fire is being developed to get a better estimate of the temperature and humidity prospects. Now days, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unrealistic to expect that in coming years the world will be covered with wireless sensor networks. This new technology has lots of unlimited potentials and can be used for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces.Keywords: deployment, sensors, wireless sensor networks, forest fires
Procedia PDF Downloads 43615665 Pracademia in Irish Higher Education: The Only Solution to Contemporary Regulation in Professional Social Care Practice
Authors: Aoife Prendergast
Abstract:
The synergy between theory and practice can be considered elusive, the touchstone for the development of successful undergraduate programmes particularly in allied health professions such as social care. A 'pracademic' is a person who spans both the somewhat ethereal world of academia as a scholar and the pragmatic world of practice. This paper examines the concept of 'pracademia' in relation to the role of the social care practitioner and continuing professional development. It also assists in the understanding of the synergy between social care professionals and higher education. A consideration of the identity and position in terms of approach to regulation is explored as well as an acknowledgement of the strengths and opportunities for sharing power in hierarchical positions. The world of practice serves as the centre point of the academic compass for most professional programs. Just as schools of engineering and law are disciplined by the marketplace, which seeks well-trained students, so our social care programmes must perennially find ways to address the fast changing needs of practitioners, whether they be government, not-for-profit organizations, consulting firms or contractors. We may not expect such traditional academic disciplines as history, sociology, or political science to cater to the needs of external audiences or practitioners— indeed, these disciplines' insulation from public concerns and issues is considered a strength by some. This paper aims to explore the integration of academic teaching and research with the communities of practice in social care. This appears to be a fundamental aspiration of the social care profession. While building and integrating an important body of academic theory and concepts from a variety of disciplines, social care as a field has embraced a professional orientation by seeking to be relevant to practitioners at various levels. While teaching theory, social care programmes, and faculty are often acutely aware that their academic content and credibility, in part, rest on a deep connection with practitioners. While theory can be self-contained, the impact of our research and teaching arguably finds its most compelling and highest audience when it addresses the agenda items and concerns of practitioners.Keywords: social care, pracademia, supervision, practice education
Procedia PDF Downloads 16215664 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 5915663 The Effect of Technology on Human Rights Rules
Authors: Adel Fathy Sadek Abdalla
Abstract:
The issue of respect for human rights in Southeast Asia has become a major concern and is attracting the attention of the international community. Basically, the Association of Southeast Asian Nations (ASEAN) made human rights one of its main issues and in the ASEAN Charter in 2008. Subsequently, the Intergovernmental Commission on Human Rights ASEAN Human Rights (AICHR) was established. AICHR is the Southeast Asia Human Rights Enforcement Commission charged with the responsibilities, functions and powers to promote and protect human rights. However, at the end of 2016, the protective function assigned to the AICHR was not yet fulfilled. This is shown by several cases of human rights violations that are still ongoing and have not yet been solved. One case that has recently come to light is human rights violations against the Rohingya people in Myanmar. Using a legal-normative approach, the study examines the urgency of establishing a human rights tribunal in Southeast Asia capable of making a decision binding on ASEAN members or guilty parties. Data shows ASEAN needs regional courts to deal with human rights abuses in the ASEAN region. In addition, the study also highlights three important factors that ASEAN should consider when establishing a human rights tribunal, namely: Volume. a significant difference in terms of democracy and human rights development among the members, a consistent implementation of the principle of non-interference and the financial issue of the continuation of the court.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 4115662 Engineering Topology of Ecological Model for Orientation Impact of Sustainability Urban Environments: The Spatial-Economic Modeling
Authors: Moustafa Osman Mohammed
Abstract:
The modeling of a spatial-economic database is crucial in recitation economic network structure to social development. Sustainability within the spatial-economic model gives attention to green businesses to comply with Earth’s Systems. The natural exchange patterns of ecosystems have consistent and periodic cycles to preserve energy and materials flow in systems ecology. When network topology influences formal and informal communication to function in systems ecology, ecosystems are postulated to valence the basic level of spatial sustainable outcome (i.e., project compatibility success). These referred instrumentalities impact various aspects of the second level of spatial sustainable outcomes (i.e., participant social security satisfaction). The sustainability outcomes are modeling composite structure based on a network analysis model to calculate the prosperity of panel databases for efficiency value, from 2005 to 2025. The database is modeling spatial structure to represent state-of-the-art value-orientation impact and corresponding complexity of sustainability issues (e.g., build a consistent database necessary to approach spatial structure; construct the spatial-economic-ecological model; develop a set of sustainability indicators associated with the model; allow quantification of social, economic and environmental impact; use the value-orientation as a set of important sustainability policy measures), and demonstrate spatial structure reliability. The structure of spatial-ecological model is established for management schemes from the perspective pollutants of multiple sources through the input–output criteria. These criteria evaluate the spillover effect to conduct Monte Carlo simulations and sensitivity analysis in a unique spatial structure. The balance within “equilibrium patterns,” such as collective biosphere features, has a composite index of many distributed feedback flows. The following have a dynamic structure related to physical and chemical properties for gradual prolong to incremental patterns. While these spatial structures argue from ecological modeling of resource savings, static loads are not decisive from an artistic/architectural perspective. The model attempts to unify analytic and analogical spatial structure for the development of urban environments in a relational database setting, using optimization software to integrate spatial structure where the process is based on the engineering topology of systems ecology.Keywords: ecological modeling, spatial structure, orientation impact, composite index, industrial ecology
Procedia PDF Downloads 6815661 Nanotechnology in Construction as a Building Security
Authors: Hanan Fayez Hussein
Abstract:
‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.Keywords: nanomaterial, global warming, building security, smart homes
Procedia PDF Downloads 8215660 Application of Unmanned Aerial Vehicle in Urban Rail Transit Intelligent Inspection
Authors: Xinglu Nie, Feifei Tang, Chuntao Wei, Zhimin Ruan, Qianhong Zhu
Abstract:
Current method of manual-style inspection can not fully meet the requirement of the urban rail transit security in China. In this paper, an intelligent inspection method using unmanned aerial vehicle (UAV) is utilized. A series of orthophoto of rail transit monitored area was collected by UAV, image correction and registration were operated among multi-phase images, then the change detection was used to detect the changes, judging the engineering activities and human activities that may become potential threats to the security of urban rail. Not only qualitative judgment, but also quantitative judgment of changes in the security control area can be provided by this method, which improves the objectives and efficiency of the patrol results. The No.6 line of Chongqing Municipality was taken as an example to verify the validation of this method.Keywords: rail transit, control of protected areas, intelligent inspection, UAV, change detection
Procedia PDF Downloads 37015659 A Neuro-Automata Decision Support System for the Control of Late Blight in Tomato Crops
Authors: Gizelle K. Vianna, Gustavo S. Oliveira, Gabriel V. Cunha
Abstract:
The use of decision support systems in agriculture may help monitoring large fields of crops by automatically detecting the symptoms of foliage diseases. In our work, we designed and implemented a decision support system for small tomatoes producers. This work investigates ways to recognize the late blight disease from the analysis of digital images of tomatoes, using a pair of multilayer perceptron neural networks. The networks outputs are used to generate repainted tomato images in which the injuries on the plant are highlighted, and to calculate the damage level of each plant. Those levels are then used to construct a situation map of a farm where a cellular automata simulates the outbreak evolution over the fields. The simulator can test different pesticides actions, helping in the decision on when to start the spraying and in the analysis of losses and gains of each choice of action.Keywords: artificial neural networks, cellular automata, decision support system, pattern recognition
Procedia PDF Downloads 45515658 A Case Study: Social Network Analysis of Construction Design Teams
Authors: Elif D. Oguz Erkal, David Krackhardt, Erica Cochran-Hameen
Abstract:
Even though social network analysis (SNA) is an abundantly studied concept for many organizations and industries, a clear SNA approach to the project teams has not yet been adopted by the construction industry. The main challenges for performing SNA in construction and the apparent reason for this gap is the unique and complex structure of each construction project, the comparatively high circulation of project team members/contributing parties and the variety of authentic problems for each project. Additionally, there are stakeholders from a variety of professional backgrounds collaborating in a high-stress environment fueled by time and cost constraints. Within this case study on Project RE, a design & build project performed at the Urban Design Build Studio of Carnegie Mellon University, social network analysis of the project design team will be performed with the main goal of applying social network theory to construction project environments. The research objective is to determine a correlation between the network of how individuals relate to each other on one’s perception of their own professional strengths and weaknesses and the communication patterns within the team and the group dynamics. Data is collected through a survey performed over four rounds conducted monthly, detailed follow-up interviews and constant observations to assess the natural alteration in the network with the effect of time. The data collected is processed by the means of network analytics and in the light of the qualitative data collected with observations and individual interviews. This paper presents the full ethnography of this construction design team of fourteen architecture students based on an elaborate social network data analysis over time. This study is expected to be used as an initial step to perform a refined, targeted and large-scale social network data collection in construction projects in order to deduce the impacts of social networks on project performance and suggest better collaboration structures for construction project teams henceforth.Keywords: construction design teams, construction project management, social network analysis, team collaboration, network analytics
Procedia PDF Downloads 20115657 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 1915656 An Analysis on Community Based Heritage Tourism: A Resource for a Small Community in Rural County Clare, Ireland
Authors: Marie Taylor, Catriona Murphy
Abstract:
The aim of this paper is to identify the factors of success in community based heritage tourism initiatives. Heritage and community are central to many tourism initiatives with heritage tourism having the potential to act as a catalyst for community development. This paper presents the findings of research that examined the relationship between heritage tourism and community development. The findings recognised that heritage tourism had economic, social and cultural benefits for a community as well as a role in strengthening concepts such as sense of identity, place, and authenticity. In addition, this paper proposes an assessment framework for sustainable community based heritage tourism to identify factors and contextual influences involved in their success or failure. In evaluating the sustainability of such initiatives, a number of issues are investigated including the continued role of stakeholders, the role of funding, the influence of collaboration and the changing role of rural development and its impact on community engagement. The research is descriptive, evaluative and explanatory research, exploring and analysing issues such as the development of community structures in community based heritage tourism. Thus, it will contribute to the development of potential tourism and community development policies and strategies at a local, national and international level. An interpretative and inductive approach is utilised, and a mixed method approach followed as it encapsulates the best of quantitative and qualitative research methods. The case studies focus on social enterprises in relation to tourism and community based tourism cooperatives as there are limited study and knowledge of these. Consequently, this research will contribute to the discourse on community based heritage tourism as an aspect of community development.Keywords: collaboration, community-based heritage tourism, stakeholders, sustainable tourism
Procedia PDF Downloads 34715655 The Territorial Expression of Religious Identity: A Case Study of Catholic Communities
Authors: Margarida Franca
Abstract:
The influence of the ‘cultural turn’ movement and the consequent deconstruction of scientific thought allowed geography and other social sciences to open or deepen their studies based on the analysis of multiple identities, on singularities, on what is particular or what marks the difference between individuals. In the context of postmodernity, the geography of religion has gained a favorable scientific, thematic and methodological focus for the qualitative and subjective interpretation of various religious identities, sacred places, territories of belonging, religious communities, among others. In the context of ‘late modernity’ or ‘net modernity’, sacred places and the definition of a network of sacred territories allow believers to attain the ‘ontological security’. The integration on a religious group or a local community, particularly a religious community, allows human beings to achieve a sense of belonging, familiarity or solidarity and to overcome, in part, some of the risks or fears that society has discovered. The importance of sacred places comes not only from their inherent characteristics (eg transcendent, mystical and mythical, respect, intimacy and abnegation), but also from the possibility of adding and integrating members of the same community, creating bonds of belonging, reference and individual and collective memory. In addition, the formation of different networks of sacred places, with multiple scales and dimensions, allows the human being to identify and structure his times and spaces of daily life. Thus, each individual, due to his unique identity and life and religious paths, creates his own network of sacred places. The territorial expression of religious identity allows to draw a variable and unique geography of sacred places. Through the case study of the practicing Catholic population in the diocese of Coimbra (Portugal), the aim is to study the territorial expression of the religious identity of the different local communities of this city. Through a survey of six parishes in the city, we sought to identify which factors, qualitative or not, define the different territorial expressions on a local, national and international scale, with emphasis on the socioeconomic profile of the population, the religious path of the believers, the religious group they belong to and the external interferences, religious or not. The analysis of these factors allows us to categorize the communities of the city of Coimbra and, for each typology or category, to identify the specific elements that unite the believers to the sacred places, the networks and religious territories that structure the religious practice and experience and also the non-representational landscape that unifies and creates memory. We conclude that an apparently homogeneous group, the Catholic community, incorporates multitemporalities and multiterritorialities that are necessary to understand the history and geography of a whole country and of the Catholic communities in particular.Keywords: geography of religion, sacred places, territoriality, Catholic Church
Procedia PDF Downloads 324