Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5277

Search results for: security awareness

3717 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 139
3716 Impact of Treatment of Fragility Fractures Due to Osteoporosis as an Economic Burden Worldwide: A Systematic Review

Authors: Fabiha Tanzeem

Abstract:

BACKGROUND: Osteoporosis is a skeletal disease that is associated with a reduction in bone mass and microstructures of the bone and deterioration of bone tissue. Fragility fracture due to osteoporosis is the most significant complication of osteoporosis. The increasing prevalence of fragility fractures presents a growing burden on the global economy. There is a rapidly evolving need to improve awareness of the costs associated with these types of fractures and to review current policies and practices for the prevention and management of the disease. This systematic review will identify and describe the direct and indirect costs associated with osteoporotic fragility fractures from a global perspective from the included studies. The review will also find out whether the costs required for the treatment of fragility fractures due to osteoporosis impose an economic burden on the global healthcare system. METHODS: Four major databases were systematically searched for direct and indirect costs of osteoporotic fragility fracture studies in the English Language. PubMed, Cochrane Library, Embase and Google Scholar were searched for suitable articles published between 1990 and July 2020. RESULTS: The original search yielded 1166 papers; from these, 27 articles were selected for this review according to the inclusion and exclusion criteria. In the 27 studies, the highest direct costs were associated with the treatment of pelvic fractures, with the majority of the expenditure due to hospitalization and surgical treatments. It is also observed that most of the articles are from developed countries. CONCLUSION: This review indicates the significance of the economic burden of osteoporosis globally, although more research needs to be done in developing countries. In the treatment of fragility fractures, direct costs were the main reported expenditure in this review. The healthcare costs incurred globally can be significantly reduced by implementing measures to effectively prevent the disease. Raising awareness in children and adults by improving the quality of the information available and standardising policies and planning of services requires further research.

Keywords: systematic review, osteoporosis, cost of illness

Procedia PDF Downloads 163
3715 Dental Students' Acquired Knowledge of the Pre-Contemplation Stage of Change

Authors: S. Curtin, A. Trace

Abstract:

Introduction: As patients can often be ambivalent about or resistant to any change in their smoking behavior the traditional ‘5 A’ model may be limited as it assumes that patients are ready and motivated to change. However, there is a stage model that is helpful to give guidance for dental students: the Transtheoretical Model (TTM). This model allows students to understand the tasks and goals for the pre-contemplation stage. The TTM was introduced in early stages as a core component of a smoking cessation programme that was integrated into a Behavioral Science programme as applied to dentistry. The aim of the present study is to evaluate and illustrate the students’ current level of knowledge from the questions the students generated in order to engage patients in the tasks and goals of the pre-contemplation stage. Method: N=47 responses of fifth-year undergraduate dental students. These responses were the data set for this study and related to their knowledge base of appropriate questions for a dentist to ask at the pre-contemplation stage of change. A deductive -descriptive analysis was conducted on the data. The goals and tasks of the pre-contemplation stage of the TTM provided a template for this deductive analysis. Results: 51% of students generated relevant, open, exploratory questions for the pre-contemplation stage, whilst 100% of students generated closed questions. With regard to those questions appropriate for the pre-contemplation stage, 19% were open and exploratory, while 66% were closed questions. A deductive analysis of the open exploratory questions revealed that 53% of the questions addressed increased concern about the current pattern of behavior, 38% of the questions concerned increased awareness of a need for change and only 8% of the questions dealt with the envisioning of the possibility of change. Conclusion: All students formulated relevant questions for the pre-contemplation stage, and half of the students generated the open, exploratory questions that increased patients’ awareness of the need to change. More training is required to facilitate a shift in the formulation from closed to open questioning, especially given that, traditionally, smoking cessation was modeled on the ‘5 As’, and that the general training for dentists supports an advisory and directive approach.

Keywords: behaviour change, pre-contemplation stage, trans-theoretical model, undergraduate dentistry students

Procedia PDF Downloads 409
3714 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 653
3713 A Methodology for the Synthesis of Multi-Processors

Authors: Hamid Yasinian

Abstract:

Random epistemologies and hash tables have garnered minimal interest from both security experts and experts in the last several years. In fact, few information theorists would disagree with the evaluation of expert systems. In our research, we discover how flip-flop gates can be applied to the study of superpages. Though such a hypothesis at first glance seems perverse, it is derived from known results.

Keywords: synthesis, multi-processors, interactive model, moor’s law

Procedia PDF Downloads 432
3712 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 95
3711 A Case Study of Kinesthetic Intelligence Development Intervention on One Asperger Child

Authors: Chingwen Yeh, I. Chen Huang

Abstract:

This paper aims to conduct a case study on kinesthetic intelligence development intervention with a child who has Asperger symptom identified by physician. First, the characteristics of Asperger were defined based on the related literature. Some Asperger's people are born with outstanding insight and are good at solving complex and difficult problems. In contrast to high-functioning autistic, Asperger children do not lose their ability to express themselves verbally. However in the cognitive function, they focus mainly on the things they are interested in instead of paying attention to the whole surrounding situation. Thus it is difficult for them not only to focus on things that they are not interesting in, but also to interact with people. Secondly, 8-weeks of kinesthetic intelligence development courses were designed within a series of physical action that including the following sections: limbs coordination, various parts of body rhythm changes, strength and space awareness and breathing practice. In classroom observations were recorded both on words and with video as the qualitative research data. Finally, in-depth interview with the case child’s teachers, parents and other in class observers were documented on a weekly base in order to examine the effectiveness of before and after the kinesthetic intelligence development course and to testify the usefulness of the lesson plan. This research found that the case child has improved significantly in terms of attention span and body movement creativity. In the beginning of intervention, the case child made less eyes contact with others. The instructor needed to face the case child to confirm the eyes contact. And the instructor also used various adjective words as guiding language for all kinds of movement sequence practice. The result can cause the case child’s attention and learning motivation. And the case child understand what to do to enhance kinesthetic intelligence. These authors hope findings of this study can contribute as reference for the further research on the related topic.

Keywords: asperger symptom, body rhythm, kinesthetic intelligence, space awareness

Procedia PDF Downloads 234
3710 Possibilities and Prospects for the Development of the Agricultural Insurance Market (The Example of Georgia)

Authors: Nino Damenia

Abstract:

The agricultural sector plays an important role in the development of Georgia's economy, it contributes to employment and food security. It faces various types of risks that may lead to heavy financial losses. Agricultural insurance is one of the means of combating agricultural risks. The paper discusses the agricultural insurance experience of those countries (European countries and the USA) that have successfully implemented the agricultural insurance program. Analysis of international cases shows that a well-designed and implemented agri-insurance system can bring significant benefits to farmers, insurance companies and the economy as a whole. In the background of all this, the Government of Georgia recognized the importance of agro-insurance and took important steps for its development. In 2014, in cooperation with insurance companies, an agro-insurance program was introduced, the purpose of which is to increase the availability of insurance for farmers and stimulate the agro-insurance market. Despite such a step forward, challenges remain such as awareness of farmers, insufficient infrastructure for data collection and risk assessment, involvement of insurance companies and other important factors. With the support of the government and stakeholders, it is possible to overcome the existing challenges and establish a strong and effective agro-insurance system. Objectives. The purpose of the research is to analyze the development trends of the agricultural insurance market, to identify the main factors affecting its growth, and to further develop recommendations for development prospects for Georgia. Methodologies. The research uses mixed methods, which combine qualitative and quantitative research techniques. The qualitative method includes the study of the literature of Georgian and foreign economists, which allows us to get acquainted with the challenges, opportunities, legislative and regulatory frameworks of agricultural insurance. Quantitative analysis involves collecting data from stakeholders and then analyzing it. The paper also uses the methods of synthesis, comparison and statistical analysis of the agricultural insurance market in Georgia, Europe and the USA. Conclusions. As the main results of the research, we can consider that the analysis of the insurance market has been made and its main functions have been identified; The essence, features and functions of agricultural insurance are analyzed; European and US agricultural insurance market is researched; The stages of formation and development of the agricultural insurance market of Georgia are studied, its importance for the agricultural sector of Georgia is determined; The role of the state for the development of agro-insurance is analyzed and development prospects are established based on the study of the current trends of the agro-insurance market of Georgia.

Keywords: agricultural insurance, agriculture, agricultural insurance program, risk

Procedia PDF Downloads 54
3709 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 194
3708 Increasing Sexual Safety Awareness and Capacity for Mental Health Professionals

Authors: Tara Hunter, Kristine Concepcion, Wendy Cheng, Brianna Pike, Jane Estoesta, Anne Stuart

Abstract:

In 2015, Family Planning NSW was contracted by the NSW Ministry of Health to design and deliver Sexual Safety Policy training (SSPT) to mental health professionals across NSW. The training was based on their current guidelines and developed in consultation with an expert reference group. From October 2015 to April 2017 it was delivered to over 2,400 mental health professionals with a view to supporting implementation of consistent prevention and intervention related to sexual safety in the mental health setting. An evaluation was undertaken to determine the knowledge and confidence of participants related to sexual safety before and after the training, and whether any improvements were translated into changes in practice. Participants were invited to complete a survey prior to the training, upon completion and three to six months thereafter. Telephone interviews were conducted among service managers and mental health champions six months post-training. Prior to training, the majority of mental health professionals reported being slightly to moderately confident in identifying a sexual safety incident. When asked on their understanding of sexual safety, gender sensitive practice and trauma informed care, they reported no confidence, slight confidence and moderate confidence. Immediately after the training, 54.5% reported being very confident and 10.9% extremely confident in identifying a sexual safety incident. More than half felt very confident or extremely confident in their understanding of sexual safety principles. The impact survey (six months later) found that the majority of participants (91%) were highly confident in identifying a sexual safety incident. Telephone interviewees reported a change in workplace culture and increased awareness after the training. Mental health professionals experienced increased knowledge and confidence about sexual safety principles following the training and were able to implement positive changes and concrete actions to better address sexual safety issues in their workplace.

Keywords: sexual safety, mental health professionals, trauma informed care, policy training

Procedia PDF Downloads 301
3707 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World

Authors: Fehmeen Anwar, Ujala Liaqat

Abstract:

For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.

Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics

Procedia PDF Downloads 290
3706 Feasibilty and Penetration of Electric Vehicles in Indian Power Grid

Authors: Kashyap L. Mokariya, Varsha A. Shah, Makarand M. Lokhande

Abstract:

As the current status and growth of Indian automobile industry is remarkable, transportation sectors are the main concern in terms of Energy security and climate change. Rising demand of fuel and its dependency on other countries affects the GDP of nation. So in this context if the 10 percent of vehicle got operated in Electrical mode how much saving in terms of Rs and in terms of liters is achieved has been analyzed which is also a part of Nations Electric mobility mission plan. Analysis is also done for converting unit consumption of Electricity of Electric vehicle into equivalent fuel consumption in liters which shows that at present tariff rate Electrical operated vehicles are far more beneficial. It also gives benchmark to the authorities to set the tariff rate for Electrical vehicles. Current situation of Indian grid is shown and how the Gap between Generation and Demand can be reduced is analyzed in terms of increasing generation capacity and Energy Conservation measures. As the certain regions of country is facing serious deficit than how to take energy conservation measures in Industry and especially in rural areas where generally Energy Auditing is not carried out that is analyzed in context of Electric vehicle penetration in near future. Author was a part of Vishvakarma yojna where in 255 villages of Gujarat Energy losses were measured and solutions were given to mitigate them and corresponding report to the authorities of villages was delivered.

Keywords: vehiclepenetration, feasibility, Energyconservation, future grid, Energy security, pf controller

Procedia PDF Downloads 355
3705 A Qualitative Study of Multiracial Experiences of Microaggressions in Mental Health Counseling and Counselor Education: Implications and Recommendations for Culturally Competent Training and Practice

Authors: C. Peeper McDonald

Abstract:

Despite the multiracial population growing exponentially in the world and especially in the U.S., there continues to be a lack of culturally responsive research addressing the unique experiences and needs of this population, especially within counseling and counselor education settings. It is evident that their unique racial microaggressive experiences need to be better understood within the field of professional counseling to not only underscore competent training and practice but also culturally responsive training and practice. The participants of this study were 13 (n=13) individuals from the United States who identified as multiracial and said they had a microaggressive experience with either their counselor or counseling professor. Data were gathered through one-on-one, semi-structured interviews. The analysis employed phenomenological methods based on the transcendental approach, resulting in themes that encapsulated the core of the participants' experiences, including multiracial microaggressions that are derogatory and perpetuate privilege/oppression; counselors and their training programs should embody safety, support, attentiveness, inter-personal sensitivity, and awareness of the impact on others; microaggressions negatively affect the counseling relationship and outcomes; awareness surrounding the emotional impact of microaggressions; strength-based responses and future responses to microaggressions; and advocacy and suggestions for counselors and counselor educators. These themes are discussed in detail, and recommendations for researchers, counselor educators, and professional counselors to improve training and practice are provided. This U.S. study's insights into the Multiracial experience of microaggressions within the mental health profession can inform global mental health practices by highlighting the need for culturally responsive counseling that recognizes and addresses racial nuances. Such knowledge is transferable to international settings where multiracial populations may also encounter similar challenges, aiding in the development of global standards for culturally competent counseling practices.

Keywords: culturally responsive training and practice, mental health, microaggressions, multiracial

Procedia PDF Downloads 45
3704 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 147
3703 Assessment of Korea's Natural Gas Portfolio Considering Panama Canal Expansion

Authors: Juhan Kim, Jinsoo Kim

Abstract:

South Korea cannot import natural gas in any form other than LNG because of the division of South and North Korea. Further, the high proportion of natural gas in the national energy mix makes this resource crucial for energy security in Korea. Expansion of Panama Canal will allow for reducing the cost of shipping between the Far East and U.S East. Panama Canal expansion can have significant impacts on South Korea. Due to this situation, we review the natural gas optimal portfolio by considering the uniqueness of the Korean Natural gas market and expansion of Panama Canal. In order to assess Korea’s natural gas optimal portfolio, we developed natural gas portfolio model. The model comprises two steps. First, to obtain the optimal long-term spot contract ratio, the study examines the price level and the correlation between spot and long-term contracts by using the Markowitz, portfolio model. The optimal long-term spot contract ratio follows the efficient frontier of the cost/risk level related to this price level and degree of correlation. Second, by applying the obtained long-term contract purchase ratio as the constraint in the linear programming portfolio model, we determined the natural gas optimal import portfolio that minimizes total intangible and tangible costs. Using this model, we derived the optimal natural gas portfolio considering the expansion of Panama Canal. Based on these results, we assess the portfolio for natural gas import to Korea from the perspective of energy security and present some relevant policy proposals.

Keywords: natural gas, Panama Canal, portfolio analysis, South Korea

Procedia PDF Downloads 286
3702 Faculty and Students Perspectives of E-Learning at the University of Bahrain

Authors: Amira Abdulrazzaq

Abstract:

This paper is studying the opinion of faculty members and students about the future of education (e-learning) at the University of Bahrain. Through quantitative analysis a distribution of two surveys, one targeting students of IT College, and College of Arts and the other targeting Faculty members of both Colleges. Through the above survey, the paper measures the following factors: awareness and acceptance, satisfaction, usability, and usefulness. Results indicate positive reactions of all above factors.

Keywords: e-learning, education, moodle, WebCT

Procedia PDF Downloads 464
3701 Measuring Social Dimension of Sustainable Development in New Zealand Cities

Authors: Taimaz Larimian

Abstract:

During recent years, sustainable development has increasingly influenced urban policy, housing and planning in cities all over the world. Debates about sustainability no longer consider it solely as an environmental concern, but also incorporate social and economic dimensions. However, while a social dimension of sustainability is extensively accepted, the exact definition of the concept is still vague and unclear. This study is addressing this lack of specificity through a detailed exploration of social sustainability as the least studied pillar of sustainable development and sheds light on the debate over the definition of social sustainability through developing a measurement model of the constitutive dimensions of the concept. With this aim, a conceptual framework is developed based on the existing literature, determining seven main dimensions of the social sustainability concept namely: social interaction, safety and security, social equity, social participation, neighborhood satisfaction, housing satisfaction and sense of place. The validity and reliability of the model is then tested using exploratory and confirmatory factor analysis. In order to do so, five case study neighborhoods from Dunedin city with a range of urban forms and characters are investigated, to define social sustainability concept and its consisting dimensions from people’s perspective. The findings of this study present a clear definition of social sustainability at neighborhood scale and highlight all different dimensions of the concept in the context of New Zealand cities. According to the results, among the investigated dimensions, neighborhood satisfaction and safety and security had the most influence on people’s feeling of social sustainability in their neighborhood.

Keywords: social sustainability, factor analysis, neighborhood level, New Zealand cities

Procedia PDF Downloads 294
3700 A Short Survey of Integrating Urban Agriculture and Environmental Planning

Authors: Rayeheh Khatami, Toktam Hanaei, Mohammad Reza Mansouri Daneshvar

Abstract:

The growth of the agricultural sector is known as an essential way to achieve development goals in developing countries. Urban agriculture is a way to reduce the vulnerability of urban populations of the world toward global environmental change. It is a sustainable and efficient system to respond to the environmental, social and economic needs of the city, which leads to urban sustainability. Today, many local and national governments are developing urban agriculture as an effective tool in responding to challenges such as poverty, food security, and environmental problems. In this study, we follow a perspective based on urban agriculture literature in order to indicate the urban agriculture’s benefits in environmental planning strategies in non-western countries like Iran. The methodological approach adopted is based on qualitative approach and documentary studies. A total of 35 articles (mixed quantitative and qualitative methods studies) were studied in final analysis, which are published in relevant journals that focus on this subject. Studies show the wide range of positive benefits of urban agriculture on food security, nutrition outcomes, health outcomes, environmental outcomes, and social capital. However, there was no definitive conclusion about the negative effects of urban agriculture. This paper provides a conceptual and theoretical basis to know about urban agriculture and its roles in environmental planning, and also conclude the benefits of urban agriculture for researchers, practitioners, and policymakers who seek to create spaces in cities for implementation urban agriculture in future.

Keywords: urban agriculture, environmental planning, urban planning, literature

Procedia PDF Downloads 137
3699 The Study of Mirror Self-Recognition in Wildlife

Authors: Azwan Hamdan, Mohd Qayyum Ab Latip, Hasliza Abu Hassim, Tengku Rinalfi Putra Tengku Azizan, Hafandi Ahmad

Abstract:

Animal cognition provides some evidence for self-recognition, which is described as the ability to recognize oneself as an individual separate from the environment and other individuals. The mirror self-recognition (MSR) or mark test is a behavioral technique to determine whether an animal have the ability of self-recognition or self-awareness in front of the mirror. It also describes the capability for an animal to be aware of and make judgments about its new environment. Thus, the objectives of this study are to measure and to compare the ability of wild and captive wildlife in mirror self-recognition. Wild animals from the Royal Belum Rainforest Malaysia were identified based on the animal trails and salt lick grounds. Acrylic mirrors with wood frame (200 x 250cm) were located near to animal trails. Camera traps (Bushnell, UK) with motion-detection infrared sensor are placed near the animal trails or hiding spot. For captive wildlife, animals such as Malayan sun bear (Helarctos malayanus) and chimpanzee (Pan troglodytes) were selected from Zoo Negara Malaysia. The captive animals were also marked using odorless and non-toxic white paint on its forehead. An acrylic mirror with wood frame (200 x 250cm) and a video camera were placed near the cage. The behavioral data were analyzed using ethogram and classified through four stages of MSR; social responses, physical inspection, repetitive mirror-testing behavior and realization of seeing themselves. Results showed that wild animals such as barking deer (Muntiacus muntjak) and long-tailed macaque (Macaca fascicularis) increased their physical inspection (e.g inspecting the reflected image) and repetitive mirror-testing behavior (e.g rhythmic head and leg movement). This would suggest that the ability to use a mirror is most likely related to learning process and cognitive evolution in wild animals. However, the sun bear’s behaviors were inconsistent and did not clearly undergo four stages of MSR. This result suggests that when keeping Malayan sun bear in captivity, it may promote communication and familiarity between conspecific. Interestingly, chimp has positive social response (e.g manipulating lips) and physical inspection (e.g using hand to inspect part of the face) when they facing a mirror. However, both animals did not show any sign towards the mark due to lost of interest in the mark and realization that the mark is inconsequential. Overall, the results suggest that the capacity for MSR is the beginning of a developmental process of self-awareness and mental state attribution. In addition, our findings show that self-recognition may be based on different complex neurological and level of encephalization in animals. Thus, research on self-recognition in animals will have profound implications in understanding the cognitive ability of an animal as an effort to help animals, such as enhanced management, design of captive individuals’ enclosures and exhibits, and in programs to re-establish populations of endangered or threatened species.

Keywords: mirror self-recognition (MSR), self-recognition, self-awareness, wildlife

Procedia PDF Downloads 266
3698 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 112
3697 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 149
3696 Advancing Inclusive Curriculum Development for Special Needs Education in Africa

Authors: Onosedeba Mary Ayayia

Abstract:

Inclusive education has emerged as a critical global imperative, aiming to provide equitable educational opportunities for all, regardless of their abilities or disabilities. In Africa, the pursuit of inclusive education faces significant challenges, particularly concerning the development and implementation of inclusive curricula tailored to the diverse needs of students with disabilities. This study delves into the heart of this issue, seeking to address the pressing problem of exclusion and marginalization of students with disabilities in mainstream educational systems across the continent. The problem is complex, entailing issues of limited access to tailored curricula, shortages of qualified teachers in special needs education, stigmatization, limited research and data, policy gaps, inadequate resources, and limited community awareness. These challenges perpetuate a system where students with disabilities are systematically excluded from quality education, limiting their future opportunities and societal contributions. This research proposes a comprehensive examination of the current state of inclusive curriculum development and implementation in Africa. Through an innovative and explicit exploration of the problem, the study aims to identify effective strategies, guidelines, and best practices that can inform the development of inclusive curricula. These curricula will be designed to address the diverse learning needs of students with disabilities, promote teacher capacity building, combat stigmatization, generate essential data, enhance policy coherence, allocate adequate resources, and raise community awareness. The goal of this research is to contribute to the advancement of inclusive education in Africa by fostering an educational environment where every student, regardless of ability or disability, has equitable access to quality education. Through this endeavor, the study aligns with the broader global pursuit of social inclusion and educational equity, emphasizing the importance of inclusive curricula as a foundational step towards a more inclusive and just society.

Keywords: inclusive education, special education, curriculum development, Africa

Procedia PDF Downloads 59
3695 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 274
3694 A Niche Sustainable Tourism Product: Stakeholder Perceptions on Sustainable Conference Tourism in Cyprus

Authors: Xenia I. Loizidou, Anthi Gavriel, Demetra Petsa

Abstract:

The tourism industry is a significant contributor to Cyprus's Gross Domestic Product. However, as the main tourism product is 'sun and sea', the industry is significantly unsustainable, with the majority of tourists (approx. 90%) concentrated in coastal areas over a short period of time, causing negative environmental, social, and economic impacts. The newly established Cypriot Deputy Ministry of Tourism aims to diversify the Cypriot tourism industry by focusing on the development of niche tourism products that will elongate the touristic season and divert visitors to inland mountainous and rural areas. In this respect, conference and event tourism is an ideal product for development. The current paper presents the results of fieldwork carried out between January and March 2020 in Cyprus, with key stakeholders within the conference and event tourism sector. The work consisted of a survey and semi-structured interviews to determine the current level of sustainability within the conference tourism sector, the main barriers to the sector's development, as well as key stakeholder insights and suggestions for measures to improve the sector's sustainability. The results suggest that there is a general lack of understanding of the negative economic, environmental and social impacts associated with the organization of conventional conferences and events, compared to the positive impacts of sustainable conferences/events. There also seems to be a lack of awareness of actions that can be taken to make the conference and event sector more sustainable. Incentives, marketing, branding, and training are identified as some of the effective means to improve the sustainability of the Cypriot conference and event sector, as is the development of country-wide sustainability policy and a review and enforcement of national waste management legislation. The research outputs will be utilized for the development of targeted toolkits, training, and awareness-raising activities that will drive Cyprus towards becoming an international sustainable tourism destination.

Keywords: conference, event, sustainability, tourism

Procedia PDF Downloads 126
3693 An Inductive Study of Pop Culture Versus Visual Art: Redefined from the Lens of Censorship in Bangladesh

Authors: Ahmed Tahsin Shams

Abstract:

The right to dissent through any form of art has been facing challenges through various strict legal measures, particularly since 2018 when the Government of Bangladesh passed the Digital Security Act 2018 (DSA). Therefore, the references to ‘popular’ culture mostly include mainstream religious and national festivals and exclude critical intellectual representation of specific political allusions in any form of storytelling: whether wall art or fiction writing, since the post-DSA period in Bangladesh. Through inductive quantitative and qualitative methodological approaches, this paper aims to study the pattern of censorship, detention or custodial tortures against artists and the banning approach by the Bangladeshi government in the last five years, specifically against static visual arts, i.e., cartoon and wall art. The pattern drawn from these data attempts to redefine the popular notion of ‘pop culture’ as an unorganized folk or mass culture. The results also hypothesize how the post-DSA period forcefully constructs ‘pop culture’ as a very organized repetitive deception of enlightenment or entertainment. Thus the argument theorizes that this censoring trend is a fascist approach making the artists subaltern. So, in this socio-political context, these two similar and overlapping elements: culture and art, are vastly separated in two streams: the former being appreciated by the power, and the latter is a fearful concern for the power. Therefore, the purpose of art also shifts from entertainment to an act of rebellion, adding more layers to the new postmodern definition of ‘pop culture.’

Keywords: popular culture, visual arts, censoring trend, fascist approach, subaltern, digital security act

Procedia PDF Downloads 75
3692 Ta(l)king Pictures: Development of an Educational Program (SELVEs) for Adolescents Combining Social-Emotional Learning and Photography Taking

Authors: Adi Gielgun-Katz, Alina S. Rusu

Abstract:

In the last two decades, education systems worldwide have integrated new pedagogical methods and strategies in lesson plans, such as innovative technologies, social-emotional learning (SEL), gamification, mixed learning, multiple literacies, and many others. Visual language, such as photographs, is known to transcend cultures and languages, and it is commonly used by youth to express positions and affective states in social networks. Therefore, visual language needs more educational attention as a linguistic and communicative component that can create connectedness among the students and their teachers. Nowadays, when SEL is gaining more and more space and meaning in the area of academic improvement in relation to social well-being, and taking and sharing pictures is part of the everyday life of the majority of people, it becomes natural to add the visual language to SEL approach as a reinforcement strategy for connecting education to the contemporary culture and language of the youth. This article presents a program conducted in a high school class in Israel, which combines the five SEL with photography techniques, i.e., Social-Emotional Learning Visual Empowerments (SELVEs) program (experimental group). Another class of students from the same institution represents the control group, which is participating in the SEL program without the photography component. The SEL component of the programs addresses skills such as: troubleshooting, uncertainty, personal strengths and collaboration, accepting others, control of impulses, communication, self-perception, and conflict resolution. The aim of the study is to examine the effects of programs on the level of the five SEL aspects in the two groups of high school students: Self-Awareness, Social Awareness, Self-Management, Responsible Decision Making, and Relationship Skills. The study presents a quantitative assessment of the SEL programs’ impact on the students. The main hypothesis is that the students’ questionnaires' analysis will reveal a better understanding and improvement of the five aspects of the SEL in the group of students involved in the photography-enhanced SEL program.

Keywords: social-emotional learning, photography, education program, adolescents

Procedia PDF Downloads 78
3691 Assessing the Impact of Quinoa Cultivation Adopted to Produce a Secure Food Crop and Poverty Reduction by Farmers in Rural Pakistan

Authors: Ejaz Ashraf, Raheel Babar, Muhammad Yaseen, Hafiz Khurram Shurjeel, Nosheen Fatima

Abstract:

Main purpose of this study was to assess adoption level of farmers for quinoa cultivation after they had been taught through training and visit extension approach. At this time of the 21st century, population structure, climate change, food requirements and eating habits of people are changing rapidly. In this scenario, farmers must play their key role in sustainable crop development and production through adoption of new crops that may also be helpful to overcome the issue of food insecurity as well as reducing poverty in rural areas. Its cultivation in Pakistan is at the early stages and there is a need to raise awareness among farmers to grow quinoa crops. In the middle of the 2015, a training and visit extension approach was used to raise awareness and convince farmers to grow quinoa in the area. During training and visit extension program, 80 farmers were randomly selected for the training of quinoa cultivation. Later on, these farmers trained 60 more farmers living into their neighborhood. After six months, a survey was conducted with all 140 farmers to assess the impact of the training and visit program on adoption level of respondents for the quinoa crop. The survey instrument was developed with the help of literature review and other experts of the crop. Validity and reliability of the instrument were checked before complete data collection. The data were analyzed by using SPSS. Multiple regression analysis was used for interpretation of the results from the survey, which indicated that factors like information/ training, change in agronomic and plant protection practices play a key role in the adoption of quinoa cultivation by respondents. In addition, the model explains more than 50% of variation in the adoption level of respondents. It is concluded that farmers need timely information for improved knowledge of agronomic and plant protection practices to adopt cultivation of the quinoa crop in the area.

Keywords: farmers, quinoa, adoption, contact, training and visit

Procedia PDF Downloads 351
3690 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 182
3689 Agroforestry Systems: A Sustainable Strategy of the Agricultural Systems of Cumaral (Meta), Colombia

Authors: Amanda Silva Parra, Dayra Yisel García Ramirez

Abstract:

In developing countries, agricultural "modernization" has led to a loss of biodiversity and inefficiency of agricultural systems, manifested in increases in Greenhouse Gas Emissions (GHG) and the C footprint, generating the susceptibility of systems agriculture to environmental problems, loss of biodiversity, depletion of natural resources, soil degradation and loss of nutrients, and a decrease in the supply of products that affect food security for peoples and nations. Each year agriculture emits 10 to 12% (5.1 to 6.1 Gt CO2eq per year) of the total estimated GHG emissions (51 Gt CO2 eq per year). The FAO recommends that countries that have not yet done so consider declaring sustainable agriculture as an essential or strategic activity of public interest within the framework of green economies to better face global climate change. The objective of this research was to estimate the balance of GHG in agricultural systems of Cumaral, Meta (Colombia), to contribute to the recovery and sustainable operation of agricultural systems that guarantee food security and face changes generated by the climate in a more intelligent way. To determine the GHG balances, the IPCC methodologies were applied with a Tier 1 and 2 level of use. It was estimated that all the silvopastoral systems evaluated play an important role in this reconversion compared to conventional systems such as improved pastures. and degraded pastures due to their ability to capture C both in soil and in biomass, generating positive GHG balances, guaranteeing greater sustainability of soil and air resources.

Keywords: climate change, carbon capture, environmental sustainability, GHG mitigation, silvopastoral systems

Procedia PDF Downloads 115
3688 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 82