Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5326

Search results for: cyber security awareness

3736 Computerized Cognitive Training and Psychological Resiliency among Adolescents with Learning Disabilities

Authors: Verd Shomrom, Gilat Trabelsi

Abstract:

The goal of the study was to examine the effects of Computerized Cognitive Training (CCT) with and without cognitive mediation on Executive Function (EF) (planning and self- regulation) and on psychological resiliency among adolescents with Attention Deficits Hyperactive Disorder (ADHD) with or without Learning Disabilities (LD). Adolescents diagnosed with Attention Deficit Disorder and / or Learning Disabilities have multidimensional impairments that result from neurological damage. This work explored the possibility of influencing cognitive aspects in the field of Executive Functions (specifically: patterns of planning and self-regulation) among adolescents with a diagnosis of Attention Deficit Disorder and / or Learning Disabilities who study for a 10-12 grades. 46 adolescents with ADHD and/or with LD were randomly applied to experimental and control groups. All the participants were tested (BRC- research version, Resiliency quaternaries) before and after the intervention: mediated/ non-mediated Computerized Cognitive Training (MINDRI). The results indicated significant effects of cognitive modification in the experimental group, between pre and post Phases, in comparison to control group, especially in self- regulation (BRC- research version, Resiliency quaternaries), and on process analysis of Computerized Cognitive Training (MINDRI). The main conclusion was that even short- term mediation synchronized with CCT could greatly enhance the performance of executive functions demands. Theoretical implications for the positive effects of MLE in combination with CCT indicate the ability for cognitive change. The practical implication is the awareness and understanding of efficient intervention processes to enhance EF, learning awareness, resiliency and self-esteem of adolescents in their academic and daily routine.

Keywords: attention deficits hyperactive disorder, computerized cognitive training, executive function, mediated learning experience, learning disabilities

Procedia PDF Downloads 134
3735 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District

Authors: Abha Gupta, Deepak K. Mishra

Abstract:

Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.

Keywords: dietary diversity, food Security, India, socio-economic groups

Procedia PDF Downloads 323
3734 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 91
3733 Making the Right Call for Falls: Evaluating the Efficacy of a Multi-Faceted Trust Wide Approach to Improving Patient Safety Post Falls

Authors: Jawaad Saleem, Hannah Wright, Peter Sommerville, Adrian Hopper

Abstract:

Introduction: Inpatient falls are the most commonly reported patient safety incidents, and carry a significant burden on resources, morbidity, and mortality. Ensuring adequate post falls management of patients by staff is therefore paramount to maintaining patient safety especially in out of hours and resource stretched settings. Aims: This quality improvement project aims to improve the current practice of falls management at Guys St Thomas Hospital, London as compared to our 2016 Quality Improvement Project findings. Furthermore, it looks to increase current junior doctors confidence in managing falls and their use of new guidance protocols. Methods: Multifaceted Interventions implemented included: the development of new trust wide guidelines detailing management pathways for patients post falls, available for intranet access. Furthermore, the production of 2000 lanyard cards distributed amongst junior doctors and staff which summarised these guidelines. Additionally, a ‘safety signal’ email was sent from the Trust chief medical officer to all staff raising awareness of falls and the guidelines. Formal falls teaching was also implemented for new doctors at induction. Using an established incident database, 189 consecutive falls in 2017were retrospectively analysed electronically to assess and compared to the variables measured in 2016 post interventions. A separate serious incident database was used to analyse 50 falls from May 2015 to March 2018 to ascertain the statistical significance of the impact of our interventions on serious incidents. A similar questionnaire for the 2017 cohort of foundation year one (FY1) doctors was performed and compared to 2016 results. Results: Questionnaire data demonstrated improved awareness and utility of guidelines and increased confidence as well as an increase in training. 97% of FY1 trainees felt that the interventions had increased their awareness of the impact of falls on patients in the trust. Data from the incident database demonstrated the time to review patients post fall had decreased from an average of 130 to 86 minutes. Improvement was also demonstrated in the reduced time to order and schedule X-ray and CT imaging, 3 and 5 hours respectively. Data from the serious incident database show that ‘the time from fall until harm was detected’ was statistically significantly lower (P = 0.044) post intervention. We also showed the incidence of significant delays in detecting harm ( > 10 hours) reduced post intervention. Conclusions: Our interventions have helped to significantly reduce the average time to assess, order and schedule appropriate imaging post falls. Delays of over ten hours to detect serious injuries after falls were commonplace; since the intervention, their frequency has markedly reduced. We suggest this will lead to identifying patient harm sooner, reduced clinical incidents relating to falls and thus improve overall patient safety. Our interventions have also helped increase clinical staff confidence, management, and awareness of falls in the trust. Next steps include expanding teaching sessions, improving multidisciplinary team involvement to aid this improvement.

Keywords: patient safety, quality improvement, serious incidents, falls, clinical care

Procedia PDF Downloads 115
3732 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa

Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba

Abstract:

The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.

Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)

Procedia PDF Downloads 339
3731 A Review of the Handling and Disposal of Botulinum Toxin in a Maxillofacial Unit

Authors: Ashana Gupta

Abstract:

Aim: In the UK, Botulinum Toxin (botox) is authorised for treating chronic myofascial pain secondary to masseter muscle hypertrophy (Fedorowicz et al. 2013). This audit aimed to ensure the Maxillofacial Unit is meeting the trust guidelines for the safe storage and disposal of botox. Method: The trust upholds a strict policy for botox handling. The audit was designed to optimise several elements including Staff awareness of regulations around botox handling A questionnaire was designed to test knowledge of advised storage temperatures, reporting of adverse events, disposal procedures and regulatory authorities. Steps taken to safely delivertoxin and eliminate unused toxin. A checklist was completed. These include marks for storagetemperature, identification checks, disposal of sharps, deactivation of toxin, and disposal. Results: All staff correctly stated storage requirements for toxin. 75% staff (n=8) were unsure about reporting and regulations. Whilst all staff knew how to dispose of vials, 0% staff showed awareness for the crucial step of deactivating toxin. All checklists (n=20) scored 100% for adequate storage, ID checks, and toxin disposal. However, there were no steps taken to deactivate toxin in any cases. Staff training took place with revision to clinical protocols. In line with Trust guidelines, an additional clinical step has been introduced including use of 0.5% sodium hypochlorite to deactivate botox. Conclusion: Deactivation is crucial to ensure residual toxin is not misused. There are cases of stolen botox within South-Tees Hospital (Woodcock, 2014). This audit was successful in increasing compliance to safe handling and disposal of botox by 100% and ensured our hospitalmeets Trust guidance.

Keywords: botulinum toxin, aesthetics, handling, disposal

Procedia PDF Downloads 187
3730 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 52
3729 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 51
3728 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 10
3727 Analysis of the Effect of Increased Self-Awareness on the Amount of Food Thrown Away

Authors: Agnieszka Dubiel, Artur Grabowski, Tomasz Przerywacz, Mateusz Roganowicz, Patrycja Zioty

Abstract:

Food waste is one of the most significant challenges humanity is facing nowadays. Every year, reports from global organizations show the scale of the phenomenon, although society's awareness is still insufficient. One-third of the food produced in the world is wasted at various points in the food supply chain. Wastes are present from the delivery through the food preparation and distribution to the end of the sale and consumption. The first step in understanding and resisting the phenomenon is a thorough analysis of the everyday behaviors of humanity. This concept is understood as finding the correlation between the type of food and the reason for throwing it out and wasting it. Those actions were identified as a critical step in the start of work to develop technology to prevent food waste. In this paper, the problem mentioned above was analyzed by focusing on the inhabitants of Central Europe, especially Poland, aged 20-30. This paper provides an insight into collecting data through dedicated software and an organized database. The proposed database contains information on the amount, type, and reasons for wasting food in households. A literature review supported the work to answer research questions, compare the situation in Poland with the problem analyzed in other countries, and find research gaps. The proposed article examines the cause of food waste and its quantity in detail. This review complements previous reviews by emphasizing social and economic innovation in Poland's food waste management. The paper recommends a course of action for future research on food waste management and prevention related to the handling and disposal of food, emphasizing households, i.e., the last link in the supply chain.

Keywords: food waste, food waste reduction, consumer food waste, human-food interaction

Procedia PDF Downloads 101
3726 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 245
3725 Identify the Risks Factors and Problems of Waste Management in Developing Countries as Hurdles

Authors: Zubair Ahmad

Abstract:

The aim of this study is to analyze the risks factors and issues with waste management in developing nations as barriers. Depending on their content and categorization, wastes are managed differently. Waste management strategies differ for liquid, solid, and organic wastes. The final stage of trash disposal entails procedures like burning, interment, recycling, and treatment. Due to the rising creation of solid waste, the growing urban population has a magnified impact on the environment and public health. All regions, but especially informal urban neighborhoods, tribal villages, and official rural settlements have a protracted backlog in waste services. Another significant impediment seen in the developing world is a lack of education and awareness of effective waste-management practices. Unauthorized dumpsites pose a serious risk to the environment since they could contain dangerous elements like radioactive, infectious, and toxic waste. Wealthier individuals are more inclined to think that their actions will have an impact on environmental problems and to act to address them. Waste managers need to take action to make sure the public is given information that is consistent with what they currently know. The results of the data analysis conducted with the aid of the various methodologies discussed in the preceding chapter are presented in this chapter by the researcher. Descriptive analysis has been used in research to determine whether or not there are relationships between variables and to determine the importance of the variables. According to a survey, there are no efforts being made to lessen the odor that garbage dump sites emit (in terms of treating or recycling the material placed at dumpsite) This might be the case since respondents only commented on the waste management conditions in their immediate surroundings and may not have fully understood the steps taken to resolve this issue.

Keywords: risk factor of waste material, lack of awareness, developing countries struggles, waste management

Procedia PDF Downloads 56
3724 Islamic Banking Recovery Process and Its Parameters: A Practitioner’s Viewpoints in the Light of Humanising Financial Services

Authors: Muhammad Izzam Bin Mohd Khazar, Nur Adibah Binti Zainudin

Abstract:

Islamic banking as one of the financial institutions is highly required to maintain a prudent approach to ensure that any financing given is able to generate income to their respective shareholders. As the default payment of customers is probably occurred in the financing, having a prudent approach in the recovery process is a must to ensure that financing losses are within acceptable limits. The objective of this research is to provide the best practice of recovery which is anticipated to benefit both bank and customers. This study will address arising issue on the current practice of recovery process and followed by providing humanising recovery solutions in the light of the Maqasid Shariah. The study identified main issues pertaining to Islamic recovery process which can be categorized into knowledge crisis, process issues, specific treatment cases and system issues. Knowledge crisis is related to direct parties including judges, solicitors and salesperson, while the recovery process issues include the process of issuance of reminder, foreclosure and repossession of asset. Furthermore, special treatment for particular cases also should be observed since different contracts in Islamic banking products will need different treatment. Finally, issues in the system used in the recovery process are still unresolved since the existing technology is still young in this area to embraced Islamic finance requirements and nature of calculation. In order to humanize the financial services in Islamic banking recovery process, we have highlighted four main recommendation to be implemented by Islamic Financial Institutions namely; 1) early deterrent by improving the awareness, 2) improvement of the internal process, 3) reward mechanism, and 4) creative penalty to provide awareness to all stakeholders.

Keywords: humanizing financial services, Islamic Finance, Maqasid Syariah, recovery process

Procedia PDF Downloads 179
3723 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 135
3722 Sustainability Assessment of a Deconstructed Residential House

Authors: Atiq U. Zaman, Juliet Arnott

Abstract:

This paper analyses the various benefits and barriers of residential deconstruction in the context of environmental performance and circular economy based on a case study project in Christchurch, New Zealand. The case study project “Whole House Deconstruction” which aimed, firstly, to harvest materials from a residential house, secondly, to produce new products using the recovered materials, and thirdly, to organize an exhibition for the local public to promote awareness on resource conservation and sustainable deconstruction practices. Through a systematic deconstruction process, the project recovered around 12 tonnes of various construction materials, most of which would otherwise be disposed of to landfill in the traditional demolition approach. It is estimated that the deconstruction of a similar residential house could potentially prevent around 27,029 kg of carbon emission to the atmosphere by recovering and reusing the building materials. In addition, the project involved local designers to produce 400 artefacts using the recovered materials and to exhibit them to accelerate public awareness. The findings from this study suggest that the deconstruction project has significant environmental benefits, as well as social benefits by involving the local community and unemployed youth as a part of their professional skills development opportunities. However, the project faced a number of economic and institutional challenges. The study concludes that with proper economic models and appropriate institutional support a significant amount of construction and demolition waste can be reduced through a systematic deconstruction process. Traditionally, the greatest benefits from such projects are often ignored and remain unreported to wider audiences as most of the external and environmental costs have not been considered in the traditional linear economy.

Keywords: circular economy, construction and demolition waste, resource recovery, systematic deconstruction, sustainable waste management

Procedia PDF Downloads 165
3721 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 323
3720 Satellite Connectivity for Sustainable Mobility

Authors: Roberta Mugellesi Dow

Abstract:

As the climate crisis becomes unignorable, it is imperative that new services are developed addressing not only the needs of customers but also taking into account its impact on the environment. The Telecommunication and Integrated Application (TIA) Directorate of ESA is supporting the green transition with particular attention to the sustainable mobility.“Accelerating the shift to sustainable and smart mobility” is at the core of the European Green Deal strategy, which seeks a 90% reduction in related emissions by 2050 . Transforming the way that people and goods move is essential to increasing mobility while decreasing environmental impact, and transport must be considered holistically to produce a shared vision of green intermodal mobility. The use of space technologies, integrated with terrestrial technologies, is an enabler of smarter traffic management and increased transport efficiency for automated and connected multimodal mobility. Satellite connectivity, including future 5G networks, and digital technologies such as Digital Twin, AI, Machine Learning, and cloud-based applications are key enablers of sustainable mobility.SatCom is essential to ensure that connectivity is ubiquitously available, even in remote and rural areas, or in case of a failure, by the convergence of terrestrial and SatCom connectivity networks, This is especially crucial when there are risks of network failures or cyber-attacks targeting terrestrial communication. SatCom ensures communication network robustness and resilience. The combination of terrestrial and satellite communication networks is making possible intelligent and ubiquitous V2X systems and PNT services with significantly enhanced reliability and security, hyper-fast wireless access, as well as much seamless communication coverage. SatNav is essential in providing accurate tracking and tracing capabilities for automated vehicles and in guiding them to target locations. SatNav can also enable location-based services like car sharing applications, parking assistance, and fare payment. In addition to GNSS receivers, wireless connections, radar, lidar, and other installed sensors can enable automated vehicles to monitor surroundings, to ‘talk to each other’ and with infrastructure in real-time, and to respond to changes instantaneously. SatEO can be used to provide the maps required by the traffic management, as well as evaluate the conditions on the ground, assess changes and provide key data for monitoring and forecasting air pollution and other important parameters. Earth Observation derived data are used to provide meteorological information such as wind speed and direction, humidity, and others that must be considered into models contributing to traffic management services. The paper will provide examples of services and applications that have been developed aiming to identify innovative solutions and new business models that are allowed by new digital technologies engaging space and non space ecosystem together to deliver value and providing innovative, greener solutions in the mobility sector. Examples include Connected Autonomous Vehicles, electric vehicles, green logistics, and others. For the technologies relevant are the hybrid satcom and 5G providing ubiquitous coverage, IoT integration with non space technologies, as well as navigation, PNT technology, and other space data.

Keywords: sustainability, connectivity, mobility, satellites

Procedia PDF Downloads 112
3719 Preparedness Level of Disaster Management Institutions in Context of Floods in Delhi

Authors: Aditi Madan, Jayant Kumar Routray

Abstract:

Purpose: Over the years flood related risks have compounded due to increasing vulnerability caused by rapid urbanisation and growing population. This increase is an indication of the need for enhancing the preparedness of institutions to respond to floods. The study describes disaster management structure and its linkages with institutions involved in managing disasters. It addresses issues and challenges associated with readiness of disaster management institutions to respond to floods. It suggests policy options for enhancing the current state of readiness of institutions to respond by considering factors like institutional, manpower, financial, technical, leadership & networking, training and awareness programs, monitoring and evaluation. Methodology: The study is based on qualitative data with statements and outputs from primary and secondary sources to understand the institutional framework for disaster management in India. Primary data included field visits, interviews with officials from institutions managing disasters and the affected community to identify the challenges faced in engaging national, state, district and local level institutions in managing disasters. For focus group discussions, meetings were held with district project officers and coordinators, local officials, community based organisation, civil defence volunteers and community heads. These discussions were held to identify the challenges associated with preparedness to respond of institutions to floods. Findings: Results show that disasters are handled by district authority and the role of local institutions is limited to a reactive role during disaster. Data also indicates that although the existing institutional setup is well coordinated at the district level but needs improvement at the local level. Wide variations exist in awareness and perception among the officials engaged in managing disasters. Additionally, their roles and responsibilities need to be clearly defined with adequate budget and dedicated permanent staff for managing disasters. Institutions need to utilise the existing manpower through proper delegation of work. Originality: The study suggests that disaster risk reduction needs to focus more towards inclusivity of the local urban bodies. Wide variations exist in awareness and perception among the officials engaged in managing disasters. In order to ensure community participation, it is important to address their social and economic problems since such issues can overshadow attempts made for reducing risks. Thus, this paper suggests development of direct linkages among institutions and community for enhancing preparedness to respond to floods.

Keywords: preparedness, response, disaster, flood, community, institution

Procedia PDF Downloads 219
3718 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 304
3717 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 370
3716 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle

Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang

Abstract:

The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.

Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids

Procedia PDF Downloads 253
3715 Governance Factors of Sustainable Stormwater Management: A Comparative Study of Case Cities in China and Sweden

Authors: Xiujuan Qiao

Abstract:

Cities worldwide are increasingly adopting sustainable stormwater solutions such as using green infrastructure to mitigate challenges related to stormwater, e.g., pluvial flooding, and stormwater pollution. Barriers caused by governance factors have been identified as the main reason for the slow pace of sustainable stormwater management implementation. In this study, we examined governance factors influencing local implementation in four case cities: Lund and Malmö, Sweden, and Xi’xian New Area and Zhenjiang, China. Based on systems thinking of interrelations between previously identified influencing governance factors in sustainable stormwater management (SSM), we developed a causal loop diagram (SSM-CLD) and used it to analyze 23 semi-structured interviews with local government officers in the four case cities. Based on the results, we created one SSM-CLD for each country and analyzed the main differences between these four SSM-CLDs. The results revealed that differences in governance structures can lead to differences in the influencing governance factors. In top-down political systems, e.g., China, the role of national policy in setting local leaders’ priorities is significant for SSM implementation. In political systems with more power devolved to local governments, e.g., Sweden, public awareness and local government politicians’ priorities are important for SSM implementation. Acquiring funding for long-term maintenance was identified as a challenge in all four cities studied. These results are relevant for policymakers, local government departments, consultancy companies, and researchers seeking a better understanding of how governance factors influence sustainable stormwater management.

Keywords: sustainable stormwater management, causal loop diagram, governance structures, local government priorities, public awareness, maintenance

Procedia PDF Downloads 237
3714 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 329
3713 Elucidation of Leaders' Intrapersonal Competencies in the Workplace

Authors: Prakash Singh

Abstract:

Employees who are satisfied at their place of work rate their leaders’ intrapersonal competencies as being high. They also believe that a leader’s intrapersonal competencies influence their sense of job satisfaction. Employees who indicate that they are unhappy at their place of work rate their leaders’ intrapersonal competencies as being low. They also believe that a leader’s intrapersonal intelligence influence their feeling of job satisfaction. The leader’s appropriate intrapersonal competencies are crucial to the creation of a motivated and satisfied employee team. In this study, the quantitative research method was used to determine the employees’ perceptions of their leaders’ intrapersonal competencies and their influence on their job satisfaction; the six competencies being self-awareness, self-confidence, self-expression, self-control, adaptability, and optimism. All the competencies of leaders identified in this quantitative study can therefore be described as intervening variables that influence an employee’s sense of job satisfaction. The number of responses that indicate that each of the intrapersonal competencies of a leader that will have an influence on an employee’s sense of job satisfaction, ranges from 93% (a leader’s sense of self-awareness) to 99% (a leader’s ability to be adaptable). As the responses are significantly similar, it can be stated that the respondents indicate that all the intrapersonal competencies of a leader can influence an employee’s sense of job satisfaction. The findings of this study strongly suggest that in order to be satisfied at work, employees prefer to be led by leaders who are confident in their leadership roles; who send out clear, unambiguous messages; who maintain self-control; who are adaptable and flexible;, who face the future with optimism and who support the establishment of a collegial working environment. Evidently, the findings corroborate the hypothesis that employees believe that the intrapersonal competencies of leaders have a positive influence on the employees’ sense of job satisfaction. This study’s findings, therefore, confirm that the key to the leaders’ self-knowledge is access to their own feelings and the ability to discriminate among them and draw upon them to guide behaviour in their organisations. This exploratory study makes a contribution to the emerging research being accomplished on leaders’ intrapersonal intelligence with more research still needing to be attempted to determine to what extent these competencies of leaders can reshape the organizational climate and culture.

Keywords: emotional intelligence, employees’ job satisfaction, leaders’ intrapersonal competencies, leaders’ self-knowledge

Procedia PDF Downloads 247
3712 Platooning Method Using Dynamic Correlation of Destination Vectors in Urban Areas

Authors: Yuya Tanigami, Naoaki Yamanaka, Satoru Okamoto

Abstract:

Economic losses due to delays in traffic congestion regarding urban transportation networks have become a more serious social problem as traffic volume increases. Platooning has recently been attracting attention from many researchers to alleviate traffic jams, especially on the highway. On highways, platooning can have positive effects, such as reducing inter-vehicular distance and reducing air resistance. However, the impacts of platooning on urban roads have not been addressed in detail since traffic lights may break the platoons. In this study, we propose a platooning method using L2 norm and cosine similarity to form a platoon with highly similar routes. Also, we investigate the sorting method within a platoon according to each vehicle’s straightness. Our proposed sorting platoon method, which uses two lanes, eliminates Head of Line Blocking at the intersection and improves throughput at intersections. This paper proposes a cyber-physical system (CPS) approach to collaborative urban platoon control. We conduct simulations using the traffic simulator SUMO and the road network, which imitates Manhattan Island. Results from the SUMO confirmed that our method shortens the average travel time by 10-20%. This paper shows the validity of forming a platoon based on destination vectors and sorting vehicles within a platoon.

Keywords: CPS, platooning, connected car, vector correlation

Procedia PDF Downloads 59
3711 Extent to Which Various Academic Factors Cause Stress in Undergraduate Students at a University in Karachi and What Unhealthy Coping Strategies They Use

Authors: Sumara Khanzada

Abstract:

This research investigated how much stress is induced by various study-related factors, in undergraduate students belonging to a renowned university in Karachi along with the unhealthy coping strategy the students use to manage the stress. The study related factors considered for the purpose of the study were curriculum and instruction based stress, teacher-student relationship, assessment system and different components related to academic work. A survey in which questionnaires were administered to hundred students was conducted. The data were analyzed quantitatively to determine the percentages of stress induced by the various factors. The study found that student-teacher relationship is the strongest factor that causes stress in the undergraduate students specifically when teachers do not deliver the lectures effectively and give assignments and presentations to students without clear guidelines and instructions. The second important factor that causes stress was the different components of academic life, such as, parental expectations and pressures to achieve one's goals. Assessment system was found to be the third key factor inducing stress and affecting students' cognitive and psychological functioning. The most commonly used unhealthy coping strategy for stress management was procrastination. In light of the findings, it is recommended that importance be given to teacher training to ensure that instruction is proper and healthy teacher student relationship exists. Effective support programs, workshops, seminars, and different awareness programs should be arranged for promoting awareness regarding mental health in educational institutions. Moreover, additional zero credit courses should be offered to teach students how to learn stress management and healthy coping skills. Sumara Khanzada Clinical Psychologist [email protected]

Keywords: Stress, coping stretigies, acadamic stress, relationship

Procedia PDF Downloads 59
3710 Perspectives on the Role of Stakeholder Engagement and Community Participation in River Basin Management in South Africa: A Study of the Hennops River

Authors: Lucien N. James, Mulala D. Simatele

Abstract:

As a country that already faces hydrological and climatological challenges, South Africa’s socio-economic situation only complicates water resource management. This is observable through the state of rivers in the Gauteng Province such as the Hennops and Jukskei which are plagued by pollution from surrounding urban areas. While communities in the Hennops River basin contribute to its degradation, their potential in improved water resource management strategies is yet to be established. Therefore, the aim of this study was to investigate the myriad of ways in which stakeholder and community engagement, mobilisation, as well as participation can be harnessed in contested urban spaces to facilitate a sustainable management system for river basins. Through meetings, clean-up campaigns, and a community workshop, the community of Tembisa and several key informants were engaged. The role of communities and their perceptions on an integrated and participatory approach to solving the Hennops River basin’s current pollution crisis were therefore explored. The findings of this study suggest that meaningful participation is tied to the level of awareness within communities as well as the amount of support attributed to active involvement through the initiatives of stakeholders such as NonGovernmental Organisations. For meaningful participation to take place, more needs to be done to shift communities away from a “bystander” position to a more active role. An approach to community engagement is therefore proposed arguing for the further support of stakeholder-driven initiatives and the raising of awareness around environmental challenges in poorer communities. The findings of this study demonstrate the value of engagement with stakeholders and communities, highlighting ways through which better water management and environmental governance can be achieved in South Africa.

Keywords: community participation, integrated water resource management, river basin management, stakeholder engagement

Procedia PDF Downloads 73
3709 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 475
3708 Social Media: The Major Trigger of Online and Offline Political Activism

Authors: Chan Eang Teng, Tang Mui Joo

Abstract:

With the viral factor on social media, the sense of persuasion is generated by repetition and popularity. When users’ interest is captured, political awareness increases to spark political enthusiasm, but, the level of user’s political participation and political attitude of those active users is still questionable. An online survey on 250 youth and in-depth interview on two politicians are conducted to answer the main question in this paper. The result shows that Facebook significantly increases political awareness among youths. Social media may not be the major trigger to political activism among youths as most respondents opined that they would still vote without Facebook. Other factors could be political campaigning, political climate, age, peer pressure or others. Finding also shows that majority of respondents did not participate in online political debates or political groups. Many also wondered if the social media was the main power switch that triggers the political influx among young voters. The research finding is significant to understand how the new media, Facebook, has reshaped the political landscape in Malaysia, creating the Social Media Election that changed the rules of the political game. However, research finding does not support the ideal notion that the social media is the major trigger to youth’s political activism. This research outcome has exposed the flaws of the Social Media Election. It has revealed the less optimistic side of youth political activism. Unfortunately, results fall short of the idealistic belief that the social media have given rise to political activism among youths in the 13th General Election in Malaysia. The research outcome also highlights an important lesson for the democratic discourse of Malaysia which is making informed and educated decisions takes more commitment, proactive and objective attitude.

Keywords: social media, political participation, political activism, democracy, political communication

Procedia PDF Downloads 298
3707 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 407