Search results for: security of organisations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3080

Search results for: security of organisations

1460 Water Crisis Management in a Tourism Dependent Community

Authors: Aishath Shakeela

Abstract:

At a global level, water stewardship, water stress and water security are crucial factors in tourism planning and development considerations. Challenges associated with water is of particular concern to the Maldives as there is limited availability of freshwater, high dependency on desalinated water, and high unit cost associated with desalinating water. While the Maldives is promoted as an example of sustainable tourism, a key sustainability challenge facing tourism dependent communities is the efficient use and management of available water resources. A water crisis event in the capital island of Maldives highlighted how precarious water related issues are in this tourism dependent destination. Applying netnography, the focus of this working paper is to present community perceptions of how government policies addressed Malé Water and Sewerage Company (MWSC) water crisis event.

Keywords: crisis management, government policies, Maldives, tourism, water

Procedia PDF Downloads 523
1459 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 129
1458 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 358
1457 Worth of Sick Building Syndrome and Enhance the Quality of Life in Green Building

Authors: Kamyar Kabirifar, Majid Azarniush, Behbood Maashkar

Abstract:

A proper house is a suitable residential area which provides comfort, proper accessibility, security, stability and permanence of structure, enough lighting, Proper initial infrastructures and ventilation for its inhabitants and the most important of all, it should be proportional to the family’s financial power. Saving energy and making optimal usage of it and also taking advantage of stable energies are the bases of green buildings. Making green building will help the health of a person living in it and in its surrounding. It will support the people and provoke their satisfaction. Not only it will bring about the raise of level of the quality of life for building inhabitants, but also it will cause the promotion of quality level of life of the people living in the surrounding area and the society.

Keywords: quality of life, green building, environment pollution, sick building

Procedia PDF Downloads 516
1456 The Impact of Artificial Intelligence on Human Rights Development

Authors: Romany Wagih Farag Zaky

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. The article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, which is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 51
1455 Developing Gifted Students’ STEM Career Interest

Authors: Wing Mui Winnie So, Tian Luo, Zeyu Han

Abstract:

To fully explore and develop the potentials of gifted students systematically and strategically by providing them with opportunities to receive education at appropriate levels, schools in Hong Kong are encouraged to adopt the "Three-Tier Implementation Model" to plan and implement the school-based gifted education, with Level Three refers to the provision of learning opportunities for the exceptionally gifted students in the form of specialist training outside the school setting by post-secondary institutions, non-government organisations, professional bodies and technology enterprises. Due to the growing concern worldwide about low interest among students in pursuing STEM (Science, Technology, Engineering, and Mathematics) careers, cultivating and boosting STEM career interest has been an emerging research focus worldwide. Although numerous studies have explored its critical contributors, little research has examined the effectiveness of comprehensive interventions such as “Studying with STEM professional”. This study aims to examine the effect on gifted students’ career interest during their participation in an off-school support programme designed and supervised by a team of STEM educators and STEM professionals from a university. Gifted students were provided opportunities and tasks to experience STEM career topics that are not included in the school syllabus, and to experience how to think and work like a STEM professional in their learning. Participants involved 40 primary school students joining the intervention programme outside the normal school setting. Research methods included adopting the STEM career interest survey and drawing tasks supplemented with writing before and after the programme, as well as interviews before the end of the programme. The semi-structured interviews focused on students’ views regarding STEM professionals; what’s it like to learn with a STEM professional; what’s it like to work and think like a STEM professional; and students’ STEM identity and career interest. The changes in gifted students’ STEM career interest and its well-recognised significant contributors, for example, STEM stereotypes, self-efficacy for STEM activities, and STEM outcome expectation, were collectively examined from the pre- and post-survey using T-test. Thematic analysis was conducted for the interview records to explore how studying with STEM professional intervention can help students understand STEM careers; build STEM identity; as well as how to think and work like a STEM professional. Results indicated a significant difference in STEM career interest before and after the intervention. The influencing mechanism was also identified from the measurement of the related contributors and the analysis of drawings and interviews. The potential of off-school support programme supervised by STEM educators and professionals to develop gifted students’ STEM career interest is argued to be further unleashed in future research and practice.

Keywords: gifted students, STEM career, STEM education, STEM professionals

Procedia PDF Downloads 69
1454 Impairments Correction of Six-Port Based Millimeter-Wave Radar

Authors: Dan Ohev Zion, Alon Cohen

Abstract:

In recent years, the presence of short-range millimeter-wave radar in civil application has increased significantly. Autonomous driving, security, 3D imaging and high data rate communication systems are a few examples. The next challenge is the integration inside small form-factor devices, such as smartphones (e.g. gesture recognition). The main challenge is implementation of a truly low-power, low-complexity high-resolution radar. The most popular approach is the Frequency Modulated Continuous Wave (FMCW) radar, with an analog multiplication front-end. In this paper, we present an approach for adaptive estimation and correction of impairments of such front-end, specifically implemented using the Six-Port Device (SPD) as the multiplier element. The proposed algorithm was simulated and implemented on a 60 GHz radar lab prototype.

Keywords: radar, FMCW Radar, IQ mismatch, six port

Procedia PDF Downloads 148
1453 An Assessment of Involuntary Migration in India: Understanding Issues and Challenges

Authors: Rajni Singh, Rakesh Mishra, Mukunda Upadhyay

Abstract:

India is among the nations born out of partition that led to one of the greatest forced migrations that marked the past century. The Indian subcontinent got partitioned into two nation-states, namely India and Pakistan. This led to an unexampled mass displacement of people accounting for about 20 million in the subcontinent as a whole. This exemplifies the socio-political version of displacement, but there are other identified reasons leading to human displacement viz., natural calamities, development projects and people-trafficking and smuggling. Although forced migrations are rare in incidence, they are mostly region-specific and a very less percentage of population appears to be affected by it. However, when this percentage is transcripted in terms of volume, the real impact created by such migration can be realized. Forced migration is thus an issue related to the lives of many people and requires to be addressed with proper intervention. Forced or involuntary migration decimates peoples' assets while taking from them their most basic resources and makes them migrate without planning and intention. This in most cases proves to be a burden on the destination resources. Thus, the question related to their security concerns arise profoundly with regard to the protection and safeguards to these migrants who need help at the place of destination. This brings the human security dimension of forced migration into picture. The present study is an analysis of a sample of 1501 persons by NSSO in India (National Sample Survey Organisation), which identifies three reasons for forced migration- natural disaster, social/political problem and displacement by development projects. It was observed that, of the total forced migrants, about 4/5th comprised of the internally displaced persons. However, there was a huge inflow of such migrants to the country from across the borders also, the major contributing countries being Bangladesh, Pakistan, Sri Lanka, Gulf countries and Nepal. Among the three reasons for involuntary migration, social and political problem is the most prominent in displacing huge masses of population; it is also the reason where the share of international migrants to that of internally displaced is higher compared to the other two factors /reasons. Second to political and social problems, natural calamities displaced a high portion of the involuntary migrants. The present paper examines the factors which increase people's vulnerability to forced migration. On perusing the background characteristics of the migrants it was seen that those who were economically weak and socially fragile are more susceptible to migration. Therefore, getting an insight about this fragile group of society is required so that government policies can benefit these in the most efficient and targeted manner.

Keywords: involuntary migration, displacement, natural disaster, social and political problem

Procedia PDF Downloads 347
1452 Corporate Female Entrepreneurship, Moving Boundaries

Authors: Morena Paulisic, Marli Gonan Bozac

Abstract:

Business organization and management in theory are typically presented as gender- neutral. Although in practice female contribution to corporation is not questionable, gender diversity in top management of corporation is and that especially in emerging countries like Croatia. This paper brings insights into obstacles and problems which should be overcome. Furthermore, gives an introspective view on the most important promotion and motivation factors of powerful female CEOs in Croatia. The goal was to clarify perception and performance of female CEOs that contributed to their success and to determine mutual characteristics of women in corporate entrepreneurship regarding the motivation. For our study we used survey instrument that was developed for this research. The research methods used were: table research, field research, generalization method, comparative method, and statistical method (descriptive statistics and Pearson’s Chi-square test). Some result showed us that today even more women in corporations are not likely to accept more engagement at work if it harms their families (2003 – 31.9% in 2013 – 33.8%) although their main motivating factor is still interested job (2003 – 95.8%; in 2013-100%). It is also significant that 78.8 % of Croatian top managers (2013) think that women managers in Croatia are insufficiently spoken and written about, and that the reasons for this are that: (1) the society underestimates their ability (37.9%); (2) women underestimate themselves (22.4%); (3) the society still mainly focuses on male managers (20.7%) and (4) women managers avoid interviews and appearing on front pages (19%). The environment still “blocks” the natural course of advancement of women managers in organisations (entrepreneurship in general) and the main obstacle is that women must always or almost always be more capable than men in order to succeed (96.6%). Based on survey results on longitudinal research conducted in 2003 (return rate 30,8%) and 2013 (return rate 29,2%) in Croatia we expand understanding of determination indicators of corporate female entrepreneurship. Theoretically in practice gender structure at the management level (executive management, management board and supervisory board) throw years (2011- 2014) have positive score but still women remain significantly underrepresented at those positions. Findings from different sources have shown that diversity at the top of corporations’ correlates with better performance. In this paper, we have contributed to research on gender in corporate entrepreneurship by offering experiences from successful female CEOs and explanation why in social responsible society women with their characteristics can support needed changes and construct different way forward for corporations. Based on research result we can conclude that in future underrepresentation of female in corporate entrepreneurship should be overcome.

Keywords: Croatia, female entrepreneurship, glass ceiling, motivation

Procedia PDF Downloads 324
1451 Concepts of the Covid-19 Pandemic and the Implications of Vaccines for Health Security in Nigeria and Diasporas

Authors: Wisdom Robert Duruji

Abstract:

The outbreak of SARS-CoV-2 serotype infection was recorded in January 2020 in Wuhan City, Hubei Province, China. This study examines the concepts of the COVID-19 pandemic and the implications of vaccines for health security in Nigeria and Diasporas. It challenges the widely accepted assumption that the first case of coronavirus infection in Nigeria was recorded on February 27th, 2020, in Lagos. The study utilizes a range of research methods to achieve its objectives. These include the double-layered culture technique, literature review, website knowledge, Google search, news media information, academic journals, fieldwork, and on-site observations. These diverse methods allow for a comprehensive analysis of the concepts and the implications being studied. The study finds that coronavirus infection can be asymptomatic; it may be the antigenicity of the leukocytes (white blood cells), which produce immunogenic hapten or interferons (α, β and γ) that fight infectious parasites, was an immune response that prevented severe virulence in healthy individuals; the reason healthy patients of coronavirus infection in Nigeria naturally recovered after two to three weeks of on-set of infection and test negative. However, the fatality data from the Nigerian Centre for Disease Control (NCDC) is incorrect in this study’s finding; it perused that the fatalities were primarily due to underlying ailments, hunger, and malnutrition in debilitated, comorbid, or compromised patients. This study concluded that the kits and Polymerase Chain Reaction (PCR) machine currently used by the Nigerian Centre for Disease Control (NCDC) in testing and confirming COVID-19 in Nigeria is not ideal; it is programmed and negates separating the strain to its specific serotypes amongst its genera coronavirus, and family Coronaviridae; and might have confirmed patients with the symptoms of febrile caused by cough, catarrh, typhoid and malaria parasites as Covid-19 positive. Therefore, it is recommended that the coronavirus species infected in Nigeria are opportunistic parasites that thrive in human immuno-suppressed conditions like the herpesvirus; it cannot be eradicated by vaccines; the only virucides are interferons, immunoglobulins, and probably synthetic antiviral guanosine drugs like copegus or ribavirin. The findings emphasized that COVID-19 is not the primary pandemic disease in Nigeria; the lockdown was a mirage and not necessary; but rather, pandemic diseases in Nigeria are corruption, nepotism, hunger, and malnutrition caused by ineptitude in governance, religious dichotomy, and ethnic conflicts.

Keywords: coronavirus, corruption, Covid-19 pandemic, lock-down, Nigeria, vaccine

Procedia PDF Downloads 59
1450 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 161
1449 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 306
1448 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 328
1447 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 152
1446 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 387
1445 Analysis of Business Intelligence Tools in Healthcare

Authors: Avishkar Gawade, Omkar Bansode, Ketan Bhambure, Bhargav Deore

Abstract:

In recent year wide range of business intelligence technology have been applied to different area in order to support decision making process BI enables extraction of knowledge from data store. BI tools usually used in public health field for financial and administrative purposes.BI uses a dashboard in presentation stage to deliver information to information to end users.In this paper,we intend to analyze some open source BI tools on the market and their applicability in the clinical sphere taking into consideration the general characteristics of the clinical environment.A pervasive BI platform was developed using a real case in order to prove the tool viability.Analysis of various BI Tools in done with the help of several parameters such as data security,data integration,data quality reporting and anlaytics,performance,scalability and cost effectivesness.

Keywords: CDSS, EHR, business intelliegence, tools

Procedia PDF Downloads 132
1444 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks

Authors: Laurent Maurin, Mervi Toivanen

Abstract:

This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.

Keywords: Euro area, capital ratios, credit supply, partial adjustment model

Procedia PDF Downloads 443
1443 Social Media Engagement in Academic Library to Advocate Participatory Service towards Dynamic Learning Community

Authors: Siti Marlia Abd Rahim, Mad Khir Johari Abdullah Sani

Abstract:

The ever-increasing use of social media applications by library users has raised concerns about the purpose and effectiveness of these platforms in academic libraries. While social media has the potential to revolutionize library services, its usage for non-educational purposes and security concerns have hindered its full potential. This paper aims to address the user behavioral factors affecting social media engagement in academic libraries and examine the impact of social media engagement on user participation. Additionally, it seeks to measure the effect of user participation in social media on the development of powerful learning communities.

Keywords: social media adoption, social media engagement, academic library, social media in academic library, learning community

Procedia PDF Downloads 109
1442 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 325
1441 Use of Cloud Computing and Smart Devices in Healthcare

Authors: Nikunj Agarwal, M. P. Sebastian

Abstract:

Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.

Keywords: cloud computing, smart devices, healthcare, telemedicine

Procedia PDF Downloads 390
1440 The Impact of Technology on Cultural Heritage among Preschool Children

Authors: Adenike Akinrotimi

Abstract:

Globally, education has been identified as vital tool for any form of development for any society (community); be it economic, social, political and cultural development. It is the determinant level of prosperity, welfare, security and sustenance of the people of a particular community. Education could be formal, informal and non-formal. Cultural development of an individual and of the community as it were is a lifelong process, where individual learns from daily experiences, exposure to the environment at home, at work, at play and it enriches human and environmental potentials. This type of education can be referred to as cultural heritage. It is built on learner participation and assimilation. Preschool programme also referred to as Early Childhood Education is critical to holistic development of a child cultural development inclusive. This paper examines the impact that technology has on cultural heritage among preschool children.

Keywords: cultural heritage, education, pre-school, technology

Procedia PDF Downloads 390
1439 Rebuilding Christchurch's Infrastructure: An Analysis of Political Mismanagement

Authors: Hugh Byrd, Steve Matthewnan

Abstract:

The devastation of the city centre of Christchurch, New Zealand, after the 2010 and 2011 earthquakes presented an opportunity to rebuild infrastructure in a coordinated and efficient manner to allow for a city that was energy efficient, low carbon, resilient and provided both energy security and justice. The research described in this paper records the processes taken to attempt to rebuild the energy infrastructure. The story is one of political decisions overriding appropriate technology and ultimately is a lesson in how not to handle the implementation of post-disaster energy infrastructure. Lack of clarity in decision making by central government and then not pursuing consultant’s recommendations led to a scheme that was effectively abandoned in 2016 and described as ‘a total failure’. The paper records the critical events that occurred and explains why the proposed energy infrastructure was both politically and technologically inappropriate.

Keywords: energy infrastructure, policy and governance, post-disaster rebuilding

Procedia PDF Downloads 166
1438 Foundation Phase Teachers' Experiences of School Based Support Teams: A Case of Selected Schools in Johannesburg

Authors: Ambeck Celyne Tebid, Harry S. Rampa

Abstract:

The South African Education system recognises the need for all learners including those experiencing learning difficulties, to have access to a single unified system of education. For teachers to be pedagogically responsive to an increasingly diverse learner population without appropriate support has been proven to be unrealistic. As such, this has considerably hampered interest amongst teachers, especially those at the foundation phase to work within an Inclusive Education (IE) and training system. This qualitative study aimed at investigating foundation phase teachers’ experiences of school-based support teams (SBSTs) in two Full-Service (inclusive schools) and one Mainstream public primary school in the Gauteng province of South Africa; with particular emphasis on finding ways to supporting them, since teachers claimed they were not empowered in their initial training to teach learners experiencing learning difficulties. Hence, SBSTs were created at school levels to fill this gap thereby, supporting teaching and learning by identifying and addressing learners’, teachers’ and schools’ needs. With the notion that IE may be failing because of systemic reasons, this study uses Bronfenbrenner’s (1979) ecosystemic as well as Piaget’s (1980) maturational theory to examine the nature of support and experiences amongst teachers taking individual and systemic factors into consideration. Data was collected using in-depth, face-to-face interviews, document analysis and observation with 6 foundation phase teachers drawn from 3 different schools, 3 SBST coordinators, and 3 school principals. Data was analysed using the phenomenological data analysis method. Amongst the findings of the study is that South African full- service and mainstream schools have functional SBSTs which render formal and informal support to the teachers; this support varies in quality depending on the socio-economic status of the relevant community where the schools are situated. This paper, however, argues that what foundation phase teachers settled for as ‘support’ is flawed; as well as how they perceive the SBST and its role is problematic. The paper conclude by recommending that, the SBST should consider other approaches at foundation phase teacher support such as, empowering teachers with continuous practical experiences on how to deal with real classroom scenarios, as well as ensuring that all support, be it on academic or non-academic issues should be provided within a learning community framework where the teacher, family, SBST and where necessary, community organisations should harness their skills towards a common goal.

Keywords: foundation phase, full- service schools, inclusive education, learning difficulties, school-based support teams, teacher support

Procedia PDF Downloads 227
1437 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: activity modeling, clustering, PLSA, video representation

Procedia PDF Downloads 391
1436 End to End Monitoring in Oracle Fusion Middleware for Data Verification

Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan

Abstract:

In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.

Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring

Procedia PDF Downloads 476
1435 Kidnapping of Migrants by Drug Cartels in Mexico as a New Trend in Contemporary Slavery

Authors: Itze Coronel Salomon

Abstract:

The rise of organized crime and violence related to drug cartels in Mexico has created serious challenges for the authorities to provide security to those who live within its borders. However, to achieve a significant improvement in security is absolute respect for fundamental human rights by the authorities. Irregular migrants in Mexico are at serious risk of abuse. Research by Amnesty International as well as reports of the NHRC (National Human Rights) in Mexico, have indicated the major humanitarian crisis faced by thousands of migrants traveling in the shadows. However, the true extent of the problem remains invisible to the general population. The fact that federal and state governments leave no proper record of abuse and do not publish reliable data contributes to ignorance and misinformation, often spread by the media that portray migrants as the source of crime rather than their victims. Discrimination and intolerance against irregular migrants can generate greater hostility and exclusion. According to the modus operandi that has been recorded criminal organizations and criminal groups linked to drug trafficking structures deprive migrants of their liberty for forced labor and illegal activities related to drug trafficking, even some have been kidnapped for be trained as murderers . If the victim or their family cannot pay the ransom, the kidnapped person may suffer torture, mutilation and amputation of limbs or death. Migrant women are victims of sexual abuse during her abduction as well. In 2011, at least 177 bodies were identified in the largest mass grave found in Mexico, located in the town of San Fernando, in the border state of Tamaulipas, most of the victims were killed by blunt instruments, and most seemed to be immigrants and travelers passing through the country. With dozens of small graves discovered in northern Mexico, this may suggest a change in tactics between organized crime groups to the different means of obtaining revenue and reduce murder profile methods. Competition and conflict over territorial control drug trafficking can provide strong incentives for organized crime groups send signals of violence to the authorities and rival groups. However, as some Mexican organized crime groups are increasingly looking to take advantage of income and vulnerable groups, such as Central American migrants seem less interested in advertising his work to authorities and others, and more interested in evading detection and confrontation. This paper pretends to analyze the introduction of this new trend of kidnapping migrants for forced labors by drug cartels in Mexico into the forms of contemporary slavery and its implications.

Keywords: international law, migration, transnational organized crime

Procedia PDF Downloads 410
1434 A Conceptual Model of the Factors Affecting Saudi Citizens' Use of Social Media to Communicate with the Government

Authors: Reemiah Alotaibi, Muthu Ramachandran, Ah-Lian Kor, Amin Hosseinian-Far

Abstract:

In the past decade, developers of Web 2.0 technologies have shown increasing interest in the topic of e-government. There has been a rapid growth in social media technology because of its significant role in backing up some essential social needs. Its importance and power is derived from its capacity to support two-way communication. Governments are curious to get engaged in these websites, hoping to benefit from the new forms of communication and interaction offered by such technology. Greater participation by the public can be viewed as a chief indicator of effective government communication. Yet, the level of public participation in government 2.0 is not quite satisfactory. In general, it is still at the early stage in most developing countries, including Saudi Arabia. Although it is a fact that Saudi people are among the most active in using social media, the number of people who use social media to communicate with the public institutions is not high. Furthermore, most of the governmental organisations are not using social media tools to communicate with the public. They use these platforms to disseminate information. Our study focuses on the factors affecting citizens’ adoption of social media in Saudi Arabia. Our research question is: what are the factors affecting Saudi citizens’ use of social media to communicate with the government? To answer this research question, the research aims to validate the UTAUT model for examining social media tools from the citizen perspective. An amendment will be proposed to fit the adoption of social media platforms as a communication channel in government by using a developed conceptual model which integrates constructs from the UTAUT model and others external variables based on the literature review. The set of potential factors that affect these citizens' decisions to adopt social media to communicate with their government has been identified as perceived encouragement, trust and cultural influence. The connection between the above-mentioned constructs from the basis for the research hypothesis will be examined in the light of a quantitative methodology. Data collection will be performed through a survey targeting a number of Saudi citizens who are social media users. The data collected from the primary survey will later be analysed by using statistical methods. The outcomes of this research project are argued to have potential contributions to the fields of social media and e-Government adoption, both on the theoretical and practical levels. It is believed that this research project is the first of its type that attempts to identify the factors that affect citizens’ adoption of social media to communicate with the government. The importance of identifying these factors stems from the potential use of them to enhance the government’s implementation of social media and help in making more accurate decisions and strategies based on comprehending the most important factors that affect citizens’ decisions.

Keywords: social media, adoption, citizen, UTAUT model

Procedia PDF Downloads 409
1433 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 65
1432 Topic Specific Differences and Lexical Variations in the Use of Violence Metaphors: A cognitive linguistic study of YouTube Breast Cancer Discourse in New Zealand and Pakistan

Authors: Sara Malik, Andreea. S. Calude, Joseph Ulatowski

Abstract:

This paper explores how speakers from New Zealand and Pakistan with breast cancer use violence metaphors to communicate the intensity of their experiences during various stages of illness. With the theoretical foundation in Conceptual Metaphor Theory and the use of Metaphor Identification Procedure for metaphor analysis, this study investigates how speakers with breast cancer use violence metaphors in different cultural contexts. it collected a corpus of forty-six personal narratives from New Zealand and thirty-six from Pakistan, posted between 2011 and 2023 on YouTube by breast cancer organisations, such as ‘NZ Breast Cancer Foundation’ and ‘Pink Ribbon Pakistan’. The data was transcribed using the Whisper AI tool and then curated to include only patients’ discourse, further organised into eight narrative topics: testing phase, treatment phase, remission phase, family support, campaigns and awareness efforts, government support and funding, general information and religious discourse. In this talk, it discuss two aspects of the use of violence metaphors, a) differences in the use of violence metaphors across various narrative topics, and b) lexical variations in the choice of such metaphors. The findings suggest that violence metaphors were used differently across various stages of illness experience. For instance, during the ‘testing phase,’ violence metaphors were employed to convey a sense of punishment as reflected in statements like, ‘Feeling like it was a death sentence, an immediate death sentence’ (NZ Example) and ‘Jese hi aap ko na breast cancer ka pata chalta hai logon ko yeh hona shuru ho jata hai ke oh bas ab to moat ka parwana mil gaya hai’ (Because as soon as you find out you have breast cancer people start to feel that you have received a death warrant) (PK Example). On the other hand, violence metaphor during the ‘treatment phase’ highlighted negative experiences related to chemotherapy as seen in statements like ‘The first lot of chemo I had was disastrous’ (NZ Example) and ‘...chemotherapy ke to, it's the worst of all, it's like a healing poison’ (chemotherapy, it's the worst of all, it's like a healing poison) (PK Example). Second, lexical variations revealed how ‘sunburn’ (a common phenomenon in the NZ) was used as a metaphor to describe the effects of radiotherapy, whereas in the discourse from Pakistan, a more general term, 'burn,' was used instead. In this talk, we will explore the possible reasons behind the different word choices made by speakers from both countries to describe the same process. This study contributes to understanding the use of violence metaphors across various narrative topics of the illness experience and explains how and why speakers from two different countries use lexical variations to describe the same process.

Keywords: metaphors, breast cancer discourse, cognitive linguistics, lexical variations, New zealand english, pakistani urdu

Procedia PDF Downloads 15
1431 Zero Net Energy Communities and the Impacts to the Grid

Authors: Heidi von Korff

Abstract:

The electricity grid is changing in terms of flexibility. Distributed generation (DG) policy is being discussed worldwide and implemented. Developers and utilities are seeking a pathway towards Zero Net Energy (ZNE) communities and the interconnection to the distribution grid. Using the VISDOM platform for establishing a method for managing and monitoring energy consumption loads of ZNE communities as a capacity resource for the grid. Reductions in greenhouse gas emissions and energy security are primary policy drivers for incorporating high-performance energy standards and sustainability practices in residential households, such as a market transformation of ZNE and nearly ZNE (nZNE) communities. This research investigates how load data impacts ZNE, to see if there is a correlation to the daily load variations in a single ZNE home. Case studies will include a ZNE community in California and a nearly ZNE community (All – Electric) in the Netherlands, which both are in measurement and verification (M&V) phases and connected to the grid for simulations of methods.

Keywords: zero net energy, distributed generation, renewable energy, zero net energy community

Procedia PDF Downloads 302