Search results for: human factor in security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15192

Search results for: human factor in security

13512 The Impact of AI on Consumers’ Morality: An Empirical Evidence

Authors: Mingxia Zhu, Matthew Tingchi Liu

Abstract:

AI grows gradually in the market with its efficiency and accuracy, influencing people’s perceptions, attitude, and even consequential behaviors. Current study extends prior research by focusing on AI’s impact on consumers’ morality. First, study 1 tested individuals’ believes about AI and human’s moral perceptions and people’s attribution of moral worth to AI and human. Moral perception refers to a computational system an entity maintains to detect and identify moral violations, while moral worth here denotes whether individual regard an entity as worthy of moral treatment. To identify the effect of AI on consumers’ morality, two studies were employed. Study 1 is a within-subjects survey, while study 2 is an experimental study. In the study 1, one hundred and forty participants were recruited through online survey company in China (M_age = 27.31 years, SD = 7.12 years; 65% female). The participants were asked to assign moral perception and moral worth to AI and human. A paired samples t-test reveals that people generally regard that human has higher moral perception (M_Human = 6.03, SD = .86) than AI (M_AI = 2.79, SD = 1.19; t(139) = 27.07, p < .001; Cohen’s d = 1.41). In addition, another paired samples t-test results showed that people attributed higher moral worth to the human personnel (M_Human = 6.39, SD = .56) compared with AIs (M_AI = 5.43, SD = .85; t(139) = 12.96, p < .001; d = .88). In the next study, two hundred valid samples were recruited from survey company in China (M_age = 27.87 years, SD = 6.68 years; 55% female) and the participants were randomly assigned to two conditions (AI vs. human). After viewing the stimuli of human versus AI, participants are informed that one insurance company would determine the price purely based on their declaration. Therefore, their open-ended answers were coded into ethical, honest behavior and unethical, dishonest behavior according to the design of prior literature. A Chi-square analysis revealed that 64% of the participants would immorally lie towards AI insurance inspector while 42% of participants reported deliberately lower mileage facing with human inspector (χ^2 (1) = 9.71, p = .002). Similarly, the logistic regression results suggested that people would significantly more likely to report fraudulent answer when facing with AI (β = .89, odds ratio = 2.45, Wald = 9.56, p = .002). It is demonstrated that people would be more likely to behave unethically in front of non-human agents, such as AI agent, rather than human. The research findings shed light on new practical ethical issues in human-AI interaction and address the important role of human employees during the process of service delivery in the new era of AI.

Keywords: AI agent, consumer morality, ethical behavior, human-AI interaction

Procedia PDF Downloads 82
13511 An Informed Application of Emotionally Focused Therapy with Immigrant Couples

Authors: Reihaneh Mahdavishahri

Abstract:

This paper provides a brief introduction to emotionally focused therapy (EFT) and its culturally sensitive and informed application when working with immigrant couples. EFT's grounding in humanistic psychology prioritizes a non-pathologizing and empathic understanding of individuals' experiences, creating a safe space for couples to explore and create new experiences without imposing judgment or prescribing the couple "the right way of interacting" with one another. EFT's emphasis on attachment, bonding, emotions, and corrective emotional experiences makes it a fitting approach to work with multicultural couples, allowing for the corrective emotional experience to be shaped and informed by the couples' unique cultural background. This paper highlights the challenges faced by immigrant couples and explores how immigration adds a complex layer to each partner’s sense of self, their attachment bond, and their sense of safety and security within their relationships. Navigating a new culture, creating a shared sense of purpose, and re-establishing emotional bonds can be daunting for immigrant couples, often leading to a deep sense of disconnection and vulnerability. Reestablishing and fostering secure attachment between the partners in the safety of the therapeutic space can be a protective factor for these couples.

Keywords: attachment, culturally informed care, emotionally focused therapy, immigration

Procedia PDF Downloads 73
13510 Human Gesture Recognition for Real-Time Control of Humanoid Robot

Authors: S. Aswath, Chinmaya Krishna Tilak, Amal Suresh, Ganesh Udupa

Abstract:

There are technologies to control a humanoid robot in many ways. But the use of Electromyogram (EMG) electrodes has its own importance in setting up the control system. The EMG based control system helps to control robotic devices with more fidelity and precision. In this paper, development of an electromyogram based interface for human gesture recognition for the control of a humanoid robot is presented. To recognize control signs in the gestures, a single channel EMG sensor is positioned on the muscles of the human body. Instead of using a remote control unit, the humanoid robot is controlled by various gestures performed by the human. The EMG electrodes attached to the muscles generates an analog signal due to the effect of nerve impulses generated on moving muscles of the human being. The analog signals taken up from the muscles are supplied to a differential muscle sensor that processes the given signal to generate a signal suitable for the microcontroller to get the control over a humanoid robot. The signal from the differential muscle sensor is converted to a digital form using the ADC of the microcontroller and outputs its decision to the CM-530 humanoid robot controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to a motor driver in order to control the servo motors in required direction for human like actions. This method for gaining control of a humanoid robot could be used for performing actions with more accuracy and ease. In addition, a study has been conducted to investigate the controllability and ease of use of the interface and the employed gestures.

Keywords: electromyogram, gesture, muscle sensor, humanoid robot, microcontroller, Zigbee

Procedia PDF Downloads 407
13509 Check Factors Contributing to the Increase or Decrease in Labor Productivity in Employees Applied Science Center Municipal Andimeshk

Authors: Hossein Boromandfar, Ahmad Ghalavandi

Abstract:

This paper examines the importance of human resources as a strategic resource and the factors that lead to increased Labor productivity in Applied Science Center Andimeshk pay. First, the concepts and definitions of productivity and factors affecting it, and then determine the center Recommendations for improving the productivity of the university at a high level its improvement. What leads to increased productivity of labor is worth. The most competent human resources infrastructure is set, because by moving towards the development and promotion. The use of qualified employees in the university with a focus on specific objectives can be effective on its promotion.

Keywords: productivity, manage, human resources, center for applied science

Procedia PDF Downloads 418
13508 Study of Temperature and Precipitation Changes Based on the Scenarios (IPCC) in the Caspian Sea City: Case Study in Gillan Province

Authors: Leila Rashidian, Mina Rajabali

Abstract:

Industrialization has made progress and comfort for human beings in many aspects. It is not only achievement for the global environment but also factor for destruction and disruption of the Earth's climate. In this study, we used LARS.WG model and down scaling of general circulation climate model HADCM-3 daily precipitation amounts, minimum and maximum temperature and daily sunshine hours. These data are provided by the meteorological organization for Caspian Sea coastal station such as Anzali, Manjil, Rasht, Lahijan and Astara since their establishment is from 1982 until 2010. According to the IPCC scenarios, including series A1b, A2, B1, we tried to simulate data from 2010 to 2040. The rainfall pattern has changed. So we have a rainfall distribution inappropriate in different months.

Keywords: climate change, Lars.WG, HADCM3, Gillan province, climatic parameters, A2 scenario

Procedia PDF Downloads 284
13507 Examining Private Law's Role in Promoting Human Rights: Prospects, Obstacles, and Safeguarding Challenges

Authors: Laura Cami Vorpsi

Abstract:

This research paper examines the potential of private law as a means to promote and safeguard human rights while also addressing the associated challenges and limitations of adopting such an approach. Historically, private law mechanisms, namely contract law, tort law, and property law, have been employed to govern and oversee private relationships and transactions. Nevertheless, it is increasingly acknowledged that private law can also assume a significant role in safeguarding and advancing human rights, particularly in circumstances where the safeguards provided by public law are insufficient or inaccessible. This study assesses the benefits associated with the utilization of private law as a complementary measure to public law safeguards. These advantages encompass enhanced efficacy and efficiency of remedies, as well as the capacity to customize solutions to suit the unique requirements and circumstances of individuals. Nevertheless, the present study also considers the constraints associated with private law mechanisms, such as the financial and procedural intricacies of legal proceedings, the possibility of imbalanced negotiation power, and the potential to worsen pre-existing disparities and systemic inequities. The paper posits that the adoption of a private law-based approach to human rights necessitates a meticulous design and implementation process in order to mitigate potential risks and optimize the advantages. In conclusion, this study examines the ramifications of these discoveries on policy and practice, highlighting the necessity for heightened awareness and education regarding the capacity of private law to advance and safeguard human rights. Additionally, it underscores the significance of establishing efficient and easily accessible mechanisms for upholding human rights within the private domain. The paper concludes by providing recommendations for future research in this domain, specifically emphasizing the necessity for additional empirical investigations to assess the efficacy and consequences of private law-oriented strategies in safeguarding human rights.

Keywords: private law, human rights, promoting, protecting, access to justice

Procedia PDF Downloads 74
13506 Analysis of 3 dB Directional Coupler Based On Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide

Authors: Nurdiani Zamhari, Abang Annuar Ehsan

Abstract:

The 3 dB directional coupler is designed by using silicon-on-insulator (SOI) large cross-section and simulate by Beam Propagation Method at the communication wavelength of 1.55 µm and 1.48 µm. The geometry is shaped with rib height (H) of 6 µm and varied in step factor (r) which is 0.5, 0.6, 0.7 and 0.8. The wave guide spacing is also fixed to 5 µm and the slab width is symmetrical. In general, the 3 dB coupling lengths for four different cross-sections are several millimetre long. The 1.48 of wavelength give the longer coupling length if compare to 1.55 at the same step factor (r). Besides, the low loss propagation is achieved with less than 2 % of propagation loss.

Keywords: 3 dB directional couplers, silicon-on-insulator, symmetrical rib waveguide, OptiBPM 9

Procedia PDF Downloads 516
13505 Design of Reinforced Concrete (RC) Walls Considering Shear Amplification by Nonlinear Dynamic Behavior

Authors: Sunghyun Kim, Hong-Gun Park

Abstract:

In the performance-based design (PBD), by using the nonlinear dynamic analysis (NDA), the actual performance of the structure is evaluated. Unlike frame structures, in the wall structures, base shear force which is resulted from the NDA, is greatly amplified than that from the elastic analysis. This shear amplifying effect causes repeated designs which make designer difficult to apply the PBD. Therefore, in this paper, factors which affect shear amplification were studied. For the 20-story wall model, the NDA was performed. From the analysis results, the base shear amplification factor was proposed.

Keywords: performance based design, shear amplification factor, nonlinear dynamic analysis, RC shear wall

Procedia PDF Downloads 379
13504 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 262
13503 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 222
13502 National Defense and Armed Forces Development in the Member States of the Visegrad Group

Authors: E. Hronyecz

Abstract:

Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial.

Keywords: armed forces, cooperation, development, Visegrad Group

Procedia PDF Downloads 133
13501 Fear of Covid-19 a Major Contributing Factor to Insomnia in General Iranian Population

Authors: Amin Nakhostin-Ansari, Samaneh Akbarour, Khosro Sadeghniiat Haghighi, Zahra Banafsheh Alemohammad, Farnaz Etesam, Arezu Najafi, Mahnaz Khalafehnilsaz

Abstract:

Introduction: The outbreak of coronavirus disease has considerably burdened the healthcare system in Iran. This study aimed to evaluate the characteristics of insomnia experienced by the general Iranian population during the COVID-19 pandemic. Method: A scale(FCV-19) was used for Fear of COVID-19, Insomnia Severity Index (ISI), Patient Health Questionnaire-2 (PHQ-2), and Generalized Anxiety Disorder Scale-2 (GAD-2) for detailed characterization of insomnia and its patterns Results: In total, 675 people with insomnia with the mean age of 40.28 years (SD=11.15) participated in this study. Prevalence of difficulty initiating sleep (DIS), difficulty maintaining sleep (DMS), and early morning awakening (EMA) were 91.4%, 86.7%, and 77%, respectively. DIS, DMS, and EMA were more common in people with depression and anxiety. FCV-19 score was higher in those with more severe types of DIS, DMS, and EMA (P<0.001). FCV-19 was a risk factor for all patterns of insomnia (OR=1.19, 1.12, 1.02 for DIS, DMS, and EMA, respectively). Conclusion: fear of COVID-19 is a major factor to insomnia patterns. Investigation of COVID-19 fear in people with insomnia and the addition of attributed relieving or management strategies to conventional management of insomnia are reasonable approaches to improve the sleep condition of people in the pandemic.

Keywords: insomnia, difficulty maintaining sleep, COVID-19, Coronavirus

Procedia PDF Downloads 180
13500 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge

Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada

Abstract:

According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.

Keywords: ancestral knowledge, climate change, medicinal plants, solar energy

Procedia PDF Downloads 235
13499 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 320
13498 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 165
13497 Role of Interleukin-36 in Response to Pseudomonas aeruginosa Infection

Authors: Muslim Idan Mohsin, Mohammed Jasim Al-Shamarti, Rusul Idan Mohsin, Ali A. Majeed

Abstract:

One of the causative agents of the lower respiratory tract (LRT) is Pseudomonas aeruginosa, which can lead to severe infection associated with a lung infection. There are many cytokines that are secreted in response to bacterial infection, in particular interleukin IL-36 cytokine in response to P. aeruginosa infection. The involvement of IL-36 in the P. aeruginosa infection could be a clue to find a specific way for treatments of different inflammatory and degenerative lung diseases. IL36 promotes primary immune response via binding to the IL-36 receptor (IL-36R). Indeed, an overactivity of IL-36 might be an initiating factor for many immunopathologic sceneries in pneumonia. Here we demonstrate if the IL-36 cytokine increases in response P. aeruginosa infection that is isolated from lower respiratory tract infection (LRT). We demonstrated that IL-36 expression significantly unregulated in human lung epithelial (A549) cells after infected by P. aeruginosa at mRNA level.

Keywords: IL36, Pseudomonas aeruginosa, LRT infection, A549 cells

Procedia PDF Downloads 232
13496 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 76
13495 Stress Variation around a Circular Hole in Functionally Graded Plate under Bending

Authors: Parveen K. Saini, Mayank Kushwaha

Abstract:

The influence of material property variation on stress concentration factor (SCF) due to the presence of a circular hole in a functionally graded material (FGM) plate is studied in this paper. A numerical method based on complex variable theory of elasticity is used to investigate the problem. To achieve the material property, variation plate is decomposed into a number of rings. In this research work, Young's modulus is assumed to be varying exponentially and it is found that stress concentration factor can be reduced by increasing Young’s modulus progressively away from the hole.

Keywords: stress concentration, circular hole, FGM plate, bending

Procedia PDF Downloads 306
13494 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 139
13493 Urban Traffic: Understanding the Traffic Flow Factor Through Fluid Dynamics

Authors: Sathish Kumar Jayaraj

Abstract:

The study of urban traffic dynamics, underpinned by the principles of fluid dynamics, offers a distinct perspective to comprehend and enhance the efficiency of traffic flow within bustling cityscapes. Leveraging the concept of the Traffic Flow Factor (TFF) as an analog to the Reynolds number, this research delves into the intricate interplay between traffic density, velocity, and road category, drawing compelling parallels to fluid dynamics phenomena. By introducing the notion of Vehicle Shearing Resistance (VSR) as an analogy to dynamic viscosity, the study sheds light on the multifaceted influence of traffic regulations, lane management, and road infrastructure on the smoothness and resilience of traffic flow. The TFF equation serves as a comprehensive metric for quantifying traffic dynamics, enabling the identification of congestion hotspots, the optimization of traffic signal timings, and the formulation of data-driven traffic management strategies. The study underscores the critical significance of integrating fluid dynamics principles into the domain of urban traffic management, fostering sustainable transportation practices, and paving the way for a more seamless and resilient urban mobility ecosystem.

Keywords: traffic flow factor (TFF), urban traffic dynamics, fluid dynamics principles, vehicle shearing resistance (VSR), traffic congestion management, sustainable urban mobility

Procedia PDF Downloads 62
13492 Review of the Software Used for 3D Volumetric Reconstruction of the Liver

Authors: P. Strakos, M. Jaros, T. Karasek, T. Kozubek, P. Vavra, T. Jonszta

Abstract:

In medical imaging, segmentation of different areas of human body like bones, organs, tissues, etc. is an important issue. Image segmentation allows isolating the object of interest for further processing that can lead for example to 3D model reconstruction of whole organs. Difficulty of this procedure varies from trivial for bones to quite difficult for organs like liver. The liver is being considered as one of the most difficult human body organ to segment. It is mainly for its complexity, shape versatility and proximity of other organs and tissues. Due to this facts usually substantial user effort has to be applied to obtain satisfactory results of the image segmentation. Process of image segmentation then deteriorates from automatic or semi-automatic to fairly manual one. In this paper, overview of selected available software applications that can handle semi-automatic image segmentation with further 3D volume reconstruction of human liver is presented. The applications are being evaluated based on the segmentation results of several consecutive DICOM images covering the abdominal area of the human body.

Keywords: image segmentation, semi-automatic, software, 3D volumetric reconstruction

Procedia PDF Downloads 290
13491 Effects of Anti-FGL2 Monoclonal Antibody SPF89 on Vascular Inflammation

Authors: Ying Sun, Biao Cheng, Qing Lu, Xuefei Tao, Xiaoyu Lai, Cheng Guo, Dan Wang

Abstract:

Fibrinogen-like protein 2 (FGL2) has recently been identified to play an important role in inflammatory diseases such as atherosclerosis through a thrombin-dependent manner. Here, a murine monoclonal antibody was raised against the critical residue Ser(89) of FGL2, and the effects of the anti-FGL2 mAb (SPF89) were analyzed in human umbilical vein endothelial cells (HUVECs) and THP-1 cells. Firstly, it was proved that SPF89, which belongs to the IgG1 subtype with a KD value of 44.5 pM, could specifically show the expression levels of protein FGL2 in different cell lines of known target gene status. The lipopolysaccharide (LPS)-mediated endothelial cell proliferation was significantly inhibited with a decline of phosphorylation nuclear factor-κB (NF-κB) in a dose-dependent manner after SPF89 treatment. Furthermore, SPF89 reduced LPS-induced expression of adhesion molecules and inflammatory cytokines such as vascular cell adhesion molecule-1, tumor necrosis factor-α, Matrix metalloproteinase MMP-2, Integrin αvβ3, and interleukin-6 in HUVECs. In macrophage-like THP-1 cells, SPF89 effectively inhibited LPS and low-density lipoprotein-induced foam cell formation. However, these anti-inflammatory and anti-atherosclerotic effects of anti-FGL2 mAb in HUVECs and THP-1 cells were significantly reduced after treatment with an NF-κB inhibitor PDTC. All the above suggest, by efficiently inhibiting LPS-induced pro-inflammatory effects in vascular endothelial cells by attenuating NF-κB dependent pathway, the new anti-FGL2 mAb SPF89 could to be a potential therapeutic candidate for protecting the vascular endothelium against inflammatory diseases such as atherosclerosis. This work was supported by the Program of Sichuan Science and Technology Department (2017FZ0069) and Collaborative Innovation Program of Sichuan for Elderly Care and Health(YLZBZ1511).

Keywords: monoclonal antibody, fibrinogen like protein 2, inflammation, endothelial cells

Procedia PDF Downloads 271
13490 Speech Motor Processing and Animal Sound Communication

Authors: Ana Cleide Vieira Gomes Guimbal de Aquino

Abstract:

Sound communication is present in most vertebrates, from fish, mainly in species that live in murky waters, to some species of reptiles, anuran amphibians, birds, and mammals, including primates. There are, in fact, relevant similarities between human language and animal sound communication, and among these similarities are the vocalizations called calls. The first specific call in human babies is crying, which has a characteristic prosodic contour and is motivated most of the time by the need for food and by affecting the puppy-caregiver interaction, with a view to communicating the necessities and food requests and guaranteeing the survival of the species. The present work aims to articulate speech processing in the motor context with aspects of the project entitled emotional states and vocalization: a comparative study of the prosodic contours of crying in human and non-human animals. First, concepts of speech motor processing and general aspects of speech evolution will be presented to relate these two approaches to animal sound communication.

Keywords: speech motor processing, animal communication, animal behaviour, language acquisition

Procedia PDF Downloads 89
13489 Social Networks Global Impact on Protest Movements and Human Rights Activism

Authors: Marcya Burden, Savonna Greer

Abstract:

In the wake of social unrest around the world, protest movements have been captured like never before. As protest movements have evolved, so too have their visibility and sources of coverage. Long gone are the days of print media as our only glimpse into the action surrounding a protest. Now, with social networks such as Facebook, Instagram and Snapchat, we have access to real-time video footage of protest movements and human rights activism that can reach millions of people within seconds. This research paper investigated various social media network platforms’ statistical usage data in the areas of human rights activism and protest movements, paralleling with other past forms of media coverage. This research demonstrates that social networks are extremely important to protest movements and human rights activism. With over 2.9 billion users across social media networks globally, these platforms are the heart of most recent protests and human rights activism. This research shows the paradigm shift from the Selma March of 1965 to the more recent protests of Ferguson in 2014, Ni Una Menos in 2015, and End Sars in 2018. The research findings demonstrate that today, almost anyone may use their social networks to protest movement leaders and human rights activists. From a student to an 80-year-old professor, the possibility of reaching billions of people all over the world is limitless. Findings show that 82% of the world’s internet population is on social networks 1 in every 5 minutes. Over 65% of Americans believe social media highlights important issues. Thus, there is no need to have a formalized group of people or even be known online. A person simply needs to be engaged on their respective social media networks (Facebook, Twitter, Instagram, Snapchat) regarding any cause they are passionate about. Information may be exchanged in real time around the world and a successful protest can begin.

Keywords: activism, protests, human rights, networks

Procedia PDF Downloads 95
13488 Anatomical Survey for Text Pattern Detection

Authors: S. Tehsin, S. Kausar

Abstract:

The ultimate aim of machine intelligence is to explore and materialize the human capabilities, one of which is the ability to detect various text objects within one or more images displayed on any canvas including prints, videos or electronic displays. Multimedia data has increased rapidly in past years. Textual information present in multimedia contains important information about the image/video content. However, it needs to technologically testify the commonly used human intelligence of detecting and differentiating the text within an image, for computers. Hence in this paper feature set based on anatomical study of human text detection system is proposed. Subsequent examination bears testimony to the fact that the features extracted proved instrumental to text detection.

Keywords: biologically inspired vision, content based retrieval, document analysis, text extraction

Procedia PDF Downloads 444
13487 3D Human Reconstruction over Cloud Based Image Data via AI and Machine Learning

Authors: Kaushik Sathupadi, Sandesh Achar

Abstract:

Human action recognition modeling is a critical task in machine learning. These systems require better techniques for recognizing body parts and selecting optimal features based on vision sensors to identify complex action patterns efficiently. Still, there is a considerable gap and challenges between images and videos, such as brightness, motion variation, and random clutters. This paper proposes a robust approach for classifying human actions over cloud-based image data. First, we apply pre-processing and detection, human and outer shape detection techniques. Next, we extract valuable information in terms of cues. We extract two distinct features: fuzzy local binary patterns and sequence representation. Then, we applied a greedy, randomized adaptive search procedure for data optimization and dimension reduction, and for classification, we used a random forest. We tested our model on two benchmark datasets, AAMAZ and the KTH Multi-view football datasets. Our HMR framework significantly outperforms the other state-of-the-art approaches and achieves a better recognition rate of 91% and 89.6% over the AAMAZ and KTH multi-view football datasets, respectively.

Keywords: computer vision, human motion analysis, random forest, machine learning

Procedia PDF Downloads 36
13486 Antecedent of Loyalty: A Case of Inbound Tourists in Bangkok, Thailand

Authors: Natnicha Hasoontree

Abstract:

This purpose of this paper was to investigate the influence of loyalty of inbound tourists towards tourist destinations in Bangkok, Thailand. The antecedents of loyalty in this study included tourists’ satisfaction towards tourist destinations, perceived value of tourist destinations, feelings of engagement with tourist destinations, acquaintance with tourist destinations, and seeking novelty. By using multi-stage sampling technique, 400 tourists were sampled: 200 male and 200 female inbound tourists. The findings revealed that inbound tourists’ satisfaction was the most important factor that could influence the factor of loyalty. The findings indicated that the overall antecedents had a mean of 4.416 with the overall standard deviation of 0.808.

Keywords: antecedents, loyalty, inbound tourists, tourist destinations

Procedia PDF Downloads 514
13485 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 221
13484 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 486
13483 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: compatibility, complexity, mobile banking, observability, risk

Procedia PDF Downloads 203