Search results for: security threat
1931 Community Based Landslide Investigation and Treatment in the Earthquake Affected Areas, Nepal
Authors: Basanta Raj Adhikari
Abstract:
Large and small scale earthquakes are frequent in the Nepal, Himalaya, and many co-seismic landslides are resulted out of it. Recently, Gorkha earthquake-2015 has triggered many co-seismic landslides destroying many lives and properties. People have displaced their original places due to having many cracks and unstable ground. Therefore, Nepal has been adopting a pronged development strategy to address the earthquake issues through reconstruction and rehabilitation policy, plans and budgets. Landslides are major threat for the mountain livelihood, and it is very important to investigate and mitigate to improve human wellbeing factoring in considerations of economic growth, environmental safety, and sustainable development. Community based landslide investigation was carried with the involvement of the local community in the Sindhupalchowk District of Central Nepal. Landslide training and field orientation were the major methodological approach of this study. Combination of indigenous and modern scientific knowledge has created unique working environment which enhanced the local capacity and trained people for replication. Local topography of the landslide was created with the help of Total Station and bill of quantity was derived based on it. River training works, plantation of trees and grasses, support structures, surface and sub-surface drainage management are the recommended mitigative measures. This is a very unique example of how academia and local community can work together for sustainable development by reducing disaster risk at the local level with very low-cost technology.Keywords: community, earthquake, landslides, Nepal
Procedia PDF Downloads 1561930 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption
Authors: A. Belmeguenai, K. Mansouri, R. Djemili
Abstract:
This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis
Procedia PDF Downloads 2961929 Suggestions to the Legislation about Medical Ethics and Ethics Review in the Age of Medical Artificial Intelligence
Authors: Xiaoyu Sun
Abstract:
In recent years, the rapid development of Artificial Intelligence (AI) has extensively promoted medicine, pharmaceutical, and other related fields. The medical research and development of artificial intelligence by scientific and commercial organizations are on the fast track. The ethics review is one of the critical procedures of registration to get the products approved and launched. However, the SOPs for ethics review is not enough to guide the healthy and rapid development of artificial intelligence in healthcare in China. Ethical Review Measures for Biomedical Research Involving Human Beings was enacted by the National Health Commission of the People's Republic of China (NHC) on December 1st, 2016. However, from a legislative design perspective, it was neither updated timely nor in line with the trends of AI international development. Therefore, it was great that NHC published a consultation paper on the updated version on March 16th, 2021. Based on the most updated laws and regulations in the States and EU, and in-depth-interviewed 11 subject matter experts in China, including lawmakers, regulators, and key members of ethics review committees, heads of Regulatory Affairs in SaMD industry, and data scientists, several suggestions were proposed on top of the updated version. Although the new version indicated that the Ethics Review Committees need to be created by National, Provincial and individual institute levels, the review authorities of different levels were not clarified. The suggestion is that the precise scope of review authorities for each level should be identified based on Risk Analysis and Management Model, such as the complicated leading technology, gene editing, should be reviewed by National Ethics Review Committees, it will be the job of individual institute Ethics Review Committees to review and approve the clinical study with less risk such as an innovative cream to treat acne. Furthermore, to standardize the research and development of artificial intelligence in healthcare in the age of AI, more clear guidance should be given to data security in the layers of data, algorithm, and application in the process of ethics review. In addition, transparency and responsibility, as two of six principles in the Rome Call for AI Ethics, could be further strengthened in the updated version. It is the shared goal among all countries to manage well and develop AI to benefit human beings. Learned from the other countries who have more learning and experience, China could be one of the most advanced countries in artificial intelligence in healthcare.Keywords: biomedical research involving human beings, data security, ethics committees, ethical review, medical artificial intelligence
Procedia PDF Downloads 1681928 The Risk of Occupational Health in the Shipbuilding Industry in Bangladesh
Authors: Md. Rashel Sheikh
Abstract:
The shipbuilding industry in Bangladesh had become a fast-growing industry in recent years when it began to export newly built ships. The various activities of shipbuilding industries in their limited, confined spaces added occupational worker exposures to chemicals, dusts, and metal fumes. The aim of this literature search is to identify the potential sources of occupational health hazards in shipyards and to promote the regulation of appropriate personal protective equipment (PPE) for the workers. In shipyards, occupational workers are involved in various activities, such as the manufacture, repair, maintenance, dismantling of boats and ships, building small ocean-going vessels and ferries. The occupational workers in the shipbuilding industry suffer from a number of hazardous issues, such as asthma, dermatitis, hearing deficits, and musculoskeletal disorders. The use of modern technologies, such as underwater plasma welding, electron beam welding, and friction stir welding and laser cutting and welding, and appropriate PPE (i.e., long-sleeved shirt and long pants, shoes plus socks, safety masks, chemical resistant gloves, eyewear, face shield, and respirators) can help reduce the occupational exposure to environmental hazards created by different activities in the shipyards. However, most shipyards in Bangladesh use traditional methods, e.g., flame cutting and arc, that add hazardous waste and pollutants to the environment in and around the shipyard. The safety and security of occupational workers in the shipyard workplace are very important. It is the primary responsibility of employers to ensure the safety and security of occupational workers in the shipyards. Employers must use advanced technologies and supply adequate and appropriate PPE for the workers. There are a number of accidents and illnesses that happen daily in the shipyard industries in Bangladesh due to the negligence and lack of adequate technologies and appropriate PPE. In addition, there are no specific regulations and implementations available to use the PPE. It is essential to have PPE regulations and strict enforcement for the adoption of PPE in the shipbuilding industries in Bangladesh. Along with the adoption of PPE with regular health examinations, health education to the workers regarding occupational hazards and lifestyle diseases are also important and require reinforcement. Monitoring health and safety hazards in shipyards are essential to enhance worker protection, and ensure worker safety, and mitigate workplace injuries and illnesses.Keywords: shipbuilding Industries, health education, occupational health hazards, personal protective equipment, shipyard workers, occupational workers, shipyards
Procedia PDF Downloads 1651927 The Compositional Effects on Electrospinning of Gelatin and Polyvinyl-alcohol Mixed Nanofibers
Authors: Yi-Chun Wu, Nai-Yun Chang, Chuan LI
Abstract:
This study investigates a feasible range of composition for the mixture of gelatin and polyvinyl alcohol to form nanofibers by electrospinning. Gelatin, one of the most available naturally derived hydrogels of amino acids, is a popular choice for food additives, cosmetic ingredients, biomedical implants, or dressing of its non-toxic and biodegradable nature. Nevertheless, synthetic hydrogel polyvinyl alcohol has long been used as a thickening agent for adhesion purposes. Many biomedical devices are also containing polyvinyl-alcohol as a major content, such as eye drops and contact lenses. To discover appropriate compositions of gelatin and polyvinyl-alcohol for electrospun nanofibers, polymer solutions of different volumetric ratios between gelatin and polyvinyl alcohol were prepared for electrospinning. The viscosity, surface tension, pH value, and electrical conductance of polymer solutions were measured. On the nanofibers, the vibrational modes of molecular structures in nanofibers were investigated by Fourier-transform infrared spectroscopy. The morphologies and surface chemical elements of fibers were examined by the scanning electron microscope and the energy-dispersive X-ray spectroscopy. The hydrophilicity of nanofiberswas evaluated by the water contact angles on the surface of the fibers. To further test the biotoxicity of nanofibers, an in-vitro 3T3 fibroblasts culture further tested the biotoxicity of the electrospun nanofibers. Throughstatistical analyses of the experimental data, it is found that the polyvinyl-alcohol rich composition (the volumetric ratio of gelatin/polyvinyl-alcohol < 1) would be a preferable choice for the formation of nanofibers by the current setup of electrospinning. These electrospun nanofibers tend to be hydrophilic with no biotoxicity threat to the 3T3 fibroblasts.Keywords: gelatin, polyvinyl-alcohol, nanofibers, electrospinning, spin coating
Procedia PDF Downloads 851926 Detection and Distribution Pattern of Prevelant Genotypes of Hepatitis C in a Tertiary Care Hospital of Western India
Authors: Upasana Bhumbla
Abstract:
Background: Hepatitis C virus is a major cause of chronic hepatitis, which can further lead to cirrhosis of the liver and hepatocellular carcinoma. Worldwide the burden of Hepatitis C infection has become a serious threat to the human race. Hepatitis C virus (HCV) has population-specific genotypes and provides valuable epidemiological and therapeutic information. Genotyping and assessment of viral load in HCV patients are important for planning the therapeutic strategies. The aim of the study is to study the changing trends of prevalence and genotypic distribution of hepatitis C virus in a tertiary care hospital in Western India. Methods: It is a retrospective study; blood samples were collected and tested for anti HCV antibodies by ELISA in Dept. of Microbiology. In seropositive Hepatitis C patients, quantification of HCV-RNA was done by real-time PCR and in HCV-RNA positive samples, genotyping was conducted. Results: A total of 114 patients who were seropositive for Anti HCV were recruited in the study, out of which 79 (69.29%) were HCV-RNA positive. Out of these positive samples, 54 were further subjected to genotype determination using real-time PCR. Genotype was not detected in 24 samples due to low viral load; 30 samples were positive for genotype. Conclusion: Knowledge of genotype is crucial for the management of HCV infection and prediction of prognosis. Patients infected with HCV genotype 1 and 4 will have to receive Interferon and Ribavirin for 48 weeks. Patients with these genotypes show a poor sustained viral response when tested 24 weeks after completion of therapy. On the contrary, patients infected with HCV genotype 2 and 3 are reported to have a better response to therapy.Keywords: hepatocellular, genotype, ribavarin, seropositive
Procedia PDF Downloads 1271925 Performance Analysis of Scalable Secure Multicasting in Social Networking
Authors: R. Venkatesan, A. Sabari
Abstract:
Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.Keywords: multicasting, scalability, security, social network
Procedia PDF Downloads 2921924 Organized Crime-A Social Challenge for Kosovo towards European Union Integration
Authors: Samedin Mehmeti
Abstract:
Very tens political and economic situation, in particular armed conflicts that followed at the time of the destruction of the former Yugoslavia, influenced migrations and displacement of population. Especially setting international sanctions and embargo influenced the creation of organized criminal groups. A lot of members of the former Yugoslav security apparatus in collaboration with ordinary criminal groups engaged in: smuggling of goods, petroleum and arms, sale and transport of drugs, payable murder, damage to public property, kidnappings, extortion, racketeering, etc. This tradition of criminality, of course in other forms and with other methods, has continued after conflicts and continues with a high intensity even in nowadays. One of the most delicate problems of organized crime activity is the impact on the economic sphere, where organized crime opposes and severely damages national security and economy to criminalize it in certain sectors and directions. Organized crime groups including who find Kosovo as a place to develop their criminal activities are characterized by: loyalty of many people especially through family connections and kinship in carrying out criminal activities and the existence of powerful hierarchy of leadership which in many cases include the corrupt officials of state apparatus. Groups have clear hierarchy and flexible structure of command, each member within the criminal group knows his duties concrete. According to statistics presented in police reports its notable that Kosovo has a large number of cases of organized crime, cultivation, trafficking and possession of narcotics. As already is very well known that one of the primary conditions that must be fulfilled on track toward integration in the European Union is precisely to prevent and combat organized crime. Kosovo has serious problems with prosecutorial and judicial system. But the misuse of public funds, even those coming directly from EU budget or the budget of the European Union member states, have a negative impact on this process. The economic crisis that has gripped some of the EU countries has led to the creation of an environment in which there are far fewer resources and opportunities to invest in preventing and combating organized crime within member states. This automatically reduces the level of financial support for other countries in the fight against organized crime. Kosovo as a poor country, now has less likely benefiting from the support tools that will be eventually offered by Europe set of in this area.Keywords: police, european integration, organized crime, narcotics
Procedia PDF Downloads 4411923 Haptic Robotic Glove for Tele-Exploration of Explosive Devices
Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes
Abstract:
ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation
Procedia PDF Downloads 1781922 Analyzing Restrictive Refugee Policies in Japan and the United Kingdom: An Examination of Fundamental Causes and Implications
Authors: Shalini Shawari Matharage
Abstract:
The worldwide refugee challenge has arisen as a critical concern, with millions of individuals fleeing their home countries owing to conflict, persecution, and human rights violations. Since the establishment of an international framework in 1951 for tackling the humanitarian needs of refugees and asylum seekers, many developed and developing countries have adopted a refugee admittance framework into their national immigration policy and steadily changed their domestic legislation to assist the resettlement of refugees. However, many developed nations have put forth strict limitations on refugee admission in the midst of the continuing refugee crisis, claiming factors including national sovereignty, security of their borders, and national economy. Two such developed nations that have been restrictive on refugees is Japan and the United Kingdom. Despite their contrasting histories, migration methods, and viewpoints on diversity in modern society, the two notably developed nations have taken similar restrictive approaches in refugee policy in the recent years. This study attempts to investigate the underlying causes that led these countries to adopt strict refugee policies and how those policies have affected their compliance with international human rights responsibilities. The study employs a head-to-head methodology to examine the structural inequities in Japan and the United Kingdom's refugee policies. Using data from the UNHCR Refugee Data Finder, official government policy proposals, statements, and academic works, the study evaluates the contemporary refugee legislations, fundamental causes, and subsequent implications. The study illustrates a combination of economic, security, and demographic issues, as well as political rigidity and negative public perceptions, as major determinants of the two countries' restrictive refugee policies. The findings shed light on the restrictive actions taken by Japan and the UK, raising concerns about potential breaches in obligations to their commitments to international law and human rights obligations. Understanding the underlying issues influencing these policies allows lawmakers and activists to establish more compassionate refugee policies that adhere to international human rights and protect vulnerable individuals fleeing persecution. Ultimately, this study aims to contribute to the development of sensible refugee policies that uphold human rights and humanitarian values.Keywords: immigration, Japan, refugee policy, united kingdom
Procedia PDF Downloads 721921 The Connection between Heroism and Violence in War Narratives from the Aspect of Rituals
Authors: Rita Fofai
Abstract:
The aim of the study is to help peacebuilding by analyzing the symbolical level of fights in the war. Despite the sufferings, war heroism still represents such a noble value in war narratives (especially in literature and films, whether it is high- or popular culture) which can make warfare attractive for every age-group. The questions of the study will revolve around the events when heroism is not a necessary and unselfish act for a greater good, but when the primary aim is to express strength in order to build self-mythology. Since war is a scene where the mythological level can meet reality, and even modern narratives use the elements of rituals and sacral references in even secular contexts, understanding the connection between rites and modern battles will ground this study, and the analysis will follow the logic of the violent rites. From this aspect, war is not merely the fight for different countries and ideas, but the fight of mankind with superhuman and natural or supernatural phenomena, as well. In this context, enemy symbolizes the threat of the world which is unpredictable for mankind, and the fight becomes a ritual combat; therefore the winner’s symbolic reward is to redefine himself or herself not only in the human environment but in the context of the whole world. The analysis of the study reveals that this kind of violence does not represents real heroism and rarely results in recruitment, on the contrary, conserves fear and the feeling of weakness, which is the root cause of this kind of act. The result of this study is a way to reshape the attitude toward so-called heroic war violence which is often a part of war narratives even nowadays. Since stepping out of the war tradition is mainly a cultural question, redefining the connection between society and narratives which has an effect on mentality and emotions, giving a clear guide to making difference between heroism and useless violence is very important in peacebuilding.Keywords: war, ritual, heroism, violence, narratives, culture
Procedia PDF Downloads 1271920 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study
Authors: Ayelet Gur
Abstract:
Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities
Procedia PDF Downloads 1551919 Wheat Production and Market in Afghanistan
Authors: Fayiz Saifurahman, Noori Fida Mohammad
Abstract:
Afghanistan produces the highest rate of wheat, it is the first source of food, and food security in Afghanistan is dependent on the availability of wheat. Although Afghanistan is the main producer of wheat, on the other hand, Afghanistan is the largest importers of flour. The objective of this study is to assess the structure and dynamics of the wheat market in Afghanistan, can compute with foreign markets, and increase the level of production. To complete this, a broad series of secondary data was complied with, group discussions and interviews with farmers, agricultural and market experts. The research findings propose that; the government should adopt different policies to support the local market. The government should distribute the seed, support financially and technically to increase wheat production.Keywords: Afghanistan, wheat, production , import
Procedia PDF Downloads 1681918 Real-Time Detection of Space Manipulator Self-Collision
Authors: Zhang Xiaodong, Tang Zixin, Liu Xin
Abstract:
In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.Keywords: space manipulator, collision detection, self-collision, the real-time collision detection
Procedia PDF Downloads 4691917 Penguins Search Optimization Algorithm for Chaotic Synchronization System
Authors: Sofiane Bououden, Ilyes Boulkaibet
Abstract:
In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization
Procedia PDF Downloads 1951916 Expression of Gro-El under Phloem-Specific Promoter Protects Transgenic Plants against Diverse Begomovirus-Beta Satellite Complex
Authors: Muhammad Yousaf Ali, Shahid Mansoor, Javeria Qazi, Imran Amin, Musarrat Shaheen
Abstract:
Cotton leaf curl disease (CLCuD) is the major threat to the cotton crop and is transmitted by whitefly (Bemisia tabaci). Since multiple begomoviruses and associated satellites are involved in CLCuD, approaches based on the concept of broad-spectrum resistance are essential for effective disease control. Gro-El and G5 are two proteins from whitefly endosymbiont and M13 bacteriophage origin, respectively. Gro-El encapsulates the virus particle when it enters the whitefly and protects the virus from the immune system of the whitefly as well as prevents viral expression in it. This characteristic of Gro-El can be exploited to get resistance against viruses if expressed in plants. G5 is a single-stranded DNA binding protein, expression of which in transgenic plants will stop viral expression on its binding with ssDNA. The use of tissue-specific promoters is more efficient than constitutive promoters. Transgenics of Nicotiana benthamiana for Gro-El under constitutive promoter and Gro-El under phloem specific promoter were made. In comparison to non-transgenic plants, transgenic plants with Gro-El under NSP promoter showed promising results when challenged against cotton leaf curl Multan virus (CLCuMuV) along with cotton leaf curl Multan beta satellite (CLCuMB), cotton leaf curl Khokhran virus (CLCuKoV) along with cotton leaf curl Multan beta satellite (CLCuMB) and Pedilenthus leaf curl virus (PedLCV) along with Tobacco leaf curl beta satellite (TbLCB).Keywords: cotton leaf curl disease, whitefly, endosymbionts, transgenic, resistance
Procedia PDF Downloads 971915 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2681914 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application
Authors: Khaled Shehata, Hanady Hussien, Sara Yehia
Abstract:
Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential
Procedia PDF Downloads 3911913 The Mediating Role of Masculine Gender Role Stress on the Relationship between the EFL learners’ Self-Disclosure and English Class Anxiety
Authors: Muhammed Kök & Adem Kantar
Abstract:
Learning a foreign language can be affected by various factors such as age, aptitude, motivation, L2 disposition, etc. Among these factors, masculine gender roles stress (MGRS) that male learners possess is the least touched area that has been examined so far.MGRS can be defined as the traditional male role stress when the male learners feel the masculinity threat against their traditionally adopted masculinity norms. Traditional masculine norms include toughness, accuracy, completeness, and faultlessness. From this perspective, these norms are diametrically opposed to the language learning process since learning a language, by its nature, involves stages such as making mistakes and errors, not recalling words, pronouncing sounds incorrectly, creating wrong sentences, etc. Considering the potential impact of MGRS on the language learning process, the main purpose of this study is to investigate the mediating role of MGRS on the relationship between the EFL learners’ self-disclosure and English class anxiety. Data were collected from Turkish EFL learners (N=282) who study different majors in various state universities across Turkey. Data were analyzed by means of the Bootstraping method using the SPSS Process Macro plugin. The findings show that the indirect effect of self-disclosure level on the English Class Anxiety via MGRS was significant. We conclude that one of the reasons why Turkish EFL learners have English class anxiety might be the pressure that they feel because of their traditional gender role stress.Keywords: masculine, gender role stress, english class anxiety, self-disclosure, masculinity norms
Procedia PDF Downloads 981912 Discursive Legitimation Strategies in ISIS’ Online Magazine, Dabiq: A Discourse Historical Approach
Authors: Sahar Rasoulikolamaki
Abstract:
ISIS (also known as DAASH) is an Islamic fundamentalist group that has been known as a global threat to the whole world for their radicalizing approach and application of online platforms as a tool to portray their activities, to disseminate their ideology, and to commit recruiting activities. This study is an attempt to carry out a critical discourse analysis on the argumentative devices by which ISIS legitimizes or delegitimizes positive or negative constructions of social practices in Dabiq. It tries to shed light on how texts in Dabiq as linguistic elements in the micro level of analysis relate to ISIS’ ideology as the higher-up macro level and in other words, how local structures contributed to the construction and transference of a global structure or ideology and vice versa. Therefore, following the relevant analytical frameworks, the study focuses on both micro-level of analysis of arguments (topoi) and macro-structure of legitimation and delegitimation in Dabiq. This purpose is nailed using the analytical categories and tools provided by Wodak’s Discourse Historical Approach (DHA) such as argumentation strategies (topoi), by which the coded language of legitimation/delegitimation and persuasion as used in Dabiq are explored. The ensuing findings demonstrate that Dabiq rigorously relies on the positive representation of the in-group course of actions and justifying its violence and, at the same time, the negative representation of the out-group behavior through implementing various topoi to achieve its desired outcome, which is the ideological manipulation and powerful self-depiction, as well as the supporter recruitment.Keywords: argumentation, discourse-historical approach, ideology, legitimation and delegitimation, topoi
Procedia PDF Downloads 1351911 Diversity and Distribution of Butterflies (Lepidoptera-Rhopalocera) along with Altitudinal Gradient and Vegetation Types at Lahoul Valley, Trans-Himalaya Region, India
Authors: Saveena Bogtapa, Jagbir Singh Kirti
Abstract:
Himalaya is one of the most fascinating ranges in the world. In India, it comprises 18 percent of the land area. Lahoul valley which is a part of Trans-Himalaya region is well known for its unique, diverse flora and fauna. It lies in the North-Eastern corner of the state Himachal Pradesh where its altitude ranges between 2500m to 5000m. Vegetation of this region is dry-temperate to alpine type. The diversity of the area is very less, rare, unique and highly endemic. But today, as a lot of environmental degradation has taken place in this hot spot of biodiversity because of frequent developmental and commercial activities which lead to the diversity of this area comes under a real threat. Therefore, as part of the research, butterflies which are known for their attractiveness as well as usefulness to the ecosystem, are used for the study. The diversity of butterflies of a particular area not only provides a healthy environment but also serves as the first step of conservation to the biodiversity. Their distribution in different habitats and altitude type helps us to understand the species richness and abundance in an area. Moreover, different environmental parameters which affect the butterfly community has also recorded. Hence, the present study documents the butterfly diversity in an unexplored habitat and altitude types at Lahoul valley. The valley has been surveyed along with altitudinal gradients (from 2500m to 4500m) and in various habitats like agriculture land, grassland, scrubland, riverine and in different types of forests. Very rare species of butterflies have been explored, and these will be discussed along with different parameters during the presentation.Keywords: butterflies, diversity, Lahoul valley, altitude, vegetation
Procedia PDF Downloads 2461910 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law
Authors: Barakat Adebisi Raji
Abstract:
In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah
Procedia PDF Downloads 371909 Women Entrepreneurship as an Inventive Approach to Ensure a Sustainable Development in Anambre State
Authors: S. Muogbo Uju, Akpunonu Uju,
Abstract:
The prevailing harsh environment factors couple with poverty rate and unemployment propels a high rate of entrepreneurial activities in developing countries of the world. Women entrepreneurs operate within gender bias among other constraint that can constitute a threat or create opportunity for women entrepreneurs. This empirical paper investigates and critically examines women entrepreneurship as an inventive approach to sustainable development in Anambra State. The study used descriptive statistics (frequencies, mean, and percentages) to answer the three research questions posed. Hypotheses testing were done with person product moment correlation and multiple regressions were employed in data analysis. SPSS [statistical package for Social Science] software was used to run the analysis. Three hundred and fifty three (353) copies of questionnaires were administered, and one hundred and forty six (146) copies were returned. Consequently, the findings of this study portrayed a significant impact between women entrepreneurship activities, job creation, wealth creation, youth empowerment, poverty reduction, employment generation, and increase in standard of livings of people. Therefore, the findings prescribe that government should ensure that managerial lessons are accompanied with the skill acquisition programs in order for them to understand the rudiment of owing and sustaining a business. The study also recommends that women entrepreneurs that have overcome the inertia of starting a business should come together to create platforms that can help those women who are yet to take a step or kick-start such venture.Keywords: women entrepreneurship, skill acquisition, sustainability, wealth creation
Procedia PDF Downloads 4401908 Developing HRCT Criterion to Predict the Risk of Pulmonary Tuberculosis
Authors: Vandna Raghuvanshi, Vikrant Thakur, Anupam Jhobta
Abstract:
Objective: To design HRCT criterion to forecast the threat of pulmonary tuberculosis. Material and methods: This was a prospective study of 69 patients with clinical suspicion of pulmonary tuberculosis. We studied their medical characteristics, numerous separate HRCT-results, and a combination of HRCT findings to foresee the danger for PTB by utilizing univariate and multivariate investigation. Temporary HRCT diagnostic criteria were planned in view of these outcomes to find out the risk of PTB and tested these criteria on our patients. Results: The results of HRCT chest were analyzed, and Rank was given from 1 to 4 according to the HRCT chest findings. Sensitivity, specificity, positive predictive value, and negative predictive value were calculated. Rank 1: Highly suspected PTB. Rank 2: Probable PTB Rank 3: Nonspecific or difficult to differentiate from other diseases Rank 4: Other suspected diseases • Rank 1 (Highly suspected TB) was present in 22 (31.9%) patients, all of them finally diagnosed to have pulmonary tuberculosis. The sensitivity, specificity, and negative likelihood ratio for RANK 1 on HRCT chest was 53.6%, 100%, and 0.43, respectively. • Rank 2 (Probable TB) was present in 13 patients, out of which 12 were tubercular, and 1 was non-tubercular. • The sensitivity, specificity, positive likelihood ratio, and negative likelihood ratio of the combination of Rank 1 and Rank 2 was 82.9%, 96.4%, 23.22, and 0.18, respectively. • Rank 3 (Non-specific TB) was present in 25 patients, and out of these, 7 were tubercular, and 18 were non-tubercular. • When all these 3 ranks were considered together, the sensitivity approached 100% however, the specificity reduced to 35.7%. The positive likelihood ratio and negative likelihood ratio were 1.56 and 0, respectively. • Rank 4 (Other specific findings) was given to 9 patients, and all of these were non-tubercular. Conclusion: HRCT is useful in selecting individuals with greater chances of pulmonary tuberculosis.Keywords: pulmonary, tuberculosis, multivariate, HRCT
Procedia PDF Downloads 1721907 The Impact of Artificial Intelligence on Human Rights Development
Authors: Kerols Seif Said Botros
Abstract:
The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 541906 Forest Risk and Vulnerability Assessment: A Case Study from East Bokaro Coal Mining Area in India
Authors: Sujata Upgupta, Prasoon Kumar Singh
Abstract:
The expansion of large scale coal mining into forest areas is a potential hazard for the local biodiversity and wildlife. The objective of this study is to provide a picture of the threat that coal mining poses to the forests of the East Bokaro landscape. The vulnerable forest areas at risk have been assessed and the priority areas for conservation have been presented. The forested areas at risk in the current scenario have been assessed and compared with the past conditions using classification and buffer based overlay approach. Forest vulnerability has been assessed using an analytical framework based on systematic indicators and composite vulnerability index values. The results indicate that more than 4 km2 of forests have been lost from 1973 to 2016. Large patches of forests have been diverted for coal mining projects. Forests in the northern part of the coal field within 1-3 km radius around the coal mines are at immediate risk. The original contiguous forests have been converted into fragmented and degraded forest patches. Most of the collieries are located within or very close to the forests thus threatening the biodiversity and hydrology of the surrounding regions. Based on the vulnerability values estimated, it was concluded that more than 90% of the forested grids in East Bokaro are highly vulnerable to mining. The forests in the sub-districts of Bermo and Chandrapura have been identified as the most vulnerable to coal mining activities. This case study would add to the capacity of the forest managers and mine managers to address the risk and vulnerability of forests at a small landscape level in order to achieve sustainable development.Keywords: forest, coal mining, indicators, vulnerability
Procedia PDF Downloads 3901905 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques
Authors: Stefan K. Behfar
Abstract:
The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing
Procedia PDF Downloads 761904 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat
Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto
Abstract:
Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.Keywords: surveillance, epidemic potential disease, port health, bioterrorism
Procedia PDF Downloads 3631903 Nuclear Mitochondrial Pseudogenes in Anastrepha fraterculus Complex
Authors: Pratibha Srivastava, Ayyamperumal Jeyaprakash, Gary Steck, Jason Stanley, Leroy Whilby
Abstract:
Exotic, invasive tephritid fruit flies (Diptera: Tephritidae) are a major threat to fruit and vegetable industries in the United States. The establishment of pest fruit fly in the agricultural industries and produce severe ecological and economic impacts on agricultural diversification and trade. Detection and identification of these agricultural pests in a timely manner will facilitate the possibility of eradication from newly invaded areas. Identification of larval stages to species level is difficult, but is required to determine pest loads and their pathways into the United States. The aim of this study is the New World genus, Anastrepha which includes pests of major economic importance. Mitochondrial cytochrome c oxidase I (COI) gene sequences were amplified from Anastrepha fraterculus specimens collected from South America (Ecuador and Peru). Phylogenetic analysis was performed to characterize the Anastrepha fraterculus complex at a molecular level. During phylogenetics analysis numerous nuclear mitochondrial pseudogenes (numts) were discovered in different specimens. The numts are nonfunctional copies of the mtDNA present in the nucleus and are easily coamplified with the mitochondrial COI gene copy by using conserved universal primers. This is problematic for DNA Barcoding, which attempts to characterize all living organisms by using the COI gene. This study is significant for national quarantine use, as morphological diagnostics to separate larvae of the various members remain poorly developed.Keywords: tephritid, Anastrepha fraterculus, COI, numts
Procedia PDF Downloads 2391902 Evaluation of the Socio-Economic Impact of Marine Debris in Coastal Nigeria
Authors: Chibuzo Okoye Daniels, Gillian Glegg, Lynda Rodwell
Abstract:
Marine debris from fishing nets to medical equipment to food packaging that play major roles in boosting the economy and protecting human health is now more than an environmental problem that can be solved by legislation, law enforcement and technical solutions. It has also been identified as a cultural problem that can only be addressed by identifying instruments that can be used to change human attitudes and behaviors. This may be through management approaches, education and involvement of all sectors/interests, including the public. To contribute to the sustainable development of coastal Nigeria, two case study areas (Ikoyi and Victoria Islands of Lagos State) were used to evaluate the socio-economic impacts of marine debris problem in coastal Nigeria. The following methods were used: (1) semi-structured interviews with key stakeholders and businesses on beaches, waterfronts and waterways within the study areas and (2) observational study of beaches, waterfronts and waterways within the study areas. The results of the study have shown that marine debris is a cultural and multi-sectoral problem that poses great threat not only to the environmental sustainability of the study areas but also to the wellbeing of its citizens and the economy of coastal Nigeria. Current solid waste and marine debris management practices are inefficient due to inadequate knowledge of how to tackle the problem. To ensure environmental sustainability in coastal Nigeria and avoid waste of scarce financial resources, adequate, appropriate and cost effective solutions to the marine debris problem need to be identified and effectively transferred for implementation in the study areas.Keywords: sustainability, coastal Nigeria, study areas, aquaculture
Procedia PDF Downloads 554