Search results for: network intrusion prevention
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6185

Search results for: network intrusion prevention

6035 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 83
6034 Management of Nutritional Strategies in Prevention of Autism Before and During Pregnancy

Authors: Maryam Ghavam Sadri, Kimia Moiniafshari

Abstract:

Objectives: Autism is a neuro-developmental disorder that has negative effects on verbal, mental and behavioral development. Studies have shown the role of a maternal dietary pattern before and during pregnancy. The relation of exerting of nutritional management programs in prevention of Autism has been approved. This review article has been made to investigate the role of nutritional management strategies before and during pregnancy in the prevention of Autism. Methods: This review study was accomplished by using the keywords related to the topic, 67 articles were found (2000-2015) and finally 20 article with criteria such as including maternal lifestyle, nutritional deficiencies and Autism prevention were selected. Results: Maternal dietary pattern and health before and during pregnancy have important roles in the incidence of Autism. Studies have suggested that high dietary fat intake and obesity can increase the risk of Autism in offspring. Maternal metabolic condition specially gestational diabetes (GDM) (p-value < 0.04) and folate deficiency (p-value = 0.04) is associated with risk of Autism. Studies have shown that folate intake in mothers with autistic children is less than mothers who have typically developing children (TYP) (p-value<0.01). As folate is an essential micronutrient for fetus mental development, consumption of average 600 mcg/day especially in P1 phase of pregnancy results in significant reduction in incidence of Autism (OR:1.53, 95%CI=0.42-0.92, p-value = 0.02). furthermore, essential fatty acid deficiency especially omega-3 fatty acid increases the rate of Autism and consumption of supplements and food sources of omega-3 can decrease the risk of Autism up to 34% (RR=1.53, 95%CI=1-2.32). Conclusion: regards to nutritional deficiency and maternal metabolic condition before and during pregnancy in prevalence of Autism, carrying out the appropriate nutritional strategies such as well-timed folate supplementation before pregnancy and healthy lifestyle adherence for prevention of metabolic syndrome (GDM) seems to help Autism prevention.

Keywords: autism, autism prevention, dietary inadequacy, maternal lifestyle

Procedia PDF Downloads 325
6033 Intrusiveness, Appraisal and Thought Control Strategies in Patients with Obsessive Compulsive Disorder

Authors: T. Arshad

Abstract:

A correlation study was done to explore the relationship of intrusiveness, appraisal and thought control strategies in patients with Obsessive Compulsive Disorder. Theoretical frame work for the present study was Salkovskis (1985) cognitive model of obsessive compulsive disorder. Sample of 100 patients (men=48, women=52) of age 14-62 years (M=32.13, SD=10.37) was recruited from hospitals of Lahore, Pakistan. Revised Obsessional Intrusion Inventory, Stress Appraisal Measure, Thought Control Questionnaire and Symptoms Checklist-R were self-administered. Findings revealed that intrusiveness is correlated with appraisals (controllable by self, controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment). Furthermore, appraisals (uncontrollable, stressfulness, controllable by others) were emerged as strong predictors for different through control strategies (distraction, punishment and social control). Moreover, men have higher frequency of intrusion, whereas women were frequently using social control as thought control strategy. Results implied that intrusiveness, appraisals (controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment) are related which maintains the disorder.

Keywords: appraisal, intrusiveness, obsessive compulsive disorder, thought control strategies

Procedia PDF Downloads 367
6032 Epidemiology, Prevention and Treatment of Leishmaniasis in Afghanistan

Authors: Mohammad Reza Mohammadi, Layegheh Daliri

Abstract:

Introduction: Leishmaniasis occurs in infectious diseases of Leishmania protozoa in Afghanistan, anthroponotic leishmaniasis and common cutaneous leishmaniasis (ZCL). Anthroponotic skin leishmania tropica may cause urban diseases and transmitted by Phlebotomus Sergenti. In different parts of Afghanistan, different species of Leishmania are observed. We report the epidemiological characteristics of prevention and treatment in this study. Methods: This study examines the epidemiology and prevention of religious diseases in Afghanistan. Knowledge gaps were analyzed and collected with our own data. Results: In Afghanistan, most of the Lishmania Tropic seekers are Four species of Leishmania in northern Afghanistan, including Leishmania Tropica, L. Major and L. Donovani, cause skin lesions, but L. Donovani and L. infantum are visible. Even combined prevention can significantly reduce the amount of infection. Conclusion: Skinny, as well as visceral leishmaniasis, can occur among the returnees from Afghanistan. Unusual and poor skin lesions can be created by L. Donovani. In most pathogenic areas, the transmission of common diseases between humans and animals. Home dogs are the main reservoir, transferring in some areas such as India and Sudan.

Keywords: leishmania donovani, leishmania tropica, treatment, disease, epidemiology

Procedia PDF Downloads 148
6031 An ANN-Based Predictive Model for Diagnosis and Forecasting of Hypertension

Authors: Obe Olumide Olayinka, Victor Balanica, Eugen Neagoe

Abstract:

The effects of hypertension are often lethal thus its early detection and prevention is very important for everybody. In this paper, a neural network (NN) model was developed and trained based on a dataset of hypertension causative parameters in order to forecast the likelihood of occurrence of hypertension in patients. Our research goal was to analyze the potential of the presented NN to predict, for a period of time, the risk of hypertension or the risk of developing this disease for patients that are or not currently hypertensive. The results of the analysis for a given patient can support doctors in taking pro-active measures for averting the occurrence of hypertension such as recommendations regarding the patient behavior in order to lower his hypertension risk. Moreover, the paper envisages a set of three example scenarios in order to determine the age when the patient becomes hypertensive, i.e. determine the threshold for hypertensive age, to analyze what happens if the threshold hypertensive age is set to a certain age and the weight of the patient if being varied, and, to set the ideal weight for the patient and analyze what happens with the threshold of hypertensive age.

Keywords: neural network, hypertension, data set, training set, supervised learning

Procedia PDF Downloads 364
6030 Strategies to Combat the Covid-19 Epidemic

Authors: Marziye Hadian, Alireza Jabbari

Abstract:

Background: The World Health Organization has identified COVID-19 as a public health emergency and is urging governments to stop the virus transmission by adopting appropriate policies. In this regard, the countries have taken different approaches to cutting the chain or controlling the spread of the disease. Methods: The present study was a systematize review of publications relating to prevention strategies for covid-19 disease. The study was carried out based on the PRISMA guidelines and CASP for articles and AACODS for grey literature. Finding: The study findings showed that in order to confront the COVID-19 epidemic, in general, there are three approaches of "mitigation", "active control" and "suppression" and four strategies of "quarantine", "isolation", "social distance" as well as "lockdown" in both individual and social dimensions to deal with epidemics that the choice of each approach requires specific strategies and has different effects when it comes to controlling and inhibiting the disease. Conclusion: The only way to control the disease is to change your behavior and lifestyle. In addition to prevention strategies, use of masks, observance of personal hygiene principles such as regular hand washing and non-contact of contaminated hands with the face, as well as observance of public health principles such as control of sneezing and coughing, safe extermination of personal protective equipment, etc. have not been included in the category of prevention tools. However, it has a great impact on controlling the epidemic, especially the new coronavirus epidemic.

Keywords: novel corona virus, COVID-19, prevention tools, prevention strategies

Procedia PDF Downloads 113
6029 Data Clustering in Wireless Sensor Network Implemented on Self-Organization Feature Map (SOFM) Neural Network

Authors: Krishan Kumar, Mohit Mittal, Pramod Kumar

Abstract:

Wireless sensor network is one of the most promising communication networks for monitoring remote environmental areas. In this network, all the sensor nodes are communicated with each other via radio signals. The sensor nodes have capability of sensing, data storage and processing. The sensor nodes collect the information through neighboring nodes to particular node. The data collection and processing is done by data aggregation techniques. For the data aggregation in sensor network, clustering technique is implemented in the sensor network by implementing self-organizing feature map (SOFM) neural network. Some of the sensor nodes are selected as cluster head nodes. The information aggregated to cluster head nodes from non-cluster head nodes and then this information is transferred to base station (or sink nodes). The aim of this paper is to manage the huge amount of data with the help of SOM neural network. Clustered data is selected to transfer to base station instead of whole information aggregated at cluster head nodes. This reduces the battery consumption over the huge data management. The network lifetime is enhanced at a greater extent.

Keywords: artificial neural network, data clustering, self organization feature map, wireless sensor network

Procedia PDF Downloads 487
6028 General Principles of Accident Prevention in Built Environment Rehabilitation

Authors: Alfredo Soeiro

Abstract:

Rehabilitation in construction or built environment is a particular type of operations when concerning prevention of accidents. In fact, it is also a different type of task in construction itself. Therefore, due to the complex characteristics of construction rehabilitation tasks and due to the intrinsic difficulty of preventing accidents in construction, a major challenge faces the responsibility for implementing adequate safety levels in this type of safety management. This paper addresses a set of proposed generic measures to face the unknown characteristics of built environment in terms of stability, materials and actual performance of buildings or other constructions. It is also addressed the necessary adaptation of preventive guidelines to this type of delicate refurbishing and renovating of existing facilities. Training, observation and reflective approaches are necessary to perform this safety management in the rehabilitation of built environment.

Keywords: built environment, rehabilitation, construction safety, accident prevention, safety plan

Procedia PDF Downloads 179
6027 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 136
6026 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 380
6025 The Increase of Adolescent Obesity Rates after the COVID-19 Pandemic and Possible Obesity Prevention Programs for Implementation

Authors: Tatiana Pratt, Benyamin Hanasabzadeh, Panayiota Courelli

Abstract:

The COVID-19 pandemic is one of the largest global public health issues of this current century. COVID-19 puts people diagnosed with obesity at higher risk of not only contracting the virus but also being hospitalized and dying, making this a vital time to implement obesity prevention programs. However, COVID-19 is predicted to rapidly increase the obesity rate in the United States due to the mandatory sedentary lifestyle the pandemic demands; this is especially harmful to adolescent-aged children because it creates lifelong unhealthy habits and behaviors. Adolescent obesity prevention programs have been rigorously implemented throughout the last century to help diminish the ever-increasing adolescent obesity rate. Since the pandemic kept adolescents inside and away from in-person school, many programs have now become ineffective due to their in-person participation. Examples of in-person participation programs include school lunch programs, OSNAP and New Moves. Therefore, online programs or remote intervention measures are now more essential. This leads to programs such as Time2bHealthy, HEALTH[e]TEEN, and SWITCH should be looked at with more vitality. Adolescents have intertwined their lives with technology and screen usage. Therefore, online and remote prevention programs will continue to play a large role in the post-pandemic era. This literature review will be reviewing past and current adolescent obesity prevention programs and their effectiveness with the new remote, sedentary lifestyle adolescents. Furthermore, it will suggest new ways to more productively decrease adolescent obesity rates by analyzing the harmful factors that COVID-19 introduced into their lifestyles.

Keywords: adolescent, obesity, overweight, COVID-19, preventative care, public health, public policy, obesity prevention programs, online programs

Procedia PDF Downloads 203
6024 Effectiveness of Cranberry Ingesting for Prevention of Urinary Tract Infection: A Systematic Review and Meta-Analysis of Randomized Controlled Trials

Authors: Yu-Chieh Huang, Pei-Shih Chen, Tao-Hsin Tung

Abstract:

Background: Urinary tract infection is the most common bacterial infection to our best knowledge. Objective: This study is to investigate whether cranberry ingesting could improve the urinary tract infection. Methods: We searched the PubMed and Cochrane Library for relevant randomized controlled trials without language limitations between 9 March 1994 and June 30, 2017, with a priori defined inclusion and exclusion criteria. The search terms included (cranberry OR Vaccinium macrocarpon OR Vaccinium oxy-coccus OR Vaccinium microcarpum OR Vaccinium erythrocarpum OR Vaccinium) AND (urinary tract infection OR bacteriuria OR pyuria) AND (effect OR effective-ness OR efficacy) AND (random OR randomized). Results: There were 26 studies met the selection criteria included among 4709 eligible participants. We analyzed all trials in meta-analysis. The random-effects pooled risk ratio (RR) for the group using cranberry versus using placebo was 0.75; 95%CI[0.63, 0.880]; p-value=0.0002) and heterogeneity was 56%. Furthermore, we divided the subjects into different subgroup to analysis. Ingesting cranberry seemed to be more effective in some subgroups, including the patients with recurrent UTI (RR, 0.71; 95%CI[0.54,0.93]; p-value=0.002) (I²= 65%) and female population (RR, 0.73, 95%CI[0.58,0.92]; p-value=0.002) (I²= 59%). The prevention effect was not different between cranberry and trimethoprim (RR, 1.25, 95%CI[0.67, 2.33]; p-value=0.49) (I²= 68%). No matter the forms of cranberry were capsules or juice, the efficacy was useful. Conclusions: It is showed that cranberry ingesting is usefully associated with prevention UTI. There are more effective in prevention of UTI in some groups.

Keywords: cranberry, effectiveness, prevention, urinary tract infect

Procedia PDF Downloads 361
6023 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 292
6022 Prediction of Oil Recovery Factor Using Artificial Neural Network

Authors: O. P. Oladipo, O. A. Falode

Abstract:

The determination of Recovery Factor is of great importance to the reservoir engineer since it relates reserves to the initial oil in place. Reserves are the producible portion of reservoirs and give an indication of the profitability of a field Development. The core objective of this project is to develop an artificial neural network model using selected reservoir data to predict Recovery Factors (RF) of hydrocarbon reservoirs and compare the model with a couple of the existing correlations. The type of Artificial Neural Network model developed was the Single Layer Feed Forward Network. MATLAB was used as the network simulator and the network was trained using the supervised learning method, Afterwards, the network was tested with input data never seen by the network. The results of the predicted values of the recovery factors of the Artificial Neural Network Model, API Correlation for water drive reservoirs (Sands and Sandstones) and Guthrie and Greenberger Correlation Equation were obtained and compared. It was noted that the coefficient of correlation of the Artificial Neural Network Model was higher than the coefficient of correlations of the other two correlation equations, thus making it a more accurate prediction tool. The Artificial Neural Network, because of its accurate prediction ability is helpful in the correct prediction of hydrocarbon reservoir factors. Artificial Neural Network could be applied in the prediction of other Petroleum Engineering parameters because it is able to recognise complex patterns of data set and establish a relationship between them.

Keywords: recovery factor, reservoir, reserves, artificial neural network, hydrocarbon, MATLAB, API, Guthrie, Greenberger

Procedia PDF Downloads 410
6021 Perception of Nurses and Caregivers on Fall Preventive Management for Hospitalized Children Based on Ecological Model

Authors: Mirim Kim, Won-Oak Oh

Abstract:

Purpose: The purpose of this study was to identify hospitalized children's fall risk factors, fall prevention status and fall prevention strategies recognized by nurses and caregivers of hospitalized children and present an ecological model for fall preventive management in hospitalized children. Method: The participants of this study were 14 nurses working in medical institutions and having more than one year of child care experience and 14 adult caregivers of children under 6 years of age receiving inpatient treatment at a medical institution. One to one interview was attempted to identify their perception of fall preventive management. Transcribed data were analyzed through latent content analysis method. Results: Fall risk factors in hospitalized children were 'unpredictable behavior', 'instability', 'lack of awareness about danger', 'lack of awareness about falls', 'lack of child control ability', 'lack of awareness about the importance of fall prevention', 'lack of sensitivity to children', 'untidy environment around children', 'lack of personalized facilities for children', 'unsafe facility', 'lack of partnership between healthcare provider and caregiver', 'lack of human resources', 'inadequate fall prevention policy', 'lack of promotion about fall prevention', 'a performanceism oriented culture'. Fall preventive management status of hospitalized children were 'absence of fall prevention capability', 'efforts not to fall', 'blocking fall risk situation', 'limit the scope of children's activity when there is no caregiver', 'encourage caregivers' fall prevention activities', 'creating a safe environment surrounding hospitalized children', 'special management for fall high risk children', 'mutual cooperation between healthcare providers and caregivers', 'implementation of fall prevention policy', 'providing guide signs about fall risk'. Fall preventive management strategies of hospitalized children were 'restrain dangerous behavior', 'inspiring awareness about fall', 'providing fall preventive education considering the child's eye level', 'efforts to become an active subject of fall prevention activities', 'providing customed fall prevention education', 'open communication between healthcare providers and caregivers', 'infrastructure and personnel management to create safe hospital environment', 'expansion fall prevention campaign', 'development and application of a valid fall assessment instrument', 'conversion of awareness about safety'. Conclusion: In this study, the ecological model of fall preventive management for hospitalized children reflects various factors that directly or indirectly affect the fall prevention of hospitalized children. Therefore, these results can be considered as useful baseline data for developing systematic fall prevention programs and hospital policies to prevent fall accident in hospitalized children. Funding: This study was funded by the National Research Foundation of South Korea (grant number NRF-2016R1A2B1015455).

Keywords: fall down, safety culture, hospitalized children, risk factors

Procedia PDF Downloads 137
6020 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 637
6019 Suicide Prevention among Young People: Findings from the Evaluation of Youth Aware of Mental Health in Australian Secondary Schools

Authors: Lauren McGillivray, Michelle Torok, Alison Calear

Abstract:

Suicide is the leading cause of death for Australians aged 15-24 years, with rates increasing over the past decade. As young people can be particularly vulnerable to mental health problems and suicidal behavior, they are an essential and obvious target for suicide prevention efforts. This study investigates the effectiveness of the universal mental health promotion and suicide prevention program, Youth Aware of Mental Health (YAM), to reduce suicidal ideation and attempts and increase help-seeking in young people. This trial took place in Australian schools across four regions in New South Wales that form part of LifeSpan, a larger multilevel suicide prevention research trial. The YAM program was delivered to Year 9 students in up to 78 schools over two years (from January 2017 to December 2019). All schools were invited to participate in YAM's evaluation, which included completing a student questionnaire at three time-points: baseline, 3-month post-intervention, and 6-month follow-up. The primary outcome is suicidal ideation severity. Secondary outcomes are new reports of suicide attempts, stigma towards suicide, knowledge about suicide, help-seeking intentions and behaviors, and depressive symptoms. Results from pre-post and follow-up data will be presented. These research findings are promising and will contribute to the evidence-based for YAM and suicide prevention programs in Australian schools. These findings are also expected to promote YAM's value and sustainability to be more widely delivered in Australian secondary schools.

Keywords: adolescent mental health, suicidal ideation, suicide prevention, universal program

Procedia PDF Downloads 107
6018 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 372
6017 Person Re-Identification using Siamese Convolutional Neural Network

Authors: Sello Mokwena, Monyepao Thabang

Abstract:

In this study, we propose a comprehensive approach to address the challenges in person re-identification models. By combining a centroid tracking algorithm with a Siamese convolutional neural network model, our method excels in detecting, tracking, and capturing robust person features across non-overlapping camera views. The algorithm efficiently identifies individuals in the camera network, while the neural network extracts fine-grained global features for precise cross-image comparisons. The approach's effectiveness is further accentuated by leveraging the camera network topology for guidance. Our empirical analysis on benchmark datasets highlights its competitive performance, particularly evident when background subtraction techniques are selectively applied, underscoring its potential in advancing person re-identification techniques.

Keywords: camera network, convolutional neural network topology, person tracking, person re-identification, siamese

Procedia PDF Downloads 49
6016 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis

Authors: Sanchai Ratthanakwan

Abstract:

This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.

Keywords: urban poor, social welfare, Bangkok metropolis, housing stability

Procedia PDF Downloads 399
6015 Performance Analysis of ERA Using Fuzzy Logic in Wireless Sensor Network

Authors: Kamalpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the main limitation is generally inimitable energy consumption during processing of the sensor nodes. Cluster head (CH) election is one of the main issues that can reduce the energy consumption. Therefore, discovering energy saving routing protocol is the focused area for research. In this paper, fuzzy-based energy aware routing protocol is presented, which enhances the stability and network lifetime of the network. Fuzzy logic ensures the well-organized selection of CH by taking four linguistic variables that are concentration, energy, centrality, and distance to base station (BS). The results show that the proposed protocol shows better results in requisites of stability and throughput of the network.

Keywords: ERA, fuzzy logic, network model, WSN

Procedia PDF Downloads 242
6014 3D Object Model Reconstruction Based on Polywogs Wavelet Network Parametrization

Authors: Mohamed Othmani, Yassine Khlifi

Abstract:

This paper presents a technique for compact three dimensional (3D) object model reconstruction using wavelet networks. It consists to transform an input surface vertices into signals,and uses wavelet network parameters for signal approximations. To prove this, we use a wavelet network architecture founded on several mother wavelet families. POLYnomials WindOwed with Gaussians (POLYWOG) wavelet families are used to maximize the probability to select the best wavelets which ensure the good generalization of the network. To achieve a better reconstruction, the network is trained several iterations to optimize the wavelet network parameters until the error criterion is small enough. Experimental results will shown that our proposed technique can effectively reconstruct an irregular 3D object models when using the optimized wavelet network parameters. We will prove that an accurateness reconstruction depends on the best choice of the mother wavelets.

Keywords: 3d object, optimization, parametrization, polywog wavelets, reconstruction, wavelet networks

Procedia PDF Downloads 256
6013 An Analysis on the Appropriateness and Effectiveness of CCTV Location for Crime Prevention

Authors: Tae-Heon Moon, Sun-Young Heo, Sang-Ho Lee, Youn-Taik Leem, Kwang-Woo Nam

Abstract:

This study aims to investigate the possibility of crime prevention through CCTV by analyzing the appropriateness of the CCTV location, whether it is installed in the hotspot of crime-prone areas, and exploring the crime prevention effect and transition effect. The real crime and CCTV locations of case city were converted into the spatial data by using GIS. The data was analyzed by hotspot analysis and weighted displacement quotient(WDQ). As study methods, it analyzed existing relevant studies for identifying the trends of CCTV and crime studies based on big data from 1800 to 2014 and understanding the relation between CCTV and crime. Second, it investigated the current situation of nationwide CCTVs and analyzed the guidelines of CCTV installation and operation to draw attention to the problems and indicating points of domestic CCTV use. Third, it investigated the crime occurrence in case areas and the current situation of CCTV installation in the spatial aspects, and analyzed the appropriateness and effectiveness of CCTV installation to suggest a rational installation of CCTV and the strategic direction of crime prevention. The results demonstrate that there was no significant effect in the installation of CCTV on crime prevention. This indicates that CCTV should be installed and managed in a more scientific way reflecting local crime situations. In terms of CCTV, the methods of spatial analysis such as GIS, which can evaluate the installation effect, and the methods of economic analysis like cost-benefit analysis should be developed. In addition, these methods should be distributed to local governments across the nation for the appropriate installation of CCTV and operation. This study intended to find a design guideline of the optimum CCTV installation. In this regard, this study is meaningful in that it will contribute to the creation of a safe city.

Keywords: CCTV, safe city, crime prevention, spatial analysis

Procedia PDF Downloads 412
6012 Effects, Causes, and Prevention of Teen Dating Violence

Authors: Isabel Jones

Abstract:

As adolescence is a formative time, experiences during adolescence often affect the rest of one’s life. Therefore, dating, specifically violence in dating, can have lasting effects on the rest of one’s life. In order to find sources, searches were conducted on PsycINFO, specifically EBSCO, and narrowed down under the criteria that the source contained information about adolescent dating violence rather than adult, and focused on causes, effects, or prevention methods. This literature review examines research regarding the effects and causes of TDV, and then what methods are effective in the prevention of TDV development. This will allow for a clear image of how these prevention methods are effective and why they are important. Effects of TDV extend beyond the physical, including psychological and sexual long-lasting effects. These are caused by a number of concepts, including learned behavior, inhibitory issues/substance abuse, and cultural factors. When both of these are taken into account, preventative measures such as school-based interventions, parental/adult monitoring, and the presence of positive family examples are more clear as to their effectiveness. This literature review may provide further awareness to this public health crisis and give the public a view of how adolescents are affected by TDV on their path from child to adult.

Keywords: adolescence, dating violence, risk factors, predictors, relationship

Procedia PDF Downloads 40
6011 Study on the Characteristics of Chinese Urban Network Space from the Perspective of Innovative Collaboration

Authors: Wei Wang, Yilun Xu

Abstract:

With the development of knowledge economy era, deepening the mechanism of cooperation and adhering to sharing and win-win cooperation has become new direction of urban development nowadays. In recent years, innovative collaborations between cities are becoming more and more frequent, whose influence on urban network space has aroused many scholars' attention. Taking 46 cities in China as the research object, the paper builds the connectivity of innovative network between cities and the linkages of urban external innovation using patent cooperation data among cities, and explores urban network space in China by the application of GIS, which is a beneficial exploration to the study of social network space in China in the era of information network. The result shows that the urban innovative network space and geographical entity space exist differences, and the linkages of external innovation are not entirely related to the city innovative capacity and the level of economy development. However, urban innovative network space and geographical entity space are similar in hierarchical clustering. They have both formed Beijing-Tianjin-Hebei, Yangtze River Delta, Pearl River Delta three metropolitan areas and Beijing-Shenzhen-Shanghai-Hangzhou four core cities, which lead the development of innovative network space in China.

Keywords: innovative collaboration, urban network space, the connectivity of innovative network, the linkages of external innovation

Procedia PDF Downloads 154
6010 Systematic Review: Examining Teacher-Led Prevention Programs to Address Behavioral Concerns in Students

Authors: Mika Kaufman

Abstract:

Behavioral health in school-age children is a great concern. Negative behaviors can affect mental and physical health and, if ignored, can lead to further problems later in life. Rural communities often lack resources for counselors, social workers, and mental health care in the hopes of intervening with children who exhibit negative behaviors. Because of this, schools in rural communities are more likely to have children with behavioral issues. Prevention programs to recognize and address these behavioral concerns can educate teachers about mental health, different negative behaviors that students might exhibit, and how to manage those behaviors and engage with students in a positive way.

Keywords: prevention programs, behavioral health, resources for teachers, rural schools

Procedia PDF Downloads 44
6009 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 416
6008 Cellular Mobile Telecommunication GSM Radio Base Station Network Planning

Authors: Saeed Alzahrani, Yaser Miaji

Abstract:

The project involves the design and simulation of a Mobile Cellular Telecommunication Network using the software tool CelPlanner. The design is mainly concerned with Global System for Mobile Communications . The design and simulation of the network is done for a small part of the area allocated for us in the terrain area of Shreveport city .The project is concerned with designing a network that is cost effective and which also efficiently meets the required Grade of Service (GOS) AND Quality of Service (QOS).The expected outcome of this project is the design of a network that gives a good coverage for the area allocated to us with minimum co-channel interference and adjacent channel interference. The Handover and Traffic Handling Capacity should also be taken into consideration and should be good for the given area . The Traffic Handling Capacity of the network in a way decides whether the designed network is good or bad . The design also takes into consideration the topographical and morphological information.

Keywords: mobile communication, GSM, radio base station, network planning

Procedia PDF Downloads 414
6007 Best Practice for Post-Operative Surgical Site Infection Prevention

Authors: Scott Cavinder

Abstract:

Surgical site infections (SSI) are a known complication to any surgical procedure and are one of the most common nosocomial infections. Globally it is estimated 300 million surgical procedures take place annually, with an incidence of SSI’s estimated to be 11 of 100 surgical patients developing an infection within 30 days after surgery. The specific purpose of the project is to address the PICOT (Problem, Intervention, Comparison, Outcome, Time) question: In patients who have undergone cardiothoracic or vascular surgery (P), does implementation of a post-operative care bundle based on current EBP (I) as compared to current clinical agency practice standards (C) result in a decrease of SSI (O) over a 12-week period (T)? Synthesis of Supporting Evidence: A literature search of five databases, including citation chasing, was performed, which yielded fourteen pieces of evidence ranging from high to good quality. Four common themes were identified for the prevention of SSI’s including use and removal of surgical dressings; use of topical antibiotics and antiseptics; implementation of evidence-based care bundles, and implementation of surveillance through auditing and feedback. The Iowa Model was selected as the framework to help guide this project as it is a multiphase change process which encourages clinicians to recognize opportunities for improvement in healthcare practice. Practice/Implementation: The process for this project will include recruiting postsurgical participants who have undergone cardiovascular or thoracic surgery prior to discharge at a Northwest Indiana Hospital. The patients will receive education, verbal instruction, and return demonstration. The patients will be followed for 12 weeks, and wounds assessed utilizing the National Healthcare Safety Network//Centers for Disease Control (NHSN/CDC) assessment tool and compared to the SSI rate of 2021. Key stakeholders will include two cardiovascular surgeons, four physician assistants, two advance practice nurses, medical assistant and patients. Method of Evaluation: Chi Square analysis will be utilized to establish statistical significance and similarities between the two groups. Main Results/Outcomes: The proposed outcome is the prevention of SSIs in the post-op cardiothoracic and vascular patient. Implication/Recommendation(s): Implementation of standardized post operative care bundles in the prevention of SSI in cardiovascular and thoracic surgical patients.

Keywords: cardiovascular, evidence based practice, infection, post-operative, prevention, thoracic, surgery

Procedia PDF Downloads 60
6006 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 414