Search results for: public order and security act
18679 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH
Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung
Abstract:
In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality
Procedia PDF Downloads 30418678 Digital Cinema Watermarking State of Art and Comparison
Authors: H. Kelkoul, Y. Zaz
Abstract:
Nowadays, the vigorous popularity of video processing techniques has resulted in an explosive growth of multimedia data illegal use. So, watermarking security has received much more attention. The purpose of this paper is to explore some watermarking techniques in order to observe their specificities and select the finest methods to apply in digital cinema domain against movie piracy by creating an invisible watermark that includes the date, time and the place where the hacking was done. We have studied three principal watermarking techniques in the frequency domain: Spread spectrum, Wavelet transform domain and finally the digital cinema watermarking transform domain. In this paper, a detailed technique is presented where embedding is performed using direct sequence spread spectrum technique in DWT transform domain. Experiment results shows that the algorithm provides high robustness and good imperceptibility.Keywords: digital cinema, watermarking, wavelet DWT, spread spectrum, JPEG2000 MPEG4
Procedia PDF Downloads 25118677 Social Media Factor in Security Environment
Authors: Cetin Arslan, Senol Tayan
Abstract:
Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.Keywords: democracy, disorder, security, Social Media
Procedia PDF Downloads 36718676 Health as an Agenda in Indian Politics: A Study of Election Manifestos in 16th General Elections
Authors: Kiran Bala
Abstract:
Health, education and employment opportunities available for a common citizen reflect the development status of a country. Health of an individual affects the growth of a country in every aspect. According to a study by WHO, India is estimated to lose more than $237 billion of its GDP over the period 2006-15 on account of premature death and morbidity from Non-communicable diseases alone. Each year 37 million people fall below poverty line due to high expenditure on health services they have to incur. Falling sick puts a double burden on them in terms of loss of income and expenditure on health care which pushes them further into debt and poverty. Adding to the gravity of situation, public spending on health in India has itself declined after liberalization from 1.3% of GDP in 1990 to 0.9% in 1999. The Approach Paper of the Government of India to the Twelfth Five Year Plan indicated that health expenditure alone as a per cent of GDP was about 1.4 per cent (B.E.) in 2011-12. It also mentioned that if one included expenditure on rural water supply and sanitation, the figure would be about 1.8 per cent. Given the abysmally low level of priority accorded to health in Indian economic policy, it becomes rather important to study the representation of health in the Indian public sphere. To this end, this study examines the prioritization of health in the public policy agenda of the national/regional political parties as evidenced in their election manifestos at a time when the nation is poised to go for the General Elections. The paper also focuses attention on the prioritization of health in the public perception as evidenced in their reasons for their preferences for a particular party or individual contestant. To arrive at the reasons for the priority level accorded by the political actors and the citizens, the study uses Focus groups of health policy makers, media persons, medical practitioners and voters. Collected data will be analysed in the theoretical framework of spiral of silence and agenda setting theory.Keywords: health, election manifestos, public perception, policies
Procedia PDF Downloads 35618675 Classroom Incivility Behaviours among Medical Students: A Comparative Study in Pakistan
Authors: Manal Rauf
Abstract:
Trained medical practitioners are produced from medical colleges serving in public and private sectors. Prime responsibility of teaching faculty is to inculcate required work ethic among the students by serving as role models for them. It is an observed fact that classroom incivility behaviours are providing a friction in achieving these targets. Present study aimed at identification of classroom incivility behaviours observed by teachers and students of public and private medical colleges as per Glasser’s Choice Theory, making a comparison and investigating the strategies being adopted by teachers of both sectors to control undesired class room behaviours. Findings revealed that a significant difference occurs between teacher and student incivility behaviours. Public sector teacher focussed on survival as a strong factor behind in civil behaviours whereas private sector teachers considered power as the precedent for incivility. Teachers of both sectors are required to use verbal as well as non-verbal immediacy to reach a healthy leaning environment.Keywords: classroom incivility behaviour, glasser choice theory, Mehrabian immediacy theory
Procedia PDF Downloads 24118674 Technological Challenges for First Responders in Civil Protection; the RESPOND-A Solution
Authors: Georgios Boustras, Cleo Varianou Mikellidou, Christos Argyropoulos
Abstract:
Summer 2021 was marked by a number of prolific fires in the EU (Greece, Cyprus, France) as well as outside the EU (USA, Turkey, Israel). This series of dramatic events have stretched national civil protection systems and first responders in particular. Despite the introduction of National, Regional and International frameworks (e.g. rescEU), a number of challenges have arisen, not only related to climate change. RESPOND-A (funded by the European Commission by Horizon 2020, Contract Number 883371) introduces a unique five-tier project architectural structure for best associating modern telecommunications technology with novel practices for First Responders of saving lives, while safeguarding themselves, more effectively and efficiently. The introduced architecture includes Perception, Network, Processing, Comprehension, and User Interface layers, which can be flexibly elaborated to support multiple levels and types of customization, so, the intended technologies and practices can adapt to any European Environment Agency (EEA)-type disaster scenario. During the preparation of the RESPOND-A proposal, some of our First Responder Partners expressed the need for an information management system that could boost existing emergency response tools, while some others envisioned a complete end-to-end network management system that would offer high Situational Awareness, Early Warning and Risk Mitigation capabilities. The intuition behind these needs and visions sits on the long-term experience of these Responders, as well, their smoldering worry that the evolving threat of climate change and the consequences of industrial accidents will become more frequent and severe. Three large-scale pilot studies are planned in order to illustrate the capabilities of the RESPOND-A system. The first pilot study will focus on the deployment and operation of all available technologies for continuous communications, enhanced Situational Awareness and improved health and safety conditions for First Responders, according to a big fire scenario in a Wildland Urban Interface zone (WUI). An important issue will be examined during the second pilot study. Unobstructed communication in the form of the flow of information is severely affected during a crisis; the flow of information between the wider public, from the first responders to the public and vice versa. Call centers are flooded with requests and communication is compromised or it breaks down on many occasions, which affects in turn – the effort to build a common operations picture for all firstr esponders. At the same time the information that reaches from the public to the operational centers is scarce, especially in the aftermath of an incident. Understandably traffic if disrupted leaves no other way to observe but only via aerial means, in order to perform rapid area surveys. Results and work in progress will be presented in detail and challenges in relation to civil protection will be discussed.Keywords: first responders, safety, civil protection, new technologies
Procedia PDF Downloads 14518673 A Critical Review of Mechanization in Rice Farming in Indonesia
Authors: K. Suheiti, P. Soni, Yardha
Abstract:
Challenges ahead of Indonesian agricultural development include increasing rural welfare, food needs, and the provision of employment through resource optimization that are laid out in agribusiness system. The agricultural system also responsive to the changing strategic environment. However, mounting pressure of population increase and changes in land-uses, require intensive use of agricultural land with modern agricultural machinery. Similarly, environmentally friendly technologies should continue to be developed in an effort to build and develop a good farming practice model. This paper explains the development of agricultural mechanization in Indonesia, particularly on rice production. The method of the research was analyze secondary data, tabulation and interpretation. The result showed, there was a variety of tools and agricultural machinery that have been produced and used by farmers to support national food security. The role of mechanization was needed to support national rice production and food security achievement.Keywords: farming, Indonesia, mechanization, rice
Procedia PDF Downloads 49718672 Insights on Behavior of Tunisian Auditors
Authors: Dammak Saida, Mbarek Sonia
Abstract:
This paper aims to examine the impact of public interest commitment, the attitude towards independence enforcement, and organizational ethical culture on auditors' ethical behavior. It also tests the moderating effect of gender diversity on these relationships. The sample consisted of 100 Tunisian chartered accountants. An online survey was used to collect the data. Data analysis techniques used to test hypotheses The findings of this study provide practical implications for accounting professionals, regulators, and audit firms as they help understand auditors' beliefs and behaviors, which implies more effective mechanisms for improving their ethical values.Keywords: public interest, independence, organizational culture, professional behavior, Tunisian auditors
Procedia PDF Downloads 7818671 The Emancipation of the Inland Areas Between Depopulation, Smart Community and Living Labs: A Case Study of Sardinia
Authors: Daniela Pisu
Abstract:
The paper deals with the issue of territorial inequalities focused on the gap of the marginalization of inland areas with respect to the centrality of urban centers as they are subjected to an almost unstoppable demographic hemorrhage in a context marked by the tendency to depopulation such as the Sardinian territory, to which are added further and intense phenomena of de-anthropization. The research question is aimed at exploring the functionality of the interventions envisaged by the Piano Nazionale Ripresa Resilienza for the reduction of territorial imbalances in these areas to the extent that it is possible to identify policy strategies aimed at increasing the relational expertise of citizenship, functional to the consolidation of results in a long-term perspective. In order to answer this question, the qualitative case study on the Municipality of Ulàssai (province of Nuoro) is highlighted as the only winner on the island, with the Pilot Project ‘Where nature meets art’, intended for the cultural and social regeneration of small towns. The main findings, which emerged from the analysis of institutional sources and secondary data, highlight the socio-demographic fragility of the territory in the face of the active institutional commitment to make Ulàssai a smart community, starting from the enhancement of natural resources and the artistic heritage of fellow citizen Maria Lai. The findings drawn from the inspections and focus groups with the youth population present the aforementioned project as a generative opportunity for both the economic and social fabric, leveraging the public debates of the living labs, where the process of public communication becomes the main vector for the exercise of the rights of participatory democracy. The qualitative lunge leads to the conclusion that the repercussions envisaged by the PNRR in internal areas will be able to show their self-sustainable effect through colloquial administrations such as that of Ulàssai, capable of seeing in the interactive paradigm of public communication that natural process with which to reduce that historical sense of extraneousness attributed to the institution-citizenship relationship.Keywords: social labs, smart community, depopulation, Sardinia, Piano Nazionale di Ripresa e Resilienza
Procedia PDF Downloads 4318670 Critical Reflection in Teaching and Learning Mathematics towards Perspective Transformation: Practices in Public and Private Schools
Authors: Arturo Tobias Calizon Jr.
Abstract:
The study investigated the practices in critical reflection being employed in teaching and learning mathematics in public and private schools for students to achieve perspective transformation in psychological, convictional and behavioral dimensions. There were 1,969 senior high school and college student-respondents selected at random from 33 schools. Process reflection is most commonly practiced in both public and private schools. Convictional dimension of perspective transformation is most frequently achieved. There is no significant difference in practices of process reflection between senior high school and college students. However, there is a significant difference in perspective transformation in behavioral dimension achieved by students from public and private schools. Also, there are significant differences in psychological, convictional and behavioral dimensions of perspective transformation achieved by senior high school and college students. There is a high and significant relationship between critical reflection practices and perspective transformation of students. The researcher concludes that there are teaching strategies that facilitate critical thinking, and there are learning activities that alter perspective of students about mathematics as an abstract field. The researcher further concludes that consistent use of appropriate teaching and learning activities could bring about perspective transformation in students with success.Keywords: critical reflection, perspective transformation, process reflection, convictional dimension, teaching and learning mathematics
Procedia PDF Downloads 15718669 Constant Order Predictor Corrector Method for the Solution of Modeled Problems of First Order IVPs of ODEs
Authors: A. A. James, A. O. Adesanya, M. R. Odekunle, D. G. Yakubu
Abstract:
This paper examines the development of one step, five hybrid point method for the solution of first order initial value problems. We adopted the method of collocation and interpolation of power series approximate solution to generate a continuous linear multistep method. The continuous linear multistep method was evaluated at selected grid points to give the discrete linear multistep method. The method was implemented using a constant order predictor of order seven over an overlapping interval. The basic properties of the derived corrector was investigated and found to be zero stable, consistent and convergent. The region of absolute stability was also investigated. The method was tested on some numerical experiments and found to compete favorably with the existing methods.Keywords: interpolation, approximate solution, collocation, differential system, half step, converges, block method, efficiency
Procedia PDF Downloads 34118668 The Effects of Racial Cohesion among White and Maori Populations on Healthcare in New Zealand
Authors: Thomas C. Nash
Abstract:
New Zealand has a small, yet racially diverse, population of only 4.6 million people, consisting of a majority European immigrant population and a large indigenous Maori population. Because disparities in healthcare often exist among minority populations, it could be expected that the White and Maori populations of New Zealand would have unequal access to healthcare. In order to understand the ways these disparities may present themselves, it became important to travel to New Zealand in order to interview both Western and natural healthcare professionals, public health officials, health activists and Maori people. In observing the various mechanisms within the New Zealand healthcare system, some stand out as effective ways of alleviating the racial disparities often seen in healthcare. These include the efficiency of regional District Health Boards, the benefits of individuals making decisions regarding their treatment plans and the importance of cohesion among the Maori and White populations. In forming a conclusion around these observations, it is evident that the integration of Maori culture into contemporary New Zealand has benefited the healthcare system. This unity has generated support for non-Western medical treatments, in turn forming a healthcare system that creates low barriers to entry for non-traditional forms of healthcare. These low barriers allow individuals to allocate available healthcare resources in ways that are most beneficial for them and are consistent with their tastes and preferences, maximizing efficiency.Keywords: alternative and complementary healthcare, low barriers to entry, Maori populations, racial cohesion
Procedia PDF Downloads 19718667 The Walkway Project: An Exploration of Informal Public Space Upgrading in Gugulethu, Cape Town
Authors: Kathryn Ewing
Abstract:
Safe and accessible public spaces are vital elements of our South African cities. Public spaces hold the potential to act as important, vibrant places for learning, exchange, and practice. Public walkways, however, are some of the most neglected and extremely dangerous public spaces experienced in the local neighborhood of Gugulethu in Cape Town. Walkways feel insignificant, being recognized as informal and undetermined or retain complex fragments of formal erven. They are generally out of sight connecting minor streets and informal settlements. Community residents refer to the walkways as unsafe and dirty spaces. Local authorities allocate minimal to no municipal budgets nor maintenance plans resulting in a lack of basic services, particularly lighting and green infrastructure. ‘The Walkway Project’ presents a series of urban stories collected from co-design workshops, emotional mapping exercises, and fieldwork, including urban walks and urban talks. The narrative interprets the socio-spatial practice and complexity of informal public space in Gugulethu, Cape Town. The Walkway Project research, interrelated to the Master of Urban Design teaching and design-research studio, has a strong focus on participatory and engaged learning and action research methodology within a deliberate pedagogy. A consolidated urban design implementation plan exposes the impact and challenges of waste and water, opening the debate on relevant local solutions for resilience and safety in Cape Town. A small and neglected passage connecting two streets, commonly referred to as iThemba Walkway, is presented as a case study to show-case strategic urban design intervention strategies for urban upgrading. The iThemba walkway is a community-driven project that demonstrates active and responsible co-design and participatory development opportunities. In March 2021, when visited on an urban walk, the public space was covered by rubble and solid waste. By April 2021, the community cleaned the walkway and created an accessible passage for the school children to pass. Numerous co-design workshops have taken place over the past year. The walkway has emerged as a public space upgrading project facilitated, motivated, and implemented by multiple local partners and residents. Social maps from urban walks and talks illustrate the transformation of iThemba Walkway into an inclusive, safe, resilient, and sustainable urban space, linked to Sustainable Development Goal number 11, sustainable cities and communities. The outcomes of the upgrading project facilitate a deeper understanding of co-design methods, urban upgrading processes, and monitoring of public space and informal urbanism.Keywords: informal, public space, resilience, safety, upgrade, walkways
Procedia PDF Downloads 9618666 Commutativity of Fractional Order Linear Time-Varying Systems
Authors: Salisu Ibrahim
Abstract:
The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of MATLAB (Simulink).Keywords: fractional differential equation, physical systems, equivalent circuit, analog control
Procedia PDF Downloads 11618665 Introduction of Knowledge Management in a Public Sector Organization in India
Authors: Siddharth Vashisth, Varun Mathur
Abstract:
This review provides an overview of the impact that implementation of various Knowledge Management (KM) strategies has had on the growth of a department in a Public Sector Company in India. In a regulated utility controlled by the government, the growth of an organization such as Hindustan Petroleum Corporation Limited (HPCL) had depended largely on the efficiencies of the systems and its people. However, subsequent to the de-regularization & to the entry of the private competition, the need for a ‘systematic templating’ of knowledge was recognized. This necessitated the introduction of Knowledge Management Centre (KMC). Projects & Pipelines Department (P&P) of HPCL introduced KMC that contributed significantly towards KM by adopting various strategies such as standardization, leveraging information system, competency enhancement, and improvements & innovations. These strategies gave both tangible as well as intangible benefits towards KM. Knowledge, technology & people are the three pillars that need to be catered for effective knowledge management in any organization. In HPCL, the initiative of KMC has served as an intermediary between these three major pillars as each activity of the strategy was centered on them and contributed significantly to their growth and up-gradation, ensuring overall growth of KM in the department.Keywords: knowledge, knowledge management, public sector organization, standardization, technology, people, skill, information system, innovation, competency, impact
Procedia PDF Downloads 45518664 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 8218663 Commutativity of Fractional Order Linear Time-Varying System
Authors: Salisu Ibrahim
Abstract:
The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of Matlab (Simulink).Keywords: fractional differential equation, physical systems, equivalent circuit, and analog control
Procedia PDF Downloads 7918662 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 1918661 Application Reliability Method for Concrete Dams
Authors: Mustapha Kamel Mihoubi, Mohamed Essadik Kerkar
Abstract:
Probabilistic risk analysis models are used to provide a better understanding of the reliability and structural failure of works, including when calculating the stability of large structures to a major risk in the event of an accident or breakdown. This work is interested in the study of the probability of failure of concrete dams through the application of reliability analysis methods including the methods used in engineering. It is in our case, the use of level 2 methods via the study limit state. Hence, the probability of product failures is estimated by analytical methods of the type first order risk method (FORM) and the second order risk method (SORM). By way of comparison, a level three method was used which generates a full analysis of the problem and involves an integration of the probability density function of random variables extended to the field of security using the Monte Carlo simulation method. Taking into account the change in stress following load combinations: normal, exceptional and extreme acting on the dam, calculation of the results obtained have provided acceptable failure probability values which largely corroborate the theory, in fact, the probability of failure tends to increase with increasing load intensities, thus causing a significant decrease in strength, shear forces then induce a shift that threatens the reliability of the structure by intolerable values of the probability of product failures. Especially, in case the increase of uplift in a hypothetical default of the drainage system.Keywords: dam, failure, limit-state, monte-carlo, reliability, probability, simulation, sliding, taylor
Procedia PDF Downloads 32618660 Young Adult Males’ Attitudes, Perceptions and Behaviours in Regards to Male Condoms in Cambodia: A Qualitative Study
Authors: Rebecca Johnson, Elizabeth Hoban
Abstract:
Condom use among young men in Cambodia has declined between 2005 and 2014 which has public health implications such as increased risks of sexually transmitted infections, including HIV, and unplanned pregnancies. Conversations about sexual and reproductive health issues, including condom use, are not socially sanctioned in Cambodian society leaving young adults with limited knowledge of, and poor access to sexual and reproductive health services. Additionally, men play a dominant role in decision making regarding condom use within sexual partnerships. This study sought to fill a gap in knowledge by exploring young adult males’ attitudes, perceptions and behaviours regarding condom use. In February and March 2018, twenty young adult males, aged 18 to 24 years, were recruited from urban, peri urban and rural areas in Cambodia. The young adult males participated in a face-to-face semi structured interview that used an interview guide and photo elicitation method. The interview explored participants’ knowledge of sexual and reproductive health issues and efficacy, sexual behaviours, and use of condoms. Inductive thematic analysis was conducted and the following major themes emerged: understanding of reproduction, understanding of sexually transmitted infections, knowledge about condoms, condom use, access to condoms, and sexual behaviour. Participants’ knowledge of condoms and specific reasons for their use varied; most participants understood that condoms provide protection from sexually transmitted infections and prevent pregnancy. Stigma associated with condom access was consistently referred to as a problem and the main reason cited by young men for not using condoms during sexual intercourse. The perceived importance of condom use altered with partner type and relationship status, dependent upon the need for protection from sexually transmitted infections or pregnancy. Condoms were used for infection control in the context of multiple relationships, or as a contraceptive method for unmarried and some married couples. The majority of young men engaged in premarital sexual intercourse, of those men the many used condoms. The inconsistent use of condoms by young men in Cambodia is of public health concern because of the increased risk of sexually transmitted infections (including HIV), and unplanned pregnancy. Public health action is required in order to minimize long term health issues for individuals and the community. Health education is required to increase knowledge of condom use, sexually transmitted infections and HIV, and reduce the stigma associated with this topic. Sustainable health promotion programs are needed to increase ease of access to condoms for young people. Public health policy in Cambodia needs to be reviewed to improve sexual and reproductive health outcomes for young adults.Keywords: Cambodia, condom use, sexual and reproductive health, young adult males
Procedia PDF Downloads 13018659 Second-Order Slip Flow and Heat Transfer in a Long Isoflux Microchannel
Authors: Huei Chu Weng
Abstract:
This paper presents a study on the effect of second-order slip on forced convection through a long isoflux heated or cooled planar microchannel. The fully developed solutions of flow and thermal fields are analytically obtained on the basis of the second-order Maxwell-Burnett slip and local heat flux boundary conditions. Results reveal that when the average flow velocity increases or the wall heat flux amount decreases, the role of thermal creep becomes more insignificant, while the effect of second-order slip becomes larger. The second-order term in the Deissler slip boundary condition is found to contribute a positive velocity slip and then to lead to a lower pressure drop as well as a lower temperature rise for the heated-wall case or to a higher temperature rise for the cooled-wall case. These findings are contrary to predictions made by the Karniadakis slip model.Keywords: microfluidics, forced convection, thermal creep, second-order boundary conditions
Procedia PDF Downloads 31618658 Factors Influencing the Adoption of Social Media as a Medium of Public Service Broadcasting
Authors: Seyed Mohammadbagher Jafari, Izmeera Shiham, Masoud Arianfar
Abstract:
The increased usage of Social media for different uses in turn makes it important to develop an understanding of users and their attitudes toward these sites, and moreover, the uses of such sites in a broader perspective such as broadcasting. This quantitative study addressed the problem of factors influencing the adoption of social media as a medium of public service broadcasting in the Republic of Maldives. These powerful and increasingly usable tools, accompanied by large public social media datasets, are bringing in a golden age of social science by empowering researchers to measure social behavior on a scale never before possible. This was conducted by exploring social responses on the use of social media. Research model was developed based on the previous models such as TAM, DOI and Trust combined model. It evaluates the influence of perceived ease of use, perceived usefulness, trust, complexity, compatibility and relative advantage influence on the adoption of social Media. The model was tested on a sample of 365 Maldivian people using survey method via questionnaire. The result showed that perceived usefulness, trust, relative advantage and complexity would highly influence the adoption of social media.Keywords: adoption, broadcasting, maldives, social media
Procedia PDF Downloads 48518657 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 36118656 Efficient Internal Generator Based on Random Selection of an Elliptic Curve
Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
Abstract:
The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.Keywords: PRNG, security, cryptosystem, ECC
Procedia PDF Downloads 44718655 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19918654 Assessment of Drinking Water Quality in Relation to Arsenic Contamination in Drinking Water in Liberia: Achieving the Sustainable Development Goal of Ensuring Clean Water and Sanitation
Authors: Victor Emery David Jr., Jiang Wenchao, Daniel Mmereki, Yasinta John
Abstract:
The fundamentals of public health are access to safe and clean drinking water. The presence of arsenic and other contaminants in drinking water leads to the potential risk to public health and the environment particularly in most developing countries where there’s inadequate access to safe and clean water and adequate sanitation. Liberia has taken steps to improve its drinking water status so as to achieve the Sustainable Development Goals (SDGs) target of ensuring clean water and effective sanitation but there is still a lot to be done. The Sustainable Development Goals are a United Nation initiative also known as transforming our world: The 2030 agenda for sustainable development. It contains seventeen goals with 169 targets to be met by respective countries. Liberia is situated within in the gold belt region where there exist the presence of arsenic and other contaminants in the underground water due to mining and other related activities. While there are limited or no epidemiological studies conducted in Liberia to confirm illness or death as a result of arsenic contamination in Liberia, it remains a public health concern. This paper assesses the drinking water quality, the presence of arsenic in groundwater/drinking water in Liberia, and proposes strategies for mitigating contaminants in drinking water and suggests options for improvement with regards to achieving the Sustainable Development Goals of ensuring clean water and effective sanitation in Liberia by 2030.Keywords: arsenic, action plan, contaminants, environment, groundwater, sustainable development goals (SDGs), Monrovia, Liberia, public health, drinking water
Procedia PDF Downloads 26618653 Split Health System for Diabetes Care in Urban Area: Experience from an Action Research Project in an Urban Poor Neighborhood in Bengaluru
Authors: T. S. Beerenahally, S. Amruthavalli, C. M. Munegowda, Leelavathi, Nagarathna
Abstract:
Introduction: In majority of urban India, the health system is split between different authorities being responsible for the health care of urban population. We believe that, apart from poor awareness and financial barriers to care, there are other health system barriers which affect quality and access to care for people with diabetes. In this paper, we attempted to identify health system complexity that determines access to public health system for diabetes care in KG Halli, a poor urban neighborhood in Bengaluru. The KG Halli has been a locus of a health systems research from 2009 to 2015. Methodology: The source of data is from the observational field-notes written by research team as part of urban health action research project (UHARP). Field notes included data from the community and the public primary care center. The data was generated by the community health assistants and the other research team members during regular home visits and interaction with individuals who self-reported to be diabetic over four years as part of UHARP. Results: It emerged during data analysis that the patients were not keen on utilizing primary public health center for many reasons. Patient has felt that the service provided at the center was not integrated. There was lack of availability of medicines, with a regular stock out of medicines in a year and laboratory service for investigation was limited. Many of them said that the time given by the providers was not sufficient and there was also a feeling of providers not listening to them attentively. The power dynamics played a huge role in communication. Only the consultation was available for free of cost at the public primary care center. The patient had to spend for the investigations and the major portion for medicine. Conclusion: Diabetes is a chronic disease that poses an important emerging public health concern. Most of the financial burden is borne by the family as the public facilities have failed to provide free care in India. Our study indicated various factors including individual beliefs, stigma and financial constraints affecting compliance to diabetes care.Keywords: diabetes care, disintegrated health system, quality of care, urban health
Procedia PDF Downloads 16218652 Formulation of a Rapid Earthquake Risk Ranking Criteria for National Bridges in the National Capital Region Affected by the West Valley Fault Using GIS Data Integration
Authors: George Mariano Soriano
Abstract:
In this study, a Rapid Earthquake Risk Ranking Criteria was formulated by integrating various existing maps and databases by the Department of Public Works and Highways (DPWH) and Philippine Institute of Volcanology and Seismology (PHIVOLCS). Utilizing Geographic Information System (GIS) software, the above-mentioned maps and databases were used in extracting seismic hazard parameters and bridge vulnerability characteristics in order to rank the seismic damage risk rating of bridges in the National Capital Region.Keywords: bridge, earthquake, GIS, hazard, risk, vulnerability
Procedia PDF Downloads 41118651 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 15318650 Urban Design as a Tool to Address Safety in a Crime Ridden Area: A Case Study of Malviya Nagar, New Delhi
Authors: Shramana Mondal
Abstract:
As a city is growing in population, sprawl, and complexity, use of public spaces increases variably and thus ensuring safety for the people becomes an utmost priority. While active monitoring measures may be necessary in some places, urban design can play a major role in devising self-policing and encourage active public life. This paper aims to explore the various spatial and psychological reasons for the occurrence of crime and the role of ‘urban design’ to address this issue. In this research, the principles of urban design are examined, as well as projected on actual site by addressing the issue with urban design principles. In this review the sociological, psychological, typological and morphological factors are addressed which affect the safety of a space and the possible framing guidelines, controls and urban design strategies are explored to address a safe neighborhood. On the basis of statistical survey, the residential and street network of Malviya Nagar in Delhi is chosen as the area of demonstration. The programs inhibit a safe neighborhood and a movement network that are addressed based on the four principles of natural surveillance, territoriality, community building, and connectivity. The paper concludes with a discussion of the urban design as an effective tool by creating an intense active zone with mixed use feature to ensure throughout activity and also ensuring safe pedestrian zone by introducing sense of community feeling and territoriality thus achieving active, useful and public friendly space.Keywords: crime, public life, safety, urban design
Procedia PDF Downloads 402