Search results for: security laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3456

Search results for: security laws

1506 Social Reforms and the Welfare State in America after the New Deal (1945-1969)

Authors: Aziza Tahar Djebbar

Abstract:

Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.

Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms

Procedia PDF Downloads 443
1505 Disinformation’s Threats to Democracy in Central Africa: Case Studies from Cameroon and Central African Republic

Authors: Simont Toussi

Abstract:

Cameroon and the Central African Republic arebound by the provisions of many regional and international charters, which condemn the manipulation of information, obstacles to access reliable information, or the limitation of freedoms of expression and opinion. These two countries also have constitutional guarantees for free speech and access to true and liable information. However, they are yet to define specific policies and regulations for access to information, disinformation, or misinformation. Yet, certain countries’ laws and regulations related to information and communication technologies, to criminal procedures, to terrorism, or intelligence services contain provisions that rather hider human rights by condemning false information. Like many other African countries, Cameroon and the Central African Republic face a profound democratic regression, and governments use multiple methods to stifle online discourse and digital rights. Despite the increased uptake of digital tools for political participation, there is a lack of interactivity and adoption of these tools. This enables a scarcity of information and creates room for the spreading of disinformation in the public space, hamperingdemocracy and the respect for human rights. This research aims to analyse the adequacy of stakeholders’ responses to disinformation in Cameroon and the Central African Republic in periods of political contestation, such as elections and anti-government protests, to highlight the nature, perpetrators, strategies, and channels of disinformation, as well as its effects on democratic actors, including civil society, bloggers, government critics, activists, and other human rights defenders. The study follows a qualitative method with literature review, content analysis, andkey informant’sinterviews with stakeholders’ representatives, emphasized crowdsourcing as a data and information collecting method in the two countries.

Keywords: disinformation, democracy, political manipulation, social media, media, fake news, central Africa, cameroon, misinformation, free speech

Procedia PDF Downloads 91
1504 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 209
1503 The Use of Geographic Information System for Selecting Landfill Sites in Osogbo

Authors: Nureni Amoo, Sunday Aroge, Oluranti Akintola, Hakeem Olujide, Ibrahim Alabi

Abstract:

This study investigated the optimum landfill site in Osogbo so as to identify suitable solid waste dumpsite for proper waste management in the capital city. Despite an increase in alternative techniques for disposing of waste, landfilling remains the primary means of waste disposal. These changes in attitudes in many parts of the world have been supported by changes in laws and policies regarding the environment and waste disposal. Selecting the most suitable site for landfill can avoid any ecological and socio-economic effects. The increase in industrial and economic development, along with the increase of population growth in Osogbo town, generates a tremendous amount of solid waste within the region. Factors such as the scarcity of land, the lifespan of the landfill, and environmental considerations warrant that the scientific and fundamental studies are carried out in determining the suitability of a landfill site. The analysis of spatial data and consideration of regulations and accepted criteria are part of the important elements in the site selection. This paper presents a multi-criteria decision-making method using geographic information system (GIS) with the integration of the fuzzy logic multi-criteria decision making (FMCDM) technique for landfill suitability site evaluation. By using the fuzzy logic method (classification of suitable areas in the range of 0 to 1 scale), the superposing of the information layers related to drainage, soil, land use/land cover, slope, land use, and geology maps were performed in the study. Based on the result obtained in this study, five (5) potential sites are suitable for the construction of a landfill are proposed, two of which belong to the most suitable zone, and the existing waste disposal site belonged to the unsuitable zone.

Keywords: fuzzy logic multi-criteria decision making, geographic information system, landfill, suitable site, waste disposal

Procedia PDF Downloads 127
1502 A Study of Safety of Data Storage Devices of Graduate Students at Suan Sunandha Rajabhat University

Authors: Komol Phaisarn, Natcha Wattanaprapa

Abstract:

This research is a survey research with an objective to study the safety of data storage devices of graduate students of academic year 2013, Suan Sunandha Rajabhat University. Data were collected by questionnaire on the safety of data storage devices according to CIA principle. A sample size of 81 was drawn from population by purposive sampling method. The results show that most of the graduate students of academic year 2013 at Suan Sunandha Rajabhat University use handy drive to store their data and the safety level of the devices is at good level.

Keywords: security, safety, storage devices, graduate students

Procedia PDF Downloads 337
1501 Speaker Recognition Using LIRA Neural Networks

Authors: Nestor A. Garcia Fragoso, Tetyana Baydyk, Ernst Kussul

Abstract:

This article contains information from our investigation in the field of voice recognition. For this purpose, we created a voice database that contains different phrases in two languages, English and Spanish, for men and women. As a classifier, the LIRA (Limited Receptive Area) grayscale neural classifier was selected. The LIRA grayscale neural classifier was developed for image recognition tasks and demonstrated good results. Therefore, we decided to develop a recognition system using this classifier for voice recognition. From a specific set of speakers, we can recognize the speaker’s voice. For this purpose, the system uses spectrograms of the voice signals as input to the system, extracts the characteristics and identifies the speaker. The results are described and analyzed in this article. The classifier can be used for speaker identification in security system or smart buildings for different types of intelligent devices.

Keywords: extreme learning, LIRA neural classifier, speaker identification, voice recognition

Procedia PDF Downloads 158
1500 Study and Analysis of Optical Intersatellite Links

Authors: Boudene Maamar, Xu Mai

Abstract:

Optical Intersatellite Links (OISLs) are wireless communications using optical signals to interconnect satellites. It is expected to be the next generation wireless communication technology according to its inherent characteristics like: an increased bandwidth, a high data rate, a data transmission security, an immunity to interference, and an unregulated spectrum etc. Optical space links are the best choice for the classical communication schemes due to its distinctive properties; high frequency, small antenna diameter and lowest transmitted power, which are critical factors to define a space communication. This paper discusses the development of free space technology and analyses the parameters and factors to establish a reliable intersatellite links using an optical signal to exchange data between satellites.

Keywords: optical intersatellite links, optical wireless communications, free space optical communications, next generation wireless communication

Procedia PDF Downloads 435
1499 Educational Institutional Approach for Livelihood Improvement and Sustainable Development

Authors: William Kerua

Abstract:

The PNG University of Technology (Unitech) has mandatory access to teaching, research and extension education. Given such function, the Agriculture Department has established the ‘South Pacific Institute of Sustainable Agriculture and Rural Development (SPISARD)’ in 2004. SPISARD is established as a vehicle to improve farming systems practiced in selected villages by undertaking pluralistic extension method through ‘Educational Institutional Approach’. Unlike other models, SPISARD’s educational institutional approach stresses on improving the whole farming systems practiced in a holistic manner and has a two-fold focus. The first is to understand the farming communities and improve the productivity of the farming systems in a sustainable way to increase income, improve nutrition and food security as well as livelihood enhancement trainings. The second is to enrich the Department’s curriculum through teaching, research, extension and getting inputs from farming community. SPISARD has established number of model villages in various provinces in Papua New Guinea (PNG) and with many positive outcome and success stories. Adaption of ‘educational institutional approach’ thus binds research, extension and training into one package with the use of students and academic staff through model village establishment in delivering development and extension to communities. This centre (SPISARD) coordinates the activities of the model village programs and linkages. The key to the development of the farming systems is establishing and coordinating linkages, collaboration, and developing partnerships both within and external institutions, organizations and agencies. SPISARD has a six-point step strategy for the development of sustainable agriculture and rural development. These steps are (i) establish contact and identify model villages, (ii) development of model village resource centres for research and trainings, (iii) conduct baseline surveys to identify problems/needs of model villages, (iv) development of solution strategies, (v) implementation and (vi) evaluation of impact of solution programs. SPISARD envisages that the farming systems practiced being improved if the villages can be made the centre of SPISARD activities. Therefore, SPISARD has developed a model village approach to channel rural development. The model village when established become the conduit points where teaching, training, research, and technology transfer takes place. This approach is again different and unique to the existing ones, in that, the development process take place in the farmers’ environment with immediate ‘real time’ feedback mechanisms based on the farmers’ perspective and satisfaction. So far, we have developed 14 model villages and have conducted 75 trainings in 21 different areas/topics in 8 provinces to a total of 2,832 participants of both sex. The aim of these trainings is to directly participate with farmers in the pursuit to improving their farming systems to increase productivity, income and to secure food security and nutrition, thus to improve their livelihood.

Keywords: development, educational institutional approach, livelihood improvement, sustainable agriculture

Procedia PDF Downloads 142
1498 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 225
1497 The Synopsis of the AI-Powered Therapy Web Platform ‘Free AI Therapist'

Authors: Arwa Alnowaiser, Hala Shoukri

Abstract:

The ‘FreeAITherapist’ is an artificial intelligence application that uses the power of AI to offer advice and mental health counseling to its users through its chatbot services. The AI therapist is designed to understand users' issues, concerns, and problems and respond appropriately; it provides empathy and guidance and uses evidence-based therapeutic techniques. With its user-friendly platform, it ensures accessibility for individuals in need, regardless of their geographical location. This website was created in direct response to the growing demand for mental health support, aiming to provide a cost-effective and confidential solution. Through promising confidentiality, it considers user privacy and data security. The ‘FreeAITherapist’ strives to bridge the gap in mental health services, offering a reliable resource for individuals seeking guidance and counseling to improve their overall well-being.

Keywords: artificial intelligence, mental health, AI therapist, website, counseling

Procedia PDF Downloads 19
1496 A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques

Authors: Tosin Ige

Abstract:

Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining.

Keywords: data, privacy, data mining, association rule, privacy preserving, mining technique

Procedia PDF Downloads 147
1495 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 86
1494 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 47
1493 Using ANN in Emergency Reconstruction Projects Post Disaster

Authors: Rasha Waheeb, Bjorn Andersen, Rafa Shakir

Abstract:

Purpose The purpose of this study is to avoid delays that occur in emergency reconstruction projects especially in post disaster circumstances whether if they were natural or manmade due to their particular national and humanitarian importance. We presented a theoretical and practical concepts for projects management in the field of construction industry that deal with a range of global and local trails. This study aimed to identify the factors of effective delay in construction projects in Iraq that affect the time and the specific quality cost, and find the best solutions to address delays and solve the problem by setting parameters to restore balance in this study. 30 projects were selected in different areas of construction were selected as a sample for this study. Design/methodology/approach This study discusses the reconstruction strategies and delay in time and cost caused by different delay factors in some selected projects in Iraq (Baghdad as a case study).A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. Project participants from the case projects provided data about the projects through a data collection instrument distributed through a survey. Mixed approach and methods were applied in this study. Mathematical data analysis was used to construct models to predict delay in time and cost of projects before they started. The artificial neural networks analysis was selected as a mathematical approach. These models were mainly to help decision makers in construction project to find solutions to these delays before they cause any inefficiency in the project being implemented and to strike the obstacles thoroughly to develop this industry in Iraq. This approach was practiced using the data collected through survey and questionnaire data collection as information form. Findings The most important delay factors identified leading to schedule overruns were contractor failure, redesigning of designs/plans and change orders, security issues, selection of low-price bids, weather factors, and owner failures. Some of these are quite in line with findings from similar studies in other countries/regions, but some are unique to the Iraqi project sample, such as security issues and low-price bid selection. Originality/value we selected ANN’s analysis first because ANN’s was rarely used in project management , and never been used in Iraq to finding solutions for problems in construction industry. Also, this methodology can be used in complicated problems when there is no interpretation or solution for a problem. In some cases statistical analysis was conducted and in some cases the problem is not following a linear equation or there was a weak correlation, thus we suggested using the ANN’s because it is used for nonlinear problems to find the relationship between input and output data and that was really supportive.

Keywords: construction projects, delay factors, emergency reconstruction, innovation ANN, post disasters, project management

Procedia PDF Downloads 152
1492 Digital Cinema Watermarking State of Art and Comparison

Authors: H. Kelkoul, Y. Zaz

Abstract:

Nowadays, the vigorous popularity of video processing techniques has resulted in an explosive growth of multimedia data illegal use. So, watermarking security has received much more attention. The purpose of this paper is to explore some watermarking techniques in order to observe their specificities and select the finest methods to apply in digital cinema domain against movie piracy by creating an invisible watermark that includes the date, time and the place where the hacking was done. We have studied three principal watermarking techniques in the frequency domain: Spread spectrum, Wavelet transform domain and finally the digital cinema watermarking transform domain. In this paper, a detailed technique is presented where embedding is performed using direct sequence spread spectrum technique in DWT transform domain. Experiment results shows that the algorithm provides high robustness and good imperceptibility.

Keywords: digital cinema, watermarking, wavelet DWT, spread spectrum, JPEG2000 MPEG4

Procedia PDF Downloads 239
1491 Constitutional Status of a Child in the Republic of Belarus and Its Principles

Authors: Maria Ashitko

Abstract:

The Constitution of the Republic of Belarus is based on the principle of the unity of rights and obligations, including those of the child. The constitutional status of the child is aspecific system of constitutional elements established and guaranteed by the state through the current legislation and regulatory acts that ensure the special legal status of the child, his or her constitutional legal capacity, implementation of the principles of the constitutional and legal status of the child, constitutional rights of the child and their safeguards. Under the principles of the constitutional status of the child, we consider the general, normative, social-volitional rules of behavior established by the Constitution of the Republic of Belarus, laws and other regulatory acts that determine the content and social purpose of the legal status of the child. The constitutional and legal status of the child is characterized by the following special principles, which form a feature of the state legal system:1) Ensuring the interests of the child means providing for the child in accordance with his or her age, state of health, characteristics of development, life experience, family life, cultural traditions, ethnicity. 2) The principle of equal responsibility of both parents or their substitutes characterized by caring for the next generation as one of the priority tasks of the state and society, and all issues related to the implementation of children’s rights should be addressed at the constitutional level. 3) We would like to highlight such a special principle as the subprinciple of safeguards, which is the principle of ensuring the safety of the child. It is also worth noting that in legal studies, there is no relationship between safety and constitutional rights as general safeguards of individual rights and freedoms, and as special safeguards for the right to life. 4) The principle of justice is expressed by the fact that in modern conditions, the quality of life is determined not only by material wealth but also by the ability of the state to ensure the harmonization of social relations and social harmony on the basis of humanism and justice. Thus, the specificity of the constitutional status of the child is the age boundary between adulthood and minority; therefore, we propose to highlight the age characteristics of the child as an additional element. It is advisable to highlight such a special principle as the subprinciple of safeguards, which is the principle of ensuring the safety of the child.

Keywords: children’s rights, constitutional status, constitutional principles, constitutional rights

Procedia PDF Downloads 115
1490 Creating Growth and Reducing Inequality in Developing Countries

Authors: Rob Waddle

Abstract:

We study an economy with weak justice and security systems and with weak public policy and regulation or little capacity to implement them, and with high barriers to profitable sectors. We look at growth and development opportunities based on the derived demand. We show that there is hope for such an economy to grow up and to generate a win-win situation for all stakeholders if the derived demand is supplied. We then investigate conditions that could stimulate the derived demand supply. We show that little knowledge of public, private and international expenditures in the economy and academic tools are enough to trigger the derived demand supply. Our model can serve as guidance to donor and NGO working in developing countries, and show to media the best way to help is to share information about existing and accessible opportunities. It can also provide direction to vocational schools and universities that could focus more on providing tools to seize existing opportunities.

Keywords: growth, development, monopoly, oligopoly, inequality

Procedia PDF Downloads 321
1489 Influence of Glass Plates Different Boundary Conditions on Human Impact Resistance

Authors: Alberto Sanchidrián, José A. Parra, Jesús Alonso, Julián Pecharromán, Antonia Pacios, Consuelo Huerta

Abstract:

Glass is a commonly used material in building; there is not a unique design solution as plates with a different number of layers and interlayers may be used. In most façades, a security glazing have to be used according to its performance in the impact pendulum. The European Standard EN 12600 establishes an impact test procedure for classification under the point of view of the human security, of flat plates with different thickness, using a pendulum of two tires and 50 kg mass that impacts against the plate from different heights. However, this test does not replicate the actual dimensions and border conditions used in building configurations and so the real stress distribution is not determined with this test. The influence of different boundary conditions, as the ones employed in construction sites, is not well taking into account when testing the behaviour of safety glazing and there is not a detailed procedure and criteria to determinate the glass resistance against human impact. To reproduce the actual boundary conditions on site, when needed, the pendulum test is arranged to be used "in situ", with no account for load control, stiffness, and without a standard procedure. Fracture stress of small and large glass plates fit a Weibull distribution with quite a big dispersion so conservative values are adopted for admissible fracture stress under static loads. In fact, test performed for human impact gives a fracture strength two or three times higher, and many times without a total fracture of the glass plate. Newest standards, as for example DIN 18008-4, states for an admissible fracture stress 2.5 times higher than the ones used for static and wing loads. Now two working areas are open: a) to define a standard for the ‘in situ’ test; b) to prepare a laboratory procedure that allows testing with more real stress distribution. To work on both research lines a laboratory that allows to test medium size specimens with different border conditions, has been developed. A special steel frame allows reproducing the stiffness of the glass support substructure, including a rigid condition used as reference. The dynamic behaviour of the glass plate and its support substructure have been characterized with finite elements models updated with modal tests results. In addition, a new portable impact machine is being used to get enough force and direction control during the impact test. Impact based on 100 J is used. To avoid problems with broken glass plates, the test have been done using an aluminium plate of 1000 mm x 700 mm size and 10 mm thickness supported on four sides; three different substructure stiffness conditions are used. A detailed control of the dynamic stiffness and the behaviour of the plate is done with modal tests. Repeatability of the test and reproducibility of results prove that procedure to control both, stiffness of the plate and the impact level, is necessary.

Keywords: glass plates, human impact test, modal test, plate boundary conditions

Procedia PDF Downloads 298
1488 Authentication Based on Hand Movement by Low Dimensional Space Representation

Authors: Reut Lanyado, David Mendlovic

Abstract:

Most biological methods for authentication require special equipment and, some of them are easy to fake. We proposed a method for authentication based on hand movement while typing a sentence with a regular camera. This technique uses the full video of the hand, which is harder to fake. In the first phase, we tracked the hand joints in each frame. Next, we represented a single frame for each individual using our Pose Agnostic Rotation and Movement (PARM) dimensional space. Then, we indicated a full video of hand movement in a fixed low dimensional space using this method: Fixed Dimension Video by Interpolation Statistics (FDVIS). Finally, we identified each individual in the FDVIS representation using unsupervised clustering and supervised methods. Accuracy exceeds 96% for 80 individuals by using supervised KNN.

Keywords: authentication, feature extraction, hand recognition, security, signal processing

Procedia PDF Downloads 113
1487 Projects and Limits of Memory Engineering: A Case of Lithuanian Partisan War

Authors: Mingaile Jurkute, Vilnius University

Abstract:

The memory of the Lithuanian partisan war (1944-1953) underwent extremely dramatic transformations. During this war, the image of the resistance and a partisan was one of the key elements of Lithuanian identity. Its importance is evidenced by the extremely large legacy of songs about partisans, no other topic has collected so much folklore in Lithuania. In the Soviet years, this resistance was practically forced to be forgotten. Terror and Soviet laws have forced people to stop talking about the events, even in the family circle. In addition, the Soviets created their own propaganda story, reinterpreting the Lithuanian partisan war, presenting partisans as bandits who brutally tortured and murdered locals. But even in the Soviet years, the memory could neither be completely suppressed, nor completely transformed into wishful shape. The analysis of fiction and cinema shows that the traumatic memory of real events rushed to the surface, thus transforming the very propagandistic narrative. After the restoration of the Republic of Lithuania in 1990, the Lithuanian partisan war was gradually returned to the central place of Lithuanian history. After 2014 the nationalist heroic narrative about Lithuanian partisans became the central narrative of modern Lithuanian history. Nevertheless, interviews I conducted in Lithuanian villages reveal that the memory of local communities and families preserves quite different experiences that do not fit into neither the Soviet narrative nor the heroic one. Such experiences include, for example, partisan violence against local families. This paper is about the efforts of two political ideologies (the Soviet and the Lithuanian patriotic) to use the history of the Lithuanian partisans for their own needs, and the attempts of small communities (mostly families) to resist these efforts. The research reveals that family memory, even when opposed to aggressive state memory policies, can preserve counter-narratives by exploiting unexpected objects beyond the control of the state, such as nature and wildlife. Basically, the paper analyses the limits of the instrumentalization of memory, even by extremely aggressive political regimes.

Keywords: collective memory, post-memory, violence, military conflict, family memory

Procedia PDF Downloads 78
1486 Practical Methods for Automatic MC/DC Test Cases Generation of Boolean Expressions

Authors: Sekou Kangoye, Alexis Todoskoff, Mihaela Barreau

Abstract:

Modified Condition/Decision Coverage (MC/DC) is a structural coverage criterion that aims to prove that all conditions involved in a Boolean expression can influence the result of that expression. In the context of automotive, MC/DC is highly recommended and even required for most security and safety applications testing. However, due to complex Boolean expressions that often embedded in those applications, generating a set of MC/DC compliant test cases for any of these expressions is a nontrivial task and can be time consuming for testers. In this paper we present an approach to automatically generate MC/DC test cases for any Boolean expression. We introduce novel techniques, essentially based on binary trees to quickly and optimally generate MC/DC test cases for the expressions. Thus, the approach can be used to reduce the manual testing effort of testers.

Keywords: binary trees, MC/DC, test case generation, nontrivial task

Procedia PDF Downloads 423
1485 Intellectual Property Rights and Health Rights: A Feasible Reform Proposal to Facilitate Access to Drugs in Developing Countries

Authors: M. G. Cattaneo

Abstract:

The non-effectiveness of certain codified human rights is particularly apparent with reference to the lack of access to essential drugs in developing countries, which represents a breach of the human right to receive adequate health assistance. This paper underlines the conflict and the legal contradictions between human rights, namely health rights, international Intellectual Property Rights, in particular patent law, as well as international trade law. The paper discusses the crucial links between R&D costs for innovation, patents and new medical drugs, with the goal of reformulating the hierarchies of priorities and of interests at stake in the international intellectual property (IP) law system. Different from what happens today, International patent law should be a legal instrument apt at rebalancing an axiological asymmetry between the (conflicting) needs at stake The core argument in the paper is the proposal of an alternative pathway, namely a feasible proposal for a patent law reform. IP laws tend to balance the benefits deriving from innovation with the costs of the provided monopoly, but since developing countries and industrialized countries are in completely different political and economic situations, it is necessary to (re)modulate such exchange according to the different needs. Based on this critical analysis, the paper puts forward a proposal, called Trading Time for Space (TTS), whereby a longer time for patent exclusive life in western countries (Time) is offered to the patent holder company, in exchange for the latter selling the medical drug at cost price in developing countries (Space). Accordingly, pharmaceutical companies should sell drugs in developing countries at the cost price, or alternatively grant a free license for the sale in such countries, without any royalties or fees. However, such social service shall be duly compensated. Therefore, the consideration for such a service shall be an extension of the temporal duration of the patent’s exclusive in the country of origin that will compensate the reduced profits caused by the supply at the price cost in developing countries.

Keywords: global health, global justice, patent law reform, access to drugs

Procedia PDF Downloads 236
1484 Competition Law as a “Must Have” Course in Legal Education

Authors: Noemia Bessa Vilela, Jose Caramelo Gomes

Abstract:

All law student are familiarized, in the first years of their bachelor of laws with the concepts of “public goods” and “ private goods”; often, such legal concept does not exactly match such economic concept, and there are consequences are some sort of confusion being created. The list of goods that follow under each category is not exhaustive, nor are students given proper mechanisms to acknowledge that some legal fields can, on its own, be considered as a “public good”; this is the case of Competition. Legal authors consider that “competition law is used to promote public interest” and, as such, it is a “public good”; in economics theory, Competition is the first public good in a market economy, as the enabler of allocation efficiency. Competition law is the legal tool to support the proper functioning of the market economy and democracy itself. It is fact that Competition Law only applies to economic activities, still, competition is object of private litigation as an integral part of Public Law. Still, regardless of the importance of Competition Law in the economic activity and market regulation, most student complete their studies in law, join the Bar Associations and engage in their professional activities never having been given sufficient tools to deal with the increasing demands of a globalized world. The lack of knowledge of economics, market functioning and the mechanisms at their reach in order to ensure proper realization of their duties as lawyers/ attorneys-at-law would be tackled if Competition Law would be included as part of the curricula of Law Schools. Proper teaching of Competition Law would combine the foundations of Competition Law, doctrine, case solving and Case Law study. Students should to understand and apply the analytical model. Special emphasis should be given to EU Competition Law, namely the TFEU Articles 101 to 106. Damages Directive should also be part of the curriculum. Students must in the first place acquire and master the economic rationale as competition and the world of competition law are the cornerstone of sound and efficient market. The teaching of Competition Law in undergraduate programs in Law would contribute to fulfill the potential of the students who will deal with matters related to consumer protection, economic and commercial law issues both in private practice and as in-house lawyers for companies.

Keywords: higher education, competition law, legal education, law, market economy, industrial economics

Procedia PDF Downloads 129
1483 Electrohydrodynamic Patterning for Surface Enhanced Raman Scattering for Point-of-Care Diagnostics

Authors: J. J. Rickard, A. Belli, P. Goldberg Oppenheimer

Abstract:

Medical diagnostics, environmental monitoring, homeland security and forensics increasingly demand specific and field-deployable analytical technologies for quick point-of-care diagnostics. Although technological advancements have made optical methods well-suited for miniaturization, a highly-sensitive detection technique for minute sample volumes is required. Raman spectroscopy is a well-known analytical tool, but has very weak signals and hence is unsuitable for trace level analysis. Enhancement via localized optical fields (surface plasmons resonances) on nanoscale metallic materials generates huge signals in surface-enhanced Raman scattering (SERS), enabling single molecule detection. This enhancement can be tuned by manipulation of the surface roughness and architecture at the sub-micron level. Nevertheless, the development and application of SERS has been inhibited by the irreproducibility and complexity of fabrication routes. The ability to generate straightforward, cost-effective, multiplex-able and addressable SERS substrates with high enhancements is of profound interest for SERS-based sensing devices. While most SERS substrates are manufactured by conventional lithographic methods, the development of a cost-effective approach to create nanostructured surfaces is a much sought-after goal in the SERS community. Here, a method is established to create controlled, self-organized, hierarchical nanostructures using electrohydrodynamic (HEHD) instabilities. The created structures are readily fine-tuned, which is an important requirement for optimizing SERS to obtain the highest enhancements. HEHD pattern formation enables the fabrication of multiscale 3D structured arrays as SERS-active platforms. Importantly, each of the HEHD-patterned individual structural units yield a considerable SERS enhancement. This enables each single unit to function as an isolated sensor. Each of the formed structures can be effectively tuned and tailored to provide high SERS enhancement, while arising from different HEHD morphologies. The HEHD fabrication of sub-micrometer architectures is straightforward and robust, providing an elegant route for high-throughput biological and chemical sensing. The superior detection properties and the ability to fabricate SERS substrates on the miniaturized scale, will facilitate the development of advanced and novel opto-fluidic devices, such as portable detection systems, and will offer numerous applications in biomedical diagnostics, forensics, ecological warfare and homeland security.

Keywords: hierarchical electrohydrodynamic patterning, medical diagnostics, point-of care devices, SERS

Procedia PDF Downloads 329
1482 The Role of the Indonesian Armed Forces to Combat Terrorism Acts During the COVID 19 Pandemic Era

Authors: Aulia Rosa Nasution

Abstract:

This research aims to analyze the involvement of the Indonesian Armed Forces in overcoming terrorism acts under legal perspectives based on Acts No. 34 of 2004, which regulates the role and mechanism of the Indonesian Armed Forces in combating terrorism. The main question of this research is, firstly, the military authority in combating terrorism acts, secondly, the implementation of Acts Number 34/2000, and thirdly, law enforcement to combat terrorism under national and international law. The methodology of this research is juridical normative based on the legal instruments and legal principles, and international norms. The result of this study explains the involvement of the Indonesian Army in combating terrorism as a part of the nonmilitary operation which has been implemented in Indonesia as part of national defence and security.

Keywords: acts of terrorism, Indonesian armed forces, legal protection

Procedia PDF Downloads 96
1481 Robust Diagnosability of PEMFC Based on Bond Graph LFT

Authors: Ould Bouamama, M. Bressel, D. Hissel, M. Hilairet

Abstract:

Fuel cell (FC) is one of the best alternatives of fossil energy. Recently, the research community of fuel cell has shown a considerable interest for diagnosis in view to ensure safety, security, and availability when faults occur in the process. The problematic for model based FC diagnosis consists in that the model is complex because of coupling of several kind of energies and the numerical values of parameters are not always known or are uncertain. The present paper deals with use of one tool: the Linear Fractional Transformation bond graph tool not only for uncertain modelling but also for monitorability (ability to detect and isolate faults) analysis and formal generation of robust fault indicators with respect to parameter uncertainties.The developed theory applied to a nonlinear FC system has proved its efficiency.

Keywords: bond graph, fuel cell, fault detection and isolation (FDI), robust diagnosis, structural analysis

Procedia PDF Downloads 352
1480 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: android, information security, intrusion detection systems, malware, mobile devices

Procedia PDF Downloads 285
1479 Modelling of Groundwater Resources for Al-Najaf City, Iraq

Authors: Hayder H. Kareem, Shunqi Pan

Abstract:

Groundwater is a vital water resource in many areas in the world, particularly in the Middle-East region where the water resources become scarce and depleting. Sustainable management and planning of the groundwater resources become essential and urgent given the impact of the global climate change. In the recent years, numerical models have been widely used to predict the flow pattern and assess the water resources security, as well as the groundwater quality affected by the contaminants transported. In this study, MODFLOW is used to study the current status of groundwater resources and the risk of water resource security in the region centred at Al-Najaf City, which is located in the mid-west of Iraq and adjacent to the Euphrates River. In this study, a conceptual model is built using the geologic and hydrogeologic collected for the region, together with the Digital Elevation Model (DEM) data obtained from the "Global Land Cover Facility" (GLCF) and "United State Geological Survey" (USGS) for the study area. The computer model is also implemented with the distributions of 69 wells in the area with the steady pro-defined hydraulic head along its boundaries. The model is then applied with the recharge rate (from precipitation) of 7.55 mm/year, given from the analysis of the field data in the study area for the period of 1980-2014. The hydraulic conductivity from the measurements at the locations of wells is interpolated for model use. The model is calibrated with the measured hydraulic heads at the locations of 50 of 69 wells in the domain and results show a good agreement. The standard-error-of-estimate (SEE), root-mean-square errors (RMSE), Normalized RMSE and correlation coefficient are 0.297 m, 2.087 m, 6.899% and 0.971 respectively. Sensitivity analysis is also carried out, and it is found that the model is sensitive to recharge, particularly when the rate is greater than (15mm/year). Hydraulic conductivity is found to be another parameter which can affect the results significantly, therefore it requires high quality field data. The results show that there is a general flow pattern from the west to east of the study area, which agrees well with the observations and the gradient of the ground surface. It is found that with the current operational pumping rates of the wells in the area, a dry area is resulted in Al-Najaf City due to the large quantity of groundwater withdrawn. The computed water balance with the current operational pumping quantity shows that the Euphrates River supplies water into the groundwater of approximately 11759 m3/day, instead of gaining water of 11178 m3/day from the groundwater if no pumping from the wells. It is expected that the results obtained from the study can provide important information for the sustainable and effective planning and management of the regional groundwater resources for Al-Najaf City.

Keywords: Al-Najaf city, conceptual modelling, groundwater, unconfined aquifer, visual MODFLOW

Procedia PDF Downloads 196
1478 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 149
1477 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage

Authors: L. Ramirez, E. Guillén, J. Sánchez

Abstract:

Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.

Keywords: analytics, telemedicine, internet of things, cloud computing

Procedia PDF Downloads 310