Search results for: homeland security
879 Managing Crowds at Sports Mega Events: Examining the Impact of ‘Fan Parks’ at International Football Tournaments between 2002 and 2016
Authors: Joel Rookwood
Abstract:
Sports mega events have become increasingly significant in sporting, political and economic terms, with analysis often focusing on issues including resource expenditure, development, legacy and sustainability. Transnational tournaments can inspire interest from a variety of demographics, and the operational management of such events can involve contributions from a range of personnel. In addition to television audiences events also attract attending spectators, and in football contexts the temporary migration of fans from potentially rival nations and teams can present event organising committees and security personnel with various challenges in relation to crowd management. The behaviour, interaction and control of supporters has previously led to incidents of disorder and hooliganism, with damage to property as well as injuries and deaths proving significant consequences. The Heysel tragedy at the 1985 European Cup final in Brussels is a notable example, where 39 fans died following crowd disorder and mismanagement. Football disasters and disorder, particularly in the context of international competition, have inspired responses from police, law makers, event organisers, clubs and associations, including stadium improvements, legislative developments and crowd management practice to improve the effectiveness of spectator safety. The growth and internationalisation of fandom and developments in event management and tourism have seen various responses to the evolving challenges associated with hosting large numbers of visiting spectators at mega events. In football contexts ‘fan parks’ are a notable example. Since the first widespread introduction in European football competitions at the 2006 World Cup finals in Germany, these facilities have become a staple element of such mega events. This qualitative, longitudinal, multi-continent research draws on extensive semi-structured interview and observation data. As a frame of reference, this work considers football events staged before and after the development of fan parks. Research was undertaken at four World Cup finals (Japan 2002, Germany 2006, South Africa 2010 and Brazil 2014), four European Championships (Portugal 2004, Switzerland/Austria 2008, Poland/Ukraine 2012 and France 2016), four other confederation tournaments (Ghana 2008, Qatar 2011, USA 2011 and Chile 2015), and four European club finals (Istanbul 2005, Athens 2007, Rome 2009 and Basle 2016). This work found that these parks are typically temporarily erected, specifically located zones where supporters congregate together irrespective of allegiances to watch matches on large screens, and partake in other forms of organised on-site entertainment. Such facilities can also allow organisers to control the behaviour, confine the movement and monitor the alcohol consumption of supporters. This represents a notable shift in policy from previous football tournaments, when the widely assumed causal link between alcohol and hooliganism which frequently shaped legislative and police responses to disorder, also dissuaded some authorities from permitting fans to consume alcohol in and around stadia. It also reflects changing attitudes towards modern football fans. The work also found that in certain contexts supporters have increasingly engaged with such provision which impacts fan behaviour, but that this is relative to factors including location, facilities, management and security.Keywords: event, facility, fan, management, park
Procedia PDF Downloads 313878 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 159877 Empowering Certificate Management with Blockchain Technology
Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware
Abstract:
The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker
Procedia PDF Downloads 47876 The Role of Celebrities in the Securitization and Desecuritization of Syrian Migrants on Social Media in Turkiye
Authors: Yelda Yenel, Orkut Acele
Abstract:
This research aims to examine the role of celebrities in the securitization and desecuritization of Syrian migrants in Türkiye on social media platforms. Traditionally, the securitization process has been driven by political actors and mainstream media. However, with the rise of social media, celebrities have emerged as influential actors, contributing to these processes. The topic of Syrian migrants, particularly those arriving in Türkiye after 2011, has sparked national debates, framing them both as a security threat and as a humanitarian issue, thereby dividing public opinion.The primary objective of this study is to analyze celebrities’ discourses about migrants on social media and to explore how these narratives contribute to the processes of securitization (presenting migrants as a threat) and desecuritization (framing migrants within a humanitarian context). This research will focus on social media platforms such as Twitter and Instagram, examining celebrities' posts and analyzing the narratives produced through content and discourse analysis techniques.By investigating how celebrities frame the migrant issue and how these frames resonate with the public, this study seeks to explore the impact of celebrity discourse on the securitization and desecuritization processes. Additionally, it will examine the influence of celebrities on social media users, offering a new perspective on how securitization theory is shaped by the role of celebrities in the digital age.Keywords: securitization, desecuritization, celebrities, Syrian migrants, social media discourse
Procedia PDF Downloads 21875 Image Processing techniques for Surveillance in Outdoor Environment
Authors: Jayanth C., Anirudh Sai Yetikuri, Kavitha S. N.
Abstract:
This paper explores the development and application of computer vision and machine learning techniques for real-time pose detection, facial recognition, and number plate extraction. Utilizing MediaPipe for pose estimation, the research presents methods for detecting hand raises and ducking postures through real-time video analysis. Complementarily, facial recognition is employed to compare and verify individual identities using the face recognition library. Additionally, the paper demonstrates a robust approach for extracting and storing vehicle number plates from images, integrating Optical Character Recognition (OCR) with a database management system. The study highlights the effectiveness and versatility of these technologies in practical scenarios, including security and surveillance applications. The findings underscore the potential of combining computer vision techniques to address diverse challenges and enhance automated systems for both individual and vehicular identification. This research contributes to the fields of computer vision and machine learning by providing scalable solutions and demonstrating their applicability in real-world contexts.Keywords: computer vision, pose detection, facial recognition, number plate extraction, machine learning, real-time analysis, OCR, database management
Procedia PDF Downloads 27874 Insecurity as a Challenge to Nutritional Status of Children and Mothers in Dansadau, Maru Local Government Area Zamfara State, North Western Nigeria
Authors: Mohammed Hussaini
Abstract:
This paper discusses insecurity as a challenge to the nutritional Status of children and mothers in Dansadau, Maru Local Government area of Zamfara state, Northwestern Nigeria. A Descriptive survey design was used in the study. Objectives of the study were formulated to guide the study. 20 Health workers and 100 mothers were used as population of the study; the instrument validation for data collection was interview. The interview structure was validated by 3 experts, the data collected was analyzed and presented using descriptive standard score (Z-score). The study revealed that, Nutritional Status of children and mothers in Northwest Nigeria specifically Zamfara state is low. This mostly affect children and mother as a result of serious insecurity challenge in the region, consisting of banditry and kidnapping, killing of farmers, destruction of farmland, burning of farm products. The study recommended that the focus is on implementing strong communication strategies to enhance short-term relief initiatives, both governmental and non-governmental organizations should actively play a role in initiating lasting change, especially when tackling issues of insecurity and effectively addressing the rise of armed banditry and other security concerns requires a sophisticated and nuanced strategy.Keywords: insecurity, malnutrition, children, mothers
Procedia PDF Downloads 55873 Study of the Economic Development of Border Areas Malinau District
Authors: Indri Nilam Sari, Aris Subagiyo, Nindya Sari
Abstract:
Malinau Regency border area is an area which is based on the RTRWN and the development priority. But, in real border area Malinau Regency placed as backyard from Indonesian area and caused development lag that is fairly large compared by town area in Malinau Regency. This research aimed to know the condition of the gap in the Malinau Regency border and its influence on the development of the border region as well as knowing the problems related to the economy development of society in the area of the border district of Malinau. Methods of analysis are used in namely descriptive analysis that represent analysis of land use and analysis of movement activities of the population, level analysis facility and infrastructure, economy analysis that represent top commodity determination analysis (LQ and Growth Share) and accessibility. The results of the study showed that the condition of the Malinau Regency border come within the gap as seen from the contributions of infrastructure repair facilities and accessibility advocates, communities, scattered seed commodities come within the borders and human resources with the condition of the most Upstream Bahau town in the backwaters of the town more. There are a few problems that cause the condition area of the border experiencing inequality, lack of human resources, poor infrastructure, lack of accessibility and low levels of security so that it brings development recommendations was the development of the flagship commodities and infrastructure as well as supporting community economic infrastructure, as well as human resources.Keywords: border, economy, development, Malinau
Procedia PDF Downloads 453872 Greed and Grievance Revisisted: The Case of ISIL
Authors: Amjed Rasheed
Abstract:
Rebellions are driven by several incentives. They do not often occur because of historical grievances or political exclusion. They can be driven by the desire to control over natural resources, or by both. In the case of the Islamic State (ISIL), greed and grievance are both drive this radical group to operate in Iraq and Syria. This article aims to show that grievance was the trigger to the emergence of ISIL. It also aims to demonstrate that ISIL is using oil as a tool, to implements its political ends, than a purpose per se. In other words, the emergence of ISIL is based on socio-political conditions, which are domestically driven, and oil is not ISIL’s aim but a source of revenue to finance its activities. This paper applies conflict analysis methodology to analyse the conflict in Iraq and Syria, with a specific highlight to ISIL. By doing so, it gives ahistorical background on emergence of ISIL. It also provides an insightful explanation on the main dynamics and the tactics this organisation applies. It also delivers a sufficient explanation on how it recruits its members, both local and international. It concludes that tackling ISIL needs a more sophisticated approach than the one Obama administration has adopted. It is more a political issue to be tackled by political means, than a military one to be tackled by military means. The current war is an Intra-Sunni war, and therefore, Sunni states have to be on board to crackdown ISIL. Besides, the article finishes with the argument that democratisation is not necessarily the key answer to bring stability to the region, but a sort of governance that provides security and material needs to individuals.Keywords: ISIL, Iraq, domestic politics, Islamic radicalisation
Procedia PDF Downloads 364871 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict
Authors: Zhao Xinlei
Abstract:
The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition
Procedia PDF Downloads 83870 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology
Authors: Ted Gournelos
Abstract:
Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.Keywords: social enterprise, strategy, innovation, social media
Procedia PDF Downloads 321869 Effect of Improved Potato Varieties Adoption on Farmers' Income in Ethiopia: An Endogenous Switching Approach
Authors: Tsion Tekalegn
Abstract:
In Ethiopia, improved potato varieties are essential for food security, but smallholders' adoption of improved technologies limits their productivity. For this study, data was collected based on a structured questionnaire randomly collected from the 329 sample farmers (158 adopters and 171 non-adopters). We estimate the adoption of improved variety and causal impact using Endogenous Switching Regression (ESR), and a propensity Score Matching (PSM) was used to test the treatment effect. This helps us estimate the effect of improved potato variety on smallholder farmer income by controlling for the role of the selection bias problem stemming from both observed and unobserved heterogeneity. According to the result, key determinants influencing adoption include livestock ownership, access to extension services, and farming experience, which positively affect the likelihood of adopting improved varieties. In contrast, access to irrigation negatively correlates with adoption, suggesting that farmers with reliable water sources perceive less need for improved varieties. The ESR model result confirmed that improved potato variety adoption increases the smallholder farmer income with an estimated gain of 8.77%. Thus, to improve the potato variety of the farming households, the government should give due emphasis to potato production, and the extension services need to be strengthened.Keywords: adoption, improved potato varieties, endogenous switching regression, Ethiopia
Procedia PDF Downloads 38868 Numerical Simulation for a Shallow Braced Excavation of Campus Building
Authors: Sao-Jeng Chao, Wen-Cheng Chen, Wei-Humg Lu
Abstract:
In order to prevent encountering unpredictable factors, geotechnical engineers always conduct numerical analysis for braced excavation design. Simulation work in advance can predict the response of subsequent excavation and thus will be designed to increase the security coefficient of construction. The parameters that are considered include geological conditions, soil properties, soil distributions, loading types, and the analysis and design methods. National Ilan University is located on the LanYang plain, mainly deposited by clayey soil and loose sand, and thus is vulnerable to external influence displacement. National Ilan University experienced a construction of braced excavation with a complete program of monitoring excavation. This study takes advantage of a one-dimensional finite element method RIDO to simulate the excavation process. The predicted results from numerical simulation analysis are compared with the monitored results of construction to explore the differences between them. Numerical simulation analysis of the excavation process can be used to analyze retaining structures for the purpose of understanding the relationship between the displacement and supporting system. The resulting deformation and stress distribution from the braced excavation cab then be understand in advance. The problems can be prevented prior to the construction process, and thus acquire all the affected important factors during design and construction.Keywords: excavation, numerical simulation, RIDO, retaining structure
Procedia PDF Downloads 263867 Energy Efficient Microgrid Design with Hybrid Power Systems
Authors: Pedro Esteban
Abstract:
Today’s electrical networks, including microgrids, are evolving into smart grids. The smart grid concept brings the idea that the power comes from various sources (continuous or intermittent), in various forms (AC or DC, high, medium or low voltage, etc.), and it must be integrated into the electric power system in a smart way to guarantee a continuous and reliable supply that complies with power quality and energy efficiency standards and grid code requirements. This idea brings questions for the different players like how the required power will be generated, what kind of power will be more suitable, how to store exceeding levels for short or long-term usage, and how to combine and distribute all the different generation power sources in an efficient way. To address these issues, there has been lots of development in recent years on the field of on-grid and off-grid hybrid power systems (HPS). These systems usually combine one or more modes of electricity generation together with energy storage to ensure optimal supply reliability and high level of energy security. Hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.Keywords: microgrids, hybrid power systems, energy storage, power quality improvement
Procedia PDF Downloads 145866 Value Chain Analysis of Melon “Egusi” (Citrullus lanatus Thunb. Mansf) among Rural Farm Enterprises in South East, Nigeria
Authors: Chigozirim Onwusiribe, Jude Mbanasor
Abstract:
Egusi Melon (Citrullus Lanatus Thunb. Mansf ) is a very important oil seed that serves a major ingredient in the diet of most of the households in Nigeria. Egusi Melon is very nutritious and very important in meeting the food security needs of Nigerians. Egusi Melon is cultivated in most farm enterprise in South East Nigeria but the profitability of its value chain needs to be investigated. This study analyzed the profitability of the Egusi Melon value chain. Specifically this study developed a value chain map for Egusi Melon, analysed the profitability of each stage of the Egusi Melon Value chain and analysed the determinants of the profitability of the Egusi Melon at each stage of the value chain. Multi stage sampling technique was used to select 125 farm enterprises with similar capacity and characteristics. Questionnaire and interview were used to elicit the required data while descriptive statistics, Food and Agriculture Organization Value Chain Analysis Tool, profitability ratios and multiple regression analysis were used for the data analysis. One of the findings showed that the stages of the Egusi Melon value chain are very profitable. Based on the findings, we recommend the provision of grants by government and donor agencies to the farm enterprises through their cooperative societies, this will provide the necessary funds for the local fabrication of value addition and processing equipment to suit their unique value addition needs not met by the imported equipment.Keywords: value, chain, melon, farm, enterprises
Procedia PDF Downloads 137865 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 437864 Perception of Safety of Workers with Different Job Levels at Construction Sites
Authors: Muhammad Dawood Idrees, Arsalan Ansari
Abstract:
Construction industry is considered as one of the most dangerous industry because workers' safety is always a major concern due to extensive number of accidents, injuries, and casualties at worksites. There are various causes of accidents at construction sites, several factors are influencing on the perception of safety of workers and psychological factors are one of them. Perception of safety varies from region to region and it also varies by demographics of workers, such as gender, age, education, job level, etc. However, research on different level of workers, such as labor and managerial staff to evaluate the impact of psychological factor is limited. Objective of this research is to evaluate the effect of psychological factors with different job level of workers. An extensive literature review was conducted to find the casual relationship between psychological factors and perception of safety, and a hypothetical structure model was developed based upon literature review. A survey instrument based upon psychological factors was developed and data was obtained from several construction sites. Structure Equation Modeling (SEM) technique was adopted in order to examine the effect of psychological factors on the perception of safety of workers with different job levels of workers. The results of this analysis reveal that job security and organizational relationships are most affecting factors in labor staff, therefore job satisfaction, mental stress, and workload are dominant in managerial staff.Keywords: accidents, job level of workers, perception of safety, structural equation modeling
Procedia PDF Downloads 161863 Contribution of Supply Chain Management Practices for Enhancing Healthcare Service Quality: A Quantitative Analysis in Delhi’s Healthcare Sector
Authors: Chitrangi Gupta, Arvind Bhardwaj
Abstract:
This study seeks to investigate and quantify the influence of various dimensions of supply chain management (namely, supplier relationships, compatibility, specifications and standards, delivery processes, and after-sales service) on distinct dimensions of healthcare service quality (specifically, responsiveness, trustworthiness, and security) within the operational framework of XYZ Superspeciality Hospital, situated in Delhi. The name of the Hospital is not being mentioned here because of the privacy policy of the hospital. The primary objective of this research is to elucidate the impact of supply chain management practices on the overall quality of healthcare services offered within hospital settings. Employing a quantitative research design, this study utilizes a hypothesis-testing approach to systematically discern the relationship between supply chain management dimensions and the quality of health services. The findings of this study underscore the significant influence exerted by supply chain management dimensions, specifically supplier relationships, specifications and standards, delivery processes, and after-sales service, on the enhancement of healthcare service quality. Moreover, the study's results reveal that demographic factors such as gender, qualifications, age, and experience do not yield discernible disparities in the relationship between supply chain management and healthcare service quality.Keywords: supply chain management, healthcare, hospital operations, service delivery
Procedia PDF Downloads 68862 Independence of the Judiciary in South Africa: An Assessment After Twenty Years of Democracy
Authors: Serges Djoyou Kamga, Gerard Emmanuel Kamdem Kamga
Abstract:
Any serious constitutionalism entails a system of government characterised by the separation of powers between the executive, the legislature, and the judiciary. The latter is generally in charge of upholding the rule of law and the respect for human rights which are vital for the functioning of any democracy. Therefore, for the judiciary to play its role as a watchdog, it should be independent from other branches of government. The aim of this paper is to examine the independence of the judiciary in South Africa after 20 of democracy. Defining judicial independence as the courts’ ability ‘to decide cases on the basis of established law and the merits of the case, without interference from other political or governmental agents’, the paper examines the extent to which the South African judiciary is independent after twenty years of democracy. As part of assessing the independence of the judiciary, the paper begins by looking at the situation during apartheid, then proceeds with an examination of the post-apartheid legal order. It also examines the institutional independence of the judiciary by looking into its day to day activities which revolve around its self-governance, or administrative and financial independence. In addition, the paper assesses the judges’ individual independence by examining whether judicial appointment, security of tenure, judges’ remuneration and disciplinary actions and the removal of judges from office do not contain loopholes that can hinder judicial independence. Ultimately, the chapter argues that although the South African model of judicial independence is yet to be perfect, it is a good practice that can be emulated by other African countries.Keywords: judical independence, South Africa, democracy, separation of powers
Procedia PDF Downloads 415861 Bullying Perpetration and Victimization in Juvenile Institutions
Authors: Nazirah Hassan, Andrew Kendrick
Abstract:
This study investigates the prevalence of perpetration behavior and victimization in juvenile correctional institutions. It investigates the dimensions of institutional environments and explores which environmental features relate to perpetration behaviors. The project focused on two hundred and eighty nine male and female young offenders aged 12 to 21 years old, in eight juvenile institutions in Malaysia. The research collected quantitative and qualitative data using a mixed-method approach. All participants completed the scale version of Direct and Indirect Prisoner behavior Checklist (DIPC-SCALED) and the Measuring the Quality of Prison life (MQPL). In addition, twenty-four interviews were carried out which involved sixteen residents and eight institutional staff. The findings showed that 95 per cent reported at least one behavior indicative of perpetration, and 99 per cent reported at least one behavior indicative of victimization in the past month. The DIPC-SCALED scored significantly higher on the verbal sub-scale. In addition, factors such as harmony, staff professionalism, security, family and wellbeing showed significant relation to the perpetration behavior. In the interviews, the residents identified circumstances, which affected their behavior within the institutions. This reflected the choices and decisions about how to confront the institutional life. These findings are discussed in terms of existing literature and their practical implications are considered.Keywords: juvenile institutions, incarcerated offenders, perpetration, victimization
Procedia PDF Downloads 300860 E-Government Adoption in Zimbabwe's Local Government: Understanding the Influence of Attitudes and Perceptions of Residents in Selected Cases
Authors: Ricky Munyaradzi Mukonza
Abstract:
E-government literature continues to grow as scholars and practitioners endeavour to understand this phenomenon. There are many facets of e-government that have been written about including its definition, adoption, and implementation and so on. However, more still needs to be known particularly in relation to how e-government is being adopted in different contexts. There could be many context specific factors that have a bearing on e-government adoption and in this paper focus is on attitudes and perceptions. Association between usage of e-government services and various perceptions such as ease of use, transparency, security, ease of understanding, communication, reliability, relevancy, perceived usefulness and perceived trust is examined. Within the Zimbabwean context and in particular the country’s local government sphere, such a study has not been done. The main aim of the paper is therefore to establish perceptions and attitudes towards e-government services among residents in Zimbabwe’s two local authorities. In terms of research methodology the paper is based on a Mixed Methods Approach (MMA) to collect and analyse data giving the researcher a holistic picture of the phenomenon being investigated. A sample of 785 residents from the two local authorities was used and these were selected using a combination of cluster and purposive sampling methods. A key finding in this paper is that a majority of respondents who have had the opportunity to use e-government services perceive the services to be easy to use, transparent, secure, easy to understand, reliable, relevant, useful and trustworthy. The paper, therefore, makes an important contribution on the relationship between residents’ perceptions and attitudes and e-government usage within the chosen cases.Keywords: adoption, attitudes, e-government, perceptions
Procedia PDF Downloads 313859 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 95858 Machine Learning Algorithms for Rocket Propulsion
Authors: Rômulo Eustáquio Martins de Souza, Paulo Alexandre Rodrigues de Vasconcelos Figueiredo
Abstract:
In recent years, there has been a surge in interest in applying artificial intelligence techniques, particularly machine learning algorithms. Machine learning is a data-analysis technique that automates the creation of analytical models, making it especially useful for designing complex situations. As a result, this technology aids in reducing human intervention while producing accurate results. This methodology is also extensively used in aerospace engineering since this is a field that encompasses several high-complexity operations, such as rocket propulsion. Rocket propulsion is a high-risk operation in which engine failure could result in the loss of life. As a result, it is critical to use computational methods capable of precisely representing the spacecraft's analytical model to guarantee its security and operation. Thus, this paper describes the use of machine learning algorithms for rocket propulsion to aid the realization that this technique is an efficient way to deal with challenging and restrictive aerospace engineering activities. The paper focuses on three machine-learning-aided rocket propulsion applications: set-point control of an expander-bleed rocket engine, supersonic retro-propulsion of a small-scale rocket, and leak detection and isolation on rocket engine data. This paper describes the data-driven methods used for each implementation in depth and presents the obtained results.Keywords: data analysis, modeling, machine learning, aerospace, rocket propulsion
Procedia PDF Downloads 116857 Stakeholder Engagement to Address Urban Health Systems Gaps for Migrants
Authors: A. Chandra, M. Arthur, L. Mize, A. Pomeroy-Stevens
Abstract:
Background: Lower and middle-income countries (LMICs) in Asia face rapid urbanization resulting in both economic opportunities (the urban advantage) and emerging health challenges. Urban health risks are magnified in informal settlements and include infectious disease outbreaks, inadequate access to health services, and poor air quality. Over the coming years, urban spaces in Asia will face accelerating public health risks related to migration, climate change, and environmental health. These challenges are complex and require multi-sectoral and multi-stakeholder solutions. The Building Health Cities (BHC) program is funded by the United States Agency for International Development (USAID) to work with smart city initiatives in the Asia region. BHC approaches urban health challenges by addressing policies, planning, and services through a health equity lens, with a particular focus on informal settlements and migrant communities. The program works to develop data-driven decision-making, build inclusivity through stakeholder engagement, and facilitate the uptake of appropriate technology. Methodology: The BHC program has partnered with the smart city initiatives of Indore in India, Makassar in Indonesia, and Da Nang in Vietnam. Implementing partners support municipalities to improve health delivery and equity using two key approaches: political economy analysis and participatory systems mapping. Political economy analyses evaluate barriers to collective action, including corruption, security, accountability, and incentives. Systems mapping evaluates community health challenges using a cross-sectoral approach, analyzing the impact of economic, environmental, transport, security, health system, and built environment factors. The mapping exercise draws on the experience and expertise of a diverse cohort of stakeholders, including government officials, municipal service providers, and civil society organizations. Results: Systems mapping and political economy analyses identified significant barriers for health care in migrant populations. In Makassar, migrants are unable to obtain the necessary card that entitles them to subsidized health services. This finding is being used to engage with municipal governments to mitigate the barriers that limit migrant enrollment in the public social health insurance scheme. In Indore, the project identified poor drainage of storm and wastewater in migrant settlements as a cause of poor health. Unsafe and inadequate infrastructure placed residents of these settlements at risk for both waterborne diseases and injuries. The program also evaluated the capacity of urban primary health centers serving migrant communities, identifying challenges related to their hours of service and shortages of health workers. In Da Nang, the systems mapping process has only recently begun, with the formal partnership launched in December 2019. Conclusion: This paper explores lessons learned from BHC’s systems mapping, political economy analyses, and stakeholder engagement approaches. The paper shares progress related to the health of migrants in informal settlements. Case studies feature barriers identified and mitigating steps, including governance actions, taken by local stakeholders in partner cities. The paper includes an update on ongoing progress from Indore and Makassar and experience from the first six months of program implementation from Da Nang.Keywords: informal settlements, migration, stakeholder engagement mapping, urban health
Procedia PDF Downloads 120856 Internalising Islamic Principles of Theocracy as a Pedestal for Good Governance in Nigeria
Authors: Busari Moshood Olanyi
Abstract:
Good governance remains the expectation of every political party in power, especially in this democratic dispensation of the Nigerian Nation. The need to ensure that the citizenry enjoys the dividends of democracy as often promised during various electioneering campaigns is envisioned to be the motif for different agendas and political slogans by different administrations. Unfortunately, different political agendas towards the security of lives and properties, halting the pillage of the economy by corrupt public officials and creation of employment opportunities for the youths, have a record of setback in the history of political leadership and governance in Nigeria. Therefore, the paper examined the principles of Islamic theocracy in its advocacy for a paradigm shift in the Nigerian political system, with a view to engendering good governance. Islamic political terms such as Shūrā (mutual consultation), ‘Adālah (equality and justice), Khilāfah (succession and stewardship) Majlis ash-Shūrā (consultative forum) and Muḥāsabah (accountability) were espoused as sacrosanct to implementing Islamic theocracy as an alternative system of government in Nigeria. The paper concluded by being flexible on the nomenclature of the suggested political system, considering the multi-religious nature of the country as a political entity. Among other recommendations, infusion of politics into our moral/religious system and not the other way round was considered a good step in the direction of a political paradigm shift for ensuring good governance and guaranteeing its sustainability in Nigeria.Keywords: Nigerian nation, democracy, good governance, Islamic theocracy, paradigm shift
Procedia PDF Downloads 146855 Evaluation of the Cities Specific Characteristics in the Formation of the Safavid Period Mints
Authors: Mahmood Seyyed, Akram Salehi Heykoei, Hamidreza Safakish Kashani
Abstract:
Among the remaining resource of the past, coins considered as an authentic documents among the most important documentary sources. The coins were minted in a place that called mint. The number and position of the mints in each period reflects the amount of economic power, political security and business growth, which was always fluctuated its position with changing the political and economic condition. Considering that, trade has more growth during the Safavid period than previous ones, the mint also has been in greater importance. It seems the one hand, the growth of economic in Safavid period has a direct link with the number and places of the mints at that time and in the other hand, the mints have been formed in some places because of the specific characteristic of cities and regions. Increasing the number of mints in the north of the country due to the growth of silk trade and in the west and northwest due to the political and commercial relation with Ottoman Empire, also the characteristics such as existence of mines, located in the Silk Road and communication ways, all are the results of this investigation. Accordingly, in this article researcher tries to examine the characteristics that give priority to a city for having mint. With considering that in the various historical periods, the mints were based in the most important cities in terms of political and social, at that time, this article examines the cities specific characteristics in the formation of the mints in Safavid period.Keywords: documentary sources, coins, mint, city, Safavid
Procedia PDF Downloads 268854 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 128853 A Causal Model for Environmental Design of Residential Community for Elderly Well-Being in Thailand
Authors: Porntip Ruengtam
Abstract:
This article is an extension of previous research presenting the relevant factors related to environmental perceptions, residential community, and the design of a healing environment, which have effects on the well-being and requirements of Thai elderly. Research methodology began with observations and interviews in three case studies in terms of the management processes and environment design of similar existing projects in Thailand. The interview results were taken to summarize with related theories and literature. A questionnaire survey was designed for data collection to confirm the factors of requirements in a residential community intended for the Thai elderly. A structural equation model (SEM) was formulated to explain the cause-effect factors for the requirements of a residential community for Thai elderly. The research revealed that the requirements of a residential community for Thai elderly were classified into three groups when utilizing a technique for exploratory factor analysis. The factors were comprised of (1) requirements for general facilities and activities, (2) requirements for facilities related to health and security, and (3) requirements for facilities related to physical exercise in the residential community. The results from the SEM showed the background of elderly people had a direct effect on their requirements for a residential community from various aspects. The results should lead to the formulation of policies for design and management of residential communities for the elderly in order to enhance quality of life as well as both the physical and mental health of the Thai elderly.Keywords: elderly, environmental design, residential community, structural equation modeling
Procedia PDF Downloads 314852 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good
Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori
Abstract:
Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.Keywords: mobile health, mhealth apps, cyberchondria, health anxiety
Procedia PDF Downloads 92851 Flood Hazard and Risk Mapping to Assess Ice-Jam Flood Mitigation Measures
Authors: Karl-Erich Lindenschmidt, Apurba Das, Joel Trudell, Keanne Russell
Abstract:
In this presentation, we explore options for mitigating ice-jam flooding along the Athabasca River in western Canada. Not only flood hazard, expressed in this case as the probability of flood depths and extents being exceeded, but also flood risk, in which annual expected damages are calculated. Flood risk is calculated, which allows a cost-benefit analysis to be made so that decisions on the best mitigation options are not based solely on flood hazard but also on the costs related to flood damages and the benefits of mitigation. The river ice model is used to simulate extreme ice-jam flood events with which scenarios are run to determine flood exposure and damages in flood-prone areas along the river. We will concentrate on three mitigation options – the placement of a dike, artificial breakage of the ice cover along the river, the installation of an ice-control structure, and the construction of a reservoir. However, any mitigation option is not totally failsafe. For example, dikes can still be overtopped and breached, and ice jams may still occur in areas of the river where ice covers have been artificially broken up. Hence, for all options, it is recommended that zoning of building developments away from greater flood hazard areas be upheld. Flood mitigation can have a negative effect of giving inhabitants a false sense of security that flooding may not happen again, leading to zoning policies being relaxed. (Text adapted from Lindenschmidt [2022] "Ice Destabilization Study - Phase 2", submitted to the Regional Municipality of Wood Buffalo, Alberta, Canada)Keywords: ice jam, flood hazard, flood risk river ice modelling, flood risk
Procedia PDF Downloads 189850 Role of Diplomacy toward Social Welfare, Equity and Economic Growth: Case Study of President Joko Widodo's Economic Diplomacy in Investment Sector in Indonesia
Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina
Abstract:
Indonesia with its former presidents has enhanced the bilateral cooperation also multilateral cooperation in terms of economy but the result was not significant towards eradicating poverty, unemployment, income inequality, and economic growth. To eradicate these problems, President Joko Widodo through his several points of Nawacita wants to boost Indonesia’s economic relationship and cooperation which manifested in “Economic Diplomacy” as one of Indonesia’s foreign policy priority and he pitches it in international forums. The economic diplomacy does not only attracts prospective countries but also attracts the foreign businessman and investors. The economic diplomacy includes four sectors which are vital for economic growth, one of them is investment. This paper would like to answer how economic diplomacy can have significant impact towards social welfare, equity and economic growth especially in Indonesia. The purpose of this paper is to explore the role of economic diplomacy and its impact toward Indonesia’s welfare, equity, and economic growth. This paper uses the theory of economic diplomacy to link the current international political economic sphere and the impact of economic diplomacy for Indonesia through case study method. The paper affirms that economic diplomacy in investment sector does have significant impact, especially in the development of infrastructures, foreign direct investment in several sectors, and food security.Keywords: economic diplomacy, economic growth, equity, Indonesia, Joko Widodo, social welfare
Procedia PDF Downloads 310