Search results for: IoT deployment challenges
4270 Understanding Evidence Dispersal Caused by the Effects of Using Unmanned Aerial Vehicles in Active Indoor Crime Scenes
Authors: Elizabeth Parrott, Harry Pointon, Frederic Bezombes, Heather Panter
Abstract:
Unmanned aerial vehicles (UAV’s) are making a profound effect within policing, forensic and fire service procedures worldwide. These intelligent devices have already proven useful in photographing and recording large-scale outdoor and indoor sites using orthomosaic and three-dimensional (3D) modelling techniques, for the purpose of capturing and recording sites during and post-incident. UAV’s are becoming an established tool as they are extending the reach of the photographer and offering new perspectives without the expense and restrictions of deploying full-scale aircraft. 3D reconstruction quality is directly linked to the resolution of captured images; therefore, close proximity flights are required for more detailed models. As technology advances deployment of UAVs in confined spaces is becoming more common. With this in mind, this study investigates the effects of UAV operation within active crimes scenes with regard to the dispersal of particulate evidence. To date, there has been little consideration given to the potential effects of using UAV’s within active crime scenes aside from a legislation point of view. Although potentially the technology can reduce the likelihood of contamination by replacing some of the roles of investigating practitioners. There is the risk of evidence dispersal caused by the effect of the strong airflow beneath the UAV, from the downwash of the propellers. The initial results of this study are therefore presented to determine the height of least effect at which to fly, and the commercial propeller type to choose to generate the smallest amount of disturbance from the dataset tested. In this study, a range of commercially available 4-inch propellers were chosen as a starting point due to the common availability and their small size makes them well suited for operation within confined spaces. To perform the testing, a rig was configured to support a single motor and propeller powered with a standalone mains power supply and controlled via a microcontroller. This was to mimic a complete throttle cycle and control the device to ensure repeatability. By removing the variances of battery packs and complex UAV structures to allow for a more robust setup. Therefore, the only changing factors were the propeller and operating height. The results were calculated via computer vision analysis of the recorded dispersal of the sample particles placed below the arm-mounted propeller. The aim of this initial study is to give practitioners an insight into the technology to use when operating within confined spaces as well as recognizing some of the issues caused by UAV’s within active crime scenes.Keywords: dispersal, evidence, propeller, UAV
Procedia PDF Downloads 1634269 Policy and Strategy to Combatting Terrorism in Indonesia: Analysis Socio Juridical Counter and Contra Terrorism
Authors: Dini Dewi Heniarti
Abstract:
In the past decades, Indonesia has suffered severe terrorist attacks, faced major terrorism challenges and has made impressive progress in countering it. The trend of terrorist groups operating in Indonesia is to focus on ‘soft’ targets. Indonesia has made notable progress in strengthening the legal regime against terrorism, in conformity with the international treaties against terrorism. Further measures are however needed to complete the legal regime building processes. This paper will demonstrate analyze socio yuridical contra and counter terrorism by Indonesia Government.Keywords: policy, strategy, combatting terrorism, socio juridical, counter and contra terrorism
Procedia PDF Downloads 4234268 Development of an Interagency Crime Management System for Nigeria’s Law Enforcement Agencies
Authors: Muhammad Abba Jallo, Fred Fudah Moveh
Abstract:
This study addresses the challenges faced by Nigerian law enforcement agencies due to the lack of an integrated crime management system. While various agencies use ICT-based systems, the absence of interoperability creates barriers to effective collaboration and information sharing. The research proposes the development of an Interagency Crime Management System (ICMS), which integrates the Crime Management Systems (CMS) of different agencies through an Application Program Interface (API). The system is designed to allow all law enforcement agencies to input data using a standardized format, improving crime tracking, reporting, and management across Nigeria. This paper details the design and implementation process, highlighting the benefits of enhanced collaboration for crime management.Keywords: crime management, Nigeria, law enforcement, ICT
Procedia PDF Downloads 194267 Cosmic Radiation Hazards and Protective Strategies in Space Exploration
Authors: Mehrnaz Mostafavi, Alireza Azani, Mahtab Shabani, Fatemeh Ghafari
Abstract:
While filled with promise and wonder, space exploration also presents significant challenges, one of the foremost being the threat of cosmic radiation to astronaut health. Recent advancements in assessing these risks and developing protective strategies have shed new light on this issue. Cosmic radiation encompasses a variety of high-energy particles originating from sources like solar particle events, galactic cosmic rays, and cosmic rays from beyond the solar system. These particles, composed of protons, electrons, and heavy ions, pose a substantial threat to human health in space due to the lack of Earth's protective atmosphere and magnetic field. Researchers have made significant progress in assessing the risks associated with cosmic radiation exposure. By employing advanced dosimetry techniques and conducting biological studies, they have gained insights into how cosmic radiation affects astronauts' health, including increasing the risk of cancer and radiation sickness. This research has led to personalized risk assessment methods tailored to individual astronaut profiles. Distinctive protection strategies have been proposed to combat the dangers of cosmic radiation. These include developing spacecraft shielding materials and designs to enhance radiation protection. Additionally, researchers are exploring pharmacological interventions such as radioprotective drugs and antioxidant therapies to mitigate the biological effects of radiation exposure and preserve astronaut well-being. The findings from recent research have significant implications for the future of space exploration. By advancing our understanding of cosmic radiation risks and developing effective protection strategies, we pave the way for safer and more sustainable human missions beyond Earth's orbit. This is especially crucial for long-duration missions to destinations like Mars, where astronauts will face prolonged exposure to cosmic radiation. In conclusion, recent research has marked a milestone in addressing the challenges posed by cosmic radiation in space exploration. By delving into the complexities of cosmic radiation exposure and developing innovative protection strategies, scientists are ensuring the health and resilience of astronauts as they venture into the vast expanse of the cosmos. Continued research and collaboration in this area are essential for overcoming the cosmic radiation challenge and enabling humanity to embark on new frontiers of exploration and discovery in space.Keywords: Space exploration, cosmic radiation, astronaut health, risk assessment, protective strategies
Procedia PDF Downloads 794266 The Mental Health of Indigenous People During the COVID-19 Pandemic: A Scoping Review
Authors: Suzanne L. Stewart, Sarah J. Ponton, Mikaela D. Gabriel, Roy Strebel, Xinyi Lu
Abstract:
Indigenous Peoples have faced unique barriers to accessing and receiving culturally safe and appropriate mental health care while also facing daunting rates of mental health diagnoses and comorbidities. Indigenous researchers and clinicians have well established the connection of the current mental health issues in Indigenous communities as a direct result of colonization by way of intergenerational trauma throughout Canada’s colonial history. Such mental health barriers and challenges have become exacerbated during the COVID-19 pandemic. Throughout the pandemic, access to mental health, cultural, ceremonial, and community services were severely impacted and restricted; however, it is these same cultural activities and community resources that are key to supporting Indigenous mental health from a traditional and community-based perspective. This research employed a unique combination of a thorough, analytical scoping review of the existent mental health literature of Indigenous mental health in the COVID-19 pandemic, alongside narrative interviews employing an oral storytelling tradition methodology with key community informants that provide comprehensive cultural services to the Indigenous community of Toronto, as well as across Canada. These key informant interviews provided a wealth of insights into virtual transitions of Indigenous care and mental health support; intersections of historical underfunding and current financial navigation in technology infrastructure; accessibility and connection with Indigenous youth in remote locations; as well as maintaining community involvement and traditional practices in a current pandemic. Both the scoping review and narrative interviews were meticulously analyzed for overarching narrative themes to best explore the extent of the literature on Indigenous mental health and services during COVID-19; identify gaps in this literature; identify barriers and supports for the Indigenous community, and explore the intersection of community and cultural impacts to mental health. Themes of the scoping review included: Historical Context; Challenges in Culturally-Based Services; and Strengths in Culturally-Based Services. Meta themes across narrative interviews included: Virtual Transitions; Financial Support for Indigenous Services; Health Service Delivery & Wellbeing; and Culture & Community Connection. The results of this scoping review and narrative interviews provide wide application and contribution to the mental health literature, as well as recommendations for policy, service provision, autonomy in Indigenous health and wellbeing, and crucial insights into the present and enduring mental health needs of Indigenous Peoples throughout the COVID-19 pandemic.Keywords: indigenous community services, indigenous mental health, indigenous scoping review, indigenous peoples and Covid-19
Procedia PDF Downloads 2414265 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5224264 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1394263 The Role of the Indigenous Radio Today and Its Impact on the Audience: The Case of Dambana FM in Sri Lanka
Authors: Dammika Bandara Herath
Abstract:
A group of people who inherits a long history of existence within a particular country may be known as early inhabitants or indigenous peoples. In other words, they have not migrated to the particular territory from another part of the world and at the same time, they have inhabited the territory in issue prior to the time of a major invasion/migration. According to the UN, there are a number of unique attributes of the indigenous peoples: Self-identification as indigenous people,Historical continuity with pre-colonial and/or pre-settler societies, Distinct social, economic or political systems, Distinct language, culture and beliefs, Form non-dominant groups of society, Resolve to maintain and reproduce their ancestral environments and systems as distinctive peoples and communities. Indigenous peoples constitute 5% of the world’s population. They are also known as tribal people, first people, native people, and indigenous people. Various indigenous communities can be found in about 90 countries in the world. Asia is home to approximately 70 % of these indigenous communities who have their own unique socio-cultural identities. Most indigenous communities remain isolated from the mainstream social, cultural, and economic institutions of their homeland. Yet, they inherited their own unique rights and responsible peculiar to their own group. These include: Protecting the socio-cultural heritage of the group, Protecting the unique identity of their community from socio-cultural changes in the mainstream communities,Protecting their land, Diffusing their cultural heritage to the future generation, Co-existing peacefully with other community .However, indigenous peoples encounter a lot of challenges as a result of socio-cultural change and legal restrictions in the world today. To assist the communities to face these challenges, the mass –media can play a significant role and the radio media has a purpose-built mechanism for this mission, known as the indigenous radio. In Sri Lanka, Dambana FM is such a radio channel based on the indigenous radio model. The target audience of this channel is the vedda / indigenous community of Sri Lanka. This study intends to the current role of the indigenous radio based on Dambana FM, of which the target audience is the indigenous community of Dambana. For the purpose of this study, interviews were conducted among fifty randomly selected respondents from the indigenous community of Dambana. As far as the findings of this study are concerned, problems in the quality of the programmed broadcasted and problems of transmission are the key issues faced by the indigenous radio in Sri Lanka. Based on the findings, the researcher seeks to develop a model to enhance the impact of the indigenous radio on its listeners in Sri Lanka.Keywords: indigenous, communities, radio, vedda, culture
Procedia PDF Downloads 4094262 Optimal Applications of Solar Energy Systems: Comparative Analysis of Ground-Mounted and Rooftop Solar PV Installations in Drought-Prone and Residential Areas of the Indian Subcontinent
Authors: Rajkumar Ghosh, Bhabani Prasad Mukhopadhyay
Abstract:
The increasing demand for environmentally friendly energy solutions highlights the need to optimize solar energy systems. This study compares two types of solar energy systems: ground-mounted solar panels for drought-prone locations and rooftop solar PV installations measuring 300 sq. ft. (approx. 28 sq. m.). The electricity output of 4730 kWh/year saves ₹ 14191/year. As a clean and sustainable energy source, solar power is pivotal in reducing greenhouse gas CO2 emissions reduction by 85 tonnes in 25 years and combating climate change. This effort, "PM Suryadaya Ghar-Muft Bijli Yojana," seeks to empower Indian homes by giving free access to solar energy. The initiative is part of the Indian government's larger attempt to encourage clean and renewable energy sources while reducing reliance on traditional fossil fuels. This report reviews various installations and government reports to analyse the performance and impact of both ground-mounted and rooftop solar systems. Besides, effectiveness of government subsidy programs for residential on-grid solar systems, including the ₹78,000 incentive for systems above 3 kW. The study also looks into the subsidy schemes available for domestic agricultural grid use. Systems up to 3 kW receive ₹43,764, while systems over 10 kW receive a fixed subsidy of ₹94,822. Households can save a substantial amount of energy and minimize their reliance on grid electricity by installing the proper solar plant capacity. In terms of monthly consumption at home, the acceptable Rooftop Solar Plant capacity for households is 0-150 units (1-2 kW), 150-300 units (2-3 kW), and >300 units (above 3 kW). Ground-mounted panels, particularly in arid regions, offer benefits such as scalability and optimal orientation but face challenges like land use conflicts and environmental impact, particularly in drought-prone regions. By evaluating the distinct advantages and challenges of each system, this study aims to provide insights into their optimal applications, guiding stakeholders in making informed decisions to enhance solar energy efficiency and sustainability within regulatory constraints. This research also explores the implications of regulations, such as Italy's ban on ground-mounted solar panels on productive agricultural land, on solar energy strategies.Keywords: sustainability, solar energy, subsidy, rooftop solar energy, renewable energy
Procedia PDF Downloads 484261 Understanding the Challenges of Lawbook Translation via the Framework of Functional Theory of Language
Authors: Tengku Sepora Tengku Mahadi
Abstract:
Where the speed of book writing lags behind the high need for such material for tertiary studies, translation offers a way to enhance the equilibrium in this demand-supply equation. Nevertheless, translation is confronted by obstacles that threaten its effectiveness. The primary challenge to the production of efficient translations may well be related to the text-type and in terms of its complexity. A text that is intricately written with unique rhetorical devices, subject-matter foundation and cultural references will undoubtedly challenge the translator. Longer time and greater effort would be the consequence. To understand these text-related challenges, the present paper set out to analyze a lawbook entitled Learning the Law by David Melinkoff. The book is chosen because it has often been used as a textbook or for reference in many law courses in the United Kingdom and has seen over thirteen editions; therefore, it can be said to be a worthy book for studies in law. Another reason is the existence of a ready translation in Malay. Reference to this translation enables confirmation to some extent of the potential problems that might occur in its translation. Understanding the organization and the language of the book will help translators to prepare themselves better for the task. They can anticipate the research and time that may be needed to produce an effective translation. Another premise here is that this text-type implies certain ways of writing and organization. Accordingly, it seems practicable to adopt the functional theory of language as suggested by Michael Halliday as its theoretical framework. Concepts of the context of culture, the context of situation and measures of the field, tenor and mode form the instruments for analysis. Additional examples from similar materials can also be used to validate the findings. Some interesting findings include the presence of several other text-types or sub-text-types in the book and the dependence on literary discourse and devices to capture the meanings better or add color to the dry field of law. In addition, many elements of culture can be seen, for example, the use of familiar alternatives, allusions, and even terminology and references that date back to various periods of time and languages. Also found are parts which discuss origins of words and terms that may be relevant to readers within the United Kingdom but make little sense to readers of the book in other languages. In conclusion, the textual analysis in terms of its functions and the linguistic and textual devices used to achieve them can then be applied as a guide to determine the effectiveness of the translation that is produced.Keywords: functional theory of language, lawbook text-type, rhetorical devices, culture
Procedia PDF Downloads 1494260 Legal Implications of a Single African Air Transport Market on Airlines and Passengers in Nigeria
Authors: Adejoke Omowumi Adediran
Abstract:
The commitment of African states to liberalise civil aviation in Africa through the implementation of the Yamoussoukro Decision of 1999 was reiterated in 2015 at the African Union Assembly meeting. A declaration was made by African Heads of government at the meeting to ensure the immediate implementation of the decision towards the establishment of a Single African Air Transport Market (SAATM) by 2017. A SAATM will imply among others, a removal of all commercial restrictions for African airlines in Africa; access to any route in Africa by African airlines without any required permit or authorisation; and a common set of regulations for airlines in African member states. As the envisioned 2017 date for launching the SAATM could not be met, a new date of January 2018 has been set. The lack of political will by African States, however, remains a prominent challenge to the realisation of the SAATM. As at June 2017, only twenty-one states had signed the commitment to actualise the decision creating the SAATM. In actualisation of the SAATM, a regulatory framework has been established to efficiently manage the new African airline industry, and regulatory texts have been adopted as part of the legal regime. This legal regime is to regulate both interstate and domestic operations. Airlines in Nigeria are currently faced with certain challenges which ultimately affect their effectiveness and passengers as well do not enjoy utmost customer satisfaction with services rendered by the airlines. Although Nigeria has demonstrated support for the SAATM since 2015, as Nigeria alongside ten other states, signed the initial commitment, whether or not SAATM will eventually be beneficial to airlines and passengers has become an issue in the light of the challenges of the Nigerian airline industry. Remarkably, the benefit of the SAATM is to a large extent ultimately determined by its legal framework. Using doctrinal research, this paper examines the legal implications of the SAATM on airlines and passengers in Nigeria. This paper analyses the legal framework of SAATM and juxtaposes this with the particular issues affecting airlines and passengers in Nigeria such as financial difficulties on the part of airlines and consumer protection as regards passengers. Among others, it can be asserted that the legal regime affords an opportunity for business expansion and creates a fair environment for competition. This is beneficial not only to the airlines but to passengers as well. In addition, in the interest of passengers, consumer rights are prescribed, and the regulations also cater for situations where airlines interrupt their services, as losses arising from these situations will be mitigated. There is indeed no doubt that the SAATM will be of great utility to both airlines and passengers in Nigeria.Keywords: airlines, civil aviation, competition, consumer protection, passengers, single African air transport market, yamoussoukro decision
Procedia PDF Downloads 1404259 Women Inclusiveness in Government Leaderships and Public Relations
Authors: Larissa Kamdjong
Abstract:
The purpose of this research is to introduce inclusive leadership as a distinct theoretical framework to understand its meaning and functions in advancing gender equality and empowerment in public relations leadership. By proposing women inclusive leadership theoretical model, we explored the roles of inclusive leadership in fostering an organization’s diverse climate and facilitating its practice of participative leadership in empowering women in public relations to reach their full potential in leadership advancement. Moreover, our results confirmed both direct and indirect impacts inclusive leadership could have on women’s perceptions of continued career growth opportunities. Our findings provide theoretical implications and practical solutions to address women’s leadership challenges through an inclusive leadership lens.Keywords: inclusiveness, empowerment, leadership, career opportunities
Procedia PDF Downloads 474258 Water Crisis or Crisis of Water Management: Assessing Water Governance in Iran
Authors: Sedigheh Kalantari
Abstract:
Like many countries in the arid and semi-arid belt, Iran experiences a natural limitation in the availability of water resources. However, rapid socioeconomic development has created a serious water crisis in a nation that was once one of the world’s pioneers in sustainable water management, due to the Persians’ contribution to hydraulic engineering inventions – the Qanat – throughout history. The exogenous issues like the changing climate, frequent droughts, and international sanctions are only crisis catalyzers, not the main cause of the water crisis; and a resilient water management system is expected to be capable of coping with these periodic external pressures. The current dramatic water security issues in Iran are rooted in managerial, political, and institutional challenges rather than engineering and technical issues, and the country is suffering from challenges in water governance. The country, instead of rigorous water conservation efforts, is still focused on supply-driven approach, technology and centralized methods, and structural solutions that aim to increase water supply; while the effectiveness of water governance and management has often left unused. To solve these issues, it is necessary to assess the present situation and its evolution over time. In this respect, establishing water governance assessment mechanisms will be a significant aspect of this paper. The research framework, however, is a conceptual framework to assess governance performance of Iran to critically diagnose problematic issues and areas, as well as proffer empirically based solutions and determine the best possible steps towards transformational processes. This concept aims to measure the adequacy of current solutions and strategies designed to ameliorate these problems and then develop and prescribe adequate futuristic solutions. Thus, the analytical framework developed in this paper seeks to provide insights on key factors influencing water governance in Iranian cities, institutional frameworks to manage water across scales and authorities, multi-level management gaps and policy responses, through an evidence-based approach and good practices to drive reform toward sustainability and water resource conservation. The findings of this paper show that the current structure of the water governance system in Iran, coupled with the lack of a comprehensive understanding of the root causes of the problem, leaves minimal hope for developing sustainable solutions to Iran’s increasing water crisis. In order to follow sustainable development approaches, Iran needs to replace symptom management with problem prevention.Keywords: governance, Iran, sustainable development, water management, water resources
Procedia PDF Downloads 264257 Ontology as Knowledge Capture Tool in Organizations: A Literature Review
Authors: Maria Margaretha, Dana Indra Sensuse, Lukman
Abstract:
Knowledge capture is a step in knowledge life cycle to get knowledge in the organization. Tacit and explicit knowledge are needed to organize in a path, so the organization will be easy to choose which knowledge will be use. There are many challenges to capture knowledge in the organization, such as researcher must know which knowledge has been validated by an expert, how to get tacit knowledge from experts and make it explicit knowledge, and so on. Besides that, the technology will be a reliable tool to help the researcher to capture knowledge. Some paper wrote how ontology in knowledge management can be used for proposed framework to capture and reuse knowledge. Organization has to manage their knowledge, process capture and share will decide their position in the business area. This paper will describe further from literature review about the tool of ontology that will help the organization to capture its knowledge.Keywords: knowledge capture, ontology, technology, organization
Procedia PDF Downloads 6064256 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management
Authors: Mehrnoosh Askarizadeh
Abstract:
To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle
Procedia PDF Downloads 4814255 Bringing German History to Tourists
Authors: Gudrun Görlitz, Christian Schölzel, Alexander Vollmar
Abstract:
Sites of Jewish Life in Berlin 1933-1945. Between Persecution and Self-assertion” was realized in a project funded by the European Regional Development Fund. A smartphone app, and a associated web site enable tourists and other participants of this educational offer to learn in a serious way more about the life of Jews in the German capital during the Nazi era. Texts, photos, video and audio recordings communicate the historical content. Interactive maps (both current and historical) make it possible to use predefined or self combined routes. One of the manifold challenges was to create a broad ranged guide, in which all detailed information are well linked with each other. This enables heterogeneous groups of potential users to find a wide range of specific information, corresponding with their particular wishes and interests. The multitude of potential ways to navigate through the diversified information causes (hopefully) the users to utilize app and web site for a second or third time and with a continued interest. Therefore 90 locations, a lot of them situated in Berlin’s city centre, have been chosen. For all of them text-, picture and/or audio/video material gives extensive information. Suggested combinations of several of these “site stories” are leading to the offer of detailed excursion routes. Events and biographies are also presented. A few of the implemented biographies are especially enriched with source material concerning the aspect of (forced) migration of these persons during the Nazi time. All this was done in a close and fruitful interdisciplinary cooperation of computer scientists and historians. The suggested conference paper aims to show the challenges shaping complex source material for practical use by different user-groups in a proper technical and didactic way. Based on the historical research in archives, museums, libraries and digital resources the quantitative dimension of the project can be sized as follows: The paper focuses on the following historiographical and technical aspects: - Shaping the text material didactically for the use in new media, especially a Smartphone-App running on differing platforms; - Geo-referencing of the sites on historical and current map material; - Overlay of old and new maps to present and find the sites; - Using Augmented Reality technologies to re-visualize destroyed buildings; - Visualization of black-/white-picture-material; - Presentation of historical footage and the resulting problems to need too much storage space; - Financial and juridical aspects in gaining copyrights to present archival material.Keywords: smartphone app, history, tourists, German
Procedia PDF Downloads 3754254 Investigating the Abolishment of Virginity Testing in South Africa
Authors: Nqobizwe Mvelo Ngema
Abstract:
This paper argues that the custom of virginity testing has been revived in order to combat against social ills such as unwanted pregnancies, immorality, promiscuity and the spread of HIV/AIDS. However, virginity testing is not free from challenges such as the belief that having sexual intercourse with a virgin can cure men from AIDS, virginity testing is not accurate because there is scientific evidence supporting the fact that there many ways of losing virginity other than sexual intercourse, for example, the usage of tampons and participation in physical activities may tear the hymen. South African parliament took some positive steps in combatting against harm associated with virginity testing by regulating it in the Children’s Act. It is argued, in this paper, that the abolition of virginity testing may lead to paper law and it would be premature to abolish virginity testing in South Africa.Keywords: equality rights, virginity testing, human rights, interdisciplinary law and legal studies
Procedia PDF Downloads 5274253 Early Childhood Education and Learning Outcomes in Lower Primary Schools, Uganda
Authors: John Acire, Wilfred Lajul, Ogwang Tom
Abstract:
Using a qualitative research technique, this study investigates the influence of Early Childhood Education (ECE) on learning outcomes in lower primary schools in Gulu City, Uganda. The study, which is based on Vygotsky's sociocultural theory of human learning, fills gaps in the current literature on the influence of ECE on learning outcomes. The aims of the study include analyzing the state of learning outcomes, investigating ECE practices, and determining the influence of these practices on learning outcomes in lower primary schools. The findings highlight the critical significance of ECE in promoting children's overall development. Nursery education helps children improve their handwriting, reading abilities, and general cognitive development. Children who have received nursery education have improved their abilities to handle pencils, form letters, and engage in social interactions, highlighting the significance of fine motor skills and socializing. Despite the good elements, difficulties in implementing ECE practices were found, such as differences in teaching styles, financial limits, and potential weariness due to prolonged school hours. The study suggests focused interventions to improve the effectiveness of ECE practices, ensure their connection with educational goals and maximize their influence on children's development. The study's findings show that respondents agree on the importance of nursery education in supporting holistic development, socialization, language competency, and conceptual comprehension. Challenges in nursery education, such as differences in teaching techniques and insufficient resources, highlight the need for comprehensive measures to address these challenges. Furthermore, parental engagement in home learning activities was revealed as an important factor affecting early education outcomes. Children who were engaged at home performed better in lower primary, emphasizing the value of a supportive family environment. Finally, the report suggests measures to enhance parental participation, changes in teaching methods through retraining, and age-appropriate enrolment. Future studies might concentrate on the involvement of parents, ECE policy practice, and the influence of ECE teachers on lower primary school learning results. These ideas are intended to help create a more favorable learning environment by encouraging holistic development and preparing children for success in succeeding academic levels.Keywords: early childhood education, learning outcomes in lower primary schools, early childhood education practices, how ECE practices influence learning outcomes in lower primary schools
Procedia PDF Downloads 424252 Training as a Service for Electronic Warfare
Authors: Toan Vo
Abstract:
Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied.Keywords: training, electronic warfare, economics, law enforcement
Procedia PDF Downloads 1034251 Effect of Institutional Structure on Project Managers Performance in Construction Projects: A Case Study in Nigeria
Authors: Ebuka Valentine Iroha, Tsunemi Watanabe, Satoshi Tsuchiya
Abstract:
Project management practices play an important role in construction project performance and are one of project managers' essential key performance indicators. Previous studies have explored the poor performance of the construction industry, with project delays and cost overruns identified to contribute largely to numerous abandoned projects. These challenges are attributed to insufficient project management practices and a lack of utilization of project managers. The actual causes of inadequate project management practices and underutilization of project managers have been rarely discussed. This study tends to bridge the gap by identifying and assessing the actual causes of insufficient project management practices and underutilization of project managers. This study differs from past studies investigating the causes of poor performance by using institutional analysis methods to identify and analyze the factors influencing project management practices and proper utilization of project managers. Based on a comprehensive literature review, this study identified some factors embedded in the construction industry that influence the institutional environment and weaken the laws and regulations. These factors were used as the basis for semi-structured interview questions to investigate their impacts on project management practices and project managers. The data collected were coded into a four-level framework for institutional analysis. This method was used to analyze the interrelationships between the identified embedded factors, institutional laws and regulations, and construction organizations to understand how these influences result in the underutilization of project managers. The study found that the underutilization of project managers consists of two subsystems, including underutilization and lowering commitment. The first subsystem, corruption, political influence, religious and tribal discrimination, and organizational culture, were found to affect the institutional structure. These embedded factors weaken the industry’s governance mechanism, forcing project managers to prioritize corrupt practices over project demands. The ineffectiveness of the existing laws and regulations worsens the situation, supporting unfair working conditions and contributing to the underperformance of project managers. This situation leads to the development of the second subsystem, which is characterized by a lack of opportunities for career development and minimal incentives within construction organizations. The findings provide significant potential for addressing systemic challenges in the construction industry, particularly the underutilization of project managers and enhancing organizational support measures to improve project management practices and mitigate the adverse effects of corruption.Keywords: construction industry, project management, poor performance, embedded factors, project managers underutilization
Procedia PDF Downloads 384250 Sexuality Education through Media and Technology: Addressing Unmet Needs of Adolescents in Bangladesh
Authors: Farhana Alam Bhuiyan, Saad Khan, Tanveer Hassan, Jhalok Ranjon Talukder, Syeda Farjana Ahmed, Rahil Roodsaz, Els Rommes, Sabina Faiz Rashid
Abstract:
Breaking the shame’ is a 3 year (2015-2018) qualitative implementation research project which investigates several aspects of sexual and reproductive health and rights (SRHR) issues for adolescents living in Bangladesh. Scope of learning SRHR issues for adolescents is limited here due to cultural and religious taboos. This study adds to the ongoing discussions around adolescent’s SRHR needs and aims to, 1) understand the overall SRHR needs of urban and rural unmarried female and male adolescents and the challenges they face, 2) explore existing gaps in the content of SRHR curriculum and 3) finally, addresses some critical knowledge gaps by developing and implementing innovative SRHR educational materials. 18 in-depth interviews (IDIs) and 10 focus-group discussions (FGDs) with boys and 21 IDIs and 14 FGDs with girls of ages 13-19, from both urban and rural setting took place. Curriculum materials from two leading organizations, Unite for Body Rights (UBR) Alliance Bangladesh and BRAC Adolescent Development Program (ADP) were also reviewed, with discussions with 12 key program staff. This paper critically analyses the relevance of some of the SRHR topics that are covered, the challenges with existing pedagogic approaches and key sexuality issues that are not covered in the content, but are important for adolescents. Adolescents asked for content and guidance on a number of topics which remain missing from the core curriculum, such as emotional coping mechanisms particularly in relationships, bullying, impact of exposure to porn, and sexual performance anxiety. Other core areas of concern were effects of masturbation, condom use, sexual desire and orientation, which are mentioned in the content, but never discussed properly, resulting in confusion. Due to lack of open discussion around sexuality, porn becomes a source of information for the adolescents. For these reasons, several myths and misconceptions regarding SRHR issues like body, sexuality, agency, and gender roles still persist. The pedagogical approach is very didactic, and teachers felt uncomfortable to have discussions on certain SRHR topics due to cultural taboos or shame and stigma. Certain topics are favored- such as family planning, menstruation- and presented with an emphasis on biology and risk. Rigid formal teaching style, hierarchical power relations between students and most teachers discourage questions and frank conversations. Pedagogy approaches within classrooms play a critical role in the sharing of knowledge. The paper also describes the pilot approaches to implementing new content in SRHR curriculum. After a review of findings, three areas were selected as critically important, 1) myths and misconceptions 2) emotional management challenges, and 3) how to use condom, that have come up from adolescents. Technology centric educational materials such as web page based information platform and you tube videos are opted for which allow adolescents to bypass gatekeepers and learn facts and information from a legitimate educational site. In the era of social media, when information is always a click away, adolescents need sources that are reliable and not overwhelming. The research aims to ensure that adolescents learn and apply knowledge effectively, through creating the new materials and making it accessible to adolescents.Keywords: adolescents, Bangladesh, media, sexuality education, unmet needs
Procedia PDF Downloads 2284249 School Counseling in Sri Lanka: Analysis of the past Recommending a Way Forward
Authors: Buddhiprabha D. D. Pathirana
Abstract:
Despite a rapid increase in the number of school counselors in the recent past; procuring the service of school counselors is a luxury that many Sri Lankan schools cannot afford. In addition, school counseling in Sri Lanka also faces new challenges in implementation due to the fact that a generally agreed consensus on training, ethical standards, role identity, counseling model, and structures for school counselors has not been reached. Therefore, this paper has several objectives. First, it reviews a brief history of school counseling in Sri Lanka and describes its current status. Second, it describes current trends/ problems specific to Sri Lankan school counseling milieu which have limited the progress of school counseling as a practice. Third, it discusses societal and cultural issues that are important to consider when implementing school counseling as a practices in Sri Lanka and provides recommendations to improve it.Keywords: school counseling, Sri Lanka, current situation, recommendations
Procedia PDF Downloads 5384248 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective
Authors: Eisa Younes Alblooshi
Abstract:
Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.Keywords: terrorism, counterterrorism, model, strategy
Procedia PDF Downloads 1584247 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 874246 Neo-Liberal Challenge - Apple in China
Authors: Mark McKeown
Abstract:
Press articles opining on how China has become the West’s biggest threat have become so common as to feel like old news. Since the United States shifted diplomatic recognition from Taiwan to the People’s Republic of China in 1979 the relationship between the world’s two largest economies has been at best a brittle one. This coiled tension has grown as trade between the two countries snaked ever upwards. As a byproduct of globalization Apple have focused much of their production and assembly in China. This has left the U.S. Big Tech company with several challenges. This paper focusses on the tightrope Apple now has to traverse. The majority of the data and analysis within this paper is sourced from my current ongoing PhD research on the influence of Big Tech lobbying on U.S. foreign policy. One of the main conclusions from this analysis is Apple has to adopt a carefully nuanced strategy of appeasement to avoid friction, with both the governments of China and the United States.Keywords: apple, China, Taiwan, war
Procedia PDF Downloads 654245 The Impact of Usefulness and Ease of Using Mobile Learning Technology on Faculty Acceptance
Authors: Leena Ahmad Khaleel Alfarani, Maggie McPherson, Neil Morris
Abstract:
Over the last decade, m-learning has been widely accepted and utilized by many western universities. However, Saudi universities face many challenges in utilizing such technology, a central one being to encourage teachers to use such technology. Although there are several factors that affect faculty members’ participation in the adoption of m-learning, this paper focuses merely on two factors, the usefulness and ease of using m-learning. A sample of 279 faculty members in one Saudi university has responded to the online survey. The results of the study have revealed that there is a statistically significant relationship (at the 0.05 level) between both usefulness and ease of using m-learning factors and the intention of teachers to use m-learning currently and in the future.Keywords: mobile learning, diffusion of innovation theory, technology acceptance, faculty adoption
Procedia PDF Downloads 5454244 The Failure of Democracy in Libya
Authors: Ali Musbah Mohamed Elwahishi
Abstract:
Democracy is demand for the majority of people in the whole world, Specifically in the regions that are still outside the democratic life such as Libya and other Arab countries. Although democracy has spread across the world through three waves of democratization, Libya is still outside the democratic process, even recently its regime has changed. The challenges of democracy in Libya are not new, they represent accumulations over time that impeded to achieve this goal. This paper concludes that the absence of democracy in Libya because of set of factors that include: colonial legacy, oil wealth, the lack of institutions, the lack of political parties, tribal factor and recently the spread of the armed groups. These factors prevented Libya to be democratic state whether during King Idris’, Qaddafi’s or even after Qaddafi rule.Keywords: the failure of democracy, political transition, the lack of institutions, Libya, Arab countries
Procedia PDF Downloads 4674243 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1674242 Outreach Intervention Addressing Crack Cocaine Addiction in Users with Co-Occurring Opioid Use Disorder
Authors: Louise Penzenstadler, Tiphaine Robet, Radu Iuga, Daniele Zullino
Abstract:
Context: The outpatient clinic of the psychiatric addiction service of Geneva University Hospital has been providing support to individuals affected by various narcotics for 30 years. However, the increasing consumption of crack cocaine in Geneva has presented a new challenge for the healthcare system. Research Aim: The aim of this research is to evaluate the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder. Methodology: The research utilizes a combination of quantitative and qualitative retrospective data analysis to evaluate the effectiveness of the outreach intervention. Findings: The data collected from October 2023 to December 2023 show that the outreach program successfully made 1,071 contacts with drug users and led to 15 new requests for care and enrollment in treatment. Patients expressed high satisfaction with the intervention, citing easy and rapid access to treatment and social support. Theoretical Importance: This research contributes to the understanding of the challenges and specific needs of a complex group of drug users who face severe health problems. It highlights the importance of outreach interventions in establishing trust, connecting users with care, and facilitating medication-assisted treatment for opioid addiction. Data Collection: Data was collected through the outreach program's interactions with drug users, including street outreach interventions and presence at locations frequented by users. Patient satisfaction surveys were also utilized. Analysis Procedures: The collected data was analyzed using both quantitative and qualitative methods. The quantitative analysis involved examining the number of contacts made, new requests for care, and treatment enrollment. The qualitative analysis focused on patient satisfaction and their perceptions of the intervention. Questions Addressed: The research addresses the following questions: What is the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder? How effective is the outreach program in connecting drug users with care and initiating medication-assisted treatment? Conclusion: The outreach program has proven to be an effective intervention in establishing trust with crack users, connecting them with care, and initiating medication-assisted treatment for opioid addiction. It has also highlighted the importance of addressing the specific challenges faced by this group of drug users.Keywords: crack addiction, outreach treatment, peer intervention, polydrug use
Procedia PDF Downloads 644241 Artificial Intelligence Impact on the Australian Government Public Sector
Authors: Jessica Ho
Abstract:
AI has helped government, businesses and industries transform the way they do things. AI is used in automating tasks to improve decision-making and efficiency. AI is embedded in sensors and used in automation to help save time and eliminate human errors in repetitive tasks. Today, we saw the growth in AI using the collection of vast amounts of data to forecast with greater accuracy, inform decision-making, adapt to changing market conditions and offer more personalised service based on consumer habits and preferences. Government around the world share the opportunity to leverage these disruptive technologies to improve productivity while reducing costs. In addition, these intelligent solutions can also help streamline government processes to deliver more seamless and intuitive user experiences for employees and citizens. This is a critical challenge for NSW Government as we are unable to determine the risk that is brought by the unprecedented pace of adoption of AI solutions in government. Government agencies must ensure that their use of AI complies with relevant laws and regulatory requirements, including those related to data privacy and security. Furthermore, there will always be ethical concerns surrounding the use of AI, such as the potential for bias, intellectual property rights and its impact on job security. Within NSW’s public sector, agencies are already testing AI for crowd control, infrastructure management, fraud compliance, public safety, transport, and police surveillance. Citizens are also attracted to the ease of use and accessibility of AI solutions without requiring specialised technical skills. This increased accessibility also comes with balancing a higher risk and exposure to the health and safety of citizens. On the other side, public agencies struggle with keeping up with this pace while minimising risks, but the low entry cost and open-source nature of generative AI led to a rapid increase in the development of AI powered apps organically – “There is an AI for That” in Government. Other challenges include the fact that there appeared to be no legislative provisions that expressly authorise the NSW Government to use an AI to make decision. On the global stage, there were too many actors in the regulatory space, and a sovereign response is needed to minimise multiplicity and regulatory burden. Therefore, traditional corporate risk and governance framework and regulation and legislation frameworks will need to be evaluated for AI unique challenges due to their rapidly evolving nature, ethical considerations, and heightened regulatory scrutiny impacting the safety of consumers and increased risks for Government. Creating an effective, efficient NSW Government’s governance regime, adapted to the range of different approaches to the applications of AI, is not a mere matter of overcoming technical challenges. Technologies have a wide range of social effects on our surroundings and behaviours. There is compelling evidence to show that Australia's sustained social and economic advancement depends on AI's ability to spur economic growth, boost productivity, and address a wide range of societal and political issues. AI may also inflict significant damage. If such harm is not addressed, the public's confidence in this kind of innovation will be weakened. This paper suggests several AI regulatory approaches for consideration that is forward-looking and agile while simultaneously fostering innovation and human rights. The anticipated outcome is to ensure that NSW Government matches the rising levels of innovation in AI technologies with the appropriate and balanced innovation in AI governance.Keywords: artificial inteligence, machine learning, rules, governance, government
Procedia PDF Downloads 70