Search results for: public security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8258

Search results for: public security

6248 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 266
6247 In-Situ Determination of Radioactivity Levels and Radiological Hazards in and around the Gold Mine Tailings of the West Rand Area, South Africa

Authors: Paballo M. Moshupya, Tamiru A. Abiye, Ian Korir

Abstract:

Mining and processing of naturally occurring radioactive materials could result in elevated levels of natural radionuclides in the environment. The aim of this study was to evaluate the radioactivity levels on a large scale in the West Rand District in South Africa, which is dominated by abandoned gold mine tailings and the consequential radiological exposures to members of the public. The activity concentrations of ²³⁸U, ²³²Th and 40K in mine tailings, soil and rocks were assessed using the BGO Super-Spec (RS-230) gamma spectrometer. The measured activity concentrations for ²³⁸U, ²³²Th and 40K in the studied mine tailings were found to range from 209.95 to 2578.68 Bq/kg, 19.49 to 108.00 Bq/kg and 31.30 to 626.00 Bq/kg, respectively. In surface soils, the overall average activity concentrations were found to be 59.15 Bq/kg, 34.91 and 245.64 Bq/kg for 238U, ²³²Th and 40K, respectively. For the rock samples analyzed, the mean activity concentrations were 32.97 Bq/kg, 32.26 Bq/kg and 351.52 Bg/kg for ²³⁸U, ²³²Th and 40K, respectively. High radioactivity levels were found in mine tailings, with ²³⁸U contributing significantly to the overall activity concentration. The external gamma radiation received from surface soil in the area is generally low, with an average of 0.07 mSv/y. The highest annual effective doses were estimated from the tailings dams and the levels varied between 0.14 mSv/y and 1.09 mSv/y, with an average of 0.51 mSv/y. In certain locations, the recommended dose constraint of 0.25 mSv/y from a single source to the average member of the public within the exposed population was exceeded, indicating the need for further monitoring and regulatory control measures specific to these areas to ensure the protection of resident members of the public.

Keywords: activity concentration, gold mine tailings, in-situ gamma spectrometry, radiological exposures

Procedia PDF Downloads 127
6246 Integrated Mass Rapid Transit (MRT) and Bus System in Singapore: MRT Ridership and the Provision of Feeder Bus Services

Authors: Devansh Jain, Shu Ting Goh

Abstract:

With the aim of improving the quality of life of people of Singapore with provision of better transport services, Land and Transport Authority Singapore recently published its Master Plan 2013. The major objectives mentioned in the plan were to make a comprehensive public transport network with better quality Mass Rapid Transit, bus services along with cycling and walking. MRT is the backbone of the transport system in Singapore, and to promote and increase the MRT ridership, good accessibility to access the MRT stations is a necessity. The aim of this paper is to investigate the relationship between MRT ridership and the provision of feeder bus services in Singapore planning areas and also to understand the hub and spoke model adopted by Singapore for provision of transport services. The findings of the study will lead to conclusions made from the Regression model developed by the various factors affecting MRT ridership, and hence will benefit to enhance the services provided by the system.

Keywords: quality of life, public transport, mass rapid transit, ridership

Procedia PDF Downloads 248
6245 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 339
6244 Rupture in the Paradigm of the International Policy of Illicit Drugs in the Field of Public Health and within the Framework of the World Health Organization, 2001 to 2016

Authors: Emy Nayana Pinto, Denise Bomtempo Birche De Carvalho

Abstract:

In the present study, the harmful use of illicit drugs is seen as a public health problem and as one of the expressions of the social question, since its consequences fall mainly on the poorer classes of the population. This perspective is a counterpoint to the dominant paradigm on illicit drug policy at the global level, whose centrality lies within the criminal justice arena. The 'drug problem' is internationally combated through fragmented approaches that focus its actions on banning and criminalizing users. In this sense, the research seeks to answer the following key questions: What are the influences of the prohibitionism in the recommendations of the United Nations (UN), the World Health Organization (WHO), and the formulation of drug policies in member countries? What are the actors that have been provoking the prospect of breaking with the prohibitionist paradigm? What is the WHO contribution to the rupture with the prohibitionist paradigm and the displacement of the drug problem in the field of public health? The general objective of this work is to seek evidence from the perspective of rupture with the prohibitionist paradigm in the field of drugs policies at the global and regional level, through analysis of documents of the World Health Organization (WHO), between the years of 2001 to 2016. The research was carried out in bibliographical and documentary sources. The bibliographic sources contributed to the approach with the object and the theoretical basis of the research. The documentary sources served to answer the research questions and evidence the existence of the perspective of change in drug policy. Twenty-two documents of the UN system were consulted, of which fifteen had the contribution of the World Health Organization (WHO). In addition to the documents that directly relate to the subject of the research, documents from various agencies, programs, and offices, such as the Joint United Nations Program on HIV/AIDS (UNAIDS) and the United Nations Office on Drugs and Crime (UNODC), which also has drugs as the central or transversal theme of its performance. The results showed that from the 2000s it was possible to find in the literature review and in the documentary analysis evidence of the critique of the prohibitionist paradigm parallel to the construction of a new perspective for drug policy at the global level and the displacement of criminal justice approaches for the scope of public health, with the adoption of alternative and pragmatic interventions based on human rights, scientific evidence and the reduction of social damages and health by the misuse of illicit drugs.

Keywords: illicit drugs, international organizations, prohibitionism, public health, World Health Organization

Procedia PDF Downloads 156
6243 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 318
6242 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 387
6241 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle

Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang

Abstract:

The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.

Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids

Procedia PDF Downloads 269
6240 Towards A Framework for Using Open Data for Accountability: A Case Study of A Program to Reduce Corruption

Authors: Darusalam, Jorish Hulstijn, Marijn Janssen

Abstract:

Media has revealed a variety of corruption cases in the regional and local governments all over the world. Many governments pursued many anti-corruption reforms and have created a system of checks and balances. Three types of corruption are faced by citizens; administrative corruption, collusion and extortion. Accountability is one of the benchmarks for building transparent government. The public sector is required to report the results of the programs that have been implemented so that the citizen can judge whether the institution has been working such as economical, efficient and effective. Open Data is offering solutions for the implementation of good governance in organizations who want to be more transparent. In addition, Open Data can create transparency and accountability to the community. The objective of this paper is to build a framework of open data for accountability to combating corruption. This paper will investigate the relationship between open data, and accountability as part of anti-corruption initiatives. This research will investigate the impact of open data implementation on public organization.

Keywords: open data, accountability, anti-corruption, framework

Procedia PDF Downloads 337
6239 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 191
6238 Effects of Exhaust Gas Emitted by the Fleet on Public Health in the Region of Annaba (Algeria): Ecotoxicological Test on Durum Wheat (Triticum durum Desf.)

Authors: Aouissi Nora, Meksem Leila

Abstract:

This work focused on the study of air pollution generated by the transport sector in the region of Annaba. Our study is based on two parts: the first one concerns an epidemiological investigation in the area of Annaba situated in the east Algerian coast, which deals with the development of the fleet and its impact on public health. To get a more precise idea of the impact of road traffic on public health, we consulted the computing center office of the National Social Insurance Fund. The information we were given by this office refers to the number of reported asthma and heart disease after medical examination during the period 2006-2010. The second part was devoted to the study of the toxicity of exhaust gases on some physical and biochemical parameters of durum wheat (Triticum durum Desf.). After germination and three-leaf stage, the pots are placed in a box of volume (0,096 m3) having an input which is linked directly to the exhaust pipe of a truck, and an outlet to prevent asphyxiation plant. The experience deals with 30 pots: 10 pots are exposed for 5 minutes to exhaust smoke; the other 10 are exposed for 15 minutes, and the remaining 10 for 30 minutes. The epidemiological study shows that the levels of pollutants emitted by the fleet are responsible for the increase of people respiratory and cardiovascular diseases. As for biochemical analyses of vegetation, they clearly show the toxicity of pollutants emitted by the exhaust gases, with an increase in total protein, proline and stimulation of detoxification enzyme (catalase).

Keywords: air pollution, toxicity, epidemiology, biochemistry

Procedia PDF Downloads 334
6237 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 136
6236 Dirty Martini vs Martini: The Contrasting Duality Between Big Bang and BTS Public Image and Their Latest MVs Analysis

Authors: Patricia Portugal Marques de Carvalho Lourenco

Abstract:

Big Bang is like a dirty martini embroiled in a stew of personal individual scandals that have rocked the group’s image and perception, from G-Dragon’s and T.O.P. marijuana episodes in 2011 and 2016, respectively, to Daesung’s building illicit entertainment activities in 2018to the Burning Sun shebang that led to the Titanic sink of Big Bang’s youngest member Seungri in 2019 and the positive sentiment migration to the antithetical side. BTS, on the other hand, are like a martini, clear, clean, attracting as many crowds to their performances and online content as the Pope attracts believers to Sunday Mass in the Vatican, as exemplified by their latest MVs. Big Bang’s 2022 Still Life achieved 16.4 million views on Youtube in 24hours, whilst BTS Permission to Dance achieved 68.5 million in the same period of time. The difference is significant when added Big Bang’s and BTS overall award wins, a total of 117 in contrast to 460. Both groups are uniquely talented and exceptional performers that have been contributing greatly to the dissemination of Korean Pop Music on a global scale in their own inimitable ways. Both are exceptional in their own right and while the artists cannot, ought not, should not be compared for the grave injustice made in comparing one individual planet with one solar system, a contrast is merited and hence done. The reality, nonetheless, is about disengagement from a group that lives life humanly, learning and evolving with each challenge and mistake without a clean, perfect tag attached to it, demonstrating not only an inability to disassociate the person from the artist and the music but also an inability to understand the difference between a private and public life.

Keywords: K-Pop, big bang, BTS, music, public image, entertainment, korean entertainment

Procedia PDF Downloads 98
6235 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 491
6234 How Envisioning Process Is Constructed: An Exploratory Research Comparing Three International Public Televisions

Authors: Alexandre Bedard, Johane Brunet, Wendellyn Reid

Abstract:

Public Television is constantly trying to maintain and develop its audience. And to achieve those goals, it needs a strong and clear vision. Vision or envision is a multidimensional process; it is simultaneously a conduit that orients and fixes the future, an idea that comes before the strategy and a mean by which action is accomplished, from a business perspective. Also, vision is often studied from a prescriptive and instrumental manner. Based on our understanding of the literature, we were able to explain how envisioning, as a process, is a creative one; it takes place in the mind and uses wisdom and intelligence through a process of evaluation, analysis and creation. Through an aggregation of the literature, we build a model of the envisioning process, based on past experiences, perceptions and knowledge and influenced by the context, being the individual, the organization and the environment. With exploratory research in which vision was deciphered through the discourse, through a qualitative and abductive approach and a grounded theory perspective, we explored three extreme cases, with eighteen interviews with experts, leaders, politicians, actors of the industry, etc. and more than twenty hours of interviews in three different countries. We compared the strategy, the business model, and the political and legal forces. We also looked at the history of each industry from an inertial point of view. Our analysis of the data revealed that a legitimacy effect due to the audience, the innovation and the creativity of the institutions was at the cornerstone of what would influence the envisioning process. This allowed us to identify how different the process was for Canadian, French and UK public broadcasters, although we concluded that the three of them had a socially constructed vision for their future, based on stakeholder management and an emerging role for the managers: ideas brokers.

Keywords: envisioning process, international comparison, television, vision

Procedia PDF Downloads 132
6233 Assessment of the Level of Awareness and Adoption of International Public Sector Accounting Standards (IPSAS) in the Curriculum of Accounting Education in Selected Tertiary Institutions in Ondo and Ekiti States Nigeria

Authors: Olurankinse Felix, Fatukasi Bayo

Abstract:

Over the years, the medium through which government financial statements are prepared has been on cash basis of accounting. This basis was characterised with some shortcomings ranging from non- disclosure of quality and detail information relating to government financial transactions, ill informed assessment of government resource allocation, weak internal control system that inhibits accountability and transparency and non- standardisation of reporting ethics for the purpose of comparability. The emergence of international public sector accounting standards (IPSAS) is therefore seen as leverage as it aims at improving the quality of general purpose financial reporting by public sector entities thereby increasing transparency and accountability. IPSAS is a new concept that all institutions must fully adopts. The crux of this paper is to find out to what extent is the awareness and adoption of IPSAS to both students and lecturers interms of teaching, learning and inclusion in the curriculum of accounting education. The methodology involved the use of well designed questionnaires to obtain information from some selected institutions and the analysis was done with the use of maximum likelihood ordered probit regression. The result of the analysis shows that despite a high level of sensitisation/awareness of IPSAS, the degree of adoption is still low due to low level of desirability by students and lecturers. The paper recommend the need for the government to enact an enabling law to back up the adoption and more importantly to institute appropriate sanctions to ensure full compliance.

Keywords: assessment, awareness, adoption, IPSAS, cash basis

Procedia PDF Downloads 483
6232 Cultural and Legal Aspects of the Fight against Corruption in the World

Authors: Mustafina-Bredikhina Diana, Kuznetsova Olga

Abstract:

Corruption as a social phenomenon is obviously a serious barrier to the development of a prosperous society and the economic development of the country as a whole. It is extremely important to analyze the influence of culture on the level of corruption in different countries and assesses the influence of culture, religion, and mentality on corrupt behavior and their perception in society. Corruption should be considered in relation to the public consciousness, which is formed in certain socio-historical conditions and cultural traditions. Often, society, formally condemning corruption, reproduces obvious corrupt behavior at the personal level of its individual members. Based on a brief analysis of the major corruption scandals and the corruption counting system of countries, the authors conclude that culture, mentality, and religion, while playing an important role in the formation of public consciousness of the concept of "corrupt behavior" are not decisive. It is more important to build a dialogue between the authorities and society, creating a uniform rejection of corrupt behavior.

Keywords: corruption, culture, corrupt behavior, perception of corruption, religion

Procedia PDF Downloads 95
6231 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 427
6230 Creating and Using Videos in a Teacher Education Programme: Success Stories in a Mexican Public University

Authors: Carla Michelle Gastelum Knight

Abstract:

In an era where teacher educators and student teachers have almost unrestricted access to all kinds of sources through the internet, a research project carried out with a group of student-teachers has revealed how self-made videos are an exciting new way to motivate and engage students. The project was carried out at Universidad de Sonora, a public university in Northern Mexico, where 39 students of the Bachelor in Arts in English Language Teaching (B.A. in ELT) programme participated creating their own videos. In the process, they worked collaboratively, they exploited their creativity, they were highly motivated and showed more interest in the subject. The videos were shared in a private YouTube channel where students had the opportunity to review their peers’ work and where videos are available at any time for later viewing. This experience has led course instructor to face the challenge of planning and designing meaningful tasks that can and to find ways of exploiting the use of these resources for learning and training purposes.

Keywords: self-made materials, student-teachers, teacher education programme, teacher training

Procedia PDF Downloads 233
6229 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 207
6228 Mining News Deserts: Impact of Local Newspaper's Closure on Political Participation and Engagement in Rural Australian Town of Lightning Ridge

Authors: Marco Magasic

Abstract:

This article examines how a local newspaper’s closure impacts the way everyday people in a rural Australian town are informed about and engage with political affairs. It draws on a two-month focused ethnographic study in the outback town of Lighting Ridge, New South Wales and explores people’s media-related practices following the closure of the towns’ only newspaper, The Ridge News, in 2015. While social media is considered to have partly filled the news void, there is an increasingly fragmented and less vibrant local public sphere that has led to growing complacency among individuals about political affairs. Local residents highlight a dearth of reliable, credible information and lament the loss of the newspaper and its role in community advocacy and fostering people’s engagement with political institutions, especially local government.

Keywords: public sphere, political participation, local news, democratic deficit

Procedia PDF Downloads 155
6227 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 450
6226 Schooling Culture in Egyptian Public Schools: Reform in Professional Development for Equity and hope in Education

Authors: Nora El-Bilawia

Abstract:

This paper discovers the challenges and/or opportunities to implementing multiple intelligence (MI) practices in English as foreign language (EFL) classrooms at Egyptian public schools as part of the government’s educational reform plan. It is found that Egyptian EFL teachers value the use of MI’s ways of teaching as means for active and higher order thinking. However, teachers believed they were underprivileged, as the government did not provide appropriate trainings, tools, or means to integrate MI in their daily lessons. They also conferred challenges they face due to some Egyptian schooling cultural practices. At the end of this chapter, a proposed need for a paradigm shift in the schooling culture in Egypt to implement practical changes in schools to promote hope in education such as the use of MI teaching tools. This study promotes cross-cultural understanding of educational opportunities and efforts for equal learning outcomes around the globe.

Keywords: professional development, schooling culture, acculturation, equitable education

Procedia PDF Downloads 102
6225 The Increase of Adolescent Obesity Rates after the COVID-19 Pandemic and Possible Obesity Prevention Programs for Implementation

Authors: Tatiana Pratt, Benyamin Hanasabzadeh, Panayiota Courelli

Abstract:

The COVID-19 pandemic is one of the largest global public health issues of this current century. COVID-19 puts people diagnosed with obesity at higher risk of not only contracting the virus but also being hospitalized and dying, making this a vital time to implement obesity prevention programs. However, COVID-19 is predicted to rapidly increase the obesity rate in the United States due to the mandatory sedentary lifestyle the pandemic demands; this is especially harmful to adolescent-aged children because it creates lifelong unhealthy habits and behaviors. Adolescent obesity prevention programs have been rigorously implemented throughout the last century to help diminish the ever-increasing adolescent obesity rate. Since the pandemic kept adolescents inside and away from in-person school, many programs have now become ineffective due to their in-person participation. Examples of in-person participation programs include school lunch programs, OSNAP and New Moves. Therefore, online programs or remote intervention measures are now more essential. This leads to programs such as Time2bHealthy, HEALTH[e]TEEN, and SWITCH should be looked at with more vitality. Adolescents have intertwined their lives with technology and screen usage. Therefore, online and remote prevention programs will continue to play a large role in the post-pandemic era. This literature review will be reviewing past and current adolescent obesity prevention programs and their effectiveness with the new remote, sedentary lifestyle adolescents. Furthermore, it will suggest new ways to more productively decrease adolescent obesity rates by analyzing the harmful factors that COVID-19 introduced into their lifestyles.

Keywords: adolescent, obesity, overweight, COVID-19, preventative care, public health, public policy, obesity prevention programs, online programs

Procedia PDF Downloads 238
6224 Building up of European Administrative Space at Central and Local Level as a Key Challenge for the Kosovo's Further State Building Process

Authors: Arlinda Memetaj

Abstract:

Building up of a well-functioning administrative justice system is one of the key prerequisites for ensuring the existence of an accountable and efficient public administration in Kosovo as well. To this aim, the country has already established an almost comprehensive legislative and institutional frameworks. The latter derives from (among others) the Kosovo`s Stabilisation and Association Agreement with the EU of 2016. A series of efforts are being presently still undertaken by all relevant domestic and international stakeholders being active in both the Kosovo`s public administration reform and the country` s system of a local self-government. Both systems are thus under a constant state of reform. Despite the aforesaid, there is still a series of shortcomings in the country in above context. There is a lot of backlog of administrative cases in the Prishtina Administrative court; there is a public lack in judiciary; the public administration is organized in a fragmented way; the administrative laws are still not properly implemented at local level; the municipalities` legislative and executive branches are not sufficiently transparent for the ordinary citizens ... Against the above short background, the full paper firstly outlines the legislative and institutional framework of the Kosovo's systems of an administrative justice and local self-government (on the basis of the fact that public administration and local government are not separate fields). It then illustrates the key specific shortcomings in those fields, as seen from the perspective of the citizens' right to good administration. It finally claims that the current status quo situation in the country may be resolved (among others) by granting Kosovo a status of full member state of the Council of Europe or at least granting it with a temporary status of a contracting party of (among others) the European Human Rights Convention. The later would enable all Kosovo citizens (regardless their ethnic or other origin whose human rights are violated by the Kosovo`s relative administrative authorities including the administrative courts) to bring their case/s before the respective well-known European Strasbourg-based Human Rights Court. This would consequently put the State under permanent and full monitoring process, with a view to obliging the country to properly implement the European Court`s decisions (as adopted by this court in those cases). This would be a benefit first of all for the very Kosovo`s ordinary citizens regardless their ethnic or other background. It would provide for a particular positive input in the ongoing efforts being undertaken by Kosovo and Serbia states within the EU-facilitated Dialogue, with a view to building up of an integral administrative justice system at central and local level in the whole Kosovo` s territory. The main method used in this paper is the descriptive, analytical and comparative one.

Keywords: administrative courts, administrative justice, administrative procedure, benefit, European Human Rights Court, human rights, monitoring, reform.

Procedia PDF Downloads 304
6223 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 136
6222 Influencing Factors to Mandatory versus Non-Mandatory E-Government Services Adoption in India: An Empirical Study

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Government agencies around the world, including India, are incorporating digital technologies and processes into their day-to-day operations to become more efficient. Despite low internet penetration (around 34.8% of total population) in India, Government of India has made some public services mandatory to access online (e.g. passport, tax filing).This is insisting citizens to access mandatory public services online. However, due to digital divide, all citizens do not have equal access to internet. In light of this, it is an interesting topic to explore how citizens are able to access mandatory online public services. It is important to understand how citizens are adopting these mandatory e-government services and how the adoption behavior of these mandatory e-government services is different or similar to adoption behavior of non-mandatory e-government services. The purpose of this research is to investigate the factors that influence adoption of mandatory and non-mandatory e-government services in India. A quantitative technique is employed in this study. A conceptual model has been proposed by integrating the influencing factors to adopt e-government services from previous studies. The proposed conceptual model highlights a comprehensive set of potential factors influencing the adoption of e-government services. The proposed model has been validated by keeping in view the local context of Indian society. Online and paper based survey was administered, collected data was analyzed and results have been discussed. A total of 463 valid responses were received and further the responses were analyzed. The research reveals that the influencing factors to adopt e-government services are not same for both mandatory and non-mandatory e-government services. There are some factors that influence adoption of both mandatory and non-mandatory e-government services but there are some which are relevant for either of mandatory and non-mandatory e-government services. The research findings may help government or concerned agencies in successfully implementing e-government services.

Keywords: adoption, e-government, India, mandatory, non-mandatory

Procedia PDF Downloads 318
6221 Executing the Law: The Practical Absence of Law and Its Effects on Death Row Inmates and Their Families in Egypt

Authors: Amira M. Othman

Abstract:

Despite the massive array of literature that engages with the Egyptian legislative system on a theoretical level, very little attention has been dedicated to the comparison between the legislative clauses on the one hand, and the (absence of their) real-world implementation on the other. This paper starts with this discrepancy, focusing on the legal proceedings in some recent cases dubbed ‘political,’ in which defendants received death sentences. Then, it sheds light on the trend of practical disregard of the law on behalf of the criminal justice apparatuses (whether security forces, public prosecution offices, lawyers, judges, prison wardens, and executioners) through the examination of case files and the conduction of interviews with some defense lawyers in the cases in question. It also identifies the resultant state of confusion among prison staff, as manifest in their treatment of defendants even before the death sentences against them is pronounced; in other words, the application of some aspects of the law in certain cases, and their simultaneous disregard of others. Then, the paper explores the effects of such execution of the law on the death row inmates, as it identifies the different strategies through which defendants who are sentenced to death appropriate a number of legal clauses to their benefit, thereby embarrassing - or highly irritating - the judges that pronounce their death sentences. In addition to appropriation, other strategies include the contestation of the law and their presence before the courts in general, as well as the complete disregard and dismissal of the legal system altogether. Finally, the paper investigates the consequent conceptual effect on the first degree families of death row inmates, namely how their daily encounters with the Egyptian legislative system - particularly its emphasis on the absence of the otherwise binding local legislation - continue to shape their conceptions of the ‘law,’ of ‘justice,’ and their trust in the ‘state.’

Keywords: death penalty, Egyptian law absence, justice, political cases

Procedia PDF Downloads 175
6220 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 191
6219 The Relevance of Corporate Governance Disclosure in Spanish Public Universities

Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez

Abstract:

There is currently a growing interest in the improvement of university governance and the disclosure of information on corporate governance processes as an essential part of the transparency and accountability of universities. This paper aims to know the importance given by Spanish university stakeholders to the disclosure of information about structure and mechanism of corporate governance. So as to meet this objective we propose a model for disclosing information on the main aspects of university governance in Spanish universities. This model will be validated using a questionnaire sent to members of the Social Councils of public universities in Spain. Our results show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance, which would result in improved transparency and accountability. According to the results of this study it may be concluded that the university stakeholders feel that it is relevant to publish information on corporate governance in the university accounting information model.

Keywords: corporate governance, transparency, accountability, universities, Spain

Procedia PDF Downloads 311