Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6007

Search results for: security service

3997 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 326
3996 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 168
3995 Micro Celebrities in Social Media Instagram and Their Personal Influence in Business Perspective

Authors: Yoga Maulana Putra, Herry Hudrasyah

Abstract:

The Internet has now become an important part of human life; it can be accessed through a computer or even a smartphone almost anywhere and anytime. The Internet has created many social media such as Facebook, Twitter, and Instagram. Instagram has been acquired by Facebook in 2012. Since then, Instagram is growing fast. And now, Instagram is transforming from photo-sharing social media into business tools. As the result, some new behavior has been discovered. Some of Instagram user is becoming popular. These people also being called minor celebrity and they are also being used as marketing tools by many companies to influencing or promoting their product or service. This minor celebrity is existing because of their behavior in using Instagram. The company is using the personal influence of the minor celebrity to promoting and influencing their product or service, and the minor celebrity gets paid as much as their rate card. And their rate card based on their followers and insight. This research is using a qualitative method. An interview is being done to 6 minor celebrities from many different categories such as photographer, travel blogger, lifestyle, food blogger, fashion, and healthcare. Theory of reasoned behavior is being used as the grounded theory to discover the reason for their behavior and personal influence to describe their way to influencing people. The result of the interview is most of the minor celebrities is influenced by their friend’s circle in the process of using Instagram. They also had a different way to use their personal influence to affect their followers when the company employs them.

Keywords: humanities and social sciences, Instagram, minor celebrity, social media

Procedia PDF Downloads 146
3994 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 374
3993 Performance Evaluation of a Prioritized, Limited Multi-Server Processor-Sharing System that Includes Servers with Various Capacities

Authors: Yoshiaki Shikata, Nobutane Hanayama

Abstract:

We present a prioritized, limited multi-server processor sharing (PS) system where each server has various capacities, and N (≥2) priority classes are allowed in each PS server. In each prioritized, limited server, different service ratio is assigned to each class request, and the number of requests to be processed is limited to less than a certain number. Routing strategies of such prioritized, limited multi-server PS systems that take into account the capacity of each server are also presented, and a performance evaluation procedure for these strategies is discussed. Practical performance measures of these strategies, such as loss probability, mean waiting time, and mean sojourn time, are evaluated via simulation. In the PS server, at the arrival (or departure) of a request, the extension (shortening) of the remaining sojourn time of each request receiving service can be calculated by using the number of requests of each class and the priority ratio. Utilising a simulation program which executes these events and calculations, the performance of the proposed prioritized, limited multi-server PS rule can be analyzed. From the evaluation results, most suitable routing strategy for the loss or waiting system is clarified.

Keywords: processor sharing, multi-server, various capacity, N-priority classes, routing strategy, loss probability, mean sojourn time, mean waiting time, simulation

Procedia PDF Downloads 316
3992 Assessing Level of Pregnancy Rate and Milk Yield in Indian Murrah Buffaloes

Authors: V. Jamuna, A. K. Chakravarty, C. S. Patil, Vijay Kumar, M. A. Mir, Rakesh Kumar

Abstract:

Intense selection of buffaloes for milk production at organized herds of the country without giving due attention to fertility traits viz. pregnancy rate has lead to deterioration in their performances. Aim of study is to develop an optimum model for predicting pregnancy rate and to assess the level of pregnancy rate with respect to milk production Murrah buffaloes. Data pertaining to 1224 lactation records of Murrah buffaloes spread over a period 21 years were analyzed and it was observed that pregnancy rate depicted negative phenotypic association with lactation milk yield (-0.08 ± 0.04). For developing optimum model for pregnancy rate in Murrah buffaloes seven simple and multiple regression models were developed. Among the seven models, model II having only Service period as an independent reproduction variable, was found to be the best prediction model, based on the four statistical criterions (high coefficient of determination (R 2), low mean sum of squares due to error (MSSe), conceptual predictive (CP) value, and Bayesian information criterion (BIC). For standardizing the level of fertility with milk production, pregnancy rate was classified into seven classes with the increment of 10% in all parities, life time and their corresponding average pregnancy rate in relation to the average lactation milk yield (MY).It was observed that to achieve around 2000 kg MY which can be considered optimum for Indian Murrah buffaloes, level of pregnancy rate should be in between 30-50%.

Keywords: life time, pregnancy rate, production, service period, standardization

Procedia PDF Downloads 616
3991 Miller’s Model for Developing Critical Thinking Skill of Pre-Service Teachers at Suan Sunandha Rajabhat University

Authors: Suttipong Boonphadung, Thassanant Unnanantn

Abstract:

The research study aimed to (1) compare the critical thinking of the teacher students of Suan Sunandha Rajabhat University before and after applying Miller’s Model learning activities and (2) investigate the students’ opinions towards Miller’s Model learning activities for improving the critical thinking. The participants of this study were purposively selected. They were 3 groups of teacher students: (1) fourth year 33 student teachers majoring in Early Childhood Education and enrolling in semester 1 of academic year 2013 (2) third year 28 student teachers majoring in English and enrolling in semester 2 of academic year 2013 and (3) third year 22 student teachers majoring in Thai and enrolling in semester 2 of academic year 2013. The research instruments were (1) lesson plans where the learning activities were settled based on Miller’s Model (2) critical thinking assessment criteria and (3) a questionnaire on opinions towards Miller’s Model based learning activities. The statistical treatment was mean, deviation, different scores and T-test. The result unfolded that (1) the critical thinking of the students after the assigned activities was better than before and (2) the students’ opinions towards the critical thinking improvement activities based on Miller’s Model ranged from the level of high to highest.

Keywords: critical thinking, Miller’s model, opinions, pre-service teachers

Procedia PDF Downloads 464
3990 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 473
3989 The Importance of Development Evaluation to Preterm Children in Remote Area

Authors: Chung-Yuan Wang, Min Hsu, Bo-Ya Juan, Hsiv Ching Lin, Hsveh Min Lin, Hsiu-Fang Yeh

Abstract:

The success of Taiwan's National Health Insurance (NHI) system attracts widespread praise from the international society. However, the availability of medical care in a emote area is limited. Without the convenient public transportation system and mature social welfare policy, these people are difficult to regain their health and prevent disability. Preterm children have more risk to get development delay. Preterm children in a remote area have the human right to get rehabilitation resources as those in the city area. Therefore, the aim of this study was to show the importance of development screening to preterm children in a remote area and a tract the government to notice the issue. In Pingtung, children who are suspected development delay would be suggested to take a skillful screening evaluation in our hospital. Those preterm children (within 1-year-old) visited our pediatric clinic would also be referred to take the development evaluation. After the physiatrist’s systemic evaluation, the subjects would be scheduled to take the development evaluation. Gross motor, fine motor, speech comprehension/expression and mental study were included. The evaluation was in-charged by a physical therapist, occupational therapy, speech therapist and pediatric psychologist. The tools were Peabody developmental scale, Bayley Scales of Infant and Toddler Development (Bayley-III) and Wechsler Preschool & Primary Scale of Intelligence-Revised (WPPSI-R). In 2013, 459 children received the service in our hospital. Among these children, fifty-seven were noted with preterm baby history (gestation within 37 weeks). Thirty-six of these preterm children, who had never receive development evaluation, were included in this study. Thirty-six subjects (twenty-six male and ten female) were included. Nineteen subjects were found development delay. Six subjects were found suspected development delay. In gross motor, six subjects were development delay and eight were suspected development delay. In fine motor, five subjects were development delay and three were suspected development delay. In speech, sixteen subjects were development delay and six were suspected development delay. In our study, through the provision of development evaluation service, 72.2% preterm baby were found their development delay or suspected delay. They need further early intervention rehabilitation service. We made their parents realize that when development delay was recognized at the early stage, they are often reversible. No only the patients but also their families were improved their health status. The number of the subjects was limited in our study. Further study might be needed. Compared with 770 physical therapist (PT) and 370 occupational therapy (OT) in Taipei, there are only 108 PT and 54 OT in Pingtung. Further, there are much fewer therapists working on the field of pediatric rehabilitation. Living healthy is a human's right, no matter where does he live. For those development delay children in remote area, particularly preterm children, early detection, and early intervention rehabilitation service could play an important role in decreasing their disability and improving their quality of life. Through this study, we suggest the government to add more national resources on the development evaluation to preterm children in a remote area.

Keywords: development, early intervention, preterm children, rehabilitation

Procedia PDF Downloads 420
3988 Fuzzy Multi-Objective Approach for Emergency Location Transportation Problem

Authors: Bidzina Matsaberidze, Anna Sikharulidze, Gia Sirbiladze, Bezhan Ghvaberidze

Abstract:

In the modern world emergency management decision support systems are actively used by state organizations, which are interested in extreme and abnormal processes and provide optimal and safe management of supply needed for the civil and military facilities in geographical areas, affected by disasters, earthquakes, fires and other accidents, weapons of mass destruction, terrorist attacks, etc. Obviously, these kinds of extreme events cause significant losses and damages to the infrastructure. In such cases, usage of intelligent support technologies is very important for quick and optimal location-transportation of emergency service in order to avoid new losses caused by these events. Timely servicing from emergency service centers to the affected disaster regions (response phase) is a key task of the emergency management system. Scientific research of this field takes the important place in decision-making problems. Our goal was to create an expert knowledge-based intelligent support system, which will serve as an assistant tool to provide optimal solutions for the above-mentioned problem. The inputs to the mathematical model of the system are objective data, as well as expert evaluations. The outputs of the system are solutions for Fuzzy Multi-Objective Emergency Location-Transportation Problem (FMOELTP) for disasters’ regions. The development and testing of the Intelligent Support System were done on the example of an experimental disaster region (for some geographical zone of Georgia) which was generated using a simulation modeling. Four objectives are considered in our model. The first objective is to minimize an expectation of total transportation duration of needed products. The second objective is to minimize the total selection unreliability index of opened humanitarian aid distribution centers (HADCs). The third objective minimizes the number of agents needed to operate the opened HADCs. The fourth objective minimizes the non-covered demand for all demand points. Possibility chance constraints and objective constraints were constructed based on objective-subjective data. The FMOELTP was constructed in a static and fuzzy environment since the decisions to be made are taken immediately after the disaster (during few hours) with the information available at that moment. It is assumed that the requests for products are estimated by homeland security organizations, or their experts, based upon their experience and their evaluation of the disaster’s seriousness. Estimated transportation times are considered to take into account routing access difficulty of the region and the infrastructure conditions. We propose an epsilon-constraint method for finding the exact solutions for the problem. It is proved that this approach generates the exact Pareto front of the multi-objective location-transportation problem addressed. Sometimes for large dimensions of the problem, the exact method requires long computing times. Thus, we propose an approximate method that imposes a number of stopping criteria on the exact method. For large dimensions of the FMOELTP the Estimation of Distribution Algorithm’s (EDA) approach is developed.

Keywords: epsilon-constraint method, estimation of distribution algorithm, fuzzy multi-objective combinatorial programming problem, fuzzy multi-objective emergency location/transportation problem

Procedia PDF Downloads 302
3987 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 405
3986 Framework for Aligning Supply Chain Strategies and Organizational Strategies in an SOE Environment

Authors: R. Setino, I. M. Ambe, J. A Badenhorst-Weiss

Abstract:

The South African government supply chain management system is not adequately implemented in State Owned Enterprises (SOEs). There are weaknesses in the SOEs SCM enablers, strategies and policies. In addition, top management of SOEs still do not see SCM as strategic enough to deserve their attention, and therefore, there is very little support from top management, thus making it even difficult for SCM practitioners to execute their day to day functions, let alone delivering the letter and spirit of the relevant legislations. Supply chain strategies lack buy in from the top, and as a result senior SCM practitioners has not been involved in the corporate strategy. This has resulted in supply chain and corporate strategies being misaligned. Due to service delivery backlog, high level of corruption and continuous strikes across the country for better services it is inevitable that government leaders be more strategic about how South Africa can use SCM as a tool to improve service delivery. Consequently, there is a need to close the gap between the strategic level dealt by top management and the application of operational SCM concepts: the use of SCM concepts and, therefore, supply chain strategies – should be aligned with the corporate and business strategies in order to ensure the achievement of top level business objectives. This paper aims to explore supply chain practices in State Owned Enterprises (SOEs). The paper based on a conceptual review provides the status, trends and development and suggests a framework for aligning supply chain strategies and organizational strategies in an SOE environment.

Keywords: alignment, strategies, state owned enterprises, supply chain management, South Africa

Procedia PDF Downloads 390
3985 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 194
3984 Reviewing Performance Assessment Frameworks for Urban Sanitation Services in India

Authors: Gaurav Vaidya, N. R. Mandal

Abstract:

UN Summit, 2000 had resolved to provide access to sanitation to whole humanity as part of ‘Millennium Development Goals -2015’. However, more than one third of world’s population still did not have the access to basic sanitation facilities by 2015. Therefore, it will be a gigantic challenge to achieve goal-6 of ‘UN Sustainable Development Goal’ to ensure availability and sustainable management of sanitation for all by the year 2030. Countries attempt to find out own ways of meeting this challenge of providing access to safe sanitation and as part of monitoring the actions have prepared varied types of ‘performance assessment frameworks (PAF)’. India introduced Service Level Benchmarking (SLB) in 2010 to set targets and achieve the goals of NUSP. Further, a method of reviewing performance was introduced as ‘Swachh Sarvekshan’ (Cleanliness Surveys) in 2016 and in 2017 guidelines for the same was revised. This study, as a first step, reviews the documents in use in India with a conclusion that the frameworks adopted are based on target setting, financial allocation and performance in achieving the targets set. However, it does not focus upon sanitation needs holistically i.e., areas and aspects not targeted through projects are not covered in the performance assessment. In this context, as a second step, this study reviews literature available on performance assessment frameworks for urban sanitation in selected other countries and compares the same with that in India. The outcome of the comparative review resulted in identification of unaddressed aspects as well as inadequacy of parameters in Indian context. Thirdly, in an attempt to restructure the performance assessment process and develop an index in urban sanitation, researches done in other urban services such as health and education were studied focusing on methods of measuring under-performance. As a fourth step, a tentative modified framework is suggested with the help of understanding drawn from above for urban sanitation using stages of Urban Sanitation Service Chain Management (SSCM) and modified set of parameters drawn from the literature review in the first and second steps. This paper reviews existing literature on SSCM procedures, Performance Index in sanitation and other urban services and identifies a tentative list of parameters and a framework for measuring under-performance in sanitation services. This may aid in preparation of a Service Delivery Under-performance Index (SDUI) in future.

Keywords: assessment, performance, sanitation, services

Procedia PDF Downloads 131
3983 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 426
3982 Restoration of Digital Design Using Row and Column Major Parsing Technique from the Old/Used Jacquard Punched Cards

Authors: R. Kumaravelu, S. Poornima, Sunil Kumar Kashyap

Abstract:

The optimized and digitalized restoration of the information from the old and used manual jacquard punched card in textile industry is referred to as Jacquard Punch Card (JPC) reader. In this paper, we present a novel design and development of photo electronics based system for reading old and used punched cards and storing its binary information for transforming them into an effective image file format. In our textile industry the jacquard punched cards holes diameters having the sizes of 3mm, 5mm and 5.5mm pitch. Before the adaptation of computing systems in the field of textile industry those punched cards were prepared manually without digital design source, but those punched cards are having rich woven designs. Now, the idea is to retrieve binary information from the jacquard punched cards and store them in digital (Non-Graphics) format before processing it. After processing the digital format (Non-Graphics) it is converted into an effective image file format through either by Row major or Column major parsing technique.To accomplish these activities, an embedded system based device and software integration is developed. As part of the test and trial activity the device was tested and installed for industrial service at Weavers Service Centre, Kanchipuram, Tamilnadu in India.

Keywords: file system, SPI. UART, ARM controller, jacquard, punched card, photo LED, photo diode

Procedia PDF Downloads 143
3981 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 115
3980 Future Considerations for Wounded Service Members and Veterans of the Global War on Terror

Authors: Selina Doncevic, Lisa Perla, Angela Kindvall

Abstract:

The Global War on Terror which began after September 11, 2011, increased survivability of severe injuries requiring varying trajectories of rehabilitation and recovery. The costs encompass physiologic, functional, social, emotional, psychological, vocational and scholastic domains of life. The purpose of this poster is to inform private sector health care practitioners and clinicians at various levels of the unique and long term dynamics of healthcare recovery for polytrauma, and traumatic brain injured service members and veterans in the United States of America. Challenges include care delivery between the private sector, the department of defense, and veterans affairs healthcare systems while simultaneously supporting the dynamics of acute as well as latent complications associated with severe injury and illness. Clinical relevance, subtleties of protracted recovery, and overwhelmed systems of care are discussed in the context of lessons learned and in reflection on previous wars. Additional concerns for consideration and discussion include: the cost of protracted healthcare, various U.S. healthcare payer systems, lingering community reintegration challenges, ongoing care giver support, the rise of veterans support groups and the development of private sector clinical partnerships.

Keywords: brain injury, future, polytrauma, rehabilitation

Procedia PDF Downloads 180
3979 The Attentional Focus Impact on the Decision Making in Three-Game Situations in Tennis

Authors: Marina Tsetseli, Eleni Zetou, Maria Michalopoulou, Nikos Vernadakis

Abstract:

Game performance, besides the accuracy and the quality skills execution, depends heavily on where the athletes will focus their attention while performing a skill. The purpose of the present study was to examine and compare the effect of internal and external focus of attention instructions on the decision making in tennis at players 8-9 years old (M=8.4, SD=0.49). The participants (N=40) were divided into two groups and followed an intervention training program that lasted 4 weeks; first group (N=20) under internal focus of attention instructions and the second group (N=20) under external focus of attention instructions. Three measurements took place (pre-test, post-test, and retention test) in which the participants were video recorded while playing matches in real scoring conditions. GPAI (Game Performance Assessment Instrument) was used to evaluate decision making in three game situations; service, return of the service, baseline game. ANOVA repeated measures (2 groups x 3 measurements) revealed a significant interaction between groups and measurements. Specifically, the data analysis showed superiority of the group that was instructed to focus externally. The high scores of the external attention group were maintained at the same level at the third measurement as well, which indicates that the impact was concerning not only performance but also learning. Thus, cues that lead to an external focus of attention enhance the decision-making skill and therefore the game performance of the young tennis players.

Keywords: decision making, evaluation, focus of attention, game performance, tennis

Procedia PDF Downloads 336
3978 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 170
3977 Simple Infrastructure in Measuring Countries e-Government

Authors: Sukhbaatar Dorj, Erdenebaatar Altangerel

Abstract:

As alternative to existing e-government measuring models, here proposed a new customer centric, service oriented, simple approach for measuring countries e-Governments. If successfully implemented, built infrastructure will provide a single e-government index number for countries. Main schema is as follows. Country CIO or equal position government official, at the beginning of each year will provide to United Nations dedicated web site 4 numbers on behalf of own country: 1) Ratio of available online public services, to total number of public services, 2) Ratio of interagency inter ministry online public services to total number of available online public services, 3) Ratio of total number of citizen and business entities served online annually to total number of citizen and business entities served annually online and physically on those services, 4) Simple index for geographical spread of online served citizen and business entities. 4 numbers then combined into one index number by mathematical Average function. In addition to 4 numbers 5th number can be introduced as service quality indicator of online public services. If in ordering of countries index number is equal, 5th criteria will be used. Notice: This approach is for country’s current e-government achievement assessment, not for e-government readiness assessment.

Keywords: countries e-government index, e-government, infrastructure for measuring e-government, measuring e-government

Procedia PDF Downloads 312
3976 The Effect of Chemical Degradation of a Nonwoven Filter Media Membrane in Polyester

Authors: Rachid El Aidani, Phuong Nguyen-Tri, Toan Vu-Khanh

Abstract:

The filter media in synthetic fibre is the most geotextile materials used in aerosol and drainage filtration, particularly for buildings soil reinforcement in civil engineering due to its appropriated properties and its low cost. However, the current understanding of the durability and stability of this material in real service conditions, especially under severe long-term conditions are completely limited. This study has examined the effects of the chemical aging of a filter media in polyester non-woven under different temperatures (50, 70 and 80˚C) and pH (2. 7 and 12). The effect of aging conditions on mechanical properties, morphology, permeability, thermal stability and molar weigh changes is investigated. The results showed a significant reduction of mechanical properties in term of tensile strength, puncture force and tearing forces of the filter media after chemical aging due to the chemical degradation. The molar mass and mechanical properties changes in different temperature and pH showed a complex dependence of material properties on environmental conditions. The SEM and AFM characterizations showed a significant impact of the thermal aging on the morphological properties of the fibers. Based on the obtained results, the lifetime of the material in different temperatures was determined by the use of the Arrhenius model. These results provide useful information to better understand phenomena occurring during chemical aging of the filter media and may help to predict the service lifetime of this material in real used conditions.

Keywords: nonwoven membrane, chemical aging, mechanical properties, lifetime, filter media

Procedia PDF Downloads 301
3975 Smart Web Services in the Web of Things

Authors: Sekkal Nawel

Abstract:

The Web of Things (WoT), integration of smart technologies from the Internet or network to Web architecture or application, is becoming more complex, larger, and dynamic. The WoT is associated with various elements such as sensors, devices, networks, protocols, data, functionalities, and architectures to perform services for stakeholders. These services operate in the context of the interaction of stakeholders and the WoT elements. Such context is becoming a key information source from which data are of various nature and uncertain, thus leading to complex situations. In this paper, we take interest in the development of intelligent Web services. The key ingredients of this “intelligent” notion are the context diversity, the necessity of a semantic representation to manage complex situations and the capacity to reason with uncertain data. In this perspective, we introduce a multi-layered architecture based on a generic intelligent Web service model dealing with various contexts, which proactively predict future situations and reactively respond to real-time situations in order to support decision-making. For semantic context data representation, we use PR-OWL, which is a probabilistic ontology based on Multi-Entity Bayesian Networks (MEBN). PR-OWL is flexible enough to represent complex, dynamic, and uncertain contexts, the key requirements of the development for the intelligent Web services. A case study was carried out using the proposed architecture for intelligent plant watering to show the role of proactive and reactive contextual reasoning in terms of WoT.

Keywords: smart web service, the web of things, context reasoning, proactive, reactive, multi-entity bayesian networks, PR-OWL

Procedia PDF Downloads 44
3974 Performance Management in Serbian Banks: Balanced Scorecard Approach

Authors: Nela Milosevic, Sladjana Barjaktarovic Rakocevic, Sladjana Benkovic, Nemanja Milanovic

Abstract:

Nowadays, performance measurement systems play a key role in evaluating the strategic performances of an organization. On the other hand, there has been a shift towards the Balanced Scorecard (BSC), which has been recognized as a valuable managerial approach. The main goal of this paper is to analyze the main performances of Serbian banks measured at the branches level, through the usage of the Balanced Scorecard framework. Although an extensive number of practitioners have an interest in the Balanced Scorecard approach, little empirical research has been conducted on the implementation of its concept in the service sector like banks, especially within developing countries. From the beginning of August till the end of September 2015, authors have been conducting in-depth interviews among a number of experts from the most successful banks in Serbia. The results show that the non-financial measures, especially, customer oriented indicators and product/ service oriented indicators, seem to be very important factors for improving not only the financial situation within the bank, but also overall business performances. Additionally, the findings prove that there is the cause-effect relationship between non-financial and financial dimensions of the Balanced Scorecard. Having in mind that the banks are still using outdated performance evaluation systems, such as annual, quarterly and monthly reports, we hope that this paper will contribute to the knowledge of how banks in Serbia may apply the Balanced Scorecard approach to evaluate their performance on the most efficient and effective way.

Keywords: balanced scorecard approach, bank management, performance measurement systems, strategic performances

Procedia PDF Downloads 320
3973 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 68
3972 Strengthening Functional Community-Provider Linkages: Lessons from the Challenge Initiative for Healthy Cities Program in Indore, India

Authors: Sabyasachi Behera, Shiv Kumar, Pramod Gautam, Anisur Rahman, Pawan Pathak, Rahul Bhadouria

Abstract:

Background: The increasing proportion of population especially urban poor and vulnerable groups or groups with specific needs, with health indicators worse than their rural counterparts in India face various issues related with availability and quality of health care. The reasons are myriad, starting from information and awareness of the community, especially, in a scenario wherein the needs and challenges of floating and migrant urban populations remain poorly understood. Weak linkages between health care facilities and slum dwellers and vulnerable populations hinder the improvement of health services for urban poor. Method: To address this issue, TCIHC program is helping health department of Indore city of Madhya Pradesh to establish a referral mechanism with a dual approach: at both community and facility level. The former is based on the premise of ‘building social capital’, i.e. norms and networks within a community facilitating collective action, helps improve the demand and supply of health services at appropriate levels of care (Minus 2: Accredited Social Health Activist and Community Health Groups; Minus 1: Urban Health Nutrition Days; Zero: Urban Primary Health Center; Plus 1: secondary facility with BEmONC services; Plus 2: secondary facilities with CEmONC services; Plus 3: tertiary level facility) for the urban poor. The latter focuses on encouraging the provision of all services at various levels of service delivery points and stakeholders to function in a coordinated manner to ensure better health service availability and coverage in underserved slum areas. Results: This initiative has enhanced the utilization of community based, primary and secondary level services through defined referral pathways that are clearly known to a community dweller. Conclusion: An ideal referral mechanism should begin with referral at the community level wherein services of a frontline health care provider are accessed by them at their door-step, causing no delay in both understanding and decision on the health issues faced by them.

Keywords: levels of care, linkages, referral mechanism, service delivery

Procedia PDF Downloads 123
3971 Cyber Operational Design and Military Decision Making Process

Authors: M. Karaman, H. Catalkaya

Abstract:

Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.

Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state

Procedia PDF Downloads 569
3970 Facilitated Massive Open Online Course (MOOC) Based Teacher Professional Development in Kazakhstan: Connectivism-Oriented Practices

Authors: A. Kalizhanova, T. Shelestova

Abstract:

Teacher professional development (TPD) in Kazakhstan has followed a fairly standard format for centuries, with teachers learning new information from a lecturer and being tested using multiple-choice questions. In the online world, self-access courses have become increasingly popular. Due to their extensive multimedia content, peer-reviewed assignments, adaptable class times, and instruction from top university faculty from across the world, massive open online courses (MOOCs) have found a home in Kazakhstan's system for lifelong learning. Recent studies indicate the limited use of connectivism-based tools such as discussion forums by Kazakhstani pre-service and in-service English teachers, whose professional interests are limited to obtaining certificates rather than enhancing their teaching abilities and exchanging knowledge with colleagues. This paper highlights the significance of connectivism-based tools and instruments, such as MOOCs, for the continuous professional development of pre- and in-service English teachers, facilitators' roles, and their strategies for enhancing trainees' conceptual knowledge within the MOOCs' curriculum and online learning skills. Reviewing the most pertinent papers on Connectivism Theory, facilitators' function in TPD, and connectivism-based tools, such as MOOCs, a code extraction method was utilized. Three experts, former active participants in a series of projects initiated across Kazakhstan to improve the efficacy of MOOCs, evaluated the excerpts and selected the most appropriate ones to propose the matrix of teacher professional competencies that can be acquired through MOOCs. In this paper, we'll look at some of the strategies employed by course instructors to boost their students' English skills and knowledge of course material, both inside and outside of the MOOC platform. Participants' interactive learning contributed to their language and subject conceptual knowledge and prepared them for peer-reviewed assignments in the MOOCs, and this approach of small group interaction was given to highlight the outcomes of participants' interactive learning. Both formal and informal continuing education institutions can use the findings of this study to support teachers in gaining experience with MOOCs and creating their own online courses.

Keywords: connectivism-based tools, teacher professional development, massive open online courses, facilitators, Kazakhstani context

Procedia PDF Downloads 52
3969 Academic Identities in Transition

Authors: Caroline Selai, Sushrut Jadhav

Abstract:

Background: University College London (UCL), the first secular university in England to admit students regardless of their religion and gender, has nearly 29,000 students of which approximately 30% are international students. The UCL Cultural Consultation Service (CCS) for staff and students is a unique service that provides assistance to staff and students experiencing challenges in their teaching, enabling, support work or studies which they believe may have a cultural component. The service provides one-to-one and group consultations, lectures, seminars, ‘grand rounds’, interactive workshops and bespoke interventions. Data: This paper presents a content analysis of CCS referrals over the last 36 months. We focus on the experience of international students, many of whom experience not only a challenge to their academic identity but also a profound challenge to their personal cultural identity. We also present 3 vignettes to illustrate how students interpret, accept, contest and resist changes in their cultural and academic identity. Discussion: This paper highlights (i) how students from collectivist cultures attempt to assimilate within an individualistic, highly competitive western university that is bound by its own institutional norms; (ii) problems in negotiating challenges at the interface of culture and gender (iii) the impact of culturally different hierarchies of power, discrimination and authority and (iv) the significance of earlier traumatic and kinship conflicts. Many international students’ social identities are shaped by their cultural and family scripts. A large number have been taught that their teachers are to be revered and their teachings unchallenged. This is at odds with quintessential goal of the western university to encourage healthy scepticism and hone students’ critical thinking skills. Conclusions: Pupil-teacher ‘cultural transference’ and shifts in cultural academic identities of students underscore critical aspects of developmental and learning challenges for students. Staff-student cultural conflict requires a broader, systemic analysis of students, staff and the wider organisation. Our findings challenge Eurocentric psychodynamic concepts such as the nature of parent-child relationship in Western Europe. We argue for a broader, more inclusive approach to develop both effective pedagogic skills in euro-american academic institutions and culturally- appropriate psychodynamic theory to underpin counselling international students.

Keywords: academic identity, cultural transference, cultural consultation in higher education, cultural formulation, cultural identity.

Procedia PDF Downloads 445
3968 Eco-Survivalism and Nomadic Pastoralism: An Exploratory Study on the Dialectics of Herder-Farmer Conflict in Nigeria

Authors: Francis N. Okpaleke

Abstract:

The threat of Fulani herder militancy in Nigeria has led to a volatile security situation characterized by communal strife, arms proliferation, rural banditry, and insurgency. The exigency of this situation resonates in the eco-survivalist theory of farmer-herder conflict which holds that the herder deems the farmers’ unwarranted incursions into his grazing terrain as an effrontery that must reprised and a call to war. In spite of the rising incidence of Fulani militancy in Nigeria, only little is known concerning the phenomenon. The bulk of prevailing ideas on the subject has been largely and unnecessarily journalistic and anecdotal, lacking in intellectual depth, fecundity and rigour. The issue has remained scarcely documented by way of organized research. There is therefore a need for a systematic investigation that would leverage scholarly and policy insights on the subject which is the purpose of this study. The study will therefore, seek to examine the nexus between nomadic pastoralism and the incidence of herder-farmer conflicts in Nigeria with particular reference to the central region of the country. By means of qualitative descriptive analysis predicated on the theory of eco-violence, the paper explores the contemporary historical and structural drivers of this conflict, its relationship with the dynamics of climate change in Nigeria and its implication of human security in Nigeria. The paper also proffers theoretical and policy recommendations to mitigate the onto ward conflict.

Keywords: eco-survivalism, conflict, pastoralism, nomads

Procedia PDF Downloads 289