Search results for: cyber physical social systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21937

Search results for: cyber physical social systems

21757 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 480
21756 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 412
21755 The Problem of Legal Regulation of Joint Physical Custody: The Polish Perspective

Authors: Katarzyna Kamińska

Abstract:

The main purpose of the work is to present the results of the studies regarding joint physical custody in the Polish legal system. The issues addressed fit into the ongoing process of modernising family law regulations and their adaptation to changing social reality in Poland. The Polish legislator now faces a dilemma: whether to introduce into Polish law a developed substantive or procedural regulation of joint physical custody and then whether it should be considered a legal presumption. Joint physical custody after divorce or separation is theoretically possible in Poland. It can either follow from the court’s independent proposal based on the assessment of the circumstances or from the parenting plan submitted by parents wishing to jointly retain full parental authority. However, joint physical custody does not result directly from the Polish Family and Guardianship Code. Therefore, there is real legal uncertainty in this matter, which leads to different treatment of citizens by the public authorities and courts. Another problem is that joint physical custody is misunderstood by the Polish courts. The main thesis of the work is that joint physical custody does not only mean the system of symmetrical child care (50/50), and the possibility to award joint physical custody will require the courts to carefully weigh the pros and cons of such an arrangement in each individual case.

Keywords: joint physical custody, shared parenting, divorce, separation, parental authority

Procedia PDF Downloads 71
21754 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 279
21753 Effects of Screen Time on Children from a Systems Engineering Perspective

Authors: Misagh Faezipour

Abstract:

This paper explores the effects of screen time on children from a systems engineering perspective. We reviewed literature from several related works on the effects of screen time on children to explore all factors and interrelationships that would impact children that are subjected to using long screen times. Factors such as kids' age, parent attitudes, parent screen time influence, amount of time kids spend with technology, psychosocial and physical health outcomes, reduced mental imagery, problem-solving and adaptive thinking skills, obesity, unhealthy diet, depressive symptoms, health problems, disruption in sleep behavior, decrease in physical activities, problematic relationship with mothers, language, social, emotional delays, are examples of some factors that could be either a cause or effect of screen time. A systems engineering perspective is used to explore all the factors and factor relationships that were discovered through literature. A causal model is used to illustrate a graphical representation of these factors and their relationships. Through the causal model, the factors with the highest impacts can be realized. Future work would be to develop a system dynamics model to view the dynamic behavior of the relationships and observe the impact of changes in different factors in the model. The different changes on the input of the model, such as a healthier diet or obesity rate, would depict the effect of the screen time in the model and portray the effect on the children’s health and other factors that are important, which also works as a decision support tool.

Keywords: children, causal model, screen time, systems engineering, system dynamics

Procedia PDF Downloads 133
21752 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 91
21751 Commutativity of Fractional Order Linear Time-Varying System

Authors: Salisu Ibrahim

Abstract:

The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of Matlab (Simulink).

Keywords: fractional differential equation, physical systems, equivalent circuit, and analog control

Procedia PDF Downloads 69
21750 Gendered Mobility: Deep Distributions in Urban Transport Systems in Delhi

Authors: Nidhi Prabha

Abstract:

Transportation as a sector is one of the most significant infrastructural elements of the ‘urban.' The distinctness of an urban life in a city is marked by the dynamic movements that it enables within the city-space. Therefore it is important to study the public-transport systems that enable and foster mobility which characterizes the urban. It is also crucial to underscore the way one is examining the urban transport systems - either as an infrastructural unit in a strict physical-structural sense or as a structural unit which acts as a prism refracting multiple experiences depending on the location of the ‘commuter.' In the proposed paper, the attempt is to uncover and investigate the assumption of the neuter-commuter by looking at urban transportation in the secondary sense i.e. as a structural unit which is experienced differently by different kinds of commuters, thus making transportation deeply distributed with various social structures and locations like class or gender which map onto the transport systems. To this end, the public-transit systems operating in Urban Delhi i.e. the Delhi Metros and the Delhi Transport Corporation run public-buses are looked at as case studies. The study is premised on the knowledge and data gained from both primary and secondary sources. Primary sources include data and knowledge collected from fieldwork, the methodology for which has ranged from adopting ‘mixed-methods’ which is ‘Qualitative-then-Quantitative’ as well as borrowing ethnographic techniques. Apart from fieldwork, other primary sources looked at including Annual Reports and policy documents of the Delhi Metro Rail Corporation (DMRC) and the Delhi Transport Corporation (DTC), Union and Delhi budgets, Economic Survey of Delhi, press releases, etc. Secondary sources include the vast array of literature available on the critical nodes that inform the research like gender, transport geographies, urban-space, etc. The study indicates a deeply-distributed urban transport system wherein the various social-structural locations or different kinds of commuters map onto the way these different commuters experience mobility or movement within the city space. Mobility or movement, therefore, becomes gendered or has class-based ramifications. The neuter-commuter assumption is thus challenged. Such an understanding enables us to challenge the anonymity which the ‘urban’ otherwise claims it provides over the rural. The rural is opposed to the urban wherein urban ushers a modern way of life, breaking ties of traditional social identities. A careful study of the transport systems through the traveling patterns and choices of the commuters, however, indicate that this does not hold true as even the same ‘public-space’ of the transport systems allocates different places to different kinds of commuters. The central argument made though the research done is therefore that infrastructure like urban-transport-systems has to be studied and examined as seen beyond just a physical structure. The various experiences of daily mobility of different kinds of commuters have to be taken into account in order to design and plan more inclusive transport systems.

Keywords: gender, infrastructure, mobility, urban-transport-systems

Procedia PDF Downloads 208
21749 Beneficial Effects of Physical Activity in Treatment with Mental Health

Authors: Aline Giardin

Abstract:

Introduction: This review addresses the relationship between physical education and mental health and its main objective is to discuss the meanings that circulate in Psychiatric Hospitalization Units and Psychosocial Care Centers (CAPS) about the presence of physical education teachers and the practices developed by Them within these services. Material and methods: It is based on the theoretical contribution of the Psychiatric Reform and is methodologically inspired by the Bibliographic Review. Objectives: The objective of this review was to identify the main scientific evidence on the effects of physical activity on the main psychological aspects associated with mental health during the hospitalization process. Results: It was observed that physical activity has beneficial effects in the psychological, social and cognitive aspects, being thus a fundamental aspect of the lifestyle in promoting a healthy and successful treatment. In studies evaluating the effects of physical activity on mental health, the most frequently evaluated outcomes include anxiety, depression, and health-related quality of life (eg, self-esteem and self-efficacy). Evidence from epistemological studies indicates that the level of physical activity is positively associated with good mental health, when mental health is defined as good mood, general well-being and decreased symptoms. Conclusion: It is necessary to intervene and a greater interest of the professionals of physical education in the treatment with the people with mental disorders so that the negative symptoms are modified, through the aid of the physical activity, by better quality of life, physical condition, nutritional state and A healthy emotional appearance.

Keywords: health mental, physical activity, benefits, treatment

Procedia PDF Downloads 335
21748 Interpreting Privacy Harms from a Non-Economic Perspective

Authors: Christopher Muhawe, Masooda Bashir

Abstract:

With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.

Keywords: data breach and misuse, economic harms, privacy harms, psychological harms

Procedia PDF Downloads 187
21747 Dynamic Modeling of Energy Systems Adapted to Low Energy Buildings in Lebanon

Authors: Nadine Yehya, Chantal Maatouk

Abstract:

Low energy buildings have been developed to achieve global climate commitments in reducing energy consumption. They comprise energy efficient buildings, zero energy buildings, positive buildings and passive house buildings. The reduced energy demands in Low Energy buildings call for advanced building energy modeling that focuses on studying active building systems such as heating, cooling and ventilation, improvement of systems performances, and development of control systems. Modeling and building simulation have expanded to cover different modeling approach i.e.: detailed physical model, dynamic empirical models, and hybrid approaches, which are adopted by various simulation tools. This paper uses DesignBuilder with EnergyPlus simulation engine in order to; First, study the impact of efficiency measures on building energy behavior by comparing Low energy residential model to a conventional one in Beirut-Lebanon. Second, choose the appropriate energy systems for the studied case characterized by an important cooling demand. Third, study dynamic modeling of Variable Refrigerant Flow (VRF) system in EnergyPlus that is chosen due to its advantages over other systems and its availability in the Lebanese market. Finally, simulation of different energy systems models with different modeling approaches is necessary to confront the different modeling approaches and to investigate the interaction between energy systems and building envelope that affects the total energy consumption of Low Energy buildings.

Keywords: physical model, variable refrigerant flow heat pump, dynamic modeling, EnergyPlus, the modeling approach

Procedia PDF Downloads 211
21746 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 267
21745 Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making

Authors: Sinchul Back, Sun Ho Kim, Jennifer LaPrade, Ilju Seong

Abstract:

Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed.

Keywords: co-offending, crime opportunity, journey-to-cybercrime, offender-stranger

Procedia PDF Downloads 169
21744 Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana

Authors: Akosua Asantewaa Anane

Abstract:

Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing.

Keywords: social activism, cialdini’s six principles of persuasion, news curation, niche authorities

Procedia PDF Downloads 58
21743 A Qualitative Study to Explore the Social Perception and Stigma around Disability, and Its Impact on the Caring Experiences of Mothers of Children with Physical Disability in Bangladesh

Authors: Farjina Malek, Julie King, Niki Edwards

Abstract:

Across the globe more than a billion people live with a disability and a further billion people, mostly carers, are indirectly impacted. While prevalence data is problematic, it is estimated that more than 15% of the population in Bangladesh live with a disability. Disability service infrastructure in Bangladesh is under-developed; and consequently, the onus of care falls on family, especially on mothers. Within the caring role, mothers encounter many challenging experiences which are not only due to the lack of support delivered through the Bangladeshi health care system but also related to the existence of stigma and perception around disability in the Bangladeshi society. Within this perception, the causes of disability are mostly associated with 'God’s will'; 'possession of ghosts on the disabled person'; and 'karma or the result of past sins of the family members especially the mothers'. These beliefs are likely to have a significant impact on the well-being of mothers and their caring experience of children with disability. This is an ongoing qualitative study which is conducting in-depth interviews with 30 mothers from five districts (Dhaka, Mymensingh, Manikganj, Tangail, and Gazipur) of Bangladesh with the aim to explore the impact of social perception and stigma around physical disability on the caring role of the mothers of children with physical disability. The major findings of this study show that the social perception around disability and the social expectation from a mother regarding her caring role have a huge impact on the well-being of mothers. Mothers are mostly expected to take their child on their lap to prove that they are ‘good mother’. These practices of lifting their children with physical disability and keeping them on the lap for a long time often cause chronic back pain of the mothers. Existing social beliefs consider disability as a ‘curse’ and punishment for the ‘sins’ of the family members, most often by the mother. Mothers are blamed if they give birth to ‘abnormal’ children. This social construction creates stigma, and thus, the caring responsibility of mothers become more challenging. It also encourages the family and mothers to hide their children from the society and to avoid seeking accessible disability services. The mothers also compromise their careers and social interaction as they have to stay with their children at home, and that has a significant impact on personal wellbeing, income, and empowerment of the mothers. The research is informed by intersectional theory and employed an interpretive phenomenological methodology to explore mothers’ experience of caring their children with physical disability, and the contribution and impact of key relationships within the family and the intersection with community and services.

Keywords: mother, family carer, physical disability, children, social stigma, key relationship

Procedia PDF Downloads 231
21742 Green Space and Their Possibilities of Enhancing Urban Life in Dhaka City, Bangladesh

Authors: Ummeh Saika, Toshio Kikuchi

Abstract:

Population growth and urbanization is a global phenomenon. As the rapid progress of technology, many cities in the international community are facing serious problems of urbanization. There is no doubt that the urbanization will proceed to have significant impact on the ecology, economy and society at local, regional, and global levels. The inhabitants of Dhaka city suffer from lack of proper urban facilities. The green spaces are needed for different functional and leisure activities of the urban dwellers. Again growing densification, a number of green space are transferred into open space in the Dhaka city. As a result greenery of the city's decreases gradually. Moreover, the existing green space is frequently threatened by encroachment. The role of green space, both at community and city level, is important to improve the natural environment and social ties for future generations. Therefore, it seems that the green space needs to be more effective for public interaction. The main objective of this study is to address the effectiveness of urban green space (Urban Park) of Dhaka City. Two approaches are selected to fulfill the study. Firstly, analyze the long-term spatial changes of urban green space using GIS and secondly, investigate the relationship of urban park network with physical and social environment. The case study site covers eight urban parks of Dhaka metropolitan area of Bangladesh. Two aspects (Physical and Social) are applied for this study. For physical aspect, satellite images and aerial photos of different years are used to find out the changes of urban parks. And for social aspect, methods are used as questionnaire survey, interview, observation, photographs, sketch and previous information of parks to analyze about the social environment of parks. After calculation of all data by descriptive statistics, result is shown by maps using GIS. According to physical size, parks of Dhaka city are classified into four types: Small, Medium, Large and Extra Large parks. The observed result showed that the physical and social environment of urban parks varies with their size. In small size parks physical environment is moderate by newly tree plantation and area expansion. However, in medium size parks physical environment are poor, example- tree decrease, exposed soil increase. On the other hand, physical environment of large size and extra large size parks are in good condition, because of plenty of vegetation and well management. Again based on social environment, in small size parks people mainly come from surroundings area and mainly used as waiting place. In medium-size parks, people come to attend various occasion from different places. In large size and extra large size parks, people come from every part of the city area for tourism purpose. Urban parks are important source of green space. Its influence both physical and social environment of urban area. Nowadays green space area gradually decreases and transfer into open space. The consequence of this research reveals that changes of urban parks influence both physical and social environment and also impact on urban life.

Keywords: physical environment, social environment, urban life, urban parks

Procedia PDF Downloads 417
21741 Novel Recommender Systems Using Hybrid CF and Social Network Information

Authors: Kyoung-Jae Kim

Abstract:

Collaborative Filtering (CF) is a popular technique for the personalization in the E-commerce domain to reduce information overload. In general, CF provides recommending items list based on other similar users’ preferences from the user-item matrix and predicts the focal user’s preference for particular items by using them. Many recommender systems in real-world use CF techniques because it’s excellent accuracy and robustness. However, it has some limitations including sparsity problems and complex dimensionality in a user-item matrix. In addition, traditional CF does not consider the emotional interaction between users. In this study, we propose recommender systems using social network and singular value decomposition (SVD) to alleviate some limitations. The purpose of this study is to reduce the dimensionality of data set using SVD and to improve the performance of CF by using emotional information from social network data of the focal user. In this study, we test the usability of hybrid CF, SVD and social network information model using the real-world data. The experimental results show that the proposed model outperforms conventional CF models.

Keywords: recommender systems, collaborative filtering, social network information, singular value decomposition

Procedia PDF Downloads 278
21740 COVID-19: The Dark Side of an Unprecedented Social Isolation in the Elderly

Authors: L. Paulino Ferreira, M. Gomes Neto, M. Duarte, S. Serra

Abstract:

Objectives: COVID-19 pandemic has caused older adults to experience a degree of social isolation and loneliness that is unprecedented. Our aim is to review state of the art regarding the consequences of social isolation due to COVID-19 in elderly people. Methods: The authors conducted a search on Medscape and PubMed with the keywords mentioned below, and the most relevant articles were selected. Results: Social isolation leads many elderlies to experience loneliness, anxiety, depression, alcohol abuse, and feelings of abandonment with a perception of being a burden on society. Thus, social isolation has increased the risk for suicide in older people. It is also noteworthy that the exacerbation of psychiatric disorders (such as depression, anxiety, and post-traumatic stress disorder) without correct treatment and follow-up also increases suicide risk. Loneliness is also associated with accelerated cognitive deterioration and dementia. Besides that, during social isolation, it could be more difficult for older people to get medication as well as proper health care. It is also noticed an increase in the risk of falls, poor nutrition, and lack of exercise. All this contributes to weakening elderlies’ immune systems leading to a higher risk of developing infections, cardiovascular events, and cancer, increasing hospitalization and morbimortality. Conclusion: Social isolation in the elderly has a significant impact on physical and mental health, as well as morbimortality and hospitalizations due to non-COVID causes. Nevertheless, further studies will be needed to assess the real dimension of the effects of social isolation due to COVID-19.

Keywords: social isolation, COVID-19, elderly, mental health

Procedia PDF Downloads 84
21739 Electrokinetic Regulation of Flow in Microcrack Reservoirs

Authors: Aslanova Aida Ramiz

Abstract:

One of the important aspects of rheophysical problems in oil and gas extraction is the regulation of thermohydrodynamic properties of liquid systems using physical and physicochemical methods. It is known that the constituent parts of real fluid systems in oil and gas production are practically non-conducting, non-magnetically active components. Real heterogeneous hydrocarbon systems, from the structural point of view, consist of an infinite number of microscopic local ion-electrostatic cores distributed in the volume of the dispersion medium. According to Cohen's rule, double electric layers are formed at the contact boundaries of components in contact (oil-gas, oil-water, water-condensate, etc.) in a heterogeneous system, and as a result, each real fluid system can be represented as a complex composition of a set of local electrostatic fields. The electrokinetic properties of this structure are characterized by a certain electrode potential. Prof. F.H. Valiyev called this potential the α-factor and came up with the idea that many natural and technological rheophysical processes (effects) are essentially electrokinetic in nature, and by changing the α-factor, it is possible to adjust the physical properties of real hydraulic systems, including thermohydrodynamic parameters. Based on this idea, extensive research work was conducted, and the possibility of reducing hydraulic resistances and improving rheological properties was experimentally discovered in real liquid systems by reducing the electrical potential with various physical and chemical methods.

Keywords: microcracked, electrode potential, hydraulic resistance, Newtonian fluid, rheophysical properties

Procedia PDF Downloads 71
21738 A Regional Innovation System Model Based on the Systems Thinking Approach

Authors: Samara E., Kilintzis P., Katsoras E., Martinidis G.

Abstract:

Regions play an important role in the global economy by driving research and innovation policies through a major tool, the Regional Innovation System (RIS). RIS is a social system that encompasses the systematic interaction of the various organizations that comprise it in order to improve local knowledge and innovation. This article describes the methodological framework for developing and validating a RIS model utilizing system dynamics. This model focuses on the functional structure of the RIS, separating it in six diverse, interacting sub-systems.

Keywords: innovations, regional development, systems thinking, social system

Procedia PDF Downloads 64
21737 Formulation and Evaluation of TDDS for Sustained Release Ondansetron HCL Patches

Authors: Baljinder Singh, Navneet Sharma

Abstract:

The skin can be used as the site for drug administration for continuous transdermal drug infusion into the systemic circulation. For the continuous diffusion/penetration of the drugs through the intact skin surface membrane-moderated systems, matrix dispersion type systems, adhesive diffusion controlled systems and micro reservoir systems have been developed. Various penetration enhancers are used for the drug diffusion through skin. In matrix dispersion type systems, the drug is dispersed in the solvent along with the polymers and solvent allowed to evaporate forming a homogeneous drug-polymer matrix. Matrix type systems were developed in the present study. In the present work, an attempt has been made to develop a matrix-type transdermal therapeutic system comprising of ondansetron-HCl with different ratios of hydrophilic and hydrophobic polymeric combinations using solvent evaporation technique. The physicochemical compatibility of the drug and the polymers was studied by infrared spectroscopy. The results obtained showed no physical-chemical incompatibility between the drug and the polymers. The patches were further subjected to various physical evaluations along with the in-vitro permeation studies using rat skin. On the basis of results obtained form the in vitro study and physical evaluation, the patches containing hydrophilic polymers i.e. polyvinyl alcohol and poly vinyl pyrrolidone with oleic acid as the penetration enhancer(5%) were considered as suitable for large scale manufacturing with a backing layer and a suitable adhesive membrane.

Keywords: transdermal drug delivery, penetration enhancers, hydrophilic and hydrophobic polymers, ondansetron HCl

Procedia PDF Downloads 312
21736 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 15
21735 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission

Authors: Parisa Javid

Abstract:

In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.

Keywords: modern lighting systems, natural light, reduced energy consumption

Procedia PDF Downloads 84
21734 A Comparative Study of Wellness Among Sportsmen and Non Sportsmen

Authors: Jaskaran Singh Sidhu

Abstract:

Aim: The purpose of this study is to find the relationship between wellness among sportsmen and non sportsmen. Methodology: The present study is an experimental study for 80 senior secondary volleyball players of 16-19 years of age from Ludhiana District of Punjab (India), and 80 non-sportsperson were taken from senior secondary school of Ludhiana district. The sample for this study was taken through a random sampling technique. Tools: A five point scale havinf 50 items was used to acess the wellness Statistical Analysis: To find out the relationship among the variables exists or not, a t-test was used to test the significance of the difference between the means. Statistics for each characteristic were calculated; Mean, Standard deviation, Standard error of Mean. Data were analyzed using SPSS (statistical package for the social sciences). Statistical significance was set at p < 0.05. Results: Substantial deviations were noted at p<0.5 in the totality of wellness. Sportsmen show significant differences exist at p<0.5 in three parameters of wellness i.e., physical wellness, mental wellness, and social wellness. In spiritual and emotional wellness attributes, non-sportsmen shows significant difference at p<0.5. Conclusion: From the data interpretation it reflects that overall wellness can be improved by participation in sports. It further noted in study that participation in sports promote the attributes of wellness i.e., physical wellness, mental wellness, emotional wellness and social wellness.

Keywords: physical, mental, social, emotional, wellness, spiritual

Procedia PDF Downloads 80
21733 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 307
21732 Impact on the Results of Sub-Group Analysis on Performance of Recommender Systems

Authors: Ho Yeon Park, Kyoung-Jae Kim

Abstract:

The purpose of this study is to investigate whether friendship in social media can be an important factor in recommender system through social scientific analysis of friendship in popular social media such as Facebook and Twitter. For this purpose, this study analyzes data on friendship in real social media using component analysis and clique analysis among sub-group analysis in social network analysis. In this study, we propose an algorithm to reflect the results of sub-group analysis on the recommender system. The key to this algorithm is to ensure that recommendations from users in friendships are more likely to be reflected in recommendations from users. As a result of this study, outcomes of various subgroup analyzes were derived, and it was confirmed that the results were different from the results of the existing recommender system. Therefore, it is considered that the results of the subgroup analysis affect the recommendation performance of the system. Future research will attempt to generalize the results of the research through further analysis of various social data.

Keywords: sub-group analysis, social media, social network analysis, recommender systems

Procedia PDF Downloads 352
21731 The Effects of Physical Activity and Serotonin on Depression, Anxiety, Body Image and Mental Health

Authors: Sh. Khoshemehry, M. E. Bahram, M. J. Pourvaghar

Abstract:

Sport has found a special place as an effective phenomenon in all societies of the contemporary world. The relationship between physical activity and exercise with different sciences has provided new fields for human study. The range of issues related to exercise and physical education is such that it requires specialized sciences and special studies. In this article, the psychological and social sections of exercise have been investigated for children and adults. It can be used for anyone in different age groups. Exercise and regular physical movements have a great impact on the mental and social health of the individual in addition to body health. It affects the individual's adaptability in society and his/her personality. Exercise affects the treatment of diseases such as depression, anxiety, stress, body image, and memory. Exercise is a safe haven for young people to achieve the optimum human development in its shelter. The effects of sensorimotor skills on mental actions and mental development are such a way that many psychologists and sports science experts believe these activities should be included in training programs in the first place. Familiarity of students and scholars with different programs and methods of sensorimotor activities not only causes their mental actions; but also increases mental health and vitality, enhances self-confidence and, therefore, mental health.

Keywords: anxiety, mental health, physical activity, serotonin

Procedia PDF Downloads 195
21730 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 88
21729 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 295
21728 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 277