Search results for: intelligence and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4217

Search results for: intelligence and security

4037 Emotional Intelligence and Gender Role Attitudes of Married Individuals: Moderating Role of Gender and Work Status

Authors: Saima Kalsoom, Sobia Masood, Muhammad Faran

Abstract:

This study aimed to examine the association between emotional intelligence and gender role attitudes of married individuals. Another aim of this study was to test the moderating role of gender work status of married individuals for predicting gender role attitudes from emotional intelligence. A sample of (N = 500) married working men and women (both working & housewives) was approached through purposive convenience sampling technique. The data was collected employing cross-sectional research design. The indigenous versions of the Gender Role Attitudes Scale and perceived Emotional Intelligence Scale were used. The results of alpha coefficients for both the scales and subscales used in this study designated satisfactory evidence for internal consistency and reliability. Assessment of correlation coefficients showed significant positive correlation between gender role attitudes and emotional intelligence, subfactors of emotional intelligence i.e., emotional self-regulation, emotional self-awareness, and interpersonal skills with gender role attitudes. Results of model testing revealed that gender (the effect was significant for women) and work status (the effect was more significant for married working women than married working men and housewives) of the married individuals significantly moderated the relationship between emotional intelligence and gender role attitudes into the positive direction. Further, it was also found that gender and work status also moderated the relationship between emotional self-regulation (as sub factor of emotional intelligence) and gender role attitudes in a positive direction. In conclusion, this empirical evidence is vital contribution derived from the traditional and collectivistic socio-cultural background of Pakistan.

Keywords: gender role attitudes, emotional intelligence, emotional self-regulation, gender, work status, married working women

Procedia PDF Downloads 110
4036 Wind Speed Prediction Using Passive Aggregation Artificial Intelligence Model

Authors: Tarek Aboueldahab, Amin Mohamed Nassar

Abstract:

Wind energy is a fluctuating energy source unlike conventional power plants, thus, it is necessary to accurately predict short term wind speed to integrate wind energy in the electricity supply structure. To do so, we present a hybrid artificial intelligence model of short term wind speed prediction based on passive aggregation of the particle swarm optimization and neural networks. As a result, improvement of the prediction accuracy is obviously obtained compared to the standard artificial intelligence method.

Keywords: artificial intelligence, neural networks, particle swarm optimization, passive aggregation, wind speed prediction

Procedia PDF Downloads 449
4035 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 592
4034 Re-Imagining and De-Constructing the Global Security Architecture

Authors: Smita Singh

Abstract:

The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.

Keywords: hegemonic discourse, global security, non-proliferation regime, power politics

Procedia PDF Downloads 317
4033 Considering Climate Change in Food Security: A Sociological Study Investigating the Modern Agricultural Practices and Food Security in Bangladesh

Authors: Hosen Tilat Mahal, Monir Hossain

Abstract:

Despite being a food-sufficient country after revolutionary changes in agricultural inputs, Bangladesh still has food insecurity and undernutrition. This study examines the association between agricultural practices (as social practices) and food security concentrating on the potential impact of sociodemographic factors and climate change. Using data from the 2012 Bangladesh Integrated Household Survey (BIHS), this study shows how modifiedagricultural practices are strongly associated with climate change and different sociodemographic factors (land ownership, religion, gender, education, and occupation) subsequently affect the status of food security in Bangladesh. We used linear and logistic regression models to analyze the association between modified agricultural practices and food security. The findings indicate that socioeconomic statuses are significant predictors of determining agricultural practices in a society like Bangladesh and control food security at the household level. Moreover, climate change is adversely impactingeven the modified agricultural and food security association version. We conclude that agricultural practices must consider climate change while boosting food security. Therefore, future research should integrate climate change into the agriculture and food-related mitigation and resiliency models.

Keywords: food security, agricultural productivity, climate change, bangladesh

Procedia PDF Downloads 122
4032 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 342
4031 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 168
4030 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 164
4029 Monitoring Co-Creation: A Survey of Lithuanian Urban Communities

Authors: Aelita Skarzauskiene, Monika Maciuliene

Abstract:

In this paper, we conduct a systematic survey of urban communities in Lithuania to evaluate their potential to co-create collective intelligence or “civic intelligence” applying Digital Co-creation Index methodology that includes different socio-technological indicators. Civic intelligence is a form of collective intelligence that refers to the group’s capacity to perceive societal problems and to address them effectively. The research focuses on evaluation of diverse organizational designs that increase efficient collective performance. The current scientific project advanced the state of the art by evaluating the basic preconditions in the urban communities through which the collective intelligence is being co-created under the systemic manner. The research subject is the “bottom up” digital enabled urban platforms, initiated by Lithuanian public organizations, civic movements or business entities. The web-based monitoring results obtained by applying a social indices calculation methodology and Pearson correlation analysis provided the information about the potential and limits of the urban communities and what possible changes need to be implemented to overcome the limitations.

Keywords: computer supported collaboration, socio-technological system, collective intelligence, networked society

Procedia PDF Downloads 203
4028 A Review of Food Security Policy Research in Central Asia

Authors: Mergen Dyussenov

Abstract:

Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.

Keywords: food security, central Asia, the role of actors, policy analysis

Procedia PDF Downloads 324
4027 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach

Authors: J. Waldon

Abstract:

The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.

Keywords: safety, security, passengers, cargo

Procedia PDF Downloads 65
4026 The Importance of Efficient and Sustainable Water Resources Management and the Role of Artificial Intelligence in Preventing Forced Migration

Authors: Fateme Aysin Anka, Farzad Kiani

Abstract:

Forced migration is a situation in which people are forced to leave their homes against their will due to political conflicts, wars and conflicts, natural disasters, climate change, economic crises, or other emergencies. This type of migration takes place under conditions where people cannot lead a sustainable life due to reasons such as security, shelter and meeting their basic needs. This type of migration may occur in connection with different factors that affect people's living conditions. In addition to these general and widespread reasons, water security and resources will be one that is starting now and will be encountered more and more in the future. Forced migration may occur due to insufficient or depleted water resources in the areas where people live. In this case, people's living conditions become unsustainable, and they may have to go elsewhere, as they cannot obtain their basic needs, such as drinking water, water used for agriculture and industry. To cope with these situations, it is important to minimize the causes, as international organizations and societies must provide assistance (for example, humanitarian aid, shelter, medical support and education) and protection to address (or mitigate) this problem. From the international perspective, plans such as the Green New Deal (GND) and the European Green Deal (EGD) draw attention to the need for people to live equally in a cleaner and greener world. Especially recently, with the advancement of technology, science and methods have become more efficient. In this regard, in this article, a multidisciplinary case model is presented by reinforcing the water problem with an engineering approach within the framework of the social dimension. It is worth emphasizing that this problem is largely linked to climate change and the lack of a sustainable water management perspective. As a matter of fact, the United Nations Development Agency (UNDA) draws attention to this problem in its universally accepted sustainable development goals. Therefore, an artificial intelligence-based approach has been applied to solve this problem by focusing on the water management problem. The most general but also important aspect in the management of water resources is its correct consumption. In this context, the artificial intelligence-based system undertakes tasks such as water demand forecasting and distribution management, emergency and crisis management, water pollution detection and prevention, and maintenance and repair control and forecasting.

Keywords: water resource management, forced migration, multidisciplinary studies, artificial intelligence

Procedia PDF Downloads 85
4025 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 201
4024 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 104
4023 E-Learning Approaches Based on Artificial Intelligence Techniques: A Survey

Authors: Nabila Daly, Hamdi Ellouzi, Hela Ltifi

Abstract:

In last year’s, several recent researches’ that focus on e-learning approaches having as goal to improve pedagogy and student’s academy level assessment. E-learning-related works have become an important research file nowadays due to several problems that make it impossible for students join classrooms, especially in last year’s. Among those problems, we note the current epidemic problems in the word case of Covid-19. For those reasons, several e-learning-related works based on Artificial Intelligence techniques are proposed to improve distant education targets. In the current paper, we will present a short survey of the most relevant e-learning based on Artificial Intelligence techniques giving birth to newly developed e-learning tools that rely on new technologies.

Keywords: artificial intelligence techniques, decision, e-learning, support system, survey

Procedia PDF Downloads 221
4022 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019

Authors: Anas Abdulrahman A. Almiman

Abstract:

In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.

Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic

Procedia PDF Downloads 194
4021 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels

Authors: Malul Miki, Rafi Bar-El, Eithan Hourie

Abstract:

In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.

Keywords: calling, loss aversion, job security, status quo bias

Procedia PDF Downloads 104
4020 Assessing Readiness Model for Business Intelligence Implementation in Organization

Authors: Abdul Razak Rahmat, Azizah Ahmad, Azman Ta’aa

Abstract:

The deployment of Business Intelligence (BI) for organization at the beginning phase is very crucial. Results from the previous studies found that more than half of the BI project fails to meet the objective even though a lot money are spent. Based on that problem, the readiness level of BI for the organization is important to identify in order to reduce the risk before the actual BI project is implemented. In this paper, rigorous literature review on the aspect success factors such as Critical Success Factors (CSFs), Readiness Factors (RFs), Success Factors (SFs), are discussed by different authors. The paper also adopted a few models from previous study as a guide for the assessment of BI readiness. The expected finding from this research is the Business Intelligent Readiness Model (BiRM) as a guild before implement the BI system.

Keywords: business intelligence readiness model, business intelligence for higher learning, BI readiness factors, BI critical success factors(CSF)

Procedia PDF Downloads 369
4019 The Impact of Interrelationship between Business Intelligence and Knowledge Management on Decision Making Process: An Empirical Investigation of Banking Sector in Jordan

Authors: Issa M. Shehabat, Huda F. Y. Nimri

Abstract:

This paper aims to study the relationship between knowledge management in its processes, including knowledge creation, knowledge sharing, knowledge organization, and knowledge application, and business intelligence tools, including OLAP, data mining, and data warehouse, and their impact on the decision-making process in the banking sector in Jordan. A total of 200 questionnaires were distributed to the sample of the study. The study hypotheses were tested using the statistical package SPSS. Study findings suggest that decision-making processes were positively related to knowledge management processes. Additionally, the components of business intelligence had a positive impact on decision-making. The study recommended conducting studies similar to this study in other sectors such as the industrial, telecommunications, and service sectors to contribute to enhancing understanding of the role of the knowledge management processes and business intelligence tools.

Keywords: business intelligence, knowledge management, decision making, Jordan, banking sector

Procedia PDF Downloads 142
4018 Eclectic Therapy in Approach to Clients’ Problems and Application of Multiple Intelligence Theory

Authors: Mohamed Sharof Mostafa, Atefeh Ahmadi

Abstract:

Most of traditional single modality psychotherapy and counselling approaches to clients’ problems are based on the application of one therapy in all sessions. Modern developments in these sciences focus on eclectic and integrative interventions to consider all dimensions of an issue and all characteristics of the clients. This paper presents and overview eclectic therapy and its pros and cons. In addition, multiple intelligence theory and its application in eclectic therapy approaches are mentioned.

Keywords: eclectic therapy, client, multiple intelligence theory, dimensions

Procedia PDF Downloads 709
4017 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 459
4016 The Influence of Emotional Intelligence Skills on Innovative Start-Ups Coaching: A Neuro-Management Approach

Authors: Alina Parincu, Giuseppe Empoli, Alexandru Capatina

Abstract:

The purpose of this paper is to identify the most influential predictors of emotional intelligence skills, in the case of 20 business innovation coaches, on the co-creation of knowledge through coaching services delivered to innovative start-ups from Europe, funded through Horizon 2020 – SME Instrument. We considered the emotional intelligence skills (self-awareness, self-regulation, motivation, empathy and social skills) as antecedent conditions of the outcome: the quality of coaching services, perceived by the entrepreneurs who received funding within SME instrument, using fuzzy-sets qualitative comparative analysis (fsQCA) approach. The findings reveal that emotional intelligence skills, trained with neuro-management techniques, were associated with increased goal-focused business coaching skills.

Keywords: neuro-management, innovative start-ups, business coaching, fsQCA

Procedia PDF Downloads 172
4015 Impact of Food Security on Urban Development: A Case Study of Adama City, Ethiopia

Authors: Shenko Chura Aredo

Abstract:

Food security and urban development are closely linked, especially in cities experiencing rapid urbanization. This paper explores the impact of food security on urban development in Adama City, Ethiopia, a fast-growing urban center that faces significant challenges related to population growth, land use changes, and food supply. By examining food systems, urban agriculture, market access, and social safety nets, the study aims to understand how food security influences urban development outcomes and vice versa. The paper concludes with policy recommendations for integrating food security into urban planning to promote sustainable urbanization and improve the resilience of food systems in Adama City.

Keywords: urbanization, food security, sustainable development, urban agriculture, Ethiopia

Procedia PDF Downloads 3
4014 Advances in Artificial intelligence Using Speech Recognition

Authors: Khaled M. Alhawiti

Abstract:

This research study aims to present a retrospective study about speech recognition systems and artificial intelligence. Speech recognition has become one of the widely used technologies, as it offers great opportunity to interact and communicate with automated machines. Precisely, it can be affirmed that speech recognition facilitates its users and helps them to perform their daily routine tasks, in a more convenient and effective manner. This research intends to present the illustration of recent technological advancements, which are associated with artificial intelligence. Recent researches have revealed the fact that speech recognition is found to be the utmost issue, which affects the decoding of speech. In order to overcome these issues, different statistical models were developed by the researchers. Some of the most prominent statistical models include acoustic model (AM), language model (LM), lexicon model, and hidden Markov models (HMM). The research will help in understanding all of these statistical models of speech recognition. Researchers have also formulated different decoding methods, which are being utilized for realistic decoding tasks and constrained artificial languages. These decoding methods include pattern recognition, acoustic phonetic, and artificial intelligence. It has been recognized that artificial intelligence is the most efficient and reliable methods, which are being used in speech recognition.

Keywords: speech recognition, acoustic phonetic, artificial intelligence, hidden markov models (HMM), statistical models of speech recognition, human machine performance

Procedia PDF Downloads 475
4013 Computational Neurosciences: An Inspiration from Biological Neurosciences

Authors: Harsh Sadawarti, Kamal Malik

Abstract:

Humans are the unique and the most powerful creature on this planet just because of the high level of intelligence gifted by nature. Computational Intelligence is highly influenced by the term natural intelligence, neurosciences and mathematics. To deal with the in-depth study of computational intelligence and to utilize it in real-life applications, it is quite important to understand its simulation with the human brain. In this paper, the three important parts, Frontal Lobe, Occipital Lobe and Parietal Lobe of the human brain, are compared with the ANN(Artificial Neural Network), CNN(Convolutional Neural network), and RNN(Recurrent Neural Network), respectively. Intelligent computational systems are created by combining deductive reasoning, logical concepts and high-level algorithms with the simulation and study of the human brain. Human brain is a combination of Physiology, Psychology, emotions, calculations and many other parameters which are of utmost importance that determines the overall intelligence. To create intelligent algorithms, smart machines and to simulate the human brain in an effective manner, it is quite important to have an insight into the human brain and the basic concepts of biological neurosciences.

Keywords: computational intelligence, neurosciences, convolutional neural network, recurrent neural network, artificial neural network, frontal lobe, occipital lobe, parietal lobe

Procedia PDF Downloads 108
4012 Housing Security System and Household Entrepreneurship: Evidence from China

Authors: Wangshi Yong, Wei Shi, Jing Zou, Qiang Li, Yilin Tian

Abstract:

With the advancement of the reform of China’s housing security system, the impact is becoming increasingly profound. This paper explores the relationship between the housing security system and household entrepreneurship on the 2017 China Household Finance Survey (CHFS) and conducts a large number of robustness checks, including PSM and IV estimation. The results show that the assistance of the housing security system will significantly promote family entrepreneurship, increasing the probability of entrepreneurship by 2%. Its internal mechanism is mainly achieved by relaxing liquidity constraints and increasing household social capital. However, the risk preference effect has not existed. Heterogeneity analysis shows that the positive impact of the housing security system on family entrepreneurship is mainly reflected in areas with high housing prices and incomes, as well as households with long-term security and social or commercial insurance. Meanwhile, it also verifies that the positive externalities of the housing security system will also positively affect active entrepreneurial motivation, entrepreneurial intensity, and entrepreneurial innovation.

Keywords: the housing security system, household entrepreneurship, social capital, liquidity constraints, risk preference

Procedia PDF Downloads 82
4011 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study

Procedia PDF Downloads 408
4010 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues

Authors: Akram Waheb Nasef Alzordoky

Abstract:

The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 21
4009 Venezuela in the US Oil Geopolitics: An Analysis in the Light of the New Oil Landscape

Authors: William Clavijo, Edmar Almeida

Abstract:

The article analyzes the importance of Venezuela in the US geopolitics of oil considering the new oil landscape. To this end, the importance of oil in the geopolitics of the United States is discussed from the perspective of energy security as well as considering a broader view of national security. Based on this discussion, the relevance of Venezuelan oil reserves on US geopolitical agenda is analyzed. Among the results, the article shows that the transformations in the supply structure of the international oil market during the last decade have allowed the United States to achieve greater levels of independence from oil imports from other producing countries. This new reality has profoundly changed the US interest in Venezuelan oil to a broader subject that involves sensitive issues of its national security agenda.

Keywords: oil geopolitics, Venezuela, United States, energy security, national security

Procedia PDF Downloads 163
4008 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 244