Search results for: telematics services
1805 Global LGBTQ+ Civic Engagement and Volunteerism: Research Insights and Future Directions
Authors: Trevor G. Gates
Abstract:
In global communities, volunteering is an important yet rapidly changing mechanism of civic engagement. However, the volunteer rate in the US significantly declined by as much as five percent during the last two decades, resulting in increased interest in what it takes to attract and recruit volunteers. Volunteers are utilized across a number of sectors, including working within the social welfare sector either with disadvantaged individuals and communities or indirectly through advocacy As with many mainstream community groups, lesbian, gay, bisexual, transgender, and queer+ (LGBTQ+) organizations actively rely on the contributions of volunteers. Consequently, community organizations must adopt strategies to attract and retain volunteers to continue to deliver their services and remain competitive. For LGBTQ+ organizations, this means an increased understanding of volunteers’ motivations and, in particular, LGBTQ+ volunteers, as they have historically been more involved due to ongoing stigmatization. In this paper, I reviewed existing literature in order to provide insights for non-profits who are managing volunteer resources for LGBTQ+ people by identifying important characteristics of LGBTQ+ volunteers and discussing what volunteering entails. Motivational factors are outlined, and the role of volunteerism in the LGBTQ+ community is explored. The benefits of volunteering and the needs of volunteers are discussed.Keywords: volunteer, lesbian, gay, bisexual, transgender
Procedia PDF Downloads 981804 Searchable Encryption in Cloud Storage
Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu
Abstract:
Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption
Procedia PDF Downloads 3831803 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2111802 A Comparative Study to Employees' Work Stress of the Casino Hotels and Non-Casino Hotels
Authors: Xiaohong Wu, Tao Zhang
Abstract:
Since Macau opened its door to international gambling firms in 2002, Macau casino hotel industry has been booming. Casino hotels are different from the non-casino hotels in the main profit source and services. The paper aims to analyze differences in employees’ work stress and job satisfaction across the casino hotels and the non-casino hotels. Through questionnaires, the paper investigates 200 employees from casino hotels and 200 employees from non-casino hotels. Work stress and job satisfaction of employees in casino hotels and non-casino hotels are compared. Statistic techniques such as descriptive statistics and one-way analysis of variance (one-way ANOVA) are applied. The paper tries to achieve the below aims: Firstly, explore and compare the impact of gender, job position, marital status and fertility status on employees’ work stress and job satisfaction. Secondly, explore the perception of work stress and job satisfaction across casino hotel and non-casino hotel employees. Thirdly, explore the relationship between work stress and job satisfaction. The result indicates there are not significant differences in employees’ work stress and job satisfaction perception between different genders, positions, marital situations and fertility situations. The result confirms there are significant differences in employees’ work stress and job satisfaction perception between casino and non-casino employees. Moreover, Work stress negatively influences job satisfaction.Keywords: casino, employee, job satisfaction, work stress
Procedia PDF Downloads 3171801 Experimental Film Class: Watbangkapom School, Samut Songkhram
Authors: J. Areerut
Abstract:
Experimental Film Class Project is supported by the Institute for Research and Development at Suan Sunandha Rajabhat University. This project is purported to provide academic and professional services to improve the quality standards of the community and locals in accordance with the mission of the university, which is to improve and expand knowledge for the community and to develop and transfer such knowledge and professions to the next generation. Eventually, it leads to sustainable development because the development of human resources is deemed as the key for sustainable development. Moreover, the Experimental Film Class is an integral part of the teaching of film production at Suan Sunandha International School of Art (SISA). By means of giving opportunities to students for participation in projects by sharing experience, skill and knowledge and participation in field activities, it helps students in the film production major to enhance their abilities and potentials as preparation for their readiness in the marketplace. Additionally, in this class, we provide basic film knowledge, screenwriting techniques, editing and subtitles including uploading videos on social media such as YouTube and Facebook for the participant students.Keywords: experimental film class, Watbangkapom School, participant students, basic of film production, film workshop
Procedia PDF Downloads 3371800 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran
Authors: Parvin Abedi, Poorandokht Afshari
Abstract:
Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.Keywords: law of the population, midwife, motivation, childbearing
Procedia PDF Downloads 411799 Rural to Urban Migration and Mental Health Consequences in Urbanizing China
Authors: Jie Li, Nick Manning
Abstract:
The mass rural-urban migrants in China associated with the urbanization processes bear significant implications on public health, which is an important yet under-researched area. Urban social and built environment, such as noise, air pollution, high population density, and social segregation, has the potential to contribute to mental illness. In China, rural-urban migrants are also faced with institutional discrimination tied to the hukou (household registration) system, through which they are denied of full citizenship to basic social welfare and services, which may elevate the stress of urban living and exacerbate the risks to mental illness. This paper aims to link the sociospatial exclusion, everyday life experiences and its mental health consequences on rural to urban migrants living in the mega-city of Shanghai. More specifically, it asks what the daily experience of being a migrant in Shanghai is actually like, particularly regarding sources of stress from housing, displacement, service accessibility, and cultural conflict, and whether these stresses affect mental health? Secondary data from literature review on migration, urban studies, and epidemiology research, as well as primary data from preliminary field trip observations and interviews are used in the analysis.Keywords: migration, urbanisation, mental health, China
Procedia PDF Downloads 3721798 A Chronological and Comparative Examination of Traditional American Post-Secondary Institutions of Higher Learning Delivery of Instruction for College Students with Autism Spectrum Disorders
Authors: Shannon Melideo
Abstract:
Post-secondary schools that provide specialized instruction for college students with special needs have been in existence for some time in the United States of America. Whether students experience learning disabilities, visual impairments, physical limitations, Autism Spectrum Disorders or any other issue that impacts their learning are able to attend universities that intentionally cater to their needs. While this selection of post-secondary education may be preferred by some students, other have sought a different experience. Over the last ten years, the number of students with Autism Spectrum Disorders (ASD) attending traditional universities in the United States of America has increased significantly. Students with ASD tend to select smaller, private institutions that appear to offer more personal attention and services. This paper will examine how traditional American universities are preparing for this relatively new group of students in their college classrooms. This paper will provide a brief historical timeline of access to university instruction for students with Autism Spectrum Disorders, and how and if students with ASD are received in colleges around the globe, and best research supported practices for success.Keywords: autism spectrum disorders, access to learning, university instruction, accommodations
Procedia PDF Downloads 1741797 The Behavior and Satisfaction of Tourists Affecting the Sustainable Tourism at the Amphawa Floating Market in Samut Songkhram Province
Authors: Chanpen Meenakorn
Abstract:
This research aims to study; (1) behavior of the tourists affecting the satisfaction level of tourism at the Amphawa floating market in Samut Songkhram province, (2) to study the satisfaction level of tourism at the Amphawa floating market. The research method will use quantitative research; data was collected by questionnaires distributed to the tourist who visits the Amphawa floating market for 480 samples. Data was analyzed by SPSS software to process descriptive statistic including frequency, percentage, mean, standard deviation and inferential statistic is t-test, F-test, and chi-square. The results showed that the behavior of tourists had known tourist attractions in the province comes from the mouth of relatives and friends suggested that he come here before and the reasons to visit is to want to pay homage to the various temples for the frequency to visit travel an average of 2-4 times and the satisfaction of the tourists in the province found that the satisfaction level of tourists in the province at the significant level of the place, convenient and services have a high level of satisfaction.Keywords: amphawa floating market behavior of the tourists, satisfaction level, sustainable tourism, Samut Songkhram province
Procedia PDF Downloads 3661796 Assessing the Impact of Covid-19 Pandemic on Waste Management Workers in Ghana
Authors: Mensah-Akoto Julius, Kenichi Matsui
Abstract:
This paper examines the impact of COVID-19 on waste management workers in Ghana. A questionnaire survey was conducted among 60 waste management workers in Accra metropolis, the capital region of Ghana, to understand the impact of the COVID-19 pandemic on waste generation, workers’ safety in collecting solid waste, and service delivery. To find out correlations between the pandemic and safety of waste management workers, a regression analysis was used. Regarding waste generation, the results show the pandemic led to the highest annual per capita solid waste generation, or 3,390 tons, in 2020. Regarding the safety of workers, the regression analysis shows a significant and inverse association between COVID-19 and waste management services. This means that contaminated wastes may infect field workers with COVID-19 due to their direct exposure. A rise in new infection cases would have a negative impact on the safety and service delivery of the workers. The result also shows that an increase in economic activities negatively impacts waste management workers. The analysis, however, finds no statistical relationship between workers’ service deliveries and employees’ salaries. The study then discusses how municipal waste management authorities can ensure safe and effective waste collection during the pandemic.Keywords: Covid-19, waste management worker, waste collection, Ghana
Procedia PDF Downloads 2041795 A Unified Approach for Naval Telecommunication Architectures
Authors: Y. Lacroix, J.-F. Malbranque
Abstract:
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion
Procedia PDF Downloads 2911794 REDD+ and Conservation: Challenges and Opportunities of the Landscape Governance Approach
Authors: Richard Mbatu
Abstract:
Implementation of the Reducing Emissions from Deforestation and forest Degradation (REDD+) program will not only lead to significant net gains in greenhouse gas reduction but also gains in biodiversity conservation. However, the looming paradigm shift in the program in the form of the proposed landscape governance approach could change this inclination. The concern lies with the fact that pursue of carbon credits by governments and private entities under the proposed landscape approach could encourage obstinate land use behaviors that are detrimental to the cause of biodiversity conservation and ecosystem services. Yet, the landscape approach could also stimulate governments to develop and implement land use management policies for climate change adaptation and mitigation. Using two potential areas of land use under the proposed landscape approach – carbon farming in grasslands and carbon farming in plantations – this paper provides a balanced analytical review of conservation challenges and opportunities for forest governance and beyond under the proposed landscape approach to REDD+. The paper argues that such a balanced view will enable policymakers and other stakeholders to better present their arguments in their efforts to shape the course of the REDD+ program in the post-Paris Agreement era.Keywords: biodiversity conservation, REDD+, forest governance, grasslands, landscape approach, plantations
Procedia PDF Downloads 3681793 Children with Autistic Spectrum Disorders in Co-Taught Classes in Greece: Teachers’ View
Authors: Tryfon Mavropalias, Anastasia Alevriadou
Abstract:
Co-teaching is a relatively recent model of providing teaching services to students with disabilities in Greece. According to recent studies, it seems that the largest number of students who take part in the Greek co-teaching programme are children with Autistic Spectrum Disorders (ASD). The aim of the suggested study is to investigate the effectiveness and usefulness of co-teaching to students with ASD as well as skills students with ASD develop during co-teaching in primary education classes. To conduct the research, quantitative method of research was used, with the means of research being a questionnaire including open and close type questions. The sample of this research consists of 142 primary school co-teachers from all over Northern Greece (71 general education teachers and 71 special education teachers). Given the results, it was concluded that co-teachers believe that including and educating children with Autistic Spectrum Disorders in the general class benefits those who autism is measured from the middle to the upper end of the spectrum. Additionally, children develop social skills first, followed by emotional and cognitive skills. Ultimately, educators declared that they are prepared only to a limited degree to effectively support students with Autistic Spectrum Disorders in general classes.Keywords: Autistic spectrum disorders, co-teaching, co-teachers, co-taught class
Procedia PDF Downloads 3591792 Entrepreneurial Orientation and Customer Satisfaction: Evidences nearby Khao San Road
Authors: Vichada Chokesikarin
Abstract:
The study aims to determine which factors account for customer satisfaction and to investigate the relationship between entrepreneurial orientation and business success, in particular, context of the information understanding of hostel business in Pranakorn district, Bangkok and the significant element of entrepreneurship in tourism industry. This study covers 352 hostels customers and 61 hostel owners/managers nearby Khao San Road. Data collection methods were used by survey questionnaire and a series of hypotheses were developed from services marketing literature. The findings suggest the customer satisfaction most influenced by image, service quality, room quality and price accordingly. Furthermore the findings revealed that significant relationships exist between entrepreneurial orientation and business success; while competitive aggressiveness was found unrelated. The ECSI model’s generic measuring customer satisfaction was found partially mediate the business success. A reconsideration of other variables applicable should be supported with the model of hostel business. The study provides context and overall view of hostel business while discussing from the entrepreneurial orientation to customer satisfaction, thereby reducing decision risk on hostel investment.Keywords: customer satisfaction, ECSI model, entrepreneurial orientation, small hotel, hostel, business performance
Procedia PDF Downloads 3361791 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1311790 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection
Authors: Maryam Heidari, James H. Jones Jr.
Abstract:
Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.Keywords: bot detection, natural language processing, neural network, social media
Procedia PDF Downloads 1161789 Development a Battery of Measurements to Assess Giftedness Initiatives in Light of the Objectives of Saudi Arabia's Future Vision of Gifted Education
Authors: Saeed M. Al Qahtani, Alaa Eldin A. Ayoub
Abstract:
The study aimed to develop a battery of measures to assessment gifted initiatives in Saudi Arabia. The battery consisted of 17 measures developed in light of Saudi Arabia's future vision objectives for gifted education. A battery was applied to 193 gifted students who benefit from gifted initiatives and programs, 42 teachers of gifted as well as, 40 experts of gifted. Samples were taken from three main regions: Riyadh, Sharqia, Gharbia in Saudi Arabia. The results indicated that battery measures have a reliability and stability index ranging from 0.6 to 0.87. Besides that, results showed that the educational environment lacks many basic components such as facilities, laboratories, and activities that may stimulate creativity and innovation. Furthermore, results showed that there is a weakness in private sector involvement in the construction of educational buildings, special centers for gifted people and the provision of certain facilities that support talented programs. The recommendations of the study indicate the need for the private sector participation in the provision of services and projects for the care of gifted students in Saudi Arabia.Keywords: battery of measures, gifted care initiatives, Saudi future vision, gifted student
Procedia PDF Downloads 1711788 Regulating the Emerging Platform Economy in Ethiopia: Issues in the Ride-Hailing Platforms
Authors: Nebiat Lemenih Lenger
Abstract:
Today, the digital economy is evolving faster than ever in Ethiopia. Platforms that provide a ride-hailing service are growing fast in the country. The market welcomed them as they disrupt it with quality services and lower prices. This revolution is, however, not without challenges. These include cybersecurity breaches, facilitating illegal economic activities, and challenging concepts of privacy. To mitigate the risks and utilize the benefits, appropriate regulation should be introduced in the economy. By identifying legal and institutional gaps in Ethiopia`s digital economy, this research work assists the government`s effort to create a better digital economy. Moreover, this study, being a pioneer study in the area, will be an input for further studies in academia. The research employs a qualitative legal research method and analyzes various legal and policy instruments in Ethiopia in comparison with best international experiences. As this research applies a qualitative research method, a grounded theory method of data analysis is used. The research concluded that Ethiopia is far from designing appropriate legal and regulatory infrastructures. Due to the government monopoly of the sector, there is poor digital infrastructure in the country. The existing labor laws have no specific provisions on the rights and obligations of gig workers.Keywords: Ethiopia, gig economy, digital, ride-hailing, regulation
Procedia PDF Downloads 931787 Implementation of an Open Source ERP for SMEs in the Automotive Sector in Peru: A Case Study
Authors: Gerson E. Cornejo, Luis A. Gamarra, David S. Mauricio
Abstract:
The Enterprise Resource Planning Systems (ERP) allows the integration of all the business processes of the functional areas of the companies, in order to automate and standardize the processes, obtain accurate information and improve decision making in time real. In Peru, 79% of medium and small companies (SMEs) do not use any management software, this is because it is believed that ERPs are expensive, complex and difficult to implement. However, for more than 20 years there have been Open Source ERPs, which are more accessible and have the same benefit as proprietary ERPs, but there is little information on the implementation process. In this work is made a case of study, in order to show the implementation process of an Open Source ERP, Odoo, based on the ASAP methodology (Accelerated SAP) and applied to a company of corrective and preventive maintenance services of vehicles. The ERP allowed the SME to standardize its business processes, increase its productivity, reducing up to 40% certain processes. The study of this case shows that it is feasible and profitable to implement an Open Source ERP in SMEs in the Automotive Sector of Peru. In addition, it is shown that the ASAP methodology is adequate to carry out Open Source ERPs implementation projects.Keywords: ASAP, automotive sector, ERP implementation, open source
Procedia PDF Downloads 3361786 Plasmodium falciparum Infection and SARS-CoV-2 Immunoglobulin-G Positivity Rates Among Primary Healthcare Centre Attendees in Osogbo, Nigeria
Authors: Ojo Oo, Akinde S. B., Kiilani A. O., Jayeola Jo, Jogbodo T. M., Ajani Ka, Olaniyan So, Adeagbo Oy, Bolarinwa Ra, Durosomo Ha, Sule W. F.
Abstract:
Lockdown imposed to control SARS-CoV-2 transmission hampered malaria control services in Nigeria. Considering COVID-19 vaccination, we assessed Plasmodium falciparum (Pf) antigen and SARS-CoV-2 immunoglobulin-G (IgG) positivity among adults in Osogbo, Osun State, Nigeria. Consenting attendees of four Healthcare Centres were consecutively enrolled for blood sampling; relevant socio-demographic/behavioral/clinical/environmental data were collected with a questionnaire. Samples were tested, using commercial rapid test kits, for Pf antigen and SARS-CoV-2 IgG and results were analyzed using logistic regression. Participants' mean age was 40.99 years (n=200), and they were predominantly females (84.5%), traders/businessmen/women (86.0%), with self-reported receipt of COVID-19 vaccine from 123 (61.5%). Pf antigen positivity was 17.5% (95% CI: 12.23–22.77%) with age (p=0.004), marital status (p=0.004), report of stagnant water around the workplace (p=0.041) and bush around homes (p=0.008) being associated. SARS-CoV-2 IgG positivity was 56.5% (95% CI: 49.63–63.37%) with age (p=0.012) and receipt of COVID-19 vaccination (p=0.001) being associated. Although the vaccinated had a 22.8 times higher likelihood of IgG positivity, no factor was predictive of COVID-19 vaccine receipt. We report 17.5% Pf antigen positivity with four predictors, and 56.5% SARS-CoV-2 IgG positivity with two predictors.Keywords: COVID-19, vaccine, IgG, Plasmodium falciparum, SARS-CoV-2
Procedia PDF Downloads 1391785 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka
Procedia PDF Downloads 3941784 Contextualizing Torture in Closed Institutions
Authors: Erinda Bllaca Ndroqi
Abstract:
The dilemma with which the monitoring professionals are facing in today’s reality is whether to accept that prisons all over the world constitute a place where not all rights are respected (ethical approach), or widen the scope of monitoring by prioritizing the special needs of people deprived of their liberties (human right approach), despite the context and the level of improved prison condition, staff profiling, more services oriented towards rehabilitation instead of punishment. Such dilemma becomes a concern if taking into consideration the fact that prisoners, due to their powerlessness and 'their lives at the hand of the state', are constantly under the threat of abuse of power and neglect, which in the Albanian case, has never been classified as torture. Scientific research in twenty-four (24) Albanian prisons shows that for some rights, prisoners belonging to 'vulnerable groups' such as mental illness, HIV positive status, sexual orientation, and terminal illness remain quite challenged and do not ensure that their basic rights are being met by the current criminal justice system (despite recommendations set forwards to prison authorities by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT)). The research orients more discussion about policy and strategic recommendations that would need a thorough assessment of the impact of rehabilitation in special categories of prisoners, including recidivists.Keywords: prisons, rehabilitation, torture, vulnerability
Procedia PDF Downloads 1291783 Communication Barriers in Disaster Risk Management
Authors: Pooja Pandey
Abstract:
The role of communication plays an integral part in the management of any disaster, whether natural or human-induced, both require effective and strategic delivery of information. The way any information is conveyed carries the most weight while dealing with the disaster. Hence, integrating communication strategies in disaster risk management (DRM) are extensively acknowledged however, these integration and planning are missing from the practical books. Researchers are continuously exploring integrated DRM and have established substantial vents between research and implementation of the strategies (gaps between science and policy). For this reason, this paper reviews the communication barriers that obstruct effective management of the disaster. Communication between first responders (government agencies, police, medical services) and the public (people directly affected by the disaster) is most critical and lacks proper delivery during a disaster. And these challenges can only be resolved if the foundation of the problem is properly dealt with, which is resolving the issues within the organizations. Through this study, it was found that it is necessary to build the communication gap between the organizations themselves as most of the hindrances occur during the mitigation, preparedness, response and recovery phase of the disaster. The study is concluded with the main aim to review the communication barriers within and at the organizational, technological, and social levels that impact effective DRM. In the end, some suggestions are made to strengthen the knowledge for future improvement in communication between the responders and their organizations.Keywords: communication, organization, barriers, first responders, disaster risk management
Procedia PDF Downloads 3001782 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 3851781 Regulating Information Asymmetries at Online Platforms for Short-Term Vacation Rental in European Union– Legal Conondrum Continues
Authors: Vesna Lukovic
Abstract:
Online platforms as new business models play an important role in today’s economy and the functioning of the EU’s internal market. In the travel industry, algorithms used by online platforms for short-stay accommodation provide suggestions and price information to travelers. Those suggestions and recommendations are displayed in search results via recommendation (ranking) systems. There has been a growing consensus that the current legal framework was not sufficient to resolve problems arising from platform practices. In order to enhance the potential of the EU’s Single Market, smaller businesses should be protected, and their rights strengthened vis-à-vis large online platforms. The Regulation (EU) 2019/1150 of the European Parliament and of the Council on promoting fairness and transparency for business users of online intermediation services aims to level the playing field in that respect. This research looks at Airbnb through the lenses of this regulation. The research explores key determinants and finds that although regulation is an important step in the right direction, it is not enough. It does not entail sufficient clarity obligations that would make online platforms an intermediary service which both accommodation providers and travelers could use with ease.Keywords: algorithm, online platforms, ranking, consumers, EU regulation
Procedia PDF Downloads 1301780 Chronic Fatigue Syndrome/Myalgic Encephalomyelitis in Younger Children: A Qualitative Analysis of Families’ Experiences of the Condition and Perspective on Treatment
Authors: Amberly Brigden, Ali Heawood, Emma C. Anderson, Richard Morris, Esther Crawley
Abstract:
Background: Paediatric chronic fatigue syndrome (CFS)/myalgic encephalomyelitis (ME) is characterised by persistent, disabling fatigue. Health services see patients below the age of 12. This age group experience high levels of disability, with low levels of school attendance, high levels of fatigue, anxiety, functional disability and pain. CFS/ME interventions have been developed for adolescents, but the developmental needs of younger children suggest treatment should be tailored to this age group. Little is known about how intervention should be delivered to this age group, and further work is needed to explore this. Qualitative research aids patient-centered design of health intervention. Methods: Five to 11-year-olds and their parents were recruited from a specialist CFS/ME service. Semi-structured interviews explored the families’ experience of the condition and perspectives on treatment. Interactive and arts-based methods were used. Interviews were audio-recorded, transcribed and analysed thematically. Qualitative Results: 14 parents and 7 children were interviewed. Early analysis of the interviews revealed the importance of the social-ecological setting of the child, which led to themes being developed in the context of Systems Theory. Theme one relates to the level of the child, theme two the family system, theme three the organisational and societal systems, and theme four cuts-across all levels. Theme1: The child’s capacity to describe, understand and manage their condition. Younger children struggled to describe their internal experiences, such as physical symptoms. Parents felt younger children did not understand some concepts of CFS/ME and did not have the capabilities to monitor and self-regulate their behaviour, as required by treatment. A spectrum of abilities was described; older children (10-11-year-olds) were more involved in clinical sessions and had more responsibility for self-management. Theme2: Parents’ responsibility for managing their child’s condition. Parents took responsibility for regulating their child’s behaviour in accordance with the treatment programme. They structured their child’s environment, gave direct instructions to their child, and communicated the needs of their child to others involved in care. Parents wanted their child to experience a 'normal' childhood and took steps to shield their child from medicalization, including diagnostic labels and clinical discussions. Theme3: Parental isolation and the role of organisational and societal systems. Parents felt unsupported in their role of managing the condition and felt negative responses from primary care health services and schools were underpinned by a lack of awareness and knowledge about CFS/ME in younger children. This sometimes led to a protracted time to diagnosis. Parents felt that schools have the potential important role in managing the child’s condition. Theme4: Complexity and uncertainty. Many parents valued specialist treatment (which included activity management, physiotherapy, sleep management, dietary advice, medical management and psychological support), but felt it needed to account for the complexity of the condition in younger children. Some parents expressed uncertainty about the diagnosis and the treatment programme. Conclusions: Interventions for younger children need to consider the 'systems' (family, organisational and societal) involved in the child’s care. Future research will include interviews with clinicians and schools supporting younger children with CFS/ME.Keywords: chronic fatigue syndrome (CFS)/myalgic encephalomyelitis (ME), pediatric, qualitative, treatment
Procedia PDF Downloads 1401779 Temporal Trends in the Urban Metabolism of Riyadh, Saudi Arabia
Authors: Naif Albelwi, Alan Kwan, Yacine Rezgui
Abstract:
Cities with rapid growth face tremendous challenges not only to provide services to meet this growth but also to assure that this growth occurs in a sustainable way. The consumption of material, energy, and water resources is inextricably linked to population growth with a unique impact in urban areas, especially in light of significant investments in infrastructure to support urban development. Urban Metabolism (UM) is becoming popular as it provides a framework accounting the mass and energy flows through a city. The objective of this study is to determine the energy and material flows of Riyadh, Saudi Arabia using locally generated data from 1996 and 2012 and analyzing the temporal trends of energy and material flows. Preliminary results show that while the population of Riyadh grew 90% since 1996, the input and output flows have increased at higher rate. Results also show increasing in energy mobile consumption from 61k TJ in 1996 to 157k TJ in 2012 which points to Riyadh’s inefficient urban form. The study findings highlight the importance to develop effective policies for improving the use of resources.Keywords: energy and water consumption, sustainability, urban development, urban metabolism
Procedia PDF Downloads 2721778 An Exploratory Study on Challenges of Public Private Partnership Projects in Oman
Authors: Omar Amoudi, Mariya Khalid
Abstract:
The limitation of the public funds for the infrastructure projects and with the deterioration of international oil prices and the negative consequences on the economies of oil producing and exporting countries, Oman has encouraged the partnership between the public and private sectors. As the private sector has a role in planning, financing, designing, operating and the maintenance of the public services. There is no doubt that, the adoption of Public Private Partnership (PPP) strategy faces many challenges which might affect the project seriously if it is not overcome in earlier time. These challenges depend on the level of understanding of the strategy, the roles and regulations and the availability of resources as well. This research aims at identifying the challenges facing the PPP infrastructure projects in Oman based on the similar previous studies supported by questionnaire survey and semi structured interviews. It also seeks to discuss the rationale for adoption in Oman and uncover the current status of PPP strategy. The identified challenges were ranked according to the importance index of each challenge. After analysis of data, it has observed that, the main challenges facing PPPs projects in Oman are high participation cost, high projects cost and regulation changes. The PPP strategy has to be adopted well and with a high level of experience in order to ensure a successful implementation of PPP projects in Oman.Keywords: public private partnership (PPP), challenges, infrastructure, Oman
Procedia PDF Downloads 3031777 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks
Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem
Abstract:
Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule
Procedia PDF Downloads 1001776 Understanding Level 5 Sport Student’s Perspectives of the Barriers to Progression and Attainment
Authors: Emma Whewell, Lee Waters, Mark Wall
Abstract:
This paper is a mixed methods investigation into the perceived barriers to attainment and progression. Initially entry level data was analysed to identify some of the key characteristics of the student cohort- for example entry route, age and ethnic background. Secondly, a phenomenological case study of the lived experiences of 15 level 5 sport and exercise students was conducted. It aimed to understand the complexities of success in higher education, far beyond entry qualifications, indices of deprivation and POLAR characteristics, to offer a first-hand account of student perceptions and interpretations of the barriers they face in progression, retention and completion on their programme. Using focus groups and interviews with students from a range of indices we offer a set of rich case studies exploring the interpretations of our students’ lived experiences and challenges. Findings demonstrate a complex set of circumstances that centre on managing workload, use of support services and aspirations of students that conflict with university priorities. Conclusions centre on the role of academic and pastoral support, assumptions about priorities of students and practical interventions to support achievement.Keywords: access and participation, higher education, progression and retention, barriers
Procedia PDF Downloads 109