Search results for: attack risk
4402 Durability of a Cementitious Matrix Based on Treated Sediments
Authors: Mahfoud Benzerzour, Mouhamadou Amar, Amine Safhi, Nor-Edine Abriak
Abstract:
Significant volumes of sediment are annually dredged in France and all over the world. These materials may, in fact, be used beneficially as supplementary cementitious material. This paper studies the durability of a new cement matrix based on marine dredged sediment of Dunkirk-Harbor (north of France). Several techniques are used to characterize the raw sediment such as physical properties, chemical analyses, and mineralogy. The XRD analysis revealed quartz, calcite, kaolinite as main mineral phases. In order to eliminate organic matter and activate some of those minerals, the sediment is calcined at a temperature of 850°C for 1h. Moreover, four blended mortars were formulated by mixing a portland cement (CEM I 52,5 N) and the calcined sediment as partial cement substitute (0%, 10%, 20% and 30%). Reference mortars, based on the blended cement, were then prepared. This re-use cannot be substantiating and efficient without a durability study. In this purpose, the following tests, mercury porosity, accessible water porosity, chloride permeability, freezing and thawing, external sulfate attack, alkali aggregates reaction, compressive and bending strength tests were conducted on those mortars. The results of most of those tests evidenced the fact that the mortar that contains 10% of the treated sediment is efficient and durable as the reference mortar itself. That would infer that the presence of these calcined sediment improves mortar general behavior.Keywords: sediment, characterization, calcination, substitution, durability
Procedia PDF Downloads 2574401 The Impact of a Five-Day Basic Disaster Management Training on Disaster Risk Reduction: Case Study of Indonesia Defense University
Authors: Jazmi Adlan Bohari, I. Dewa Ketut Kerta Widana
Abstract:
Education on disaster management has been made as a mainstream focus of many countries. In Indonesia, this has been emphasized with the direct order of the President of Indonesia to implement disaster education at all levels in both formal and informal education. Indonesia Defense University (IDU) executes this order through Three Pillars of Higher Education, which consists of research, education, and community service. One of them is a five-day disaster management training for 105 participants divided into three batches that consist of faculty members and graduate students. This training uses the 2018 Basic Disaster Management Training Modul issued by the Indonesia National Disaster Management Agency (BNPB). This research aims to analyze the impact of this short training on the trainee’s knowledge and understanding of basic disaster management. This study is a qualitative research with case study approach. The research shows that after five days of training, there as a significant increase in knowledge and understanding of basic disaster management experienced by the trainees with a 61,73% overall increase. The post-training data shows that 61% of the trainees have a very good understanding, 24% with good understanding, 13% with adequate understanding, and 2% with poor understanding. The result suggests that a short-time education with a structured curriculum can successfully increase the knowledge and understanding of disaster management on a basic level and can hypothetically contribute to the effort to reduce disaster risks.Keywords: disaster education, basic disaster management training, three Pillars of Higher Education, disaster risk reduction
Procedia PDF Downloads 1374400 The Effect of Particulate Matter on Cardiomyocyte Apoptosis Through Mitochondrial Fission
Authors: Tsai-chun Lai, Szu-ju Fu, Tzu-lin Lee, Yuh-Lien Chen
Abstract:
There is much evidence that exposure to fine particulate matter (PM) from air pollution increases the risk of cardiovascular morbidity and mortality. According to previous reports, PM in the air enters the respiratory tract, contacts the alveoli, and enters the blood circulation, leading to the progression of cardiovascular disease. PM pollution may also lead to cardiometabolic disturbances, increasing the risk of cardiovascular disease. The effects of PM on cardiac function and mitochondrial damage are currently unknown. We used mice and rat cardiomyocytes (H9c2) as animal and in vitro cell models, respectively, to simulate an air pollution environment using PM. These results indicate that the apoptosis-related factor PUMA, a regulator of apoptosis upregulated by p53, is increased in mice treated with PM. Apoptosis was aggravated in cardiomyocytes treated with PM, as measured by TUNEL assay and Annexin V/PI. Western blot results showed that CASPASE3 was significantly increased and BCL2 (B-cell lymphoid 2) was significantly decreased under PM treatment. Concurrent exposure to PM increases mitochondrial reactive oxygen species (ROS) production by MitoSOX Red staining. Furthermore, using Mitotracker staining, PM treatment significantly shortened mitochondrial length, indicating mitochondrial fission. The expression of mitochondrial fission-related proteins p-DRP1 (phosphodynamics-related protein 1) and FIS1 (mitochondrial fission 1 protein) was significantly increased. Based on these results, the exposure to PM worsens mitochondrial function and leads to cardiomyocyte apoptosis.Keywords: particulate matter, cardiomyocyte, apoptosis, mitochondria
Procedia PDF Downloads 1044399 Clinical Impact of Delirium and Antipsychotic Therapy: 10-Year Experience from a Referral Coronary Care Unit
Authors: Niyada Naksuk, Thoetchai Peeraphatdit, Vitaly Herasevich, Peter A. Brady, Suraj Kapa, Samuel J. Asirvatham
Abstract:
Introduction: Little is known about the safety of antipsychotic therapy for delirium in the coronary care unit (CCU). Our aim was to examine the effect of delirium and antipsychotic therapy among CCU patients. Methods: Pre-study Confusion Assessment Method-Intensive Care Unit (CAM–ICU) criteria were implemented in screening consecutive patients admitted to Mayo Clinic, Rochester, the USA from 2004 through 2013. Death status was prospectively ascertained. Results: Of 11,079 study patients, the incidence of delirium was 8.3% (n=925). Delirium was associated with an increased risk of in-hospital mortality (adjusted OR 1.49; 95% CI, 1.08-2.08; P=.02) and one-year mortality among patients who survived from CCU admission (adjusted HR 1.46; 95% CI, 1.12-1.87; P=.005). A total of 792 doses of haloperidol (5 IQR [3-10] mg/day) or quetiapine (25 IQR [13-50] mg/day) were given to 244 patients with delirium. The clinical characteristics of patients with delirium who did and did not receive antipsychotic therapy were not different (baseline corrected QT [QTc] interval 460±61 ms vs. 457±58 ms, respectively; P = 0.57). In comparison to baseline, mean QTc intervals after the first and third doses of the antipsychotics were not significantly prolonged in haloperidol (448±56, 458±57, and 450±50 ms, respectively) or quetiapine groups (459±54, 467±68, and 462±46 ms, respectively) (P > 0.05 for all). Additionally, in-hospital mortality (adjusted OR 0.67; 95% CI, 0.42-1.04; P=.07), ventricular arrhythmia (adjusted OR 0.87; 95% CI, 0.17-3.62; P=.85) and one-year mortality among the hospital survivors (adjusted HR 0.86; 95% CI 0.62-1.17; P = 0.34) were not different in patients with delirium irrespective of whether or not they received antipsychotics. Conclusions: In patients admitted to the CCU, delirium was associated with an increase in both in-hospital and one-year mortality. Low doses of haloperidol and quetiapine appeared to be safe, without an increase in risk of sudden cardiac death, in-hospital mortality, or one-year mortality in carefully monitored patients.Keywords: arrhythmias, haloperidol, mortality, qtc interval, quetiapine
Procedia PDF Downloads 3724398 Reduction of the Number of Traffic Accidents by Function of Driver's Anger Detection
Authors: Masahiro Miyaji
Abstract:
When a driver happens to be involved in some traffic congestion or after traffic incidents, the driver may fall in a state of anger. State of anger may encounter decisive risk resulting in severer traffic accidents. Preventive safety function using driver’s psychosomatic state with regard to anger may be one of solutions which would avoid that kind of risks. Identifying driver’s anger state is important to create countermeasures to prevent the risk of traffic accidents. As a first step, this research figured out root cause of traffic incidents by means of using Internet survey. From statistical analysis of the survey, dominant psychosomatic states immediately before traffic incidents were haste, distraction, drowsiness and anger. Then, we replicated anger state of a driver while driving, and then, replicated it by means of using driving simulator on bench test basis. Six types of facial expressions including anger were introduced as alternative characteristics. Kohonen neural network was adopted to classify anger state. Then, we created a methodology to detect anger state of a driver in high accuracy. We presented a driving support safety function. The function adapts driver’s anger state in cooperation with an autonomous driving unit to reduce the number of traffic accidents. Consequently, e evaluated reduction rate of driver’s anger in the traffic accident. To validate the estimation results, we referred the reduction rate of Advanced Safety Vehicle (ASV) as well as Intelligent Transportation Systems (ITS).Keywords: Kohonen neural network, driver’s anger state, reduction of traffic accidents, driver’s state adaptive driving support safety
Procedia PDF Downloads 3594397 'I'm in a Very Safe Place': Webcam Sex Workers in Aotearoa, New Zealand and Their Perceptions of Danger and Risk
Authors: Madeline V. Henry
Abstract:
Sex work is a contested subject in academia. Many authors now argue that the practice should be recognized as a legitimate and rationally chosen form of labor, and that decriminalization is necessary to ensure the safety of sex workers and reduce their stigmatization. However, a prevailing argument remains that the work is inherently violent and oppressive and that all sex workers are directly or indirectly coerced into participating in the industry. This argument has been complicated by the recent proliferation of computer-mediated technologies that allow people to conduct sex work without the need to be physically co-present with customers or pimps. One example of this is the practice of ‘camming’, wherein ‘webcam models’ stream themselves stripping and/or performing autoerotic stimulation in an online chat-room for payment. In this presentation, interviews with eight ‘camgirls’ (aged 22-34) will be discussed. Their talk has been analyzed using Foucauldian discourse analysis, focusing on common discursive threads in relation to the work and their subjectivities. It was found that the participants demonstrated appreciation for the lack of physical danger they were in, but emphasized the unique and significant dangers of online-based sex work (their images and videos being recorded and shared without their consent, for example). Participants also argued that their largest concerns were based around stigma, which they claimed remained prevalent despite the decriminalized legal model in Aotearoa/New Zealand (which has been in place for over 14 years). Overall, this project seeks to challenge commonplace academic approaches to sex work, adding further research to support sex workers’ rights and highlighting new issues to consider in a digital environment.Keywords: camming, sex work, stigma, risk
Procedia PDF Downloads 1554396 Performance of the Abbott RealTime High Risk HPV Assay with SurePath Liquid Based Cytology Specimens from Women with Low Grade Cytological Abnormalities
Authors: Alexandra Sargent, Sarah Ferris, Ioannis Theofanous
Abstract:
The Abbott RealTime High Risk HPV test (RealTime HPV) is one of five assays clinically validated and approved by the English NHS Cervical Screening Programme (CSP) for HPV triage of low grade dyskaryosis and test-of-cure of treated Cervical Intraepithelial Neoplasia. The assay is a highly automated multiplex real-time PCR test for detecting 14 high risk (hr) HPV types, with simultaneous differentiation of HPV 16 and HPV 18 versus non-HPV 16/18 hrHPV. An endogenous internal control ensures sample cellularity, controls extraction efficiency and PCR inhibition. The original cervical specimen collected in SurePath (SP) liquid-based cytology (LBC) medium (BD Diagnostics) and the SP post-gradient cell pellets (SPG) after cytological processing are both CE marked for testing with the RealTime HPV test. During the 2011 NHSCSP validation of new tests only the original aliquot of SP LBC medium was investigated. Residual sample volume left after cytology slide preparation is low and may not always have sufficient volume for repeat HPV testing or for testing of other biomarkers that may be implemented in testing algorithms in the future. The SPG samples, however, have sufficient volumes to carry out additional testing and necessary laboratory validation procedures. This study investigates the correlation of RealTime HPV results of cervical specimens collected in SP LBC medium from women with low grade cytological abnormalities observed with matched pairs of original SP LBC medium and SP post-gradient cell pellets (SPG) after cytology processing. Matched pairs of SP and SPG samples from 750 women with borderline (N = 392) and mild (N = 351) cytology were available for this study. Both specimen types were processed and parallel tested for the presence of hrHPV with RealTime HPV according to the manufacturer´s instructions. HrHPV detection rates and concordance between test results from matched SP and SPGCP pairs were calculated. A total of 743 matched pairs with valid test results on both sample types were available for analysis. An overall-agreement of hrHPV test results of 97.5% (k: 0.95) was found with matched SP/SPG pairs and slightly lower concordance (96.9%; k: 0.94) was observed on 392 pairs from women with borderline cytology compared to 351 pairs from women with mild cytology (98.0%; k: 0.95). Partial typing results were highly concordant in matched SP/SPG pairs for HPV 16 (99.1%), HPV 18 (99.7%) and non-HPV16/18 hrHPV (97.0%), respectively. 19 matched pairs were found with discrepant results: 9 from women with borderline cytology and 4 from women with mild cytology were negative on SPG and positive on SP; 3 from women with borderline cytology and 3 from women with mild cytology were negative on SP and positive on SPG. Excellent correlation of hrHPV DNA test results was found between matched pairs of SP original fluid and post-gradient cell pellets from women with low grade cytological abnormalities tested with the Abbott RealTime High-Risk HPV assay, demonstrating robust performance of the test with both specimen types and reassuring the utility of the assay for cytology triage with both specimen types.Keywords: Abbott realtime test, HPV, SurePath liquid based cytology, surepath post-gradient cell pellet
Procedia PDF Downloads 2584395 Landfill Failure Mobility Analysis: A Probabilistic Approach
Authors: Ali Jahanfar, Brajesh Dubey, Bahram Gharabaghi, Saber Bayat Movahed
Abstract:
Ever increasing population growth of major urban centers and environmental challenges in siting new landfills have resulted in a growing trend in design of mega-landfills some with extraordinary heights and dangerously steep slopes. Landfill failure mobility risk analysis is one of the most uncertain types of dynamic rheology models due to very large inherent variabilities in the heterogeneous solid waste material shear strength properties. The waste flow of three historic dumpsite and two landfill failures were back-analyzed using run-out modeling with DAN-W model. The travel distances of the waste flow during landfill failures were calculated approach by taking into account variability in material shear strength properties. The probability distribution function for shear strength properties of the waste material were grouped into four major classed based on waste material compaction (landfills versus dumpsites) and composition (high versus low quantity) of high shear strength waste materials such as wood, metal, plastic, paper and cardboard in the waste. This paper presents a probabilistic method for estimation of the spatial extent of waste avalanches, after a potential landfill failure, to create maps of vulnerability scores to inform property owners and residents of the level of the risk.Keywords: landfill failure, waste flow, Voellmy rheology, friction coefficient, waste compaction and type
Procedia PDF Downloads 2904394 Value-Based Argumentation Frameworks and Judicial Moral Reasoning
Authors: Sonia Anand Knowlton
Abstract:
As the use of Artificial Intelligence is becoming increasingly integrated in virtually every area of life, the need and interest to logically formalize the law and judicial reasoning is growing tremendously. The study of argumentation frameworks (AFs) provides promise in this respect. AF’s provide a way of structuring human reasoning using a formal system of non-monotonic logic. P.M. Dung first introduced this framework and demonstrated that certain arguments must prevail and certain arguments must perish based on whether they are logically “attacked” by other arguments. Dung labelled the set of prevailing arguments as the “preferred extension” of the given argumentation framework. Trevor Bench-Capon’s Value-based Argumentation Frameworks extended Dung’s AF system by allowing arguments to derive their force from the promotion of “preferred” values. In VAF systems, the success of an attack from argument A to argument B (i.e., the triumph of argument A) requires that argument B does not promote a value that is preferred to argument A. There has been thorough discussion of the application of VAFs to the law within the computer science literature, mainly demonstrating that legal cases can be effectively mapped out using VAFs. This article analyses VAFs from a jurisprudential standpoint to provide a philosophical and theoretical analysis of what VAFs tell the legal community about the judicial reasoning, specifically distinguishing between legal and moral reasoning. It highlights the limitations of using VAFs to account for judicial moral reasoning in theory and in practice.Keywords: nonmonotonic logic, legal formalization, computer science, artificial intelligence, morality
Procedia PDF Downloads 744393 Factors Associated with Risky Sexual Behaviour in Adolescent Girls and Young Women in Cambodia: A Systematic Review
Authors: Farwa Rizvi, Joanne Williams, Humaira Maheen, Elizabeth Hoban
Abstract:
There is an increase in risky sexual behavior and unsafe sex in adolescent girls and young women aged 15 to 24 years in Cambodia, which negatively affects their reproductive health by increasing the risk of contracting sexually transmitted infections and unintended pregnancies. Risky sexual behavior includes ‘having sex at an early age, having multiple sexual partners, having sex while under the influence of alcohol or drugs, and unprotected sexual behaviors’. A systematic review of quantitative research conducted in Cambodia was undertaken, using the theoretical framework of the Social Ecological Model to identify the personal, social and cultural factors associated with risky sexual behavior and unsafe sex in young Cambodian women. PRISMA guidelines were used to search databases including Medline Complete, PsycINFO, CINAHL Complete, Academic Search Complete, Global Health, and Social Work Abstracts. Additional searches were conducted in Science Direct, Google Scholar and in the grey literature sources. A risk-of-bias tool developed explicitly for the systematic review of cross-sectional studies was used. Summary item on the overall risk of study bias after the inter-rater response showed that the risk-of-bias was high in two studies, moderate in one study and low in one study. The search strategy included a combination of subject terms and free text terms. The medical subject headings (MeSH) terms included were; contracept* or ‘birth control’ or ‘family planning’ or pregnan* or ‘safe sex’ or ‘protected intercourse’ or ‘unprotected intercourse’ or ‘protected sex’ or ‘unprotected sex’ or ‘risky sexual behaviour*’ or ‘abort*’ or ‘planned parenthood’ or ‘unplanned pregnancy’ AND ( barrier* or obstacle* or challenge* or knowledge or attitude* or factor* or determinant* or choic* or uptake or discontinu* or acceptance or satisfaction or ‘needs assessment’ or ‘non-use’ or ‘unmet need’ or ‘decision making’ ) AND Cambodia*. Initially, 300 studies were identified by using key words and finally, four quantitative studies were selected based on the inclusion criteria. The four studies were published between 2010 and 2016. The study participants ranged in age from 10-24 years, single or married, with 3 to 10 completed years of education. The mean age at sexual debut was reported to be 18 years. Using the perspective of the Social Ecological Model, risky sexual behavior was associated with individual-level factors including young age at sexual debut, low education, unsafe sex under the influence of alcohol and substance abuse, multiple sexual partners or transactional sex. Family level factors included living away from parents, orphan status and low levels of family support. Peer and partner level factors included peer delinquency and lack of condom use. Low socioeconomic status at the society level was also associated with risky sexual behaviour. There is scant research on sexual and reproductive health of adolescent girls and young women in Cambodia. Individual, family and social factors were significantly associated with risky sexual behaviour. More research is required to inform potential preventive strategies and policies that address young women’s sexual and reproductive health.Keywords: adolescents, high-risk sex, sexual activity, unplanned pregnancies
Procedia PDF Downloads 2454392 A Review on the Use of Herbal Alternatives to Antibiotics in Poultry Diets
Authors: Sasan Chalaki, Seyed Ali Mirgholange, Touba Nadri, Saman Chalaki
Abstract:
In the current world, proper poultry nutrition has garnered special attention as one of the fundamental factors for enhancing their health and performance. Concerns related to the excessive use of antibiotics in the poultry industry and their role in antibiotic resistance have transformed this issue into a global challenge in public health and the environment. On the other hand, poultry farming plays a vital role as a primary source of meat and eggs in human nutrition, and improving their health and performance is crucial. One effective approach to enhance poultry nutrition is the utilization of the antibiotic properties of plant-based ingredients. The use of plant-based alternatives as natural antibiotics in poultry nutrition not only aids in improving poultry health and performance but also plays a significant role in reducing the consumption of synthetic antibiotics and preventing antibiotic resistance-related issues. Plants contain various antibacterial compounds, such as flavonoids, tannins, and essential oils. These compounds are recognized as active agents in combating bacteria. Plant-based antibiotics are compounds extracted from plants with antibacterial properties. They are acknowledged as effective substitutes for chemical antibiotics in poultry diets. The advantages of plant-based antibiotics include reducing the risk of resistance to chemical antibiotics, increasing poultry growth performance, and lowering the risk of disease transmission.Keywords: poultry, antibiotics, essential oils, plant-based
Procedia PDF Downloads 774391 Aerodynamics and Aeroelastics Studies of Hanger Bridge with H-Beam Profile Using Wind Tunnel
Authors: Matza Gusto Andika, Malinda Sabrina, Syarie Fatunnisa
Abstract:
Aerodynamic and aeroelastics studies on the hanger bridge profile are important to analyze the aerodynamic phenomenon and Aeroelastics stability of hanger. Wind tunnel tests were conducted on a model of H-beam profile from hanger bridge. The purpose of this study is to investigate steady aerodynamic characteristics such as lift coefficient (Cl), drag coefficient (Cd), and moment coefficient (Cm) under the different angle of attack for preliminary prediction of aeroelastics stability problems. After investigation the steady aerodynamics characteristics from the model, dynamic testing is also conducted in wind tunnel to know the aeroelastics phenomenon which occurs at the H-beam hanger bridge profile. The studies show that the torsional vortex induced vibration occur when the wind speed is 7.32 m/s until 9.19 m/s with maximum amplitude occur when the wind speed is 8.41 m/s. The result of wind tunnel testing is matching to hanger vibration where occur in the field, so wind tunnel studies has successful to model the problem. In order that the H-beam profile is not good enough for the hanger bridge and need to be modified to minimize the Aeroelastics problem. The modification can be done with structure dynamics modification or aerodynamics modification.Keywords: aerodynamics, aeroelastic, hanger bridge, h-beam profile, vortex induced vibration, wind tunnel
Procedia PDF Downloads 3504390 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa
Authors: Masa Popovac, Philip Fine
Abstract:
Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa
Procedia PDF Downloads 4824389 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete
Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei
Abstract:
The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.Keywords: admixture, granite dust, permeability, pozzolans
Procedia PDF Downloads 1594388 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 1584387 Effects of High Intensity Interval vs. Low Intensity Continuous Training on LXRβ, ABCG5 and ABCG8 Genes Expression in Male Wistar Rats
Authors: Sdiqeh Jalali, M. R. Khazdair
Abstract:
Liver X receptors (LXR) have an essential role in the regulation of cholesterol metabolism, and their activation increase ABCG5 and ABCG8 genes expression for the improvement of cholesterol excretion from the body during reverse cholesterol transport (RCT). The aim of this study was to investigate the effects of high-intensity interval (HIT) and low intensity continuous (LIT) trainings on gene expression of these substances after a high-fat diet in Wistar rats. Materials and Methods: Fifteen male Wistar rats were divided into 3 groups: control group (n = 5), HIT exercise group (n = 5) and LIT exercise group (n = 5). All groups used a high-fat diet for 13 weeks, and the HIT and LIT groups performed the specific training program. The expression of LXRβ, ABCG5, and ABCG8 genes was measured after the training period. Findings: Data analysis showed significantly higher levels of LXRβ, ABCG5, and ABCG8 gene expression in HIT and LIT groups compared to the control group (P ≤ 0.05). Conclusion: HIT and LIT trainings after a high-fat diet have beneficial effects on RCT that prevent heart attack. Also, HIT training may have a greater effect on cholesterol excretion during the reverse cholesterol transport mechanism than LIT.Keywords: liver X receptor, atherosclerosis, interval training, endurance training
Procedia PDF Downloads 1174386 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 1324385 Effect of Preconception Picture-Based Nutrition Education on Knowledge and Adherence to Iron-Folic Acid Supplementation Among Women Planning to Be Pregnant in Ethiopia
Authors: Anteneh Berhane Yeyi, Tefera Belachew
Abstract:
Any woman who could become pregnant is at risk of having a baby with neural tube defects (NTDs). A spontaneous aborted women with immediately preceding pregnancy may have an increased risk of develop NTDs. Ethiopia has one of the highest rates of micronutrient deficiencies, including folate and iron deficiency. Currently, in Ethiopia, NTDs is emerged as a public health concern. Even if Ethiopia, has implement different strategies for reducing maternal and neonatal mortality and morbidity, there is no room in the health care system and lack of integration for preventing the risk of NTDs for those women who aborted spontaneously and women who discontinue long acting contraception to become pregnant. The purpose of this study was to evaluate the effect of preconception picture-based nutrition education on knowledge and adherence to iron-folic acid supplement (IFAS) intake to reduce the risk of developing neural tube defects (NTDs) and iron deficiency anemia (IDA) among women who had a planned to pregnancy in Ethiopia, a country with a high burden of NTDs. Methodology: This study was conducted in Eastern Ethiopia. A double blinded parallel randomized controlled trial design was employed among women in the age group of 18-45 years who requested to interrupt modern contraceptive who have an intention to be pregnant and women with spontaneous abortion who refused to take a contraceptive. The interventional arm (n=122) received a preconception picture-based nutrition education with iron-folic acid supplement, and the control arm (n=122) received only preconception IFAS. In this study male partners were participated. Result: After three months of intervention the proportion of adherence to IFAS was 23% (n=56). With regard to adherence within the groups, 42.6% (n=52) in the intervention group and 3.3% (n=4) in the control group and the intervention group were significantly higher than in control group. In the intervention group the proportion of adherence to IFAS intake among participants increased by 40.1% and there were statistically difference (P<0.0001). The difference in difference between the two groups of adherence to IFAS intake was 37.6% and there were a statistical significance (P<0.0001). Level of knowledge between the groups did differ before and after intervention (P= 0.87 Vs P<0.0001). The overall the mean change in knowledge Mean (+SE) between group was 0.9 (+3.04 SE) and there were significant differences between two groups (P<0.001). Conclusion: In general this intervention is effective toward adherence to IFAS and a critical milestone to improve maternal health and reduce the neonate mortality due to NTDs and other advert effect of pregnancy and birth outcomes. This intervention is very short, simple, and cost effective and has potential for adaptation, feasible development to large-scale implementation in the existing health care system. Furthermore, this type of interventional approach has the potential to reduce the country's ANC program dropout rates and increase male partner’s participation on reproductive health.Keywords: NTDs, IFAS, WRA, Ethiopia
Procedia PDF Downloads 344384 Development of Mechanisms of Value Creation and Risk Management Organization in the Conditions of Transformation of the Economy of Russia
Authors: Mikhail V. Khachaturyan, Inga A. Koryagina, Eugenia V. Klicheva
Abstract:
In modern conditions, scientific judgment of problems in developing mechanisms of value creation and risk management acquires special relevance. Formation of economic knowledge has resulted in the constant analysis of consumer behavior for all players from national and world markets. Effective mechanisms development of the demand analysis, crucial for consumer's characteristics of future production, and the risks connected with the development of this production are the main objectives of control systems in modern conditions. The modern period of economic development is characterized by a high level of globalization of business and rigidity of competition. At the same time, the considerable share of new products and services costs has a non-material intellectual nature. The most successful in Russia is the contemporary development of small innovative firms. Such firms, through their unique technologies and new approaches to process management, which form the basis of their intellectual capital, can show flexibility and succeed in the market. As a rule, such enterprises should have very variable structure excluding the tough scheme of submission and demanding essentially new incentives for inclusion of personnel in innovative activity. Realization of similar structures, as well as a new approach to management, can be constructed based on value-oriented management which is directed to gradual change of consciousness of personnel and formation from groups of adherents included in the solution of the general innovative tasks. At the same time, valuable changes can gradually capture not only innovative firm staff, but also the structure of its corporate partners. Introduction of new technologies is the significant factor contributing to the development of new valuable imperatives and acceleration of the changing values systems of the organization. It relates to the fact that new technologies change the internal environment of the organization in a way that the old system of values becomes inefficient in new conditions. Introduction of new technologies often demands change in the structure of employee’s interaction and training in their new principles of work. During the introduction of new technologies and the accompanying change in the value system, the structure of the management of the values of the organization is changing. This is due to the need to attract more staff to justify and consolidate the new value system and bring their view into the motivational potential of the new value system of the organization.Keywords: value, risk, creation, problems, organization
Procedia PDF Downloads 2844383 Prevalence and Determinants of Depression among Orphans and Vulnerable Children in Child Care Homes in Nepal
Authors: Kumari Bandana Bhatt, Navin Bhatt
Abstract:
Background: Orphans and vulnerable children (OVC) are high risk of physical, mental, sexual and emotional abuse and face social stigma and discrimination which significantly increase the risk of mental and behavioral disorders such as anxiety, depression or emotional problems even they stay in well run child care homes. The objective of this study was to estimate the prevalence of depression and determine the determinants among OVC in child care homes in Nepal. Methods: An institutional-based analytical cross-sectional study was conducted in twenty orphanages of five districts of Nepal. Six hundred two children were recruited into the study. After the informed consent form obtaining, the guardian and assent were interviewed by a semi-structured questionnaire and Beck Depression Inventory-II (BDI-II). Logistic regression was used for detecting the association between variables at the significant level of =0.05. Results: The study revealed that 33.20% of OVC had depression. Among them 66.80% of children experienced minimal depression, 17.40% had mild depression, 11.30% had moderate depression 4.50% had severe depression. Sex, alcohol drinking, congenital problem, social support and bully were the main variables associated with depression among OVC of the child care homes in Nepal. Conclusion: Prevalence of depression was high among the orphans and vulnerable children living in child care homes especially among the female children in Nepal. Therefore, early identification and instituting of preventive measures of depression are essential to reduce this problem in this special group of children living in child care homes.Keywords: Mental health, Depression, Orphans and vulnerable children, child care homes
Procedia PDF Downloads 1494382 Investigating Suicide Cases in Attica, Greece: Insight from an Autopsy-Based Study
Authors: Ioannis N. Sergentanis, Stavroula Papadodima, Maria Tsellou, Dimitrios Vlachodimitropoulos, Sotirios Athanaselis, Chara Spiliopoulou
Abstract:
Introduction: The aim of this study is the investigation of characteristics of suicide, as documented in autopsies during a five-year interval in the greater area of Attica, including the city of Athens. This could reveal possible protective or aggravating factors for suicide risk during a period strongly associated with the Greek debt crisis. Materials and Methods: Data was obtained following registration of suicide cases among autopsies performed in the Forensic Medicine and Toxicology Department, School of Medicine, National and Kapodistrian University of Athens, Greece, during the time interval from January 2011 to December 2015. Anonymity and medical secret were respected. A series of demographic and social factors in addition to special characteristics of suicide were entered into a specially established pre-coded database. These factors include social data as well as psychiatric background and certain autopsy characteristics. Data analysis was performed using descriptive statistics and Fisher’s exact test. The software used was STATA/SE 13 (Stata Corp., College Station, TX, USA). Results: A total of 162 cases were studied, 128 men and 34 women. Age ranged from 14 to 97 years old with an average of 53 years, presenting two peaks around 40 and 60 years. A 56% of cases were single/ divorced/ widowed. 25% of cases occurred during the weekend, and 66% of cases occurred in the house. A predominance of hanging as the leading method of suicide (41.4%) followed by jumping from a height (22.8%) and firearms (19.1%) was noted. Statistical analysis showed an association was found between suicide method and gender (P < 0.001, Fisher’s exact test); specifically, no woman used a firearm while only one man used medication overdose (against four women). Discussion: Greece has historically been one of the countries with the lowest suicide rates in Europe. Given a possible change in suicide trends during the financial crisis, further research seems necessary in order to establish risk factors. According to our study, suicide is more frequent in men who are not married, inside their house. Gender seems to be a factor affecting the method of suicide. These results seem in accordance with the international literature. Stronger than expected predominance in male suicide can be associated with failure to live up to social and family expectations for financial reasons.Keywords: autopsy, Greece, risk factors, suicide
Procedia PDF Downloads 2204381 Modernization from Above: The (re-)Creation of National Identity through Westernization in Mubarak-era Cairo
Authors: Mariam Aref Mahmoud
Abstract:
A myth surrounding the development of Cairo bases itself in the Fatimid era when the city, as we know it today, was built. Surrounding the city was a wall meant to protect the main center from any possible attack. The effects of global hierarchies of power extend further than labor regulations and trade statistics. Beyond that, they form dialectical oppositions between local and global identities within urban space. As such, those in power often aim to claim national identity as what they perceive to be the most nationally beneficial strategy. These claims over perceptions of national identity take over the streets, the advertisements, and the parks and eventually make their way into the different forms of media. Often, these claims take over the main planning goals of the city. Whether it is through the control over which sounds are allowed to be produced in public space, what type of people are encouraged to enter which spaces, or other forms of performing local and national identity, public space, property, and land have often been used as a method to present to both the public and the global population what people in power wish for these spaces to represent. In Egypt, these developments have been changing since the end of colonial rule. In particular, this paper will analyze how Hosni Mubarak, and to a certain extent Anwar el-Sadat, enacted neoliberal designs dedicated towards modernization in order to present an image of a Cairo that is not uniquely Egyptian but essentially Western cosmopolitan - a Cairo that belongs to a globalized world.Keywords: Egypt, imperialism, westernization, housing
Procedia PDF Downloads 694380 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun
Authors: Ndje Ndje Mireille
Abstract:
The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun
Procedia PDF Downloads 1584379 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 964378 Management Tools for Assessment of Adverse Reactions Caused by Contrast Media at the Hospital
Authors: Pranee Suecharoen, Ratchadaporn Soontornpas, Jaturat Kanpittaya
Abstract:
Background: Contrast media has an important role for disease diagnosis through detection of pathologies. Contrast media can, however, cause adverse reactions after administration of its agents. Although non-ionic contrast media are commonly used, the incidence of adverse events is relatively low. The most common reactions found (10.5%) were mild and manageable and/or preventable. Pharmacists can play an important role in evaluating adverse reactions, including awareness of the specific preparation and the type of adverse reaction. As most common types of adverse reactions are idiosyncratic or pseudo-allergic reactions, common standards need to be established to prevent and control adverse reactions promptly and effectively. Objective: To measure the effect of using tools for symptom evaluation in order to reduce the severity, or prevent the occurrence, of adverse reactions from contrast media. Methods: Retrospective review descriptive research with data collected on adverse reactions assessment and Naranjo’s algorithm between June 2015 and May 2016. Results: 158 patients (10.53%) had adverse reactions. Of the 1,500 participants with an adverse event evaluation, 137 (9.13%) had a mild adverse reaction, including hives, nausea, vomiting, dizziness, and headache. These types of symptoms can be treated (i.e., with antihistamines, anti-emetics) and the patient recovers completely within one day. The group with moderate adverse reactions, numbering 18 cases (1.2%), had hypertension or hypotension, and shortness of breath. Severe adverse reactions numbered 3 cases (0.2%) and included swelling of the larynx, cardiac arrest, and loss of consciousness, requiring immediate treatment. No other complications under close medical supervision were recorded (i.e., corticosteroids use, epinephrine, dopamine, atropine, or life-saving devices). Using the guideline, therapies are divided into general and specific and are performed according to the severity, risk factors and ingestion of contrast media agents. Patients who have high-risk factors were screened and treated (i.e., prophylactic premedication) for prevention of severe adverse reactions, especially those with renal failure. Thus, awareness for the need for prescreening of different risk factors is necessary for early recognition and prompt treatment. Conclusion: Studying adverse reactions can be used to develop a model for reducing the level of severity and setting a guideline for a standardized, multidisciplinary approach to adverse reactions.Keywords: role of pharmacist, management of adverse reactions, guideline for contrast media, non-ionic contrast media
Procedia PDF Downloads 3034377 Hygrothermal Performance of Sheep Wool in Cold and Humid Climates
Authors: Yuchen Chen, Dehong Li, Bin Li, Denis Rodrigue, Xiaodong (Alice) Wang
Abstract:
When selecting insulation materials, not only should their thermal efficiency be considered, but also their impact on the environment. Compared to conventional insulation materials, bio-based materials not only have comparable thermal performance, but they also have a lower embodied energy. Sheep wool has the advantages of low negative health impact, high fire resistance, eco-friendliness, and high moisture resistance. However, studies on applying sheep wool insulation in cold and humid climates are still insufficient. The purpose of this study is to simulate the hygrothermal performance of sheep wool insulation for the Quebec City climate, as well as analyze the mold growth risks. The results show that a sheep wool wall has better thermal performance than a reference wall and that both meet the minimum requirements of the Quebec Code for the thermal performance of above-ground walls. The total water content indicates that the sheep wool wall can reach dynamic equilibrium in the Quebec climate and can dry out. At the same time, a delay of almost four months in the maximum total water content indicates that the sheep wool wall has high moisture absorption compared to the reference wall. The hygrothermal profiles show that the sheathing-insulation interface of both walls is at the highest risk for condensation. When the interior surface gypsum was replaced by stucco, the mold index significantly dropped.Keywords: sheep wool, water content, hygrothermal performance, mould growth risk
Procedia PDF Downloads 914376 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 1524375 Regulatory and Economic Challenges of AI Integration in Cyber Insurance
Authors: Shreyas Kumar, Mili Shangari
Abstract:
Integrating artificial intelligence (AI) in the cyber insurance sector represents a significant advancement, offering the potential to revolutionize risk assessment, fraud detection, and claims processing. However, this integration introduces a range of regulatory and economic challenges that must be addressed to ensure responsible and effective deployment of AI technologies. This paper examines the multifaceted regulatory landscape governing AI in cyber insurance and explores the economic implications of compliance, innovation, and market dynamics. AI's capabilities in processing vast amounts of data and identifying patterns make it an invaluable tool for insurers in managing cyber risks. Yet, the application of AI in this domain is subject to stringent regulatory scrutiny aimed at safeguarding data privacy, ensuring algorithmic transparency, and preventing biases. Regulatory bodies, such as the European Union with its General Data Protection Regulation (GDPR), mandate strict compliance requirements that can significantly impact the deployment of AI systems. These regulations necessitate robust data protection measures, ethical AI practices, and clear accountability frameworks, all of which entail substantial compliance costs for insurers. The economic implications of these regulatory requirements are profound. Insurers must invest heavily in upgrading their IT infrastructure, implementing robust data governance frameworks, and training personnel to handle AI systems ethically and effectively. These investments, while essential for regulatory compliance, can strain financial resources, particularly for smaller insurers, potentially leading to market consolidation. Furthermore, the cost of regulatory compliance can translate into higher premiums for policyholders, affecting the overall affordability and accessibility of cyber insurance. Despite these challenges, the potential economic benefits of AI integration in cyber insurance are significant. AI-enhanced risk assessment models can provide more accurate pricing, reduce the incidence of fraudulent claims, and expedite claims processing, leading to overall cost savings and increased efficiency. These efficiencies can improve the competitiveness of insurers and drive innovation in product offerings. However, balancing these benefits with regulatory compliance is crucial to avoid legal penalties and reputational damage. The paper also explores the potential risks associated with AI integration, such as algorithmic biases that could lead to unfair discrimination in policy underwriting and claims adjudication. Regulatory frameworks need to evolve to address these issues, promoting fairness and transparency in AI applications. Policymakers play a critical role in creating a balanced regulatory environment that fosters innovation while protecting consumer rights and ensuring market stability. In conclusion, the integration of AI in cyber insurance presents both regulatory and economic challenges that require a coordinated approach involving regulators, insurers, and other stakeholders. By navigating these challenges effectively, the industry can harness the transformative potential of AI, driving advancements in risk management and enhancing the resilience of the cyber insurance market. This paper provides insights and recommendations for policymakers and industry leaders to achieve a balanced and sustainable integration of AI technologies in cyber insurance.Keywords: artificial intelligence (AI), cyber insurance, regulatory compliance, economic impact, risk assessment, fraud detection, cyber liability insurance, risk management, ransomware
Procedia PDF Downloads 334374 Investigating the Determinants and Growth of Financial Technology Depth of Penetration among the Heterogeneous Africa Economies
Authors: Tochukwu Timothy Okoli, Devi Datt Tewari
Abstract:
The high rate of Fintech adoption has not transmitted to greater financial inclusion and development in Africa. This problem is attributed to poor Fintech diversification and usefulness in the continent. This concept is referred to as the Fintech depth of penetration in this study. The study, therefore, assessed its determinants and growth process in a panel of three emergings, twenty-four frontiers and five fragile African economies disaggregated with dummies over the period 2004-2018 to allow for heterogeneity between groups. The System Generalized Method of Moments (GMM) technique reveals that the average depth of Mobile banking and automated teller machine (ATM) is a dynamic heterogeneity process. Moreover, users' previous experiences/compatibility, trial-ability/income, and financial development were the major factors that raise its usefulness, whereas perceived risk, financial openness, and inflation rate significantly limit its usefulness. The growth rate of Mobile banking, ATM, and Internet banking in 2018 is, on average 41.82, 0.4, and 20.8 per cent respectively greater than its average rates in 2004. These greater averages after the 2009 financial crisis suggest that countries resort to Fintech as a risk-mitigating tool. This study, therefore, recommends greater Fintech diversification through improved literacy, institutional development, financial liberalization, and continuous innovation.Keywords: depth of fintech, emerging Africa, financial technology, internet banking, mobile banking
Procedia PDF Downloads 1304373 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 105