Search results for: security mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5641

Search results for: security mechanism

3481 Interoperability of 505th Search and Rescue Group and the 205th Tactical Helicopter Wing of the Philippine Air Force in Search and Rescue Operations: An Assessment

Authors: Ryan C. Igama

Abstract:

The complexity of disaster risk reduction management paved the way for various innovations and approaches to mitigate the loss of lives and casualties during disaster-related situations. The efficiency of doing response operations during disasters relies on the timely and organized deployment of search, rescue and retrieval teams. Indeed, the assistance provided by the search, rescue, and retrieval teams during disaster operations is a critical service needed to further minimize the loss of lives and casualties. The Armed Forces of the Philippines was mandated to provide humanitarian assistance and disaster relief operations during calamities and disasters. Thus, this study “Interoperability of 505TH Search and Rescue Group and the 205TH Tactical Helicopter Wing of the Philippine Air Force in Search and Rescue Operations: An Assessment” was intended to provide substantial information to further strengthen and promote the capabilities of search and rescue operations in the Philippines. Further, this study also aims to assess the interoperability of the 505th Search and Rescue Group of the Philippine Air Force and the 205th Tactical Helicopter Wing Philippine Air Force. This study was undertaken covering the component units in the Philippine Air Force of the Armed Forces of the Philippines – specifically the 505th SRG and the 205th THW as the involved units who also acted as the respondents of the study. The qualitative approach was the mechanism utilized in the form of focused group discussions, key informant interviews, and documentary analysis as primary means to obtain the needed data for the study. Essentially, this study was geared towards the evaluation of the effectiveness of the interoperability of the two (2) involved PAF units during search and rescue operations. Further, it also delved into the identification of the impacts, gaps, and challenges confronted regarding interoperability as to training, equipment, and coordination mechanism vis-à-vis the needed measures for improvement, respectively. The result of the study regarding the interoperability of the two (2) PAF units during search and rescue operations showed that there was a duplication in terms of functions or tasks in HADR activities, specifically during the conduct of air rescue operations in situations like calamities. In addition, it was revealed that there was a lack of equipment and training for the personnel involved in search and rescue operations which is a vital element during calamity response activities. Based on the findings of the study, it was recommended that a strategic planning workshop/activity must be conducted regarding the duties and responsibilities of the personnel involved in the search and rescue operations to address the command and control and interoperability issues of these units. Additionally, the conduct of intensive HADR-related training for the personnel involved in search and rescue operations of the two (2) PAF Units must also be conducted so they can be more proficient in their skills and sustainably increase their knowledge of search and rescue scenarios, including the capabilities of the respective units. Lastly, the updating of existing doctrines or policies must be undertaken to adapt advancement to the evolving situations in search and rescue operations.

Keywords: interoperability, search and rescue capability, humanitarian assistance, disaster response

Procedia PDF Downloads 78
3480 Structural Analysis of Hydro-Turbine Head Cover Using Ansys

Authors: Surjit Angra, Manisha Kumari, Vinod Kumar

Abstract:

The objective of the Hydro Turbine Head Cover is to support the guide bearing, guide vane regulating mechanism and even in some design for generator thrust bearing support. Mechanical design of head cover deals with high static as well as fluctuating load acting on the structure. In the present work structural analysis of hydro turbine Head-cover using ANSYS software is carried out. Finite element method is used to calculate stresses on head cover. These calculations were done for the maximum possible loading under operating condition “LCI Quick Shut Down”. The results for equivalent Von-Mises stress, total deformation and directional deformation have been plotted and compared with the existing results whether the design is safe or not.

Keywords: ANSYS, head cover, hydro-turbine, structural analysis, total deformation, Von-Mises stress

Procedia PDF Downloads 511
3479 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 127
3478 The Fake News Impact on the Public Policy Cycle: A Systemic Analysis through Documentary Survey

Authors: Aron Miranda Burgos, Ergon Cugler de Moraes Silva

Abstract:

In the present article, it is observed that the constant advancement of issues related to misinformation impacts the guarantee of the public policy cycle. Thus, it is found that the dissemination of false information has a direct influence on each of the component stages of this cycle. Therefore, in order to maintain scientific and theoretical credibility in the qualitative analysis process, it was necessary to logically interpose the concepts of firehosing of falsehood, fake news, public policy cycle, as well as using the epistemological and pragmatic mechanism at the intersection of such academic concepts, such as the scientific method. It was found, through the analysis of official documents and public notes, how the multiple theoretical perspectives evidence the commitment of the provision and elaboration of public policies, verifying the way in which the fake news impact each part of the process in this atmosphere.

Keywords: firehosing of falsehood, governance, misinformation, post-truth

Procedia PDF Downloads 124
3477 Application of Freeze Desalination for Tace elements Removal from Water

Authors: Fekadu Melak, Tsegaye Girma Asere

Abstract:

Trace element ions, such as Cr(VI) and F−, are of particular interest due to their environmental impact. Both ions exhibit an anionic nature in water that can show similar removal tendencies except for their significant differences in ionic radius. Accordingly, partial freezing was performed to examine freeze separation efficiencies of Cr(VI) and F– from aqueous solutions. Real groundwater and simulated wastewater were included to test effeciency of F– and Cr(VI), respectively. Parameters such as initial ion concentration, salt addition, and freeze duration were explored. Under optimal operating conditions, freeze separation efficiencies of 90 ± 0.12 to 97 ± 0.54% and 58 ± 0.23% to 60 ± 0.34% from 5 mg/L of Cr(VI) and F–, respectively, were demonstrated. The F– ion intercalation into the ice, initiating the decrement of freeze separation efficiency was observed in the salt addition processes. The influences of structuring-destructuring (kosmotropicity-chaotropicity) and the size-exclusion nature of ice crystals were used to explain the plausible mechanism in freeze separation efficiency trace elemental ions.

Keywords: Cr(VI), F-, partial freezing, size exclusion

Procedia PDF Downloads 67
3476 Improvement of Performance for R. C. Beams Made from Recycled Aggregate by Using Non-Traditional Admixture

Authors: A. H. Yehia, M. M. Rashwan, K. A. Assaf, K. Abd el Samee

Abstract:

The aim of this work is to use an environmental, cheap; organic non-traditional admixture to improve the structural behavior of sustainable reinforced concrete beams contains different ratios of recycled concrete aggregate. The used admixture prepared by using wastes from vegetable oil industry. Under and over reinforced concrete beams made from natural aggregate and different ratios of recycled concrete aggregate were tested under static load until failure. Eight beams were tested to investigate the performance and mechanism effect of admixture on improving deformation characteristics, modulus of elasticity and toughness of tested beams. Test results show efficiency of organic admixture on improving flexural behavior of beams contains 20% recycled concrete aggregate more over the other ratios.

Keywords: deflection, modulus of elasticity, non-traditional admixture, recycled concrete aggregate, strain, toughness, under and over reinforcement

Procedia PDF Downloads 443
3475 The Conduct of Laundering Money through Transport of Cash in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This article mainly aims to detect and understand how money laundering activities are executed by transport of cash, identifying the underlying factors and separating legitimate from illegitimate usage of cash and how it is being used. This research provides academics with additional literature and provides bank supervisors and practitioners with a better understanding of sources and uses of cash in criminal activities and how cash is used in the laundering mechanism. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help distinguish the factors affecting preference for cash rather other payment instruments in the region, identify what causes the tendency to launder illegal proceeds through cash transportation and how illegal cash is being laundered and moved. On the other hand, this paper sheds the light on major cash generating criminal activities, its sources and main destinations.

Keywords: illegitimate activities, cash, money laundering, terrorism financing

Procedia PDF Downloads 137
3474 The Rite of Jihadification in ISIS Modified Video Games: Mass Deception and Dialectic of Religious Regression in Technological Progression

Authors: Venus Torabi

Abstract:

ISIS, the terrorist organization, modified two videogames, ARMA III and Grand Theft Auto 5 (2013) as means of online recruitment and ideological propaganda. The urge to study the mechanism at work, whether it has been successful or not, derives (Digital) Humanities experts to explore how codes of terror, Islamic ideology and recruitment strategies are incorporated into the ludic mechanics of videogames. Another aspect of the significance lies in the fact that this is a latent problem that has not been fully addressed in an interdisciplinary framework prior to this study, to the best of the researcher’s knowledge. Therefore, due to the complexity of the subject, the present paper entangles with game studies, philosophical and religious poles to form the methodology of conducting the research. As a contextualized epistemology of such exploitation of videogames, the core argument is building on the notion of “Culture Industry” proposed by Theodore W. Adorno and Max Horkheimer in Dialectic of Enlightenment (2002). This article posits that the ideological underpinnings of ISIS’s cause corroborated by the action-bound mechanics of the videogames are in line with adhering to the Islamic Eschatology as a furnishing ground and an excuse in exercising terrorism. It is an account of ISIS’s modification of the videogames, a tool of technological progression to practice online radicalization. Dialectically, this practice is packed up in rhetoric for recognizing a religious myth (the advent of a savior), as a hallmark of regression. The study puts forth that ISIS’s wreaking havoc on the world, both in reality and within action videogames, is negotiating the process of self-assertion in the players of such videogames (by assuming one’s self a member of terrorists) that leads to self-annihilation. It tries to unfold how ludic Mod videogames are misused as tools of mass deception towards ethnic cleansing in reality and line with the distorted Eschatological myth. To conclude, this study posits videogames to be a new avenue of mass deception in the framework of the Culture Industry. Yet, this emerges as a two-edged sword of mass deception in ISIS’s modification of videogames. It shows that ISIS is not only trying to hijack the minds through online/ludic recruitment, it potentially deceives the Muslim communities or those prone to radicalization into believing that it's terrorist practices are preparing the world for the advent of a religious savior based on Islamic Eschatology. This is to claim that the harsh actions of the videogames are potentially breeding minds by seeds of terrorist propaganda and numbing them to violence. The real world becomes an extension of that harsh virtual environment in a ludic/actual continuum, the extension that is contributing to the mass deception mechanism of the terrorists, in a clandestine trend.

Keywords: culture industry, dialectic, ISIS, islamic eschatology, mass deception, video games

Procedia PDF Downloads 128
3473 A Passive Reaction Force Compensation for a Linear Motor Motion Stage Using Pre-Compressed Springs

Authors: Kim Duc Hoang, Hyeong Joon Ahn

Abstract:

Residual vibration of the system base due to a high-acceleration motion of a stage may reduce life and productivity of the manufacturing device. Although a passive RFC can reduce vibration of the system base, spring or dummy mass should be replaced to tune performance of the RFC. In this paper, we develop a novel concept of the passive RFC mechanism for a linear motor motion stage using pre-compressed springs. Dynamic characteristic of the passive RFC can be adjusted by pre-compression of the spring without exchanging the spring or dummy mass. First, we build a linear motor motion stage with pre-compressed springs. Then, the effect of the pre-compressed spring on the passive RFC is investigated by changing both pre-compressions and stiffness of springs. Finally, the effectiveness of the passive RFC using pre-compressed springs was verified with both simulations and experiments.

Keywords: linear motor motion stage, residual vibration, passive RFC, pre-compressed spring

Procedia PDF Downloads 337
3472 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 358
3471 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria

Authors: J. O. Ayinde, S. O. Olatunji

Abstract:

This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.

Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security

Procedia PDF Downloads 198
3470 The Effect of Internal Auditing Function on the Quality of Financial Reporting: A Theoretical Framework

Authors: Hani Albogami

Abstract:

The internal audit function is considered as one of the internal corporate governance mechanisms that may have an impact on improving earnings quality by constraining earnings management. The internal audit function is also a unique corporate governance mechanism because internal auditors have more involvement with the day-to-day operations comparing to the audit committee, and also internal auditors audit their companies the whole year compared to the external auditor who audits only a certain time of the year. The relationships between internal audit function and earnings management can be understood by some theories. Therefore, this paper provides a theoretical background of the influence of the quality of internal audit function on earnings management. In particular, the agency theory, institutional theory, singling theory, and resource dependency theory are adapted by this paper to provide some understanding and analyses that can be a basis for future research to contribute to the corporate governance academic studies.

Keywords: internal audit, corporate governance, earnings management, accounting

Procedia PDF Downloads 169
3469 Thermal Transformation and Structural on Se90Te7Cu3 Chalcogenide Glass

Authors: Farid M. Abdel-Rahim

Abstract:

In this study, Se90Te7Cu3 chalcogenide glass was prepared using the melt quenching technique. The amorphous nature of the as prepared samples was confirmed by scanning electron microscope (SEM). Result of differential scanning calorimetric (DSC) under nonisothermal condition on composition bulk materials are reported and discussed. It shows that these glasses exhibit a single-stage glass transition and a single-stage crystallization on heating rates. The glass transition temperature (Tg), the onset crystallization (Tc), the crystallization temperature (Tp), were found by dependent on the composition and heating rates. Activation energy for glass transition (Et), activation energy of the amorphous –crystalline transformation (Ec), crystallization reaction rate constant (Kp), (n) and (m) are constants related to crystallization mechanism of the bulk samples have been determined by different formulations.

Keywords: chalcogenides, heat treatment, DSC, SEM, glass transition, thermal analysis

Procedia PDF Downloads 380
3468 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 149
3467 Use of Diatomite for the Elimination of Chromium Three from Wastewater Annaba, Algeria

Authors: Sabiha Chouchane, Toufik Chouchane, Azzedine Hani

Abstract:

The wastewater was treated with a natural asorbent “Diatomite” to eliminate chromium three. Diatomite is an element that comes from Sig (west of Algeria). The physicochemical characterization revealed that the diatomite is mainly made up of silica, lime and a lower degree of alumina. The process considered in static regime, at 20°C, an ion stirring speed of 150 rpm, a pH = 4 and a grain diameter of between 100 and 150µm, shows that one gram of diatomite purified can fix according to the Langmuir model up to 39.64 mg/g of chromium with pseudo 1st order kinetics. The pseudo-equilibrium time highlighted is 25 minutes. The affinity between the adsorbent and the adsorbate follows the value of the RL ratio indicates us that the solid used has a good adsorption capacity. The external transport of the metal ions from the solution to the adsorbent seems to be a step controlling the speed of the overall process. On the other hand, internal transport in the pores is not the only limiting mechanism of sorption kinetics. Thermodynamic parameters show that chromium sorption is spontaneous and exothermic with negative entropy.

Keywords: adsorption, diatomite, crIII, wastewater

Procedia PDF Downloads 35
3466 Technology Blending as an Innovative Construction Mechanism in the Global South

Authors: Janet Kaningen, Richard N. Kaningen, Jonas Kaningen

Abstract:

This paper aims to discover the best ways to improve production efficiency, cost efficiency, community cohesion, and long-term sustainability in Ghana's housing delivery. Advanced Construction Technologies (ACTs) are set to become the sustainable mainstay of the construction industry due to the demand for innovative housing solutions. Advances in material science, building component production, and assembly technologies are leading to the development of next-generation materials such as polymeric-fiber-based products, light-metal alloys, and eco-materials. Modular housing construction has become more efficient and cost-effective than traditional building methods and is becoming increasingly popular for commercial, industrial, and residential projects. Effective project management and logistics will be imperative in the future speed and cost of modular construction housing.

Keywords: technology blending, sustainability, housing, Ghana

Procedia PDF Downloads 73
3465 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System

Authors: A. S. Walkey, N. P. Patidar

Abstract:

It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.

Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices

Procedia PDF Downloads 488
3464 Attenuation of Homocysteine-Induced Cyclooxygenase-2 Expression in Human Monocytes by Fulvic Acid

Authors: Shao-Ju Chien, Yi-Chien Wu, Ting-Ying Huang, Li-Tsen Li, You-Jin Chen, Cheng-Nan Chen

Abstract:

Homocysteine and pro-inflammatory mediators such as cyclooxygenase-2 (COX-2) have been linked to vascular dysfunction and risks of cardiovascular diseases. Fulvic acid (FA) is class of compounds of humic substances and possesses various pharmacological properties. However, the effect of FA on inflammatory responses of the monocytes remains unclear. We investigated the regulatory effect of FA on homocysteine-induced COX-2 expression in human monocytes. Peripheral blood monocytes and U937 cells were kept as controls or pre-treated with FA, and then stimulated with homocysteine. The results show that pretreating monocytes with FA inhibited the homocysteine-induced COX-2 expression in a dose-dependent manner. The inhibitor for nuclear factor-kB (NF-kB) attenuated homocysteine-induced COX-2 expression. Our findings provide a molecular mechanism by which FA inhibit homocysteine-induced COX-2 expression in monocytes, and a basis for using FA in pharmaceutical therapy against inflammation.

Keywords: homocysteine, monocytes, cyclooxygenase-2, fulvic acid, anti-inflammation

Procedia PDF Downloads 576
3463 Impact of Obesity on Fertility in a Population of Women in the Wilaya of Batna

Authors: S. Benbia, W. Bouafia, D. Khellaf, A. Chennaf, M. Yahia

Abstract:

Our study was designed to highlight changes in certain biochemical parameters (CH, TG, HDL, GOT, GPT, LDL, and CRP), obese women infertile fertile witnesses and research potential pathophysiological link between obesity and infertility in this population of women. This practical work was focused on a population of 24 obese women infertile, compared to controls, subjects without any pathology causing disruption of parameters to be studied to determine the contribution of obesity in the etiology of infertility. The assay results revealed a highly significant difference between the two groups in serum CH, TG, HDL, TGO and TGP (P < 0.0001) and in the rate of LDL (p = 0.0017) and CRP (p = 0.02). The hormonal balance also shows a significant difference between the two groups (P < 0.0001).The present study indicates that obesity is associated with infertility, but there is no direct pathophysiological link between obesity and infertility has not been determined. Further in-depth studies are needed to determine the exact mechanism by which overweight leads to female infertility.

Keywords: obesity, fertility, infertility, biochemical, women

Procedia PDF Downloads 431
3462 A System to Detect Inappropriate Messages in Online Social Networks

Authors: Shivani Singh, Shantanu Nakhare, Kalyani Nair, Rohan Shetty

Abstract:

As social networking is growing at a rapid pace today it is vital that we work on improving its management. Research has shown that the content present in online social networks may have significant influence on impressionable minds. If such platforms are misused, it will lead to negative consequences. Detecting insults or inappropriate messages continues to be one of the most challenging aspects of Online Social Networks (OSNs) today. We address this problem through a Machine Learning Based Soft Text Classifier approach using Support Vector Machine algorithm. The proposed system acts as a screening mechanism the alerts the user about such messages. The messages are classified according to their subject matter and each comment is labeled for the presence of profanity and insults.

Keywords: machine learning, online social networks, soft text classifier, support vector machine

Procedia PDF Downloads 489
3461 Analyzing Data Protection in the Era of Big Data under the Framework of Virtual Property Layer Theory

Authors: Xiaochen Mu

Abstract:

Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional "one object, one right" theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the “bundle of right” theory, this paper establishes specific three-level data rights. This paper analyzes the cases: Google v. Vidal-Hall, Halliday v Creation Consumer Finance, Douglas v Hello Limited, Campbell v MGN and Imerman v Tchenquiz. This paper concluded that recognizing property rights over personal data and protecting data under the framework of intellectual property will be beneficial to establish the tort of misuse of personal information.

Keywords: data protection, property rights, intellectual property, Big data

Procedia PDF Downloads 10
3460 β-Lactamase Inhibitory Effects of Anchusa azurea Extracts

Authors: Naoual Boussoualim, Hayat Trabsa, Iman Krache, Lekhmici Arrar, Abderrahmane Baghiani

Abstract:

Resistance to antibiotics has emerged following their widespread use; the important mechanism of beta-lactam resistance in bacteria is the production of beta-lactamase. In order to find new bioactive beta-lactamase inhibitors, this study investigated the inhibition effect of the extracts of Anchusa azurea (AA) on a beta-lactamase from Bacillus cereus. The extracts exerted inhibitory effects on beta-lactamase in a dose-dependent manner, the results showed that the crude extract (BrE) and the ethyl acetate extract (AcE) of Anchusa azurea showed a very high inhibitory activity at a concentration of 10 mg, the percentage of inhibition was between 58% and 68%. Not all extracts were as potent as the original inhibitors such as clavulanic acid, the isolation and the structural elucidation of the active constituents in these extracts will provide useful means in the development of beta -lactamase inhibitors.

Keywords: Anchusa azurea, natural product, resistance, antibiotics, beta-lactamase, inhibitors

Procedia PDF Downloads 498
3459 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java

Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah

Abstract:

Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.

Keywords: exploitation, home batik industry, occupational health and safety, putting-out system

Procedia PDF Downloads 299
3458 Restriction on the Freedom of Economic Activity in the Polish Energy Law

Authors: Zofia Romanowska

Abstract:

Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.

Keywords: license, energy law, energy market, public goods, regulator

Procedia PDF Downloads 233
3457 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 459
3456 Environmental Impact Assessments in Peru: Tools for Violence

Authors: Nadia Degregori

Abstract:

This paper focuses on Peru’s Environmental Impact Assessment’s communication and participation mechanisms, whose rationale is to prevent conflictive situations by –supposedly- providing high-quality information about mining projects and their impacts to affected stakeholders. It is argued that, in fact, these mechanisms enhance citizens’ feelings of fear and/or mistrust towards mining projects and the companies behind them because their design follows a top-down perspective that limits “participation” to a passive reception of information, and which does not address power unbalances between communities and companies or government. As well, the paper contends that this way of managing the social aspects of Environmental Impact Assessments in Peru leads stakeholders who possess less power (typically communities) to incline towards maintaining the status quo and avoiding negotiations with either the central government or mining companies as a defence mechanism for avoiding a bad negotiation.

Keywords: community relations, environmental impact assessments, governance and participation, mining, Peru

Procedia PDF Downloads 413
3455 A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology

Authors: Kang Zijian, Zhang Tingyu, Burra Venkata Durga Kumar

Abstract:

This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem.

Keywords: virtual machine, pre-copy technology, memory migration process, downtime, dirty pages migration method

Procedia PDF Downloads 115
3454 Modified Tendon Model Considered Structural Nonlinearity in PSC Structures

Authors: Yangsu Kwon, Hyo-Gyoung Kwak

Abstract:

Nonlinear tendon constitutive model for nonlinear analysis of pre-stressed concrete structures are presented. Since the post-cracking behavior of concrete structures, in which bonded reinforcements such as tendons and/or reinforcing steels are embedded, depends on many influencing factors(the tensile strength of concrete, anchorage length of reinforcements, concrete cover, and steel spacing) that are deeply related to the bond characteristics between concrete and reinforcements, consideration of the tension stiffening effect on the basis of the bond-slip mechanism is necessary to evaluate ultimate resisting capacity of structures. In this paper, an improved tendon model, which considering the slip effect between concrete and tendon, and effect of tension stiffening, is suggested. The validity of the proposed models is established by comparing between the analytical results and experimental results in pre-stressed concrete beams.

Keywords: bond-slip, prestressed concrete, tendon, ultimate strength

Procedia PDF Downloads 481
3453 Major Factors That Enhance Economic Growth in South Africa: A Re-Examination Using a Vector Error Correction Mechanism

Authors: Temitope L. A. Leshoro

Abstract:

This study explored several variables that enhance economic growth in South Africa, based on different growth theories while using the vector error correction model (VECM) technique. The impacts and contributions of each of these variables on GDP in South Africa were investigated. The motivation for this study was as a result of the weak economic growth that the country has been experiencing lately, as well as the continuous increase in unemployment rate and deteriorating health care system. Annual data spanning over the period 1974 to 2013 was employed. The results showed that the major determinants of GDP are trade openness, government spending, and health indicator; as these variables are not only economically significant but also statistically significant in explaining the changes in GDP in South Africa. Policy recommendations for economic growth enhancement are suggested based on the findings of this study.

Keywords: economic growth, GDP, investment, health indicator, VECM

Procedia PDF Downloads 263
3452 Implant Guided Surgery and Immediate Loading

Authors: Omid Tavakol, Mahnaz Gholami

Abstract:

Introduction : In this oral presentation the main goal is discussing immediate loading in dental implants , from treatment planning and surgical guide designing to delivery , follow up and occlusal consideration . Methods and materials : first of all systematic reviews about immediate loading will be considered . besides , a comparison will be made between immediate loading and conventional loading in terms of success rate and complications . After that different methods , prosthetic options and materials best used in immediate loading will be explained. Particularly multi unit abutments and their mechanism of function will be explained .Digital impressions and designing the temporaries is the next topic we are to explicate .Next issue is the differences between single unit , multiple unit and full arch implantation in immediate loading .Following we are going to describe methods for tissue engineering and papilla formation after extraction . Last slides are about a full mouth rehabilitation via immediate loading technique from surgical designing to follow up .At the end we would talk about potential complications , how to prevent from occurrence and what to do if we face up with .

Keywords: guided surgery, digital implantology, immediate loading, digital dentistry

Procedia PDF Downloads 28