Search results for: data security architecture
25790 The Web Site Development for E-Commerce Trading in Thailand Customers View
Authors: Ladaporn Pithuk
Abstract:
The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.Keywords: customer requirement, customization, connection, online business
Procedia PDF Downloads 20025789 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 19525788 Wave Pressure Metering with the Specific Instrument and Measure Description Determined by the Shape and Surface of the Instrument including the Number of Sensors and Angle between Them
Authors: Branimir Jurun, Elza Jurun
Abstract:
Focus of this paper is description and functioning manner of the instrument for wave pressure metering. Moreover, an essential component of this paper is the proposal of a metering unit for the direct wave pressure measurement determined by the shape and surface of the instrument including the number of sensors and angle between them. Namely, far applied instruments by means of height, length, direction, wave time period and other components determine wave pressure on a particular area. This instrument, allows the direct measurement i.e. measurement without additional calculation, of the wave pressure expressed in a standardized unit of measure. That way the instrument has a standardized form, surface, number of sensors and the angle between them. In addition, it is made with the status that follows the wave and always is on the water surface. Database quality which is listed by the instrument is made possible by using the Arduino chip. This chip is programmed for receiving by two data from each of the sensors each second. From these data by a pre-defined manner a unique representative value is estimated. By this procedure all relevant wave pressure measurement results are directly and immediately registered. Final goal of establishing such a rich database is a comprehensive statistical analysis that ranges from multi-criteria analysis across different modeling and parameters testing to hypothesis accepting relating to the widest variety of man-made activities such as filling of beaches, security cages for aquaculture, bridges construction.Keywords: instrument, metering, water, waves
Procedia PDF Downloads 26425787 Machine Learning Analysis of Student Success in Introductory Calculus Based Physics I Course
Authors: Chandra Prayaga, Aaron Wade, Lakshmi Prayaga, Gopi Shankar Mallu
Abstract:
This paper presents the use of machine learning algorithms to predict the success of students in an introductory physics course. Data having 140 rows pertaining to the performance of two batches of students was used. The lack of sufficient data to train robust machine learning models was compensated for by generating synthetic data similar to the real data. CTGAN and CTGAN with Gaussian Copula (Gaussian) were used to generate synthetic data, with the real data as input. To check the similarity between the real data and each synthetic dataset, pair plots were made. The synthetic data was used to train machine learning models using the PyCaret package. For the CTGAN data, the Ada Boost Classifier (ADA) was found to be the ML model with the best fit, whereas the CTGAN with Gaussian Copula yielded Logistic Regression (LR) as the best model. Both models were then tested for accuracy with the real data. ROC-AUC analysis was performed for all the ten classes of the target variable (Grades A, A-, B+, B, B-, C+, C, C-, D, F). The ADA model with CTGAN data showed a mean AUC score of 0.4377, but the LR model with the Gaussian data showed a mean AUC score of 0.6149. ROC-AUC plots were obtained for each Grade value separately. The LR model with Gaussian data showed consistently better AUC scores compared to the ADA model with CTGAN data, except in two cases of the Grade value, C- and A-.Keywords: machine learning, student success, physics course, grades, synthetic data, CTGAN, gaussian copula CTGAN
Procedia PDF Downloads 4425786 An Integrated Label Propagation Network for Structural Condition Assessment
Authors: Qingsong Xiong, Cheng Yuan, Qingzhao Kong, Haibei Xiong
Abstract:
Deep-learning-driven approaches based on vibration responses have attracted larger attention in rapid structural condition assessment while obtaining sufficient measured training data with corresponding labels is relevantly costly and even inaccessible in practical engineering. This study proposes an integrated label propagation network for structural condition assessment, which is able to diffuse the labels from continuously-generating measurements by intact structure to those of missing labels of damage scenarios. The integrated network is embedded with damage-sensitive features extraction by deep autoencoder and pseudo-labels propagation by optimized fuzzy clustering, the architecture and mechanism which are elaborated. With a sophisticated network design and specified strategies for improving performance, the present network achieves to extends the superiority of self-supervised representation learning, unsupervised fuzzy clustering and supervised classification algorithms into an integration aiming at assessing damage conditions. Both numerical simulations and full-scale laboratory shaking table tests of a two-story building structure were conducted to validate its capability of detecting post-earthquake damage. The identifying accuracy of a present network was 0.95 in numerical validations and an average 0.86 in laboratory case studies, respectively. It should be noted that the whole training procedure of all involved models in the network stringently doesn’t rely upon any labeled data of damage scenarios but only several samples of intact structure, which indicates a significant superiority in model adaptability and feasible applicability in practice.Keywords: autoencoder, condition assessment, fuzzy clustering, label propagation
Procedia PDF Downloads 9725785 Performance Analysis of a Hybrid Channel for Foglet Assisted Smart Asset Reporting
Authors: Hasan Farahneh
Abstract:
Smart asset management along roadsides and in deserted areas is a topic of deprived attention. We find most of the work in emergency reporting services in intelligent transportation systems (ITS) and rural areas but not much in asset reporting. Currently, available asset management mechanisms are based on scheduled maintenance and do not effectively report any emergency situation in a timely manner. This paper is the continuation of our previous work, in which we proposed the usage of Foglets and VLC link between smart vehicles and road side assets. In this paper, we propose a hybrid communication system for asset management and emergency reporting architecture for smart transportation. We incorporate Foglets along with visible light communication (VLC) and radio frequency (RF) communication. We present the channel model and parameters of a hybrid model to support an intelligent transportation system (ITS) system. Simulations show high improvement in the system performance in terms of communication range and received data. We present a comparative analysis of a hybrid ITS system.Keywords: Internet of Things, Foglets, VLC, RF, smart vehicle, roadside asset management
Procedia PDF Downloads 13325784 Employee Well-being in the Age of AI: Perceptions, Concerns, Behaviors, and Outcomes
Authors: Soheila Sadeghi
Abstract:
— The growing integration of Artificial Intelligence (AI) into Human Resources (HR) processes has transformed the way organizations manage recruitment, performance evaluation, and employee engagement. While AI offers numerous advantages—such as improved efficiency, reduced bias, and hyper-personalization—it raises significant concerns about employee well-being, job security, fairness, and transparency. The study examines how AI shapes employee perceptions, job satisfaction, mental health, and retention. Key findings reveal that: (a) while AI can enhance efficiency and reduce bias, it also raises concerns about job security, fairness, and privacy; (b) transparency in AI systems emerges as a critical factor in fostering trust and positive employee attitudes; and (c) AI systems can both support and undermine employee well-being, depending on how they are implemented and perceived. The research introduces an AI-employee well-being Interaction Framework, illustrating how AI influences employee perceptions, behaviors, and outcomes. Organizational strategies, such as (a) clear communication, (b) upskilling programs, and (c) employee involvement in AI implementation, are identified as crucial for mitigating negative impacts and enhancing positive outcomes. The study concludes that the successful integration of AI in HR requires a balanced approach that (a) prioritizes employee well-being, (b) facilitates human-AI collaboration, and (c) ensures ethical and transparent AI practices alongside technological advancement.Keywords: artificial intelligence, human resources, employee well-being, job satisfaction, organizational support, transparency in AI
Procedia PDF Downloads 2925783 Cyber Operational Design and Military Decision Making Process
Authors: M. Karaman, H. Catalkaya
Abstract:
Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state
Procedia PDF Downloads 58925782 Data Access, AI Intensity, and Scale Advantages
Authors: Chuping Lo
Abstract:
This paper presents a simple model demonstrating that ceteris paribus countries with lower barriers to accessing global data tend to earn higher incomes than other countries. Therefore, large countries that inherently have greater data resources tend to have higher incomes than smaller countries, such that the former may be more hesitant than the latter to liberalize cross-border data flows to maintain this advantage. Furthermore, countries with higher artificial intelligence (AI) intensity in production technologies tend to benefit more from economies of scale in data aggregation, leading to higher income and more trade as they are better able to utilize global data.Keywords: digital intensity, digital divide, international trade, scale of economics
Procedia PDF Downloads 6825781 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data
Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju
Abstract:
Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding
Procedia PDF Downloads 41225780 Identity Verification Using k-NN Classifiers and Autistic Genetic Data
Authors: Fuad M. Alkoot
Abstract:
DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN).Keywords: biometrics, genetic data, identity verification, k nearest neighbor
Procedia PDF Downloads 25825779 Eco-Survivalism and Nomadic Pastoralism: An Exploratory Study on the Dialectics of Herder-Farmer Conflict in Nigeria
Authors: Francis N. Okpaleke
Abstract:
The threat of Fulani herder militancy in Nigeria has led to a volatile security situation characterized by communal strife, arms proliferation, rural banditry, and insurgency. The exigency of this situation resonates in the eco-survivalist theory of farmer-herder conflict which holds that the herder deems the farmers’ unwarranted incursions into his grazing terrain as an effrontery that must reprised and a call to war. In spite of the rising incidence of Fulani militancy in Nigeria, only little is known concerning the phenomenon. The bulk of prevailing ideas on the subject has been largely and unnecessarily journalistic and anecdotal, lacking in intellectual depth, fecundity and rigour. The issue has remained scarcely documented by way of organized research. There is therefore a need for a systematic investigation that would leverage scholarly and policy insights on the subject which is the purpose of this study. The study will therefore, seek to examine the nexus between nomadic pastoralism and the incidence of herder-farmer conflicts in Nigeria with particular reference to the central region of the country. By means of qualitative descriptive analysis predicated on the theory of eco-violence, the paper explores the contemporary historical and structural drivers of this conflict, its relationship with the dynamics of climate change in Nigeria and its implication of human security in Nigeria. The paper also proffers theoretical and policy recommendations to mitigate the onto ward conflict.Keywords: eco-survivalism, conflict, pastoralism, nomads
Procedia PDF Downloads 31425778 Assessing Smallholder Farmers’ Perception of Climate Change and Coping Strategies Adopted in the Olifants Catchment of South Africa
Authors: Mary Funke Olabanji, Thando Ndarana, Nerhene Davis, Sylvester Okechukwu Ilo
Abstract:
Scientific evidence indicates that climate change is already being experienced by farmers, and its impacts are felt on agricultural and food systems. Understanding the perceptions of farmers on climate change and how they respond to this change is essential to the development and implementation of appropriate policies for agriculture and food security. This paper aims to contribute to the understanding of farmers’ perceptions of climate change, adopted coping strategies, long-term implications of their adaptation choices, and barriers to their decisions to adapt. Data were randomly collected from 73 respondents in five districts located in the Olifants catchment of South Africa. A combination of descriptive statistics and Chi-Square statistical tests using the Statistical Package for Social Science (SPSS) was used to analyse the data obtained from the survey. Results show that smallholder farmers have an in-depth perception of climate change. The most significant changes perceived by farmers were increased temperature and low rainfall. The results equally revealed that smallholder farmers in the Olifants catchment had adopted several adaptation strategies in response to the perceived climate change. The significant adaptation strategies from the results include changing cropping patterns and planting date, use of improved seed variety, and chemical fertilizers. The study, therefore, concludes that crop diversification and agroforestry were more effective and sustainable in mitigating the impact of climate change.Keywords: adaptation, climate change, perception, smallholder farmers
Procedia PDF Downloads 18225777 A Review on Intelligent Systems for Geoscience
Authors: R Palson Kennedy, P.Kiran Sai
Abstract:
This article introduces machine learning (ML) researchers to the hurdles that geoscience problems present, as well as the opportunities for improvement in both ML and geosciences. This article presents a review from the data life cycle perspective to meet that need. Numerous facets of geosciences present unique difficulties for the study of intelligent systems. Geosciences data is notoriously difficult to analyze since it is frequently unpredictable, intermittent, sparse, multi-resolution, and multi-scale. The first half addresses data science’s essential concepts and theoretical underpinnings, while the second section contains key themes and sharing experiences from current publications focused on each stage of the data life cycle. Finally, themes such as open science, smart data, and team science are considered.Keywords: Data science, intelligent system, machine learning, big data, data life cycle, recent development, geo science
Procedia PDF Downloads 13525776 Influence of Different Ripening Agents on the Shelf-Life and Microbial Load of Organic and Inorganic Musaceae, during the Ripening Process, and the Health Implication for Food Security
Authors: Wisdom Robert Duruji
Abstract:
Local farmers and fruit processors in developing countries of West Africa use different ripening agents to accelerate the ripening process of plantain and banana. This study reports on the influence of different ripening agents on the shelf-life and microbial load of organic and inorganic plantain (Musa paradisiaca) and banana (Musa sapientum) during ripening process and the health implication for food security in Nigeria. The experiment consisted of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening agent was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating their micro flora (Bacteria, Yeast and Mould) using pour plate method. Microbes present in the samples were enumerated, characterized and classified to genera and species. The result indicated that the microbial load of inorganic plantain from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 12.11 cfu/g for ripened; and the microbial load of organic plantain from Obafemi Awolowo University Teaching and Research Farm (OAUTRF) increased from 6.00 for unripe to 11.60 cfu/g for ripened. Also, the microbial load of inorganic banana from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 11.50 cfu/g for ripened; while the microbial load of organic banana from OAUTRF increased from 6.50 for unripe to 9.40 cfu/g for ripened. The microbial effects of the ripening agents increased from 10.00 for control to 16.00 cfu/g for treated (ripened) organic and inorganic plantain; while that of organic and inorganic banana increased from 7.50 for control to 14.50 cfu/g for ripened. Visual observation for the presence of fungal colonies and deterioration rates were monitored till seven days after the plantain and banana fingers have fully ripened. Inorganic plantain and banana from (Urban day) open market in Ile-Ife are more contaminated than organic plantain and banana fingers from OAUTRF. The ripening accelerators reduced the shelf life, increased senescence, and microbial load of plantain and banana. This study concluded that organic Agriculture is better and microbial friendlier than inorganic farming.Keywords: organic agriculture, food security, Musaceae, calcium carbide, Irvingia gabonensis, Newbouldia laevis
Procedia PDF Downloads 58425775 Factors Affecting Residential Satisfaction in Low-Income Housing: Case Study of War College Housing in Gwarinpa Estate-Abuja, Nigeria
Authors: Abdulmajeed Mustapha, Murat Sahin, Ebru Karahan
Abstract:
Low-income housing for poor people in urban areas is a global challenge, especially in developing countries. The quality of construction of mass housing is oftentimes compromised, thus resulting in a housing deficit, thereby affecting the residential satisfaction of users. This research analyses the various factors affecting residential satisfaction in War College Housing Estate, Abuja, Nigeria. These were investigated using parameters such as environmental characteristics and public amenities such as public benefits, safety/security, and sociodemographic characteristics. The study adopted a quantitative approach for the data gathering through literature reviews within the topic’s scope. The survey was conducted between April to May 2021 using a questionnaire form that was distributed to household members, onsite analysis within the selected housing project, and interviews with a few professionals within the field of this research. Data gathered from the survey and analysis on housing and sociodemographic characteristics, amongst others, were acquired through the means of interviews and site surveys of the selected Housing Estate. Findings from the various characteristics determining satisfaction revealed that residents had varying levels of satisfaction, ranging from a scale of satisfied to dissatisfied. It is recommended that the government come up with policies that will not only make the environment clean and safe but also make sure that the needs of the people who live there are taken into account. This will help the people who live there be more satisfied with their homes.Keywords: residential satisfaction, neighborhood satisfaction, low-income housing, socio-demographic characteristics, Nigeria
Procedia PDF Downloads 9725774 Study of Human Position in Architecture with Contextual Approach
Authors: E. Zarei, M. Bazaei, A. seifi, A. Keshavarzi
Abstract:
Contextuallism has been always the main component of urban science. It not only has great direct and indirect impact on behaviors, events and interactions, but also is one of the basic factors of an urban values and identity. Nowadays there might be some deficiencies in the cities. In the theories of environment designing, humanistic orientations with the focus on culture and cultural variables would enable us to transfer information. To communicate with the context in which human lives, he needs some common memories, understandable symbols and daily activities in that context. The configuration of a place can impact on human’s behaviors. The goal of this research is to review 7 projects in different parts of the world with various usages and some factors such as ‘sense of place’, ‘sense of belonging’ and ‘social and cultural relations’ will be discussed in these projects. The method used for research in this project is descriptive- analytic. Library information and Internet are the main sources of gathering information and the method of reasoning used in this project is inductive. The consequence of this research will be some data in the form of tables that has been extracted from mentioned projects.Keywords: contextuallism with humanistic approach, sense of place, sense of belonging, social and cultural relations
Procedia PDF Downloads 39625773 Employee Job Performance and Supervisor Workplace Gossip Employee Job Engagement's Mediation Effect
Authors: Pphakamani Irvine Dlamini
Abstract:
The impact of supervisory gossip on subordinate work performance was investigated in this paper. The paper postulated that supervisory gossip, both bad and positive, has an impact on employee job engagement, which in turn has an impact on employee job performance. Data was collected from 238 employees and supervisors from the Mpumalanga Government Municipality in South Africa using a dyadic study approach. Employees responded to questions on supervisor gossip and job engagement, while supervisors responded to questions about employee work performance. Three waves of data gathering were carried out. Favourable superior gossip had a positive and substantial effect on employee job engagement, which increased employee job performance, according to the study, but negative superior gossip had a positive but insignificant effect on employee job engagement. The multicultural aspect of the municipality, as well as causation concerns and frequent method biases connected with research design, hampered the study. After successfully disentangling the supervisor-subordinate reciprocal communication web using Social Exchange Theory (SET), the study suggests that managers should instil effective ways for using both positive and negative gossip in the workplace to achieve favourable employee outcomes. Positive gossip creates workplace rivalry and competition, but negative gossip creates tension, stress, and mistrust among employees. This study attempted to assess the implication of supervisor gossip on employee job engagement and performance in the public service sector, whose employees are characterised by high job security as compared to their peers in the private sector.Keywords: worlplace gossip, supervisor, employee engagement, LMX
Procedia PDF Downloads 12425772 Criminal Attitude vs Transparency in the Arab World
Authors: Keroles Akram Saed Ghatas
Abstract:
The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.
Procedia PDF Downloads 4425771 Flood Risk Assessment in the Niger River Basin in Support of the Conception of a Flood Risk Management Plan: Case Study of the District of Malanville, Benin
Authors: Freddy Houndekindo
Abstract:
A study was carried out to evaluate the flood risk in the district of Malanville located along the Niger River. The knowledge produce by this study is useful in the implementation of adaptation and/or mitigation measures to alleviate the impact of the flooding on the populations, the economy and the environment. Over the course of the study, the lack of data in the area of interest has been one of the main challenges encountered. Therefore, in the analysis of the flood hazard different sources of remotely sensed data were used. Moreover, the flood hazard was analysed by applying a 1D hydraulic model: HEC-RAS. After setting up the model for the study area, the different flood scenarios considered were simulated and mapped using ArcGIS and the HEC-GEORAS extension. The result of the simulation gave information about the inundated areas and the water depths at each location. From the analysis of the flood hazard, it was found that between 47% and 50% of the total area of the district of Malanville would be flooded in the different flood scenarios considered, and the water depth varies between 1 and 7 m. The townships of Malanville most at risk of flooding are Momkassa and Galiel, located in a high-risk and very high-risk zone, respectively. Furthermore, the assessment of the flood risk showed that the most vulnerable sector to the inundations is the agricultural sector. Indeed, the cultivated floodplains were the most affected areas by the floodwater in every flood scenarios. Knowing that a high proportion of the population of the district relies on their farmlands in these floodplains for their livelihood, the floods pose a challenge not only to the food security in the area but also to its development.Keywords: flood risk management, Niger, remote sensing, vulnerability
Procedia PDF Downloads 15325770 Challenges in the Management of Her2 Neu Positive Breast Cancer Patients: Real World Data from India
Authors: Praveen Adusumilli, Meher Lakshmi Konatam, Sadashivudu Gundeti, Stalin Bala
Abstract:
The invention of trastuzumab has changed the treatment of breast cancer and lives of many patients all over the world. Despite many patients getting benefitted from the drug, it is out of reach for most of the patients. There is very limited real world data regarding the epidemiology and clinical outcome of Her2neu positive breast cancer patients. Materials and Methods: This is a retrospective analysis of breast cancer patients presenting to a tertiary care cancer centre in Southern India from 2007 to2013. All early and locally advanced breast cancer patients, who were Her2neu 3+ on IHC are included in the study and evaluated in terms of epidemiology, 3-year disease free survival (DFS)and 5-year overall survival(OS). Chemotherapy regimens used were-FAC 6 cycles or AC 4 cycles followed by 12 cycles of weekly paclitaxel . Trastuzumab was given after 6 cycles of FAC or weekly with paclitaxel followed by 3weekly maintenance until 1 year. Results: Over the period of this study there were 885 newly diagnosed cases of carcinoma breast, of which 242 (27%) were Her2neu positive, 360(40%) were hormone receptor positive, and 212(24%) were triple negative. A total of 71(8%) were Her2neu equivocal of which only 10 patients got FISH test done. Of the 212 newly diagnosed patients, only 74 (29%) opted to have standard of care therapy with trastuzumab at our centre, out of which 52(24%), 8(3%), received under insurance, paying basis respectively. 14(9%) patients received the care as part of clinical trial program (ALTTO trial). 7 (9.72%) patients developed decrease of ejection fraction by greater than 10%, requiring stoppage of trastuzumab out of which 5 were restarted in 2 months. Patients receiving trastuzumab along with chemotherapy had longer 3year DFS 92% vs. 60% (p value<0.0001) when compared to chemotherapy alone. 5 year OS was 87% vs 44% (p-value <0.0001) compared to chemotherapy alone. Conclusion: Trastuzumab with chemotherapy improves the DFS and OS in Her2neu positive patients. The biggest constraint is the cost of the treatment and absence of universal health security net to treat all patients with this diagnosis.Keywords: breast cancer, Her 2 neu positive, real world data, Trastuzumab
Procedia PDF Downloads 16925769 The Preparation and Training of Expert Studio Reviewers
Authors: Diane M. Bender
Abstract:
In design education, professional education is delivered in a studio, where students learn and understand their discipline. This learning methodology culminates in a final review, where students present their work before instructors and invited reviewers, known as jurors. These jurors are recognized experts who add a wide diversity of opinions in their feedback to students. This feedback can be provided in multiple formats, mainly a verbal critique of the work. To better understand how these expert reviewers prepare for a studio review, a survey was distributed to reviewers at a multi-disciplinary design school within the United States. Five design disciplines are involved in this case study: architecture, graphic design, industrial design, interior design, and landscape architecture. Respondents (n=122) provided information about if and how they received training on how to critique and participate in a final review. Common forms of training included mentorship, modeled behavior from other designers/past professors, workshops on critique from the instructing faculty prior to the crit session, and by being a practicing design professional. Respondents also gave feedback about how much the instructor provided course materials prior to the review in order to better prepare for student interaction. Finally, respondents indicated if they had interaction, and in what format, with students prior to the final review. Typical responses included participation in studio desk crits, a midterm jury member, meetings with students, and email or social media correspondence. While the focus of this study is the studio review, the findings are equally applicable to other disciplines. Suggestions will be provided on how to improve the preparation of guests in the learning process and how their interaction can positively influence student engagement.Keywords: critique, design, education, evaluation, juror
Procedia PDF Downloads 8225768 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria
Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi
Abstract:
Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization
Procedia PDF Downloads 29025767 The Nation as Brand: Postcolonial Construction of National Identity in Late 20th/21st Century Qatar
Authors: Ryunhye Kim
Abstract:
Despite its relatively short history as an independent state, Qatar has emerged as a highly regarded Gulf state and global power. Since its independence in September 1971, the state has employed deliberate policy initiatives designed to put Qatar on the map and distinguish it from other Gulf states. Because Qatar and its neighbors are resource-poor apart from energy, whoever is first to introduce a unique aspect of branding not only takes the lead but assumes what is often an insurmountable advantage. This study examines three specific modes of branding undertaken by Qatar: (1) energy policies to utilize its natural gas to become a dominant supplier; (2) the deliberate construction of a distinct cultural brand utilizing sports, architecture, museums, and media; and (3) ‘niche diplomacy’ to serve as a mediator in regional and intra-national conflicts, especially as interlocutor between the United States and Arab regimes and Muslim groups. Gleaning data from a range of sources, this study analyzes the effectiveness and significance of Qatar’s place branding on the global stage, as well as potential disadvantages and limits in this branding, including problems encountered before and after the ‘Qatar crisis.’Keywords: national branding, national-identity, Qatar, soft-power
Procedia PDF Downloads 15225766 Big Data Analysis with RHadoop
Authors: Ji Eun Shin, Byung Ho Jung, Dong Hoon Lim
Abstract:
It is almost impossible to store or analyze big data increasing exponentially with traditional technologies. Hadoop is a new technology to make that possible. R programming language is by far the most popular statistical tool for big data analysis based on distributed processing with Hadoop technology. With RHadoop that integrates R and Hadoop environment, we implemented parallel multiple regression analysis with different sizes of actual data. Experimental results showed our RHadoop system was much faster as the number of data nodes increases. We also compared the performance of our RHadoop with lm function and big lm packages available on big memory. The results showed that our RHadoop was faster than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases.Keywords: big data, Hadoop, parallel regression analysis, R, RHadoop
Procedia PDF Downloads 43725765 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes
Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay
Abstract:
Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe
Procedia PDF Downloads 14925764 A Mutually Exclusive Task Generation Method Based on Data Augmentation
Authors: Haojie Wang, Xun Li, Rui Yin
Abstract:
In order to solve the memorization overfitting in the meta-learning MAML algorithm, a method of generating mutually exclusive tasks based on data augmentation is proposed. This method generates a mutex task by corresponding one feature of the data to multiple labels, so that the generated mutex task is inconsistent with the data distribution in the initial dataset. Because generating mutex tasks for all data will produce a large number of invalid data and, in the worst case, lead to exponential growth of computation, this paper also proposes a key data extraction method, that only extracts part of the data to generate the mutex task. The experiments show that the method of generating mutually exclusive tasks can effectively solve the memorization overfitting in the meta-learning MAML algorithm.Keywords: data augmentation, mutex task generation, meta-learning, text classification.
Procedia PDF Downloads 9425763 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 26325762 Efficient Positioning of Data Aggregation Point for Wireless Sensor Network
Authors: Sifat Rahman Ahona, Rifat Tasnim, Naima Hassan
Abstract:
Data aggregation is a helpful technique for reducing the data communication overhead in wireless sensor network. One of the important tasks of data aggregation is positioning of the aggregator points. There are a lot of works done on data aggregation. But, efficient positioning of the aggregators points is not focused so much. In this paper, authors are focusing on the positioning or the placement of the aggregation points in wireless sensor network. Authors proposed an algorithm to select the aggregators positions for a scenario where aggregator nodes are more powerful than sensor nodes.Keywords: aggregation point, data communication, data aggregation, wireless sensor network
Procedia PDF Downloads 15725761 Public Culture Intervention in the Sustainable Renewal of Vernacular Heritage, Taking the Villages Surrounding the Erlitou Site in China as an Example
Authors: Gong Zhang
Abstract:
The villages surrounding protected areas of the Sites are a unique vernacular heritage due to their geographical location, long history, and the combination of nature and humanity. With the construction of more and more heritage sites, the villages around them are faced with the conflict between conservation and development. How to carry out sustainable micro-renewal while preserving the authenticity of the vernacular heritage is of great importance for the co-growth of the village residents and the site. This paper focuses on the process of revitalization of the villages nearby the Erlitou Site Park in China, aiming to study how sustainable village regeneration and conservation can be carried out through the activation of public culture. Firstly, through field research and literature review, this paper studies the vernacular morphology and architecture types of more than ten historical villages around the Erlitou site and investigates the traditional vernacular culture and the daily public activities of the local villagers. Secondly, taking the nearest village to the site area, Ranzhuang Village, as an example, the paper studies the role of public cultural activity interventions on the three different stages of vernacular heritage renewal: master planning, architecture group, and acupuncture-style micro-renewal of individual buildings, aiming to summarise its impact on villagers' lives and vernacular heritage. This paper concludes that a living regeneration with a moderate public cultural activity intervention can promote the symbiosis between the heritage site and the life of the villagers and increase the vitality of the village. This study aims to use the example of village regeneration in Henan, China, as a sustainable reference for the co-development of heritage sites and villages in other parts of the world.Keywords: Erlitou site, public culture intervention, sustainable, vernacular heritage
Procedia PDF Downloads 246