Search results for: smart security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3957

Search results for: smart security

1737 Improved Image Retrieval for Efficient Localization in Urban Areas Using Location Uncertainty Data

Authors: Mahdi Salarian, Xi Xu, Rashid Ansari

Abstract:

Accurate localization of mobile devices based on camera-acquired visual media information usually requires a search over a very large GPS-referenced image database. This paper proposes an efficient method for limiting the search space for image retrieval engine by extracting and leveraging additional media information about Estimated Positional Error (EP E) to address complexity and accuracy issues in the search, especially to be used for compensating GPS location inaccuracy in dense urban areas. The improved performance is achieved by up to a hundred-fold reduction in the search area used in available reference methods while providing improved accuracy. To test our procedure we created a database by acquiring Google Street View (GSV) images for down town of Chicago. Other available databases are not suitable for our approach due to lack of EP E for the query images. We tested the procedure using more than 200 query images along with EP E acquired mostly in the densest areas of Chicago with different phones and in different conditions such as low illumination and from under rail tracks. The effectiveness of our approach and the effect of size and sector angle of the search area are discussed and experimental results demonstrate how our proposed method can improve performance just by utilizing a data that is available for mobile systems such as smart phones.

Keywords: localization, retrieval, GPS uncertainty, bag of word

Procedia PDF Downloads 282
1736 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 423
1735 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 19
1734 Re-Invent Corporate Governance - Ethical Way

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.

Keywords: business, entrepreneur, ethics, governance, transparency.

Procedia PDF Downloads 72
1733 Multi-Scale Green Infrastructure: An Integrated Literature Review

Authors: Panpan Feng

Abstract:

The concept of green infrastructure originated in Europe and the United States. It aims to ensure smart growth of urban and rural ecosystems and achieve sustainable urban and rural ecological, social, and economic development by combining it with gray infrastructure in traditional planning. Based on the literature review of the theoretical origin, value connotation, and measurement methods of green infrastructure, this study summarizes the research content of green infrastructure at different scales from the three spatial levels of region, city, and block and divides it into functional dimensions, spatial dimension, and strategic dimension. The results show that in the functional dimension, from region-city-block, the research on green infrastructure gradually shifts from ecological function to social function. In the spatial dimension, from region-city-block, the research on the spatial form of green infrastructure has shifted from two-dimensional to three-dimensional, and the spatial structure of green infrastructure has shifted from single ecological elements to multiple composite elements. From a strategic perspective, green infrastructure research is more of a spatial planning tool based on land management, environmental livability and ecological psychology, providing certain decision-making support.

Keywords: green infrastructure, multi-scale, social and ecological functions, spatial strategic decision-making tools

Procedia PDF Downloads 56
1732 Hand Gesture Interpretation Using Sensing Glove Integrated with Machine Learning Algorithms

Authors: Aqsa Ali, Aleem Mushtaq, Attaullah Memon, Monna

Abstract:

In this paper, we present a low cost design for a smart glove that can perform sign language recognition to assist the speech impaired people. Specifically, we have designed and developed an Assistive Hand Gesture Interpreter that recognizes hand movements relevant to the American Sign Language (ASL) and translates them into text for display on a Thin-Film-Transistor Liquid Crystal Display (TFT LCD) screen as well as synthetic speech. Linear Bayes Classifiers and Multilayer Neural Networks have been used to classify 11 feature vectors obtained from the sensors on the glove into one of the 27 ASL alphabets and a predefined gesture for space. Three types of features are used; bending using six bend sensors, orientation in three dimensions using accelerometers and contacts at vital points using contact sensors. To gauge the performance of the presented design, the training database was prepared using five volunteers. The accuracy of the current version on the prepared dataset was found to be up to 99.3% for target user. The solution combines electronics, e-textile technology, sensor technology, embedded system and machine learning techniques to build a low cost wearable glove that is scrupulous, elegant and portable.

Keywords: American sign language, assistive hand gesture interpreter, human-machine interface, machine learning, sensing glove

Procedia PDF Downloads 300
1731 Development and Power Characterization of an IoT Network for Agricultural Imaging Applications

Authors: Jacob Wahl, Jane Zhang

Abstract:

This paper describes the development and characterization of a prototype IoT network for use with agricultural imaging and monitoring applications. The sensor and gateway nodes are designed using the ESP32 SoC with integrated Bluetooth Low Energy 4.2 and Wi-Fi. A development board, the Arducam IoTai ESP32, is used for prototyping, testing, and power measurements. Google’s Firebase is used as the cloud storage site for image data collected by the sensor. The sensor node captures images using the OV2640 2MP camera module and transmits the image data to the gateway via Bluetooth Low Energy. The gateway then uploads the collected images to Firebase via a known nearby Wi-Fi network connection. This image data can then be processed and analyzed by computer vision and machine learning pipelines to assess crop growth or other needs. The sensor node achieves a wireless transmission data throughput of 220kbps while consuming 150mA of current; the sensor sleeps at 162µA. The sensor node device lifetime is estimated to be 682 days on a 6600mAh LiPo battery while acquiring five images per day based on the development board power measurements. This network can be utilized by any application that requires high data rates, low power consumption, short-range communication, and large amounts of data to be transmitted at low-frequency intervals.

Keywords: Bluetooth low energy, ESP32, firebase cloud, IoT, smart farming

Procedia PDF Downloads 136
1730 Introducing Global Navigation Satellite System Capabilities into IoT Field-Sensing Infrastructures for Advanced Precision Agriculture Services

Authors: Savvas Rogotis, Nikolaos Kalatzis, Stergios Dimou-Sakellariou, Nikolaos Marianos

Abstract:

As precision holds the key for the introduction of distinct benefits in agriculture (e.g., energy savings, reduced labor costs, optimal application of inputs, improved products, and yields), it steadily becomes evident that new initiatives should focus on rendering Precision Agriculture (PA) more accessible to the average farmer. PA leverages on technologies such as the Internet of Things (IoT), earth observation, robotics and positioning systems (e.g., the Global Navigation Satellite System – GNSS - as well as individual positioning systems like GPS, Glonass, Galileo) that allow: from simple data georeferencing to optimal navigation of agricultural machinery to even more complex tasks like Variable Rate Applications. An identified customer pain point is that, from one hand, typical triangulation-based positioning systems are not accurate enough (with errors up to several meters), while on the other hand, high precision positioning systems reaching centimeter-level accuracy, are very costly (up to thousands of euros). Within this paper, a Ground-Based Augmentation System (GBAS) is introduced, that can be adapted to any existing IoT field-sensing station infrastructure. The latter should cover a minimum set of requirements, and in particular, each station should operate as a fixed, obstruction-free towards the sky, energy supplying unit. Station augmentation will allow them to function in pairs with GNSS rovers following the differential GNSS base-rover paradigm. This constitutes a key innovation element for the proposed solution that encompasses differential GNSS capabilities into an IoT field-sensing infrastructure. Integrating this kind of information supports the provision of several additional PA beneficial services such as spatial mapping, route planning, and automatic field navigation of unmanned vehicles (UVs). Right at the heart of the designed system, there is a high-end GNSS toolkit with base-rover variants and Real-Time Kinematic (RTK) capabilities. The GNSS toolkit had to tackle all availability, performance, interfacing, and energy-related challenges that are faced for a real-time, low-power, and reliable in the field operation. Specifically, in terms of performance, preliminary findings exhibit a high rover positioning precision that can even reach less than 10-centimeters. As this precision is propagated to the full dataset collection, it enables tractors, UVs, Android-powered devices, and measuring units to deal with challenging real-world scenarios. The system is validated with the help of Gaiatrons, a mature network of agro-climatic telemetry stations with presence all over Greece and beyond ( > 60.000ha of agricultural land covered) that constitutes part of “gaiasense” (www.gaiasense.gr) smart farming (SF) solution. Gaiatrons constantly monitor atmospheric and soil parameters, thus, providing exact fit to operational requirements asked from modern SF infrastructures. Gaiatrons are ultra-low-cost, compact, and energy-autonomous stations with a modular design that enables the integration of advanced GNSS base station capabilities on top of them. A set of demanding pilot demonstrations has been initiated in Stimagka, Greece, an area with a diverse geomorphological landscape where grape cultivation is particularly popular. Pilot demonstrations are in the course of validating the preliminary system findings in its intended environment, tackle all technical challenges, and effectively highlight the added-value offered by the system in action.

Keywords: GNSS, GBAS, precision agriculture, RTK, smart farming

Procedia PDF Downloads 112
1729 Evaluation of the Factors Affecting Violence Against Women (Case Study: Couples Referring to Family Counseling Centers in Tehran)

Authors: Hassan Manouchehri

Abstract:

The present study aimed to identify and evaluate the factors affecting violence against women. The statistical population included all couples referring to family counseling centers in Tehran due to domestic violence during the past year. A number of 305 people were selected as a statistical sample using simple random sampling and Cochran's formula in unlimited conditions. A researcher-made questionnaire including 110 items was used for data collection. The face validity and content validity of the questionnaire were confirmed by 30 experts and its reliability was obtained above 0.7 for all studied variables in a preliminary test with 30 subjects and it was acceptable. In order to analyze the data, descriptive statistical methods were used with SPSS software version 22 and inferential statistics were used for modeling structural equations in Smart PLS software version 2. Evaluating the theoretical framework and domestic and foreign studies indicated that, in general, four main factors, including cultural and social factors, economic factors, legal factors, as well as medical factors, underlie violence against women. In addition, structural equation modeling findings indicated that cultural and social factors, economic factors, legal factors, and medical factors affect violence against women.

Keywords: violence against women, cultural and social factors, economic factors, legal factors, medical factors

Procedia PDF Downloads 139
1728 Damage of Laminated Corrugated Sandwich Panels under Inclined Impact Loading

Authors: Muhammad Kamran, Xue Pu, Naveed Ahmed

Abstract:

Sandwich foam structures are efficient in impact energy absorption and making components lightweight; however their efficient use require a detailed understanding of its mechanical response. In this study, the foam core, laminated facings’ sandwich panel with internal triangular rib configuration is impacted by a spherical steel projectile at different angles using ABAQUS finite element package and damage mechanics is studied. Laminated ribs’ structure is sub-divided into three formations; all zeros, all 45 and optimized combination of zeros and 45 degrees. Impact velocity is varied from 250 m/s to 500 m/s with an increment of 50 m/s. The impact damage can significantly demolish the structural integrity and energy absorption due to fiber breakage, matrix cracking, and de-bonding. Macroscopic fracture study of the panel and core along with load-displacement responses and failure modes are the key parameters in the design of smart ballistic resistant structures. Ballistic impact characteristics of panels are studied on different speed, different inclination angles and its dependency on the base, and core materials, ribs formation, and cross-sectional spaces among them are determined. Impact momentum, penetration and kinetic energy absorption data and curves are compiled to predict the first and proximity impact in an effort to enhance the dynamic energy absorption.

Keywords: dynamic energy absorption, proximity impact, sandwich panels, impact momentum

Procedia PDF Downloads 384
1727 Impact of Schools' Open and Semi-Open Spaces on Student's Studying Behavior

Authors: Chaithanya Pothuganti

Abstract:

Open and semi-open spaces in educational buildings like corridors, mid landings, seating spaces, lobby, courtyards are traditionally have been the places of social communion and interaction which helps in promoting the knowledge, performance, activeness, and motivation in students. Factors like availability of land, commercialization, of educational facilities, especially in e-techno and smart schools, led to closed classrooms to accommodate students thereby lack quality open and semi-open spaces. This insufficient attention towards open space design which is a means of informal learning misses an opportunity to encourage the student’s skill development, behavior and learning skills. The core objective of this paper is to find the level of impact on student learning behavior and to identify the suitable proportions and configuration of spaces that shape the schools. In order to achieve this, different types of open spaces in schools and their impact on student’s performance in various existing models are analysed using case studies to draw some design principles. The study is limited to indoor open spaces like corridors, break out spaces and courtyards. The expected outcome of the paper is to suggest better design considerations for the development of semi-open and open spaces which functions as an element for informal learnings. Its focus is to provide further thinking on designing and development of open spaces in educational buildings.

Keywords: configuration of spaces and proportions, informal learning, open spaces, schools, student’s behavior

Procedia PDF Downloads 308
1726 Leveraging the Power of Dual Spatial-Temporal Data Scheme for Traffic Prediction

Authors: Yang Zhou, Heli Sun, Jianbin Huang, Jizhong Zhao, Shaojie Qiao

Abstract:

Traffic prediction is a fundamental problem in urban environment, facilitating the smart management of various businesses, such as taxi dispatching, bike relocation, and stampede alert. Most earlier methods rely on identifying the intrinsic spatial-temporal correlation to forecast. However, the complex nature of this problem entails a more sophisticated solution that can simultaneously capture the mutual influence of both adjacent and far-flung areas, with the information of time-dimension also incorporated seamlessly. To tackle this difficulty, we propose a new multi-phase architecture, DSTDS (Dual Spatial-Temporal Data Scheme for traffic prediction), that aims to reveal the underlying relationship that determines future traffic trend. First, a graph-based neural network with an attention mechanism is devised to obtain the static features of the road network. Then, a multi-granularity recurrent neural network is built in conjunction with the knowledge from a grid-based model. Subsequently, the preceding output is fed into a spatial-temporal super-resolution module. With this 3-phase structure, we carry out extensive experiments on several real-world datasets to demonstrate the effectiveness of our approach, which surpasses several state-of-the-art methods.

Keywords: traffic prediction, spatial-temporal, recurrent neural network, dual data scheme

Procedia PDF Downloads 116
1725 Direct and Moderating Effect of Religious Activities, Sustainability and Peer Support on Job Performance

Authors: Fahad Alam

Abstract:

Work stress directly affects job performance, specifically in a worse environment. Consequently, a social provision plays a crucial part for enhancement. Therefore, the current research investigates the direct and moderating effect between religious activities, sustainability and peer support on job performance at hospitals in Khyber PakhtunKhwa (KPK), Pakistan. Both primary and secondary data are collected through 261 questionnaires of medical employees from four district hospitals in Khyber PakhtunKhwa, Pakistan, in 2018. The analysis was carried out by SPSS16 and SMART PLS3, to test the direct effect of religious activities, sustainability and social support on job performance and the effect of moderating variable 'work environment' on job performance. The finding confirmed that direct and moderating variables play a significant positive effect among religious activities, sustainability and peer support on job performance, the variables help to diminish the strain level or the stress level, consequently helps in the job completed. Affirmative social approaches produce desirable effects on job performance. The research revealed that social provisions are significant triggers for superior practices. Moreover, the results are stimulating because some of the past literature revealed an insignificant correlation between social provision and performance. This study found that there is a significant relationship which persuades health care organizations.

Keywords: job performance, peer’s support, religious activities, sustainability, work environment

Procedia PDF Downloads 115
1724 Device to Alert and Fire Prevention through Temperature Monitoring and Gas Detection

Authors: Dêivisson Alves Anjos, Blenda Fonseca Aires Teles, Queitiane Castro Costa

Abstract:

Fire is one of the biggest dangers for factories, warehouses, mills, among other places, causing unimaginable damage, because besides the material damage also directly affects the lives of workers who are likely to suffer death or very serious consequences. This protection of the lives of these people should be taken seriously, always seeking safety. Thus investment in security and monitoring equipment must be high, so you can prevent or reduce the impacts of a possible fire. Our device, made in PIC micro controller monitors the temperature and the presence of gas in the environment, it sends the data via Bluetooth device to a developed in LabVIEW interface saves these data continuously and alert if the temperature exceeds the allowed or some gas is detected. Currently the device is in operation and can perform several tests, as well as use in different areas for which you need anti-fire protection.

Keywords: pic, bluetooth, fire, temperature, gas, LabVIEW

Procedia PDF Downloads 530
1723 The Ethical and Social Implications of Using AI in Healthcare: A Literature Review

Authors: Deepak Singh

Abstract:

AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use.

Keywords: AI, healthcare, telemedicine, telehealth, ethics, security, privacy, patient, rights, safety

Procedia PDF Downloads 138
1722 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 580
1721 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 286
1720 Biosignal Measurement System Based on Ultra-Wide Band Human Body Communication

Authors: Jonghoon Kim, Gilwon Yoon

Abstract:

A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strong security measures since it does not use wireless network. Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.

Keywords: biosignal, human body communication, mobile health, PPG, ultrawide band

Procedia PDF Downloads 472
1719 Numerical Simulation and Laboratory Tests for Rebar Detection in Reinforced Concrete Structures using Ground Penetrating Radar

Authors: Maha Al-Soudani, Gilles Klysz, Jean-Paul Balayssac

Abstract:

The aim of this paper is to use Ground Penetrating Radar (GPR) as a non-destructive testing (NDT) method to increase its accuracy in recognizing the geometric reinforced concrete structures and in particular, the position of steel bars. This definition will help the managers to assess the state of their structures on the one hand vis-a-vis security constraints and secondly to quantify the need for maintenance and repair. Several configurations of acquisition and processing of the simulated signal were tested to propose and develop an appropriate imaging algorithm in the propagation medium to locate accurately the rebar. A subsequent experimental validation was used by testing the imaging algorithm on real reinforced concrete structures. The results indicate that, this algorithm is capable of estimating the reinforcing steel bar position to within (0-1) mm.

Keywords: GPR, NDT, Reinforced concrete structures, Rebar location.

Procedia PDF Downloads 502
1718 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 451
1717 Effects of Reversible Watermarking on Iris Recognition Performance

Authors: Andrew Lock, Alastair Allen

Abstract:

Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.

Keywords: biometrics, iris recognition, reversible watermarking, vision engineering

Procedia PDF Downloads 453
1716 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa

Authors: Saska Alexandria Hayes

Abstract:

Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.

Keywords: domestic policy, immigration, migration, New Zealand

Procedia PDF Downloads 101
1715 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 170
1714 Resilient Manufacturing in Times of Mass Customisation: Using Augmented Reality to Improve Training and Operating Practices of EV’s Battery Assembly

Authors: Lorena Caires Moreira, Marcos Kauffman

Abstract:

This paper outlines the results of experimental research on deploying an emerging augmented reality (AR) system for real-time task assistance of highly customized and high-risk manual operations. The focus is on operators’ training capabilities and the aim is to test if such technologies can support achieving higher levels of knowledge retention and accuracy of task execution to improve health and safety (H and S) levels. The proposed solution is tested and validated using a real-world case study of electric vehicles’ battery module assembly. The experimental results revealed that the proposed AR method improved the training practices by increasing the knowledge retention levels from 40% to 84% and improved the accuracy of task execution from 20% to 71%, compared to the traditional paper-based method. The results of this research can be used as a demonstration of how emerging technologies are advancing the choice of manual, hybrid, or fully automated processes by promoting the connected worker (Industry 5.0) and supporting manufacturing in becoming more resilient in times of constant market changes.

Keywords: augmented reality, extended reality, connected worker, XR-assisted operator, manual assembly, industry 5.0, smart training, battery assembly

Procedia PDF Downloads 126
1713 Impact of Green Marketing Mix Strategy and CSR on Organizational Performance: An Empirical Study of Manufacturing Sector of Pakistan

Authors: Syeda Shawana Mahasan, Muhammad Farooq Akhtar

Abstract:

The objective of this study is to analyze the influence of the green marketing mix strategy and corporate social responsibility (CSR) on the performance of an organization, taking into account the mediating effect of corporate image. The impact of frugal innovation and corporate activism is being examined. The data was gathered from executives at various levels of management, including top, middle, and lower-level managers, from a total of 550 manufacturing enterprises of different sizes, ranging from small to medium to large. The collected replies are processed and analyzed using SMART PLS version 4.0.0.0. The application of PLS-SEM demonstrates that the green marketing mix strategy and corporate social responsibility have a significant impact on organizational performance. Therefore, it is imperative for organizations to effectively adopt environmentally sustainable and socially conscious methods within their operations. The results indicate that the corporate image has a key role in mediating the relationship between the green marketing mix strategy, corporate social responsibility, and organizational performance. This demonstrates the imperative for organizations to actively enhance their favorable reputation among stakeholders. The combination of frugal innovation and corporate activism enhances the connection between corporate image and organizational performance. The current study assists managers in recognizing the significance of these particular constructs in maintaining the long-term performance of the organization.

Keywords: green marketing mix strategy, CSR, corporate image, organizational performance, frugal innovation, corporate activism

Procedia PDF Downloads 36
1712 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 331
1711 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 481
1710 Rescue Emergency Drone for Fast Response to Medical Emergencies Due to Traffic Accidents

Authors: Anders S. Kristensen, Dewan Ahsan, Saqib Mehmood, Shakeel Ahmed

Abstract:

Traffic accidents are a result of the convergence of hazards, malfunctioning of vehicles and human negligence that have adverse economic and health impacts and effects. Unfortunately, avoiding them completely is very difficult, but with quick response to rescue and first aid, the mortality rate of inflicted persons can be reduced significantly. Smart and innovative technologies can play a pivotal role to respond faster to traffic crash emergencies comparing conventional means of transportation. For instance, Rescue Emergency Drone (RED) can provide faster and real-time crash site risk assessment to emergency medical services, thereby helping them to quickly and accurately assess a situation, dispatch the right equipment and assist bystanders to treat inflicted person properly. To conduct a research in this regard, the case of a traffic roundabout that is prone to frequent traffic accidents on the outskirts of Esbjerg, a town located on western coast of Denmark is hypothetically considered. Along with manual calculations, Emergency Disaster Management Simulation (EDMSIM) has been used to verify the response time of RED from a fire station of the town to the presumed crash site. The results of the study demonstrate the robustness of RED into emergency services to help save lives. 

Keywords: automated external defibrillator, medical emergency, response time, unmanned aerial system

Procedia PDF Downloads 227
1709 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 352
1708 Reasons of Change in Security Prices and Price Volatility: An Analysis of the European Carbon Futures Market

Authors: Boulis M. Ibrahim, Iordanis A. Kalaitzoglou

Abstract:

A micro structural pricing model is proposed in which price components account for learning by incorporating changing expectations of the trading intensity and the risk level of incoming trades. An analysis of European carbon futures transactions finds expected trading intensity to increase the information component and decrease the liquidity component of price changes, but at different rates. Among the results, the expected persistence in trading intensity explains the majority of the auto correlations in the level and the conditional volatility of price changes, helps predict hourly patterns in the bid–ask spread and differentiates between the impact of buy versus sell and continuing versus reversing trades.

Keywords: CO2 emission allowances, market microstructure, duration, price discovery

Procedia PDF Downloads 407