Search results for: security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7772

Search results for: security challenges

5012 The Ethical and Social Implications of Using AI in Healthcare: A Literature Review

Authors: Deepak Singh

Abstract:

AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use.

Keywords: AI, healthcare, telemedicine, telehealth, ethics, security, privacy, patient, rights, safety

Procedia PDF Downloads 116
5011 Analysis of Big Data

Authors: Sandeep Sharma, Sarabjit Singh

Abstract:

As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.

Keywords: big data, unstructured data, volume, variety, velocity

Procedia PDF Downloads 528
5010 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 563
5009 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 271
5008 Biosignal Measurement System Based on Ultra-Wide Band Human Body Communication

Authors: Jonghoon Kim, Gilwon Yoon

Abstract:

A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strong security measures since it does not use wireless network. Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.

Keywords: biosignal, human body communication, mobile health, PPG, ultrawide band

Procedia PDF Downloads 458
5007 Factors That Facilitate and Hinder Friendship with Peers: A Qualitative Study Involving Early Adolescents

Authors: I. Stacher, B. Schrank, K. Stiehl, K. A. Woodcock

Abstract:

Background: The need and desire for connectedness and belonging to a peer group is a major concern in middle childhood. This is particularly true for the period of school transition when making and maintaining friendships is put to the test. Social relations are important for enhancing self-esteem, confidence, and mental health. Conflicts with peers and victimization mark challenges in the complex social environment of early adolescents. Thus, the promotion of supportive peer relationships is an important social goal. The current literature lacks an in-depth analysis of young people’s experiences connected to making and maintaining friendships. Aim: This qualitative study aims to understand the factors that facilitate and hinder friendship and peer relations within the complex context of school transition. Methods: Youth engagement workshops at primary and secondary schools were conducted with 53 classes (N = 906 pupils; M age = 10.44; SD = .912) in 29 different schools across lower Austria. A big poster was created with the entire class, collecting early adolescents’ ideas on ways they can support each other in the school environment. Then, students were divided into smaller groups and encouraged to share their personal experiences of friendship. Verbatim quotes from students were collected on observation sheets and sticky notes during the activities. A thematic analysis was conducted. Results: Early adolescents describe facilitating factors that allow them to connect with peers. These descriptions are mainly on a behavioral level and are relevant for face-to-face and digital contact, e.g., practical and emotional support, spending time together, pleasure and fun. Specific challenges such as offensive actions, betrayal, and lack of emotion regulation exist and need to be addressed if aiming to reduce barriers between peers. Conclusion: Knowing first-hand experiences, desires, and barriers for making and maintaining friends at the time of school transition will help researchers to develop preventive health programs that adequately address the needs and preferences of today’s youth.

Keywords: youth voice, experts by experience, friendship, peer relations, primary-secondary school, transition

Procedia PDF Downloads 112
5006 VR/AR Applications in Personalized Learning

Authors: Andy Wang

Abstract:

Personalized learning refers to an educational approach that tailors instruction to meet the unique needs, interests, and abilities of each learner. This method of learning aims at providing students with a customized learning experience that is more engaging, interactive, and relevant to their personal lives. With generative AI technology, the author has developed a Personal Tutoring Bot (PTB) that supports personalized learning. The author is currently testing PTB in his EE 499 – Microelectronics Metrology course. Virtual Reality (VR) and Augmented Reality (AR) provide interactive and immersive learning environments that can engage student in online learning. This paper presents the rationale of integrating VR/AR tools in PTB and discusses challenges and solutions of incorporating VA/AR into the Personal Tutoring Bot (PTB).

Keywords: personalized learning, online education, hands-on practice, VR/AR tools

Procedia PDF Downloads 55
5005 Solar-Electric Pump-out Boat Technology: Impacts on the Marine Environment, Public Health, and Climate Change

Authors: Joy Chiu, Colin Hemez, Emma Ryan, Jia Sun, Robert Dubrow, Michael Pascucilla

Abstract:

The popularity of recreational boating is on the rise in the United States, which raises numerous national-level challenges in the management of air and water pollution, aquatic habitat destruction, and waterway access. The need to control sewage discharge from recreational vessels underlies all of these challenges. The release of raw human waste into aquatic environments can lead to eutrophication and algal blooms; can increase human exposure to pathogenic viruses, bacteria, and parasites; can financially impact commercial shellfish harvest/fisheries and marine bathing areas; and can negatively affect access to recreational and/or commercial waterways to the detriment of local economies. Because of the damage that unregulated sewage discharge can do to environments and human health/marine life, recreational vessels in the United States are required by law to 'pump-out' sewage from their holding tanks into sewage treatment systems in all designated 'no discharge areas'. Many pump-out boats, which transfer waste out of recreational vessels, are operated and maintained using funds allocated through the Federal Clean Vessel Act (CVA). The East Shore District Health Department of Branford, Connecticut is protecting this estuary by pioneering the design and construction of the first-in-the-nation zero-emissions, the solar-electric pump-out boat of its size to replace one of its older traditional gasoline-powered models through a Connecticut Department of Energy and Environmental Protection CVA Grant. This study, conducted in collaboration with the East Shore District Health Department, the Connecticut Department of Energy and Environmental Protection, States Organization for Boating Access and Connecticut’s CVA program coordinators, had two aims: (1) To perform a national assessment of pump-out boat programs, supplemented by a limited international assessment, to establish best pump-out boat practices (regardless of how the boat is powered); and (2) to estimate the cost, greenhouse gas emissions, and environmental and public health impacts of solar-electric versus traditional gasoline-powered pump-out boats. A national survey was conducted of all CVA-funded pump-out program managers and selected pump-out boat operators to gauge best practices; costs associated with gasoline-powered pump-out boat operation and management; and the regional, cultural, and policy-related issues that might arise from the adoption of solar-electric pump-out boat technology. We also conducted life-cycle analyses of gasoline-powered and solar-electric pump-out boats to compare their greenhouse gas emissions; production of air, soil and water pollution; and impacts on human health. This work comprises the most comprehensive study into pump-out boating practices in the United States to date, in which information obtained at local, state, national, and international levels is synthesized. This study aims to enable CVA programs to make informed recommendations for sustainable pump-out boating practices and identifies the challenges and opportunities that remain for the wide adoption of solar-electric pump-out boat technology.

Keywords: pump-out boat, marine water, solar-electric, zero emissions

Procedia PDF Downloads 114
5004 Open Distance Learning and Curriculum Transformation: Linkages, Alignment, and Innovation

Authors: Devanandan Govender

Abstract:

Curriculum design and development in higher education is a complex and challenging process. Amongst others, the extent to which higher education curriculum responds to a country's imperatives, industry requirements, and societal demands are some important considerations. Added to this is the whole notion of sustainable development, climate change and in the South African context the issue of ‘Africanising the curriculum’ is also significant. In this paper, the author describes and analyses the various challenges related to curriculum transformation, design and development within an ODL context and how we at Unisa engage and address curriculum transformation in mainstream curriculum design and development both at course design level and programme/ qualification level.

Keywords: curriculum transformation, curriculum creep, curriculum drift, curriculum mapping

Procedia PDF Downloads 359
5003 Numerical Simulation and Laboratory Tests for Rebar Detection in Reinforced Concrete Structures using Ground Penetrating Radar

Authors: Maha Al-Soudani, Gilles Klysz, Jean-Paul Balayssac

Abstract:

The aim of this paper is to use Ground Penetrating Radar (GPR) as a non-destructive testing (NDT) method to increase its accuracy in recognizing the geometric reinforced concrete structures and in particular, the position of steel bars. This definition will help the managers to assess the state of their structures on the one hand vis-a-vis security constraints and secondly to quantify the need for maintenance and repair. Several configurations of acquisition and processing of the simulated signal were tested to propose and develop an appropriate imaging algorithm in the propagation medium to locate accurately the rebar. A subsequent experimental validation was used by testing the imaging algorithm on real reinforced concrete structures. The results indicate that, this algorithm is capable of estimating the reinforcing steel bar position to within (0-1) mm.

Keywords: GPR, NDT, Reinforced concrete structures, Rebar location.

Procedia PDF Downloads 488
5002 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 431
5001 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience

Authors: Ayomide Oyedele

Abstract:

In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.

Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses

Procedia PDF Downloads 57
5000 Exploitation Pattern of Atlantic Bonito in West African Waters: Case Study of the Bonito Stock in Senegalese Waters

Authors: Ousmane Sarr

Abstract:

The Senegalese coasts have high productivity of fishery resources due to the frequency of intense up-welling system that occurs along its coast, caused by the maritime trade winds making its waters nutrients rich. Fishing plays a primordial role in Senegal's socioeconomic plans and food security. However, a global diagnosis of the Senegalese maritime fishing sector has highlighted the challenges this sector encounters. Among these concerns, some significant stocks, a priority target for artisanal fishing, need further assessment. If no efforts are made in this direction, most stock will be overexploited or even in decline. It is in this context that this research was initiated. This investigation aimed to apply a multi-modal approach (LBB, Catch-only-based CMSY model and its most recent version (CMSY++); JABBA, and JABBA-Select) to assess the stock of Atlantic bonito, Sarda sarda (Bloch, 1793) in the Senegalese Exclusive Economic Zone (SEEZ). Available catch, effort, and size data from Atlantic bonito over 15 years (2004-2018) were used to calculate the nominal and standardized CPUE, size-frequency distribution, and length at retentions (50 % and 95 % selectivity) of the species. These relevant results were employed as input parameters for stock assessment models mentioned above to define the stock status of this species in this region of the Atlantic Ocean. The LBB model indicated an Atlantic bonito healthy stock status with B/BMSY values ranging from 1.3 to 1.6 and B/B0 values varying from 0.47 to 0.61 of the main scenarios performed (BON_AFG_CL, BON_GN_Length, and BON_PS_Length). The results estimated by LBB are consistent with those obtained by CMSY. The CMSY model results demonstrate that the SEEZ Atlantic bonito stock is in a sound condition in the final year of the main scenarios analyzed (BON, BON-bt, BON-GN-bt, and BON-PS-bt) with sustainable relative stock biomass (B2018/BMSY = 1.13 to 1.3) and fishing pressure levels (F2018/FMSY= 0.52 to 1.43). The B/BMSY and F/FMSY results for the JABBA model ranged between 2.01 to 2.14 and 0.47 to 0.33, respectively. In contrast, The estimated B/BMSY and F/FMSY for JABBA-Select ranged from 1.91 to 1.92 and 0.52 to 0.54. The Kobe plots results of the base case scenarios ranged from 75% to 89% probability in the green area, indicating sustainable fishing pressure and an Atlantic bonito healthy stock size capable of producing high yields close to the MSY. Based on the stock assessment results, this study highlighted scientific advice for temporary management measures. This study suggests an improvement of the selectivity parameters of longlines and purse seines and a temporary prohibition of the use of sleeping nets in the fishery for the Atlantic bonito stock in the SEEZ based on the results of the length-base models. Although these actions are temporary, they can be essential to reduce or avoid intense pressure on the Atlantic bonito stock in the SEEZ. However, it is necessary to establish harvest control rules to provide coherent and solid scientific information that leads to appropriate decision-making for rational and sustainable exploitation of Atlantic bonito in the SEEZ and the Eastern Atlantic Ocean.

Keywords: multi-model approach, stock assessment, atlantic bonito, SEEZ

Procedia PDF Downloads 50
4999 Inclusive Education in Early Childhood Settings: Fostering a Diverse Learning Environment

Authors: Rodrique Watong Tchounkeu

Abstract:

This paper investigated the implementation and impact of inclusive education practices in early childhood settings (ages 3-6) with the overarching aim of fostering a diverse learning environment. The primary objectives were to assess the then-current state of inclusive practices, identify effective methodologies for accommodating diverse learning needs, and evaluate the outcomes of implementing inclusive education in early childhood settings. To achieve these objectives, a mixed-methods approach was employed, combining qualitative interviews with early childhood educators and parents, along with quantitative surveys distributed to a diverse sample of participants. The qualitative phase involved semi-structured interviews with 30 educators and 50 parents, selected through purposive sampling. The interviews aimed to gather insights into the challenges faced in implementing inclusive education, the strategies employed, and the perceived benefits and drawbacks. The quantitative phase included surveys administered to 300 early childhood educators across various settings, measuring their familiarity with inclusive practices, their perceived efficacy, and their willingness to adapt teaching methods. The results revealed a significant gap between the theoretical understanding and practical implementation of inclusive education in early childhood settings. While educators demonstrated a high level of theoretical knowledge, they faced challenges in effectively translating these concepts into practice. Parental perspectives highlighted the importance of collaboration between educators and parents in supporting inclusive education. The surveys indicated a positive correlation between educators' familiarity with inclusive practices and their willingness to adapt teaching methods, emphasizing the need for targeted professional development. The implications of this study suggested the necessity for comprehensive training programs for early childhood educators focused on the practical implementation of inclusive education strategies. Additionally, fostering stronger partnerships between educators and parents was crucial for creating a supportive learning environment for all children. By addressing these findings, this research contributed to the advancement of inclusive education practices in early childhood settings, ultimately leading to more inclusive and effective learning environments for diverse groups of young learners.

Keywords: inclusive education, early childhood settings, diverse learning, young learners, practical implementation, parental collaboration

Procedia PDF Downloads 53
4998 The Role of Journalism in Society, Informing, Educating, and Holding Power Accountable within the Yaoundé Region of Cameroon

Authors: Ita Noh Nkwain

Abstract:

Journalism plays a critical role in today's society by providing accurate and reliable information to the public. Through various mediums such as print, television, and online news outlets, journalists inform and educate the public on important issues and events happening around the world. Additionally, journalism serves as a watchdog by holding those in power accountable for their actions and decisions. However, with the rise of social media and the decline of traditional news sources, the future of journalism is uncertain. Despite these challenges, the importance of quality journalism cannot be overstated in a world where information is readily available but not always trustworthy.

Keywords: journalism, accountability, education, television, public

Procedia PDF Downloads 24
4997 The Role of Journalism in Society, Informing, Educating, and Holding Power Accountable within the Yaoundé Region of Cameroon

Authors: Ita Noh Nkwain

Abstract:

Journalism plays a critical role in today's society by providing accurate and reliable information to the public. Through various mediums such as print, television, and online news outlets, journalists inform and educate the public on important issues and events happening around the world. Additionally, journalism serves as a watchdog by holding those in power accountable for their actions and decisions. However, with the rise of social media and the decline of traditional news sources, the future of journalism is uncertain. Despite these challenges, the importance of quality journalism cannot be overstated in a world where information is readily available but not always trustworthy.

Keywords: Journalism, accountability, education, television, public

Procedia PDF Downloads 21
4996 Exploration and Reform of Fundamentals of Program Design Based on Application Ability

Authors: Jiaqi Yin, Baofeng Liang

Abstract:

The rapid development in the fields of computer science and information technology presents new challenges and opportunities for foundational programming education. Traditional programming courses often focus heavily on theoretical knowledge while neglecting students’ practical programming and problem-solving abilities. This paper delves into the significance of programming education based on application abilities and provides a detailed explanation of a reform approach that incorporates project-driven teaching to nurture students with more comprehensive computer science skills.

Keywords: fundamentals of programming, application abilities, pedagogical reform, program design

Procedia PDF Downloads 50
4995 Effects of Reversible Watermarking on Iris Recognition Performance

Authors: Andrew Lock, Alastair Allen

Abstract:

Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.

Keywords: biometrics, iris recognition, reversible watermarking, vision engineering

Procedia PDF Downloads 437
4994 Challenging Shariah-Compliant Contract: A Latest Insight into the Malaysian Court Cases

Authors: Noor Suhaida Kasri

Abstract:

In the last three decades, Malaysia has developed fundamental legal and regulatory structures that aim to accommodate and facilitate the growth of Islamic banking and finance industry. Important building blocks have been put in place, to cite a few, the elevation of the position of the Malaysian Central Bank Shariah Advisory Council (SAC) as the apex advisory body and the empowerment of their Shariah resolutions through the Central Bank Act 1958; the promulgation of the Islamic Financial Services Act 2013 that regulate and govern Islamic finance market with a robust statutory requirement of Shariah governance and Shariah compliance. Notwithstanding these achievements, enforceability of Shariah-compliant contract remains a contentious subject. The validity of Al Bai Bithaman Ajil concept that was commonly used by the Islamic financial institutions in their financing facilities structures and documentation has been unabatedly challenged by the customers in courts. The challenge was due to the manner in which the Al Bai Bithaman Ajil transactions were carried out. Due to this legal challenge, Al Bai Bithaman Ajil financing structure seems to no longer be the practitioners’ favourite in Malaysia, though its substitute tawarruq and commodity murabahah financing structure may potentially face similar legal challenges. This paper examines the legal challenges affecting the enforceability of these underlying Shariah contracts. The examination of these cases highlights the manner in which these contracts were being implemented and applied by the Malaysian Islamic financial institutions that triggered Shariah and legal concern. The analysis also highlights the approach adopted by the Malaysian courts in determining the Shariah issues as well as the SAC in ascertaining the rulings on the Shariah issues referred to it by the courts. The paper adopts a qualitative research methodology by using textual and documentary analysis approach. The outcome of this study underlines factors that require consideration by industry stakeholder in order to ameliorate the efficacy of the existing building blocks that would eventually strengthens the validity and enforceability of Shariah-compliant contracts. This, in the long run, will further reinforce financial stability and trust into the Islamic banking and finance industry in Malaysia.

Keywords: enforceability of Shariah compliant contract, legal challenge, legal and regulatory framework, Shariah Advisory Council

Procedia PDF Downloads 222
4993 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa

Authors: Saska Alexandria Hayes

Abstract:

Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.

Keywords: domestic policy, immigration, migration, New Zealand

Procedia PDF Downloads 79
4992 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 358
4991 The Role of Palestinian Women in Peacebuilding

Authors: Muhammad Abu Sadah

Abstract:

This paper is focused on women engagement in peacebuilding efforts with Israeli counterparts. It defines ‘ the role of Palestinian women in peacebuilders’ in its general term. The necessity of this role, analyze the scope of peacebuilding efforts in the context of the ongoing Palestinian-Israeli conflict. The paper examine the role of women on respond to conflict mitigation to accelerate peacebuilding. The study tend to examine the impact of women empowerment of the continuously changing circumstances and ongoing challenges.

Keywords: peacebuilding, palestinian, Israeli, women empowerment, conflict mitigation, counter extremism

Procedia PDF Downloads 99
4990 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 158
4989 Enhancing the Quality of Silage Bales Produced by a Commercial Scale Silage Producer in Northern province, Sri Lanka: A Step Toward Supporting Smallholder Dairy Farmers in the Northern Province Sri Lanka

Authors: Harithas Aruchchunan

Abstract:

Silage production is an essential aspect of dairy farming, used to provide high-quality feed to ruminants. However, dairy farmers in Northern Province Sri Lanka are facing multiple challenges that compromise the quality and quantity of silage produced. To tackle these challenges, promoting silage feeding has become an essential component of sustainable dairy farming practices. In this study, silage bale samples were collected from a newly started silage baling factory in Jaffna, Northern province and their quality was analysed at the Veterinary Research Institute laboratory in Kandy in March 2023. The results show the nutritional composition of three Napier grass cultivars: Super Napier, CO6, and Indian Red Napier (BH18). The main parameters analysed were dry matter, pH, lactic acid, soluble carbohydrate, ammonia nitrogen, ash, crude protein, NDF, and ADF. The results indicate that Super Napier and CO6 have higher crude protein content and lower ADF levels, making them suitable for producing high-quality silage. The pH levels of all three cultivars were safe, and the ammonia nitrogen levels were considered appropriate. However, laboratory results indicate that the quality of silage bales produced can be further enhanced. Dairy farmers should be encouraged to adopt these cultivars to achieve better yields as they are high in protein and are better suited to Northern Province's soil and climate. Therefore, it is vital to educate small-scale fodder producers, who supply the raw material to silage factories, on the best practices of cultivating these new cultivars. To improve silage bale production and quality in Northern Province Sri Lanka, we recommend increasing public awareness about silage feeding, providing education and training to dairy farmers and small-scale fodder producers on modern silage production techniques and improving the availability of raw materials for silage production. Additionally, Napier grass cultivars need to be promoted among dairy farmers for better production and quality of silage bales. Failing to improve the quality and quantity of silage bale production could not only lead to the decline of dairy farming in Northern Province Sri Lanka but also the negative impact on the economy

Keywords: silage bales, dairy farming, economic crisis, Sri Lanka

Procedia PDF Downloads 69
4988 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 316
4987 Smart Construction Sites in KSA: Challenges and Prospects

Authors: Ahmad Mohammad Sharqi, Mohamed Hechmi El Ouni, Saleh Alsulamy

Abstract:

Due to the emerging technologies revolution worldwide, the need to exploit and employ innovative technologies for other functions and purposes in different aspects has become a remarkable matter. Saudi Arabia is considered one of the most powerful economic countries in the world, where the construction sector participates effectively in its economy. Thus, the construction sector in KSA should convoy the rapid digital revolution and transformation and implement smart devices on sites. A Smart Construction Site (SCS) includes smart devices, artificial intelligence, the internet of things, augmented reality, building information modeling, geographical information systems, and cloud information. This paper aims to study the level of implementation of SCS in KSA, analyze the obstacles and challenges of adopting SCS and find out critical success factors for its implementation. A survey of close-ended questions (scale and multi-choices) has been conducted on professionals in the construction sector of Saudi Arabia. A total number of twenty-nine questions has been prepared for respondents. Twenty-four scale questions were established, and those questions were categorized into several themes: quality, scheduling, cost, occupational safety and health, technologies and applications, and general perception. Consequently, the 5-point Likert scale tool (very low to very high) was adopted for this survey. In addition, five close-ended questions with multi-choice types have also been prepared; these questions have been derived from a previous study implemented in the United Kingdom (UK) and the Dominic Republic (DR), these questions have been rearranged and organized to fit the structured survey in order to place the Kingdom of Saudi Arabia in comparison with the United Kingdom (UK) as well as the Dominican Republic (DR). A total number of one hundred respondents have participated in this survey from all regions of the Kingdom of Saudi Arabia: southern, central, western, eastern, and northern regions. The drivers, obstacles, and success factors for implementing smart devices and technologies in KSA’s construction sector have been investigated and analyzed. Besides, it has been concluded that KSA is on the right path toward adopting smart construction sites with attractive results comparable to and even better than the UK in some factors.

Keywords: artificial intelligence, construction projects management, internet of things, smart construction sites, smart devices

Procedia PDF Downloads 131
4986 Formal History Teaching and Lifeworld Literacies: Developing Transversal Skills as an Embodied Learning Outcomes in Historical Research Projects

Authors: Paul Flynn, Luke O’Donnell

Abstract:

There is a pressing societal need for educators in formal and non-formal settings to develop pedagogical frameworks, programmes, and interventions that support the development of transversal skills for life beyond the classroom. These skills include communication, collaboration, interpersonal relationship building, problem-solving, and planning, and organizational skills; or lifeworld literacies encountered first hand. This is particularly true for young people aged between 15-18. This demographic represents both the future of society and those best positioned to take advantage of well-designed, structured educational supports within and across formal and non-formal settings. Secondary school history has been identified as an appropriate area of study which deftly develops many of those transversal skills so crucial to positive societal engagement. However, in the formal context, students often challenge history’s relevance to their own lived experience and dismiss it as a study option. In response to such challenges, teachers will often design stimulating lessons which are often well-received. That said, some students continue to question modern-day connections, presenting a persistent and pervasive classroom distraction. The continuing decline in numbers opting to study second-level history indicates an erosion of what should be a critical opportunity to develop all-important lifeworld literacies within formal education. In contrast, students readily acknowledge relevance in non-formal settings where many participants meaningfully engage with history by way of student-focused activities. Furthermore, many do so without predesigned pedagogical aids which support transversal skills development as embodied learning outcomes. As this paper will present, there is a dearth of work pertaining to the circular subject of history and its embodied learning outcomes, including lifeworld literacies, in formal and non-formal settings. While frequently challenging to reconcile formal (often defined by strict curricula and examination processes), and non-formal engagement with history, opportunities do exist. In the Irish context, this is exemplified by a popular university outreach programme: breaking the SEAL. This programme supports second-level history students as they fulfill curriculum requirements in completing a research study report. This report is a student-led research project pulling on communication skills, collaboration with peers and teachers, interpersonal relationships, problem-solving, and planning and organizational skills. Completion of this process has been widely recognized as excellent preparation not only for higher education (third level) but work-life demands as well. Within a formal education setting, the RSR harnesses non-formal learning virtues and exposes students to limited aspects of independent learning that relate to a professional work setting –a lifeworld literacy. Breaking the SEAL provides opportunities for students to enhance their lifeworld literacy by engaging in an independent research and learning process within the protective security of the classroom and its teacher. This paper will highlight the critical role this programme plays in preparing participating students (n=315) for life after compulsory education and presents examples of how lifeworld literacies may be developed through a scaffolded process of historical research and reporting anchored in non-formal contexts.

Keywords: history, education, literacy, transversal skills

Procedia PDF Downloads 146
4985 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 467
4984 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server

Authors: Ahmed Khattab, Bassem Shetta

Abstract:

Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.

Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay

Procedia PDF Downloads 246
4983 European Countries Challenge’s in Value Added Tax

Authors: Fatbardha Kadiu, Nulifer Caliskan

Abstract:

The value added tax came as a necessity of substituting the old tax on sales. Based on the advantages of this new tax in our days it is used successfully in more than 140 countries around the world. The aim of the paper is to describe the nature of this tax with its advantages and disadvantages. Also it will describe the way how it functions in most of the European countries and the actual challenges of these countries on value added tax. It will be present the types of goods which are exempt from this tax, the reasons and the consequences of those exemptions. The paper will be based on secondary data taken from respective literature. An econometric model will be present in order to identify the dependence of value tax from other parameters. The analyzing most refers to the two main principles of harmonization and billing on the fiscal system and the ways how to restructures the system in order to minimize the fiscal evasion.

Keywords: value added tax, revenues, complexity, legal uncertainty

Procedia PDF Downloads 383