Search results for: conflict detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4245

Search results for: conflict detection

4125 Hausa Home Videos: A Template for Global Peace

Authors: Ibrahim Uba Yusuf

Abstract:

Conflict is a subject or, better put, theme that primarily dominates Hausa home videos. Conflict in Hausa home videos is one of the sources of attraction to viewers, but do such films achieve anything? The Hausa home video industry in Northern Nigeria, popularly called Kannywood has been making attempts by producing cultural products for consumption within and outside the country. The ability of the industry to connect issues of concern within the region is an effort to reckon with. This paper, therefore, examines how Hausa home videos on peacebuilding can serve as a template for peacebuilding. This is coming at a time when global attention to peacebuilding is increasing. The inclusion of peacebuilding as SDG Goal suggests the need for utilizing other approaches that can enhance peace in risk societies like Nigeria. The paper based its arguments using the key proponents of the auteur theory—the director’s bias, thoughts, and sense of reasoning shape the issues emphasized in the home videos. The paper argues that Hausa home video industry is one medium amongst the many producing discourse about peacebuilding, conflict, and justice, social cohesion, education, and understanding, as well as raising social consciousness on issues of public concern. It is the conclusion of the paper that Hausa home videos produced on sustaining peacebuilding in Northern Nigeria are cultural products that have become lenses to understanding the interplay between representations or portrayal of conflict and peaceful resolutions of the conflicting issues.

Keywords: hausa home videos, peacebuilding, conflict, northern Nigeria

Procedia PDF Downloads 76
4124 Brief Solution-Focused Negotiation: Theory and Application

Authors: Sapir Handelman

Abstract:

Brief Solution Focused Negotiation is a powerful conflict resolution tool. It can be applied in almost all dimensions of our social life, from politics to family. The initiative invites disputing parties to negotiate practical solutions to their conflict. The negotiation is conducted in a framework of rules, structure, and timeline. The paper presents a model of Brief Solution Focused Negotiation that rests on three pillars: Transformation – turning opposing parties into a negotiating cooperative; Practicality – focusing on practical solutions to a negotiable problem; Discovery – discovering key game changers. This paper introduces these three building blocks. It demonstrates the potential contribution of each one of them to negotiation success. It shows that an effective combination of these three elements has the greatest potential to build, maintain and successfully conclude Brief Solution Focused Negotiation.

Keywords: conflict, negotiation, negotiating cooperative, game changer

Procedia PDF Downloads 57
4123 Resolving Partisan Conflict: A Dialectical Approach

Authors: Michael F. Mascolo

Abstract:

Western democratic traditions are being strained. Western nations are losing the common agonistic ground needed to engage in traditional forms of democracy – adversarial debate, voting, and the peaceful transfer of power. Political polarization among party elites has become commonplace. Because it seeks to resolve conflict through the integration of opposites, a dialectical approach to resolving partisan conflict offers the promise of helping political partisans bridge ideological divides. This paper contains an analysis of dialectical engagement as a collaborative alternative to adversarial politics. Dialectical engagement involves two broad phases: collaborative political problem-solving and dialectical problem-solving. The paper contains a description of an 18-month longitudinal study assessing the effectiveness of dialectical engagement as a method for bridging divides on contentious socio-political issues. The study shows how dialectical engagement produced dramatic consensus among a small group of individuals from different political orientations as they worked together to resolve the issue of capital punishment.

Keywords: collaborative democracy, dialectical thinking, capital punishment, partisan conflict

Procedia PDF Downloads 46
4122 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges

Authors: M. Kowalski, M. Kastek, M. Szustakowski

Abstract:

Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertz

Keywords: terahertz, infrared, object detection, screening camera, image processing

Procedia PDF Downloads 326
4121 Traditional Mechanisms of Conflict Resolution in Africa: A Pathway to Sustainable Peace in Nigeria

Authors: Ejovi Eghwubare Augustine

Abstract:

This study delved into the traditional mechanisms of conflict resolution in Africa, a pathway to sustainable peace in Nigeria. It deployed the quantitative and qualitative methods of data collection and content analysis. The work adopted the Peace Process theory propounded by John Darby and Roger Macunity. It ascertained that disputes or disagreements are unarguably and necessarily an inevitable part of human existence, flowing directly from communication, interaction, and relationships which can occur at individual and national levels, even at international levels in view of the current trend of globalization. The alternative Dispute Resolution (ADR) mechanism is a basket of procedures outside the traditional process of litigation or strict determination of legal rights. It may also be elucidated as a range of procedures that serve as generally involve the intercession and assistance of a neutral and impartial third party. The traditional mechanisms of conflict resolution in Africa are alien to the Western world; this paper is of utmost importance to the Western world and also enriched their pool of literature. Nigeria is a country that is dominated by various ethnic groups anchored on diverse cultures, customs, and traditions. It is, therefore, not surprising to see conflicts arise, and despite the various attempts at resolving these conflicts through litigation, they still remained unabated. The paper investigated the lessons learned from Traditional Mechanisms of Conflict resolution; it also interrogated its impact and the way forward. In light of the lessons that were learned and the impact of the traditional mechanisms of conflict resolution, suggestions on how to attain a sustainable, peaceful society were proffered. In conclusion, the study crystallized reforms on the alternative dispute resolution introduced through the traditional mechanism, which includes, amongst others, that constitutional recognition should be given to traditional institutions of conflict resolution to enable quick dispensation of matters.

Keywords: traditional, conflict, peace, resolution

Procedia PDF Downloads 41
4120 Reinforcement of Local Law into Government Policy to Address Conflict of Utilization of Sea among Small Fishermen

Authors: Ema Septaria, Muhammad Yamani, N. S. B. Ambarini

Abstract:

The problem begins with the imposition of fine penalties by Ipuh small fishermen for customary fishing vessels encroaching catchment area in the Ipuh, a village in Muko-Muko, Bengkulu, Indonesia. Two main reasons for that are fishermen from out of Ipuh came and fished in Ipuh water using trawl as the gear and the number of fish decrease time by time as a result of irresponsible fishing practice. Such conflict has lasted since long ago. Indonesia Governing laws do not rule the utilization of sea territory by small fishermen that when the conflict appears there is a rechtvacuum on how to solve the conflict and this leads to a chaos in society. In Ipuh itself, there has been a local law in fisheries which they still adhere up to present because they believe holding to the law will keep the fish sustain. This is an empirical legal research with socio legal approach. The results of this study show even though laws do not regulate in detail about the utilization of sea territory by small fishermen, there is an article in Fisheries Act stating fisheries activity has to put attention to local law and community participation. Furthermore, constitution governs that the land, the waters and the natural resources within shall be under the powers of the State and shall be used to the greatest benefit of the people. With the power, Government has to make a policy that reinforces what has been ruled in Ipuh local law. Besides, Bengkulu Governor has to involve Ipuh community directly in managing their fisheries to ensure the fisheries sustainability therein.

Keywords: local law, reinforcement, conflict, sea utilization, small fishermen

Procedia PDF Downloads 288
4119 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 387
4118 Use of Structural Family Therapy and Dialectical Behavior Therapy with High-Conflict Couples

Authors: Eman Tadros, Natasha Finney

Abstract:

The following case study involving a high-conflict, Children’s Services Bureau (CSB) referred couple is analyzed and reviewed through an integrated lens of structural family therapy and dialectical behavior therapy. In structural family therapy, normal family development is not characterized by a lack of problems, but instead by families’ having developed a functional structure for dealing with their problems. Whereas, in dialectical behavioral therapy normal family development can be characterized by having a supportive and validating environment, where all family members feel a sense of acceptance and validation for who they are and where they are in life. The clinical case conceptualization highlights the importance of conceptualizing how change occurs within a therapeutic setting. In the current case study, the couple did not only experience high-conflict, but there were also issues of substance use, health issues, and other complicating factors. Clinicians should view their clients holistically and tailor their treatment to fit their unique needs. In this framework, change occurs within the family unit, by accepting each member as they are, while at the same time working together to change maladaptive familial structures.

Keywords: couples, dialectical behavior therapy, high-conflict, structural family therapy

Procedia PDF Downloads 312
4117 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 135
4116 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 188
4115 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 435
4114 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 446
4113 Exploring Teachers’ Professional Identity in the Context of the Current Political Conflict in Palestine

Authors: Bihan Qaimari

Abstract:

In many areas of the world there are political conflicts the consequences of which have an inevitable impact on the educational system. Palestine is one such country where the experience of political conflict, going back over many years, has had a devastating effect on the development and maintenance of a stable educational environment for children and their teachers. Up to now there have been few studies that have focussed on the effects of living and working in a war zone on the professional identity of teachers. The aim of this study is to explore how the formation of Palestinian teachers’ professional identity is affected by their experience of the current political conflict its impact on the school social culture. In order to gain an in-depth understanding of the impact of political violence on the formation of the professional identity of Palestinian teachers, a qualitative multiple case-study approach was adopted which draws on sociocultural theories of identity formation. An initial study was first conducted in six schools and this was followed by an in-depth study of teachers working in three further primary schools. Data sources included participant observation, a research diary, semi-structured group and individual interviews. Grounded theory, constant-comparative methods, and discourse analysis procedures were used to interpret the data. The findings suggest that the Palestinian primary school teachers negotiate multiple conflicting identities through their every day experiences of political conflict and the schools’ social culture. This tension is formed as a result of the historical cultural meaning that teachers construct about themselves and within the current unstable and unsettling conditions that exist in their country. In addition, the data indicate that the geographical location of the schools in relation of their proximity to the events of the political conflict also had an influence on the degree of tension inherent in teachers’ professional identity. The study makes significant theoretical, practical, and methodical contributions to the study of the formation of teachers’ professional identity in countries affected by political conflict.

Keywords: identity, political conflict, Palestine, teacher's professional identity

Procedia PDF Downloads 378
4112 Using Kalosara Tradition for Conflict Resolution in Tolaki's People, Southeast Sulawesi

Authors: S. S. Ramis Rauf

Abstract:

This study will be explained the role of local wisdom in Tolakinese customary law on customs offense. The scope of this study was the informants who have a conflict located in Southeast Sulawesi. Then, their conflicts were resolved by using Kalosara tradition. The method of this study was a qualitative research by applying the techniques of deep interviews, revealing experiences and stories from informants, interviews customary leaders who are skilled and experienced in the customary settlement process of Kalosara tradition. Kalosara, as Tolakinese local wisdom, has contained in Tolakinese customary law. Kalosara was the application of customary law which was guided by Tolaki’s people when there was a problem. Knowledge and understanding of the customs have been conceived as something that comes from the ancestors. They created custom rules based on the law of Allah SWT for the elderly to do with full of awareness. Then, it was hereditary obeying by their children from generation to generation. The conflict occurred because of several things, namely bad words, aspersion, and other violations (such as harassment and affair). In custom settlement process, kalosara was done by using the enforcement of Tolakinese customary law that managed within an institution. It was called as Sara Wonua. It led by someone who was called as Pu'utobu that serves as a customary leader.

Keywords: kalosara, conflict resolution, tradition, unity, diversity

Procedia PDF Downloads 177
4111 Crater Detection Using PCA from Captured CMOS Camera Data

Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata

Abstract:

We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.

Keywords: crater detection, PCA, FPGA, image processing

Procedia PDF Downloads 517
4110 On-Road Text Detection Platform for Driver Assistance Systems

Authors: Guezouli Larbi, Belkacem Soundes

Abstract:

The automation of the text detection process can help the human in his driving task. Its application can be very useful to help drivers to have more information about their environment by facilitating the reading of road signs such as directional signs, events, stores, etc. In this paper, a system consisting of two stages has been proposed. In the first one, we used pseudo-Zernike moments to pinpoint areas of the image that may contain text. The architecture of this part is based on three main steps, region of interest (ROI) detection, text localization, and non-text region filtering. Then, in the second step, we present a convolutional neural network architecture (On-Road Text Detection Network - ORTDN) which is considered a classification phase. The results show that the proposed framework achieved ≈ 35 fps and an mAP of ≈ 90%, thus a low computational time with competitive accuracy.

Keywords: text detection, CNN, PZM, deep learning

Procedia PDF Downloads 57
4109 The Relationship of Employee’s Job Satisfaction and Job Performance in Service Sector in Bangkok

Authors: Vithaya Intaraphimol

Abstract:

This study investigates the relationship between employee’s job satisfaction and job performance of hotel’s employees in five-star hotels in Bangkok. This study used self-administration data collection from a sample of 400 employees of five-star hotels in Bangkok. The results indicated that there was a relationship between job satisfaction and job performance. In addition, dysfunctional conflict was related negatively to job satisfaction; meanwhile, functional conflict was related positively to job satisfaction. Moreover, there was a positive relationship between integrating, obliging, avoiding and compromising style and job satisfaction; however; dominating style had a negative relationship with job satisfaction and proved that job satisfaction tend to increase the positive emotion on job satisfaction in the service setting, consequently, employee has ability to deal with problems with more effectively and predictor of job satisfaction due to employee who satisfied with the job seems to remain in the organization and appearing to gain rewarding beneficial.

Keywords: conflict management, job satisfaction, job performance, service sector

Procedia PDF Downloads 247
4108 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 263
4107 Authenticity during Conflict Reporting: The China-India Border Clash in the Indian Press

Authors: Arjun Chatterjee

Abstract:

The India-China border clash in Galwan valley in June 2020, the first deadly skirmish between the two Asian giants in the Himalayan border area in over four decades, highlighted the need to examine the notion of ‘authenticity’ in journalistic practices. Information emanating from such remotely located, sparsely populated, and not well-demarcated international land borders have limited sources, restricted to official sources, which have their own narrative. Geopolitical goals and ambitions embolden narratives of nationalism in the media, and these often challenge the notion and understanding of authenticity in journalism. The Indian press, contrary to the Chinese press, which is state-owned, is diverse and also confrontational, where narratives of nationalism are differentially interpreted, embedded, and realised. This paper examines how authenticity has become a variable, rather than a constant, in conflict reporting of the Sino-Indian border clash and how authenticity is interpreted similarly or differently in conflict journalism. The paper reports qualitative textual analysis of two leading English language newspapers – The Times of India and The Hindu, and two mainstream regional language newspapers, Amar Ujala (Hindi) and Ananda Bazar Patrika (Bengali), to evaluate the ways in which representations of information function in conflict reporting and to recontextualize (and thus change or modify the meaning of) that which they represent, and with what political and cultural implications.

Keywords: India-China, framing, conflict, media narratives, border dispute

Procedia PDF Downloads 63
4106 A Paper Based Sensor for Mercury Ion Detection

Authors: Emine G. Cansu Ergun

Abstract:

Conjugated system based sensors for selective detection of metal ions have been taking attention during last two decades. Fluorescent sensors are the promising candidates for ion detection due to their high selectivity towards metal ions, and rapid response times. Detection of mercury in an environmenet is important since mercury is a toxic element for human. Beyond the maximum allowable limit, mercury may cause serious problems in human health by spreading into the atmosphere, water and the food chain. In this study, a quinoxaline and 3,4-ethylenedioxy thiophene based donor-acceptor-donor type conjugated molecule used as a fluorescent sensor for detecting the mercury ion in aqueous medium. Among other various cations, existence of mercury resulted in a full quenching of the fluorescence signal. Then, a paper based sensor is constructed and used for mercury detection. As a result it is concluded that the offering sensor is a good candidate for selective mercury detection in aqueous media both in solution and paper based forms.

Keywords: Conjugated molecules , fluorescence quenching, metal ion detection , sensors

Procedia PDF Downloads 129
4105 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 110
4104 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 374
4103 Gender and Work-Family Conflict Gaps in Hong Kong: The Impact of Family-Friendly Policies

Authors: Lina Vyas

Abstract:

Gender gap, unfortunately, is still prevalent in the workplace around the world. In most countries, women are less likely than men to participate in the workplace. They earn considerably less than men for doing the same work and are generally expected to prioritize family obligations over work responsibilities. Women often face more conflicts while balancing the increasingly normalized roles of both worker and mother. True gender equality in the workplace is still a long way off. In Hong Kong, no less is this true. Despite the fact that female students are outnumbered by males at universities, only 55% of women are active participants in the labour market, and for those in the workforce, the gender pay gap is 22%. This structural inequality also exacerbates the issues of confronting biases at work for choosing to be employed as a mother, as well as reinforces the societal expectation of women to be the primary caregiver at home. These pressures are likely to add up for women and contribute to increased levels of work-life conflict, which may be a further barrier for the inclusion of women into the workplace. Family-friendly policies have long been thought to be an alleviator of work-life conflict through helping employees balance the demands in both work and family. Particularly, for women, this could be a facilitator of their integration into the workplace. However, little research has looked at how family-friendly policies may also have a gender differential in effect, as opposed to traditional notions of having universal efficacy. This study investigates both how and how much the gender dimension impacts work-family conflict. In addition to disentangling the reasons for gender gaps existing in work-life conflict for women, this study highlights what can be done at an organizational level to alleviate these conflicts. Most importantly, the policies recommendations derived from this study serve as an avenue for more active participation for women in the workplace and can be considered as a pathway for promoting greater gender egalitarianism and fairness in a traditionally gender-segregated society.

Keywords: family-friendly policies, Hong Kong, work-family conflict, workplace

Procedia PDF Downloads 136
4102 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 316
4101 Burnout Syndrome: A Study of Financial Professionals

Authors: Sara Santos, Maria João Santos

Abstract:

Thisarticleanalyzesthethemeofwork-family conflict and professional stress among financial workers and their relationships with burnout syndrome. This also studieshowthesocio demographicandworkingcharacteristicsoftheseprofessionalsinfluencetheirlevelsofburnout. Weadopted a mixedmethodbasedontheanalysisof 255 surveysand 24 interviewscarriedoutwith financial sector professionals. Thekeyresultsincludeverificationofhowtheseprofessionalsregister a positive relationshipbetweenwork-familyconflictandburnoutsyndrome as well as betweenprofessional stress andburnout. Thestudycontributes to a betterunderstandingoftheimpactsthatwork-familyconflictsandprofessional stress haveon financial professionalsandhowtheycontribute to thevariationsprevailingintheirrespectivelevelsofburnout.

Keywords: burnout syndrome, financial area, conflict, stres

Procedia PDF Downloads 164
4100 Music Note Detection and Dictionary Generation from Music Sheet Using Image Processing Techniques

Authors: Muhammad Ammar, Talha Ali, Abdul Basit, Bakhtawar Rajput, Zobia Sohail

Abstract:

Music note detection is an area of study for the past few years and has its own influence in music file generation from sheet music. We proposed a method to detect music notes on sheet music using basic thresholding and blob detection. Subsequently, we created a notes dictionary using a semi-supervised learning approach. After notes detection, for each test image, the new symbols are added to the dictionary. This makes the notes detection semi-automatic. The experiments are done on images from a dataset and also on the captured images. The developed approach showed almost 100% accuracy on the dataset images, whereas varying results have been seen on captured images.

Keywords: music note, sheet music, optical music recognition, blob detection, thresholding, dictionary generation

Procedia PDF Downloads 143
4099 Efficient Iterative V-BLAST Detection Technique in Wireless Communication System

Authors: Hwan-Jun Choi, Sung-Bok Choi, Hyoung-Kyu Song

Abstract:

Recently, among the MIMO-OFDM detection techniques, a lot of papers suggested V-BLAST scheme which can achieve high data rate. Therefore, the signal detection of MIMOOFDM system is important issue. In this paper, efficient iterative VBLAST detection technique is proposed in wireless communication system. The proposed scheme adjusts the number of candidate symbol and iterative scheme based on channel state. According to the simulation result, the proposed scheme has better BER performance than conventional schemes and similar BER performance of the QRD-M with iterative scheme. Moreover complexity of proposed scheme has 50.6 % less than complexity of QRD-M detection with iterative scheme. Therefore the proposed detection scheme can be efficiently used in wireless communication.

Keywords: MIMO-OFDM, V-BLAST, QR-decomposition, QRDM, DFE, iterative scheme, channel condition

Procedia PDF Downloads 504
4098 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 343
4097 Mosaic Augmentation: Insights and Limitations

Authors: Olivia A. Kjorlien, Maryam Asghari, Farshid Alizadeh-Shabdiz

Abstract:

The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case.

Keywords: accuracy, false positives, mosaic augmentation, object detection, YOLOV4, YOLOV4-Tiny

Procedia PDF Downloads 83
4096 Developing Alternatives: Citizens Perspectives on Causes and Ramification of Political Conflict in Ivory Coast from 2002 - 2009

Authors: Suaka Yaro

Abstract:

This article provides an alternative examination of the causes and the ramifications of the Ivorian political conflict from 2002 to 2009. The researcher employed a constructivist epistemology and qualitative study based upon fieldwork in different African cities interviewing Ivorians outside and within Ivory Coast. A purposive sampling of fourteen participants was selected. A purposive sampling was used to select fourteen respondents. The respondents were selected based on their involvement in Ivorian conflict. Their experiences on the causes and effects of the conflict were tapped for analysis. Qualitative methodology was used for the study. The data collection instruments were semi-structured interview questions, open-ended semi-structured questionnaire, and documentary analysis. The perceptions of these participants on the causes, effects and the possible solution to the endemic conflict in their homeland hold key perspectives that have hitherto been ignored in the whole debate about the Ivorian political conflict and its legacies. Finally, from the synthesized findings of the investigation, the researcher concluded that the analysed data revealed that the causes of the conflict were competition for scarce resources, bad governance, media incitement, xenophobia, incessant political power struggle and the proliferation of small firearms entering the country. The effects experienced during the conflict were the human rights violation, destruction of property including UN premises and displaced people both internally and externally. Some recommendations made include: Efforts should be made by the government to strengthen good relationship among different ethnic groups and help them adapt to new challenges that confront democratic developments in the country. The government should organise the South African style of Truth and Reconciliation Commission to revisit the horrors of the past in order to heal wounds and prevent future occurrence of the conflict. Employment opportunities and other income generating ventures for Ivorian should be created by the government by attracting local and foreign investors. The numerous rebels should be given special skills training in other for them to be able to live among the communities in Ivory Coast. Government of national unity should be encouraged in situation like this.

Keywords: displaced, federalism, pluralism, identity politics, grievance, eligibility, greed

Procedia PDF Downloads 198