Search results for: cyber space
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3834

Search results for: cyber space

3654 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 121
3653 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 109
3652 The Development of Space-Time and Space-Number Associations: The Role of Non-Symbolic vs. Symbolic Representations

Authors: Letizia Maria Drammis, Maria Antonella Brandimonte

Abstract:

The idea that people use space representations to think about time and number received support from several lines of research. However, how these representations develop in children and then shape space-time and space-number mappings is still a debated issue. In the present study, 40 children (20 pre-schoolers and 20 elementary-school children) performed 4 main tasks, which required the use of more concrete (non-symbolic) or more abstract (symbolic) space-time and space-number associations. In the non-symbolic conditions, children were required to order pictures of everyday-life events occurring in a specific temporal order (Temporal sequences) and of quantities varying in numerosity (Numerical sequences). In the symbolic conditions, they were asked to perform the typical time-to-position and number-to-position tasks by mapping time-related words and numbers onto lines. Results showed that children performed reliably better in the non-symbolic Time conditions than the symbolic Time conditions, independently of age, whereas only pre-schoolers performed worse in the Number-to-position task (symbolic) as compared to the Numerical sequence (non-symbolic) task. In addition, only older children mapped time-related words onto space following the typical left-right orientation, pre-schoolers’ performance being somewhat mixed. In contrast, mapping numbers onto space showed a clear left-right orientation, independently of age. Overall, these results indicate a cross-domain difference in the way younger and older children process time and number, with time-related tasks being more difficult than number-related tasks only when space-time tasks require symbolic representations.

Keywords: space-time associations, space-number associations, orientation, children

Procedia PDF Downloads 295
3651 Research on the Evolution of Public Space in Tourism-Oriented Traditional Rural Settlements

Authors: Yu Zhang, Mingxue Lang, Li Dong

Abstract:

The hundreds of years of slow succession of living environment in rural area is a crucial carrier of China’s long history of culture and national wisdom. In recent years, the space evolution of traditional rural settlements has been promoted by the intervention of tourism development, among which the public architecture and outdoor activity areas together served as the major places for villagers, and tourists’ social activities are an important characterization for settlement spatial evolution. Traditional public space upgrade and layout study of new public space can effectively promote the tourism industry development of traditional rural settlements. This article takes Qi County, one China Traditional Culture Village as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and Space Syntax, studies the evolution features of public space of tourism-oriented traditional rural settlements in four steps. First, acquire the 2003 and 2016 image data of Qi County, using the remote sensing application EDRAS8.6. Second, vectorize the basic maps of Qi County including its land use map with the application of ArcGIS 9.3 meanwhile, associating with architectural and site information concluded from field research. Third, analyze the accessibility and connectivity of the inner space of settlements using space syntax; run cross-correlation with the public space data of 2003 and 2016. Finally, summarize the evolution law of the public space of settlements; study the upgrade pattern of traditional public space and location plan for new public space. Major findings of this paper including: first, location layout of traditional public space has a larger association with the calculation results of space syntax and further confirmed the objective value of space syntax in expressing the space and social relations. Second, the intervention of tourism development generates remarkable impact on public space location of tradition rural settlements. Third, traditional public space produces the symbols of both strengthening and decline and forms a diversified upgrade pattern for the purpose of meeting the different tourism functional needs. Finally, space syntax provides an objective basis for location plan of new public space that meets the needs of tourism service. Tourism development has a significant impact on the evolution of public space of traditional rural settlements. Two types of public space, architecture, and site are both with changes seen from the perspective of quantity, location, dimension and function after the intervention of tourism development. Function upgrade of traditional public space and scientific layout of new public space are two important ways in achieving the goal of sustainable development of tourism-oriented traditional rural settlements.

Keywords: public space evolution, Qi county, space syntax, tourism oriented, traditional rural settlements

Procedia PDF Downloads 293
3650 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 157
3649 Kerr Electric-Optic Measurement of Electric Field and Space Charge Distribution in High Voltage Pulsed Transformer Oil

Authors: Hongda Guo, Wenxia Sima

Abstract:

Transformer oil is widely used in power systems because of its excellent insulation properties. The accurate measurement of electric field and space charge distribution in transformer oil under high voltage impulse has important theoretical and practical significance, but still remains challenging to date because of its low Kerr constant. In this study, the continuous electric field and space charge distribution over time between parallel-plate electrodes in high-voltage pulsed transformer oil based on the Kerr effect is directly measured using a linear array photoelectrical detector. Experimental results demonstrate the applicability and reliability of this method. This study provides a feasible approach to further study the space charge effects and breakdown mechanisms in transformer oil.

Keywords: electric field, Kerr, space charge, transformer oil

Procedia PDF Downloads 324
3648 Study on the Evaluation and Utilization of Space Renewal Potential under Bridge in Chongqing

Authors: Qin Xvelian

Abstract:

organic renewal" based on the development of existing resources in high-density urban areas has become the mainstream of urban development in the new era. As an important stock resource of public space in high-density urban areas, promoting its value remodeling is an effective way to alleviate the shortage of public space resources. However, due to the lack of evaluation links in the process of underpass space renewal, a large number of underpass space resources have been left idle, facing the problems of low space conversion efficiency, lack of accuracy in development decision-making, and low adaptability of functional positioning to citizens' needs. Therefore, it is of great practical significance to construct the evaluation system of under-bridge space renewal potential and explore the renewal mode. In this paper, some of the under-bridge spaces in the main urban area of Chongqing are selected as the research object. Through the questionnaire interviews with the users of the built excellent space under the bridge, three types of six levels and twenty-two potential evaluation indexes of "objective demand factor, construction feasibility factor and construction suitability factor" are selected, including six levels of land resources, infrastructure, accessibility, safety, space quality and ecological environment. The analytical hierarchy process and expert scoring method are used to determine the index weight, construct the potential evaluation system of the space under the bridge in high-density urban areas of Chongqing, and explore the direction of renewal and utilization of its suitability. To provide feasible theoretical basis and scientific decision support for the use of under bridge space in the future.

Keywords: high density urban area, potential evaluation, space under bridge, updated using

Procedia PDF Downloads 24
3647 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 21
3646 Youth Health Promotion Project for Indigenous People in Canada: Together against Bullying and Cyber-Dependence

Authors: Mohamed El Fares Djellatou, Fracoise Filion

Abstract:

The Ashukin program that means bridge in Naskapi or Atikamekw language, has been designed to offer a partnership between nursing students and an indigenous community. The students design a health promotion project tailored to the needs of the community. The issues of intimidation in primary school and cyber-dependence in high school were some concerns in a rural Atikamekw community. The goal of the project was to have a conversation with indigenous youths, aged 10-16 years old, on the challenges presented by intimidation and cyber dependence as well as promoting healthy relationships online and within the community. Methods: Multiple progressive inquiry questions (PIQs) were used to assess the feasibility and importance of this project for the Atikamekw nation, and to determine a plan to follow. The theoretical foundations to guide the conception of the project were the Population Health Promotion Model (PHPM), the First Nations Holistic Lifelong Learning Model, and the Medicine Wheel. A broad array of social determinants of health were addressed, including healthy childhood development, personal health practices, and coping skills, and education. The youths were encouraged to participate in interactive educational sessions, using PowerPoint presentations and pamphlets as the main effective strategies. Additional tools such as cultural artworks and physical activities were introduced to strengthen the inter-relational and team spirit within the Indigenous population. A quality assurance tool (QAT) was developed specifically to determine the appropriateness of these health promotion tools. Improvements were guided by the feedback issued by the indigenous schools’ teachers and social workers who filled the QATs. Post educational sessions, quantitative results have shown that 93.48% of primary school students were able to identify the different types of intimidation, 72.65% recognized more than two strategies, and 52.1% were able to list at least four resources to diffuse intimidation. On the other hand, around 75% of the adolescents were able to name at least three negative effects, and 50% listed three strategies to reduce cyber-dependence. This project was meant to create a bridge with the First Nation through health promotion, a population that is known to be disadvantaged due to systemic health inequity and disparities. Culturally safe care was proposed to deal with the two identified priority issues, and an educational toolkit was given to both schools to ensure the sustainability of the project. The project was self-financed through fundraising activities, and it yielded better results than expected.

Keywords: indigenous, first nation, bullying, cyber-dependence, internet addiction, intimidation, youth, adolescents, school, community nursing, health promotion

Procedia PDF Downloads 69
3645 Designing and Costing the Concept of Servicer Satellites That Can Be Used to De-Orbit Space Debris

Authors: Paras Adlakha

Abstract:

Today the major threat to our existing and future satellites is space debris; the collision of bodies like defunct satellites with any other objects in space, including the new age ASAT (anti-satellite) weaponry system, are the main causes of the increasing amount of space debris every year. After analyzing the current situation of space debris, low earth orbit is found to be having a large density of debris as compared to any other orbit range; that's why it is selected as the target orbit for space debris removal mission. In this paper, the complete data of 24000 debris is studied based on size, altitude, inclination, mass, number of existing satellites threaten by each debris from which the rocket bodies are the type of wreckage found to be most suited for removal. The optimal method of active debris removal using a robotic arm for capturing the body to attach a de-orbit kit is used to move the debris from its orbit without making the actual contact of servicer with the debris to reduce the further the threat of collision with defunct material. The major factors which are brought into consideration while designing the concept of debris removal are tumbling, removal of debris under a low-cost mission and decreasing the factor of collisions during the mission.

Keywords: de-orbit, debris, servicer, satellite, space junk

Procedia PDF Downloads 94
3644 Counting People Utilizing Space-Time Imagery

Authors: Ahmed Elmarhomy, K. Terada

Abstract:

An automated method for counting passerby has been proposed using virtual-vertical measurement lines. Space-time image is representing the human regions which are treated using the segmentation process. Different color space has been used to perform the template matching. A proper template matching has been achieved to determine direction and speed of passing people. Distinguish one or two passersby has been investigated using a correlation between passerby speed and the human-pixel area. Finally, the effectiveness of the presented method has been experimentally verified.

Keywords: counting people, measurement line, space-time image, segmentation, template matching

Procedia PDF Downloads 411
3643 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being

Authors: Jeyaseelan Maria Michael

Abstract:

This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.

Keywords: college students, cyberbullying, cyber victimization, psychological well-being

Procedia PDF Downloads 85
3642 Estimation of Carbon Dioxide Absorption in DKI Jakarta Green Space

Authors: Mario Belseran

Abstract:

The issue of climate change become world attention where one of them increase in air temperature due to greenhouse gas emissions. This climate change is caused by gases in the atmosphere, one of which is CO2. DKI Jakarta as the capital has a dense population with a variety of existing land use. Land use that is dominated by settlements resulting in fewer green space, which functions to absorb atmospheric CO2. Image interpretation SPOT-7 is used to determine the greenness level of vegetation on a green space using the vegetation index NDVI, EVI, GNDVI and OSAVI. Measuring the diameter and height of trees were also performed to obtain the value of biomass that will be used as the CO2 absorption value. The CO2 absorption value that spread in Jakarta are classified into three classes: high, medium, and low. The distribution pattern of CO2 absorption value at green space in Jakarta dominance in the medium class with the distribution pattern is located in South Jakarta, East Jakarta, North Jakarta and West Jakarta. The distribution pattern of green space in Jakarta scattered randomly and more dominate in East Jakarta and South Jakarta

Keywords: carbon dioxide, DKI Jakarta, green space, SPOT-7, vegetation index

Procedia PDF Downloads 244
3641 Decision Trees Constructing Based on K-Means Clustering Algorithm

Authors: Loai Abdallah, Malik Yousef

Abstract:

A domain space for the data should reflect the actual similarity between objects. Since objects belonging to the same cluster usually share some common traits even though their geometric distance might be relatively large. In general, the Euclidean distance of data points that represented by large number of features is not capturing the actual relation between those points. In this study, we propose a new method to construct a different space that is based on clustering to form a new distance metric. The new distance space is based on ensemble clustering (EC). The EC distance space is defined by tracking the membership of the points over multiple runs of clustering algorithm metric. Over this distance, we train the decision trees classifier (DT-EC). The results obtained by applying DT-EC on 10 datasets confirm our hypotheses that embedding the EC space as a distance metric would improve the performance.

Keywords: ensemble clustering, decision trees, classification, K nearest neighbors

Procedia PDF Downloads 153
3640 The Analysis of Space Syntax Used in the Development Explore of Hangzhou city’s Centratity

Authors: Liu Junzhu

Abstract:

In contemporary China,city is expanding with an amazing speed. And because of the unexpected events’ interference, spatial structure could change itself in a short time, That will lead to the new urban district livingness and unfortunately, this phenomenon is very common.On the one hand,it fail to achieve the goal of city planning, On the other hand,it is unfavourable to the sustainable development of city. Bill Hillier’stheory Space Syntax shows organzation pattern of each space,it explains the characteristics of urban spatial patterns and its transformation regulation from the point of self-organization in system and also, it gives confirmatory and predictive ways to the building and city. This paper used axial model to summarize Hangzhou City’s special structure and enhanced comprehensive understanding of macroscopic space and environment, space structure,developing trend, ect, by computer analysis of Space Syntax. From that, it helps us to know the operation law in the urban system and to understand Hangzhou City’s spatial pattern and indirect social effect it has mad more clearly, Thus, it could comply with the tendency of cities development in process and planning of policy and plan our cities’ future sustainably.

Keywords: sustainable urban design, space syntax, spatial network, segment angular analysis, social inclusion

Procedia PDF Downloads 419
3639 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 217
3638 A Study on the Strategy for Domestic Space Industry Activation

Authors: Hangil Park, Hwayeon Song, Jingyung Sim

Abstract:

In this study, a business ecosystem of a domestic space industry is comprehensively analyzed to derive the influence factors. The priority level of each element as well as the disparity between the ideal and reality are investigated through a literature review and an expert survey. The three major influence factors determined are: (a) investment scale and approach, (b) propulsion system, and (c) industrialization with overseas expansion. Related issues based on the current status are evaluated, followed by a proposed activation strategy. This research's findings offer a direction for R&D budget allocation and law system maintenance for the activation of the domestic space industry.

Keywords: space industry, activation, strategy, business ecosystem

Procedia PDF Downloads 330
3637 3D Elasticity Analysis of Laminated Composite Plate Using State Space Method

Authors: Prathmesh Vikas Patil, Yashaswini Lomte Patil

Abstract:

Laminated composite materials have considerable attention in various engineering applications due to their exceptional strength-to-weight ratio and mechanical properties. The analysis of laminated composite plates in three-dimensional (3D) elasticity is a complex problem, as it requires accounting for the orthotropic anisotropic nature of the material and the interactions between multiple layers. Conventional approaches, such as the classical plate theory, provide simplified solutions but are limited in performing exact analysis of the plate. To address such a challenge, the state space method emerges as a powerful numerical technique for modeling the behavior of laminated composites in 3D. The state-space method involves transforming the governing equations of elasticity into a state-space representation, enabling the analysis of complex structural systems in a systematic manner. Here, an effort is made to perform a 3D elasticity analysis of plates with cross-ply and angle-ply laminates using the state space approach. The state space approach is used in this study as it is a mixed formulation technique that gives the displacements and stresses simultaneously with the same level of accuracy.

Keywords: cross ply laminates, angle ply laminates, state space method, three-dimensional elasticity analysis

Procedia PDF Downloads 51
3636 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 43
3635 Multidisciplinary Training of Social Work and Applied Drama: From the Perspective of the Third Space

Authors: Yen Yi Huang

Abstract:

This paper aims to explore the application of strategies in applied drama to the social work education arena in order to enhance students' creativity, curiosity, and aesthetic sensitivity. Also, applied drama is used as a means to facilitate students' reflection-in-action and improve their understanding of issues on creative aging, gender equality, human rights, bullying, and prejudice. This paper mainly uses the perspective of Homi K. Bhabha's third space to explore the impact of applied drama and social work training on students. First, it focuses on how students create new understandings and insights in the third space of multidisciplinary training studies. Second, it analyzes how the hybridity and negotiation of ideas between applied drama and social work were created. Finally, it discusses the follow-up effects of the training and the factors that promote or hinder the hybridity and generation of the third space. This paper uses students' reflection papers for analysis. It is not focused on a discussion of the effectiveness of the teaching but attempts to bring new insights into the applications of applied drama to the social work education arena. The hybridity and generation of the third space require handling power strategically and looking after the emotional space of the students. Taking part in the training allows students in the third space of multidisciplinary training to reexamine the traditional framework of social work knowledge to create new ideas and possibilities.

Keywords: multidisciplinary, applied drama, social work education, third space

Procedia PDF Downloads 130
3634 Research on the Renewal and Utilization of Space under the Bridge in Chongqing Based on Spatial Potential Evaluation

Authors: Xvelian Qin

Abstract:

Urban "organic renewal" based on the development of existing resources in high-density urban areas has become the mainstream of urban development in the new era. As an important stock resource of public space in high-density urban areas, promoting its value remodeling is an effective way to alleviate the shortage of public space resources. However, due to the lack of evaluation links in the process of underpass space renewal, a large number of underpass space resources have been left idle, facing the problems of low space conversion efficiency, lack of accuracy in development decision-making, and low adaptability of functional positioning to citizens' needs. Therefore, it is of great practical significance to construct the evaluation system of under-bridge space renewal potential and explore the renewal mode. In this paper, some of the under-bridge spaces in the main urban area of Chongqing are selected as the research object. Through the questionnaire interviews with the users of the built excellent space under the bridge, three types of six levels and twenty-two potential evaluation indexes of "objective demand factor, construction feasibility factor and construction suitability factor" are selected, including six levels of land resources, infrastructure, accessibility, safety, space quality and ecological environment. The analytical hierarchy process and expert scoring method are used to determine the index weight, construct the potential evaluation system of the space under the bridge in high-density urban areas of Chongqing, and explore the direction of renewal and utilization of its suitability. To provide feasible theoretical basis and scientific decision support for the use of under bridge space in the future.

Keywords: high density urban area, potential evaluation, space under bridge, updated using

Procedia PDF Downloads 23
3633 The Big Bang Was Not the Beginning, but a Repeating Pattern of Expansion and Contraction of the Spacetime

Authors: Amrit Ladhani

Abstract:

The cyclic universe theory is a model of cosmic evolution according to which the universe undergoes endless cycles of expansion and cooling, each beginning with a “big bang” and ending in a “big crunch”. In this paper, we propose a unique property of Space-time. This particular and marvelous nature of space shows us that space can stretch, expand, and shrink. This property of space is caused by the size of the universe change over time: growing or shrinking. The observed accelerated expansion, which relates to the stretching of Shrunk space for the new theory, is derived. This theory is based on three underlying notions: First, the Big Bang is not the beginning of Space-time, but rather, at the very beginning fraction of a second, there was an infinite force of infinite Shrunk space in the cosmic singularity that force gave rise to the big bang and caused the rapidly growing of space, and all other forms of energy are transformed into new matter and radiation and a new period of expansion and cooling begins. Second, there was a previous phase leading up to it, with multiple cycles of contraction and expansion that repeat indefinitely. Third, the two principal long-range forces are the gravitational force and the repulsive force generated by shrink space. They are the two most fundamental quantities in the universe that govern cosmic evolution. They may provide the clockwork mechanism that operates our eternal cyclic universe. The universe will not continue to expand forever; no need, however, for dark energy and dark matter. This new model of Space-time and its unique properties enables us to describe a sequence of events from the Big Bang to the Big Crunch.

Keywords: dark matter, dark energy, cosmology, big bang and big crunch

Procedia PDF Downloads 26
3632 Ta-DAH: Task Driven Automated Hardware Design of Free-Flying Space Robots

Authors: Lucy Jackson, Celyn Walters, Steve Eckersley, Mini Rai, Simon Hadfield

Abstract:

Space robots will play an integral part in exploring the universe and beyond. A correctly designed space robot will facilitate OOA, satellite servicing and ADR. However, problems arise when trying to design such a system as it is a highly complex multidimensional problem into which there is little research. Current design techniques are slow and specific to terrestrial manipulators. This paper presents a solution to the slow speed of robotic hardware design, and generalizes the technique to free-flying space robots. It presents Ta-DAH Design, an automated design approach that utilises a multi-objective cost function in an iterative and automated pipeline. The design approach leverages prior knowledge and facilitates the faster output of optimal designs. The result is a system that can optimise the size of the base spacecraft, manipulator and some key subsystems for any given task. Presented in this work is the methodology behind Ta-DAH Design and a number optimal space robot designs.

Keywords: space robots, automated design, on-orbit operations, hardware design

Procedia PDF Downloads 31
3631 Construction Strategy of Urban Public Space in Driverless Era

Authors: Yang Ye, Hongfei Qiu, Yaqi Li

Abstract:

The planning and construction of traditional cities are oriented by cars, which leads to the problems of insufficient urban public space, fragmentation, and low utilization efficiency. With the development of driverless technology, the urban structure will change from the traditional single-core grid structure to the multi-core model. In terms of traffic organization, with the release of land for traffic facilities, public space will become more continuous and integrated with traffic space. In the context of driverless technology, urban public reconstruction is characterized by modularization and high efficiency, and its planning and layout features accord with points (service facilities), lines (smart lines), surfaces (activity centers). The public space of driverless urban roads will provide diversified urban public facilities and services. The intensive urban layout makes the commercial public space realize the functions of central activities and style display, respectively, in the interior (building atrium) and the exterior (building periphery). In addition to recreation function, urban green space can also utilize underground parking space to realize efficient dispatching of shared cars. The roads inside the residential community will be integrated into the urban landscape, providing conditions for the community public activity space with changing time sequence and improving the efficiency of space utilization. The intervention of driverless technology will change the thinking of traditional urban construction and turn it into a human-oriented one. As a result, urban public space will be richer, more connected, more efficient, and the urban space justice will be optimized. By summarizing the frontier research, this paper discusses the impact of unmanned driving on cities, especially urban public space, which is beneficial for landscape architects to cope with the future development and changes of the industry and provides a reference for the related research and practice.

Keywords: driverless, urban public space, construction strategy, urban design

Procedia PDF Downloads 74
3630 Net Folklore as a Part of Kazakhstani Internet Literature

Authors: Dina Sabirova, Madina Moldagali

Abstract:

The rapid development of new media, especially the Internet, has led to major changes in folk culture. The net space is increasingly becoming a creation of the ‘folk’ imagination, saturated with multimedia stories with collective authorship, like traditional folklore. Moreover, the Internet picks up and changes old folklore traditions, such as the form of publication, the way of storytelling, or gave a new morality to the ‘old tales’. In this article, the similarities and differences between Internet folklore/ cyber-folklore/ digital folklore and oral folk art were examined by using the material of modern Kazakh authors. The relationship between tradition and innovation was studied in order to interpret the sequence of the authors' research taking into account the realities. The material of the article was the prose texts of Kazakh writers published in internet magazines and social networks. An immanent and intertextual analysis of the text was carried out. Thus, the new forms of Internet folklore lead to new forms of expression and social morality in society

Keywords: internet literature, modern Kazakhstani authors, net folklore, oral folk art

Procedia PDF Downloads 59
3629 The Qualification and Quality of Space Sciences and Space Engineering Education in Turkey

Authors: Hatice Canan Gungor, Ahmet Akdemir

Abstract:

The fields of engineering and technological sciences are increasing in quality and quantity day by day all over the world. Countries have to follow, implement and adapt these developments in order to economical empowerments. In our era, it's possible to follow the rapidly developing technology and to produce new technologies by inquisitive, curious, numerical thinking individuals who can show several approaches to problem solving. In this case, countries should develop te result oriented and need-focused curriculums in university education. As in the whole world, there are more space studies in our country as well. Universities should undertake the task of supply the need for staff of this technological race. In this context, questions about the purpose, content and learning outcomes of the space sciences and space engineering departments in our country will be researched answers to reveal the characteristic of this section. In this study, it was determined in which universities the space engineering and the departments of basic sciences educate with formal education and the contents of this education, and the universities were compared with each other as of 2017. In our country three universities provide Aeronautical and Aerospace Engineering, two universities provide Space Sciences and Technologies, two universities provide Aerospace Engineering, two universities provide Aeronautics and Astronautics Engineering education. In all universities, specialized courses are taught after basic engineering education. But the question that needs to be answered is, do the lessons benefit in practice? The answer of this question will reveal the quality of the education. This paper suggests that surveys be conducted to search for the answer to this question. It's thought to be the base for the next works.

Keywords: education, space engineering, space science, quality of systems

Procedia PDF Downloads 246
3628 An Exploration of Renewal Utilization of Under-bridge Space Based on Spatial Potential Evaluation - Taking Chongqing Municipality as an Example

Authors: Xuelian Qin

Abstract:

Urban "organic renewal" based on the development of existing resources in high-density urban areas has become the mainstream of urban development in the new era. As an important stock resource of public space in high-density urban areas, promoting its value remodeling is an effective way to alleviate the shortage of public space resources. However, due to the lack of evaluation links in the process of underpass space renewal, a large number of underpass space resources have been left idle, facing the problems of low space conversion efficiency, lack of accuracy in development decision-making, and low adaptability of functional positioning to citizens' needs. Therefore, it is of great practical significance to construct the evaluation system of under-bridge space renewal potential and explore the renewal mode. In this paper, some of the under-bridge spaces in the main urban area of Chongqing are selected as the research object. Through the questionnaire interviews with the users of the built excellent space under the bridge, three types of six levels and twenty-two potential evaluation indexes of "objective demand factor, construction feasibility factor and construction suitability factor" are selected, including six levels of land resources, infrastructure, accessibility, safety, space quality and ecological environment. The analytical hierarchy process and expert scoring method are used to determine the index weight, construct the potential evaluation system of the space under the bridge in high-density urban areas of Chongqing, and explore the direction of renewal and utilization of its suitability. To provide feasible theoretical basis and scientific decision support for the use of under bridge space in the future.

Keywords: high density urban area, potential evaluation, space under bridge, updated using

Procedia PDF Downloads 38
3627 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 444
3626 The Effect of Configuration Space and Visual Perception in Public Space Usage at Villa Bukit Tidar Housing in Malang City

Authors: Aisyiyah Fauziah Rahmah

Abstract:

Generally, an urban city has a rapid growth, it has frequent a variety of problems, especially of convenience in public space usage. The density of population in urban areas and the high activity is also indicated as a cause of urban resident lifestyle for the worse in social relationships and allow for the stress. Streets and green space (parks) are the only public space in a residential area which is used as a place to build social activity, to meet and interact with the other housing dweller. The high level of activity and social interaction that occurs will affect the spatial arrangement. It can be effected the space structures in housing more complex. Ease in access to public space is the reason many dweller prefer doing social activities there. Hillier in Carmona et al (2003) explains that the pattern and intensity of movement of individuals is influenced by the configuration of space, even the space structure can be regarded as the single most influential determinant of movements in the space. Whyte in Zhang and Lawson (2009) also suggest some factors such as seats, trees, water and legibility of space encourage people to stay in public outdoor space. Furthermore this activities can attract more activities. Villa Bukit Tidar is a housing in Lowokwaru District which highest number of people in Malang City, so social activity is also high there. It has natural and recreational concept and provided with view of Malang City from heights. This potential is able to attract the people who live there to stay in public outdoor space and doing activities there. From this study we can find whether the ease of access to public space and visual satisfaction of Villa Bukit Tidar housing affect the usage of public space. This study was carried out by observing the streets pattern and plot pattern to know the configuration space of Villa Bukit Tidar housing through values of connectivity and integrity by resulting from space sintax analysis. Distributing questionnaires also carried out to determine the level of satisfaction and importance perception of visual condition in the public space in Villa Bukit Tidar housing through Important Performance Analysis (IPA). Results of this research indicated that the public spaces in Villa Bukit Tidar housing who has high connectivity and integrity is considered to be visually satisfied and it has a higher public space usage than has low connectivity and integrity are considered to be visually dissatisfied.

Keywords: configuration space, visual perception, social activities, public space usage

Procedia PDF Downloads 447
3625 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area

Authors: Niyi Adegoke, Saanumi Jimmy Omolou

Abstract:

The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.

Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology

Procedia PDF Downloads 179