Search results for: intelligence and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3914

Search results for: intelligence and security

3854 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 161
3853 A Literature Review of Precision Agriculture: Applications of Diagnostic Diseases in Corn, Potato, and Rice Based on Artificial Intelligence

Authors: Carolina Zambrana, Grover Zurita

Abstract:

The food loss production that occurs in deficient agricultural production is one of the major problems worldwide. This puts the population's food security and the efficiency of farming investments at risk. It is to be expected that this food security will be achieved with the own and efficient production of each country. It will have an impact on the well-being of its population and, thus, also on food sovereignty. The production losses in quantity and quality occur due to the lack of efficient detection of diseases at an early stage. It is very difficult to solve the agriculture efficiency using traditional methods since it takes a long time to be carried out due to detection imprecision of the main diseases, especially when the production areas are extensive. Therefore, the main objective of this research study is to perform a systematic literature review, of the latest five years, of Precision Agriculture (PA) to be able to understand the state of the art of the set of new technologies, procedures, and optimization processes with Artificial Intelligence (AI). This study will focus on Corns, Potatoes, and Rice diagnostic diseases. The extensive literature review will be performed on Elsevier, Scopus, and IEEE databases. In addition, this research will focus on advanced digital imaging processing and the development of software and hardware for PA. The convolution neural network will be handling special attention due to its outstanding diagnostic results. Moreover, the studied data will be incorporated with artificial intelligence algorithms for the automatic diagnosis of crop quality. Finally, precision agriculture with technology applied to the agricultural sector allows the land to be exploited efficiently. This system requires sensors, drones, data acquisition cards, and global positioning systems. This research seeks to merge different areas of science, control engineering, electronics, digital image processing, and artificial intelligence for the development, in the near future, of a low-cost image measurement system that allows the optimization of crops with AI.

Keywords: precision agriculture, convolutional neural network, deep learning, artificial intelligence

Procedia PDF Downloads 46
3852 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 453
3851 Conceptualizing Thoughtful Intelligence for Sustainable Decision Making

Authors: Musarrat Jabeen

Abstract:

Thoughtful intelligence offers a sustainable position to enhance the influence of decision-makers. Thoughtful Intelligence implies the understanding to realize the impact of one’s thoughts, words and actions on the survival, dignity and development of the individuals, groups and nations. Thoughtful intelligence has received minimal consideration in the area of Decision Support Systems, with an end goal to evaluate the quantity of knowledge and its viability. This pattern degraded the imbibed contribution of thoughtful intelligence required for sustainable decision making. Given the concern, this paper concentrates on the question: How to present a model of Thoughtful Decision Support System (TDSS)? The aim of this paper is to appreciate the concepts of thoughtful intelligence and insinuate a Decision Support System based on thoughtful intelligence. Thoughtful intelligence includes three dynamic competencies: i) Realization about long term impacts of decisions that are made in a specific time and space, ii) A great sense of taking actions, iii) Intense interconnectivity with people and nature and; seven associate competencies, of Righteousness, Purposefulness, Understanding, Contemplation, Sincerity, Mindfulness, and Nurturing. The study utilizes two methods: Focused group discussion to count prevailing Decision Support Systems; 70% results of focus group discussions found six decision support systems and the positive inexistence of thoughtful intelligence among decision support systems regarding sustainable decision making. Delphi focused on defining thoughtful intelligence to model (TDSS). 65% results helped to conceptualize (definition and description) of thoughtful intelligence. TDSS is offered here as an addition in the decision making literature. The clients are top leaders.

Keywords: thoughtful intelligence, sustainable decision making, thoughtful decision support system

Procedia PDF Downloads 88
3850 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 544
3849 Emotional Intelligence: Key to Job Satisfaction - A Case Study

Authors: Arpita Sabath, Jytoika Samuel

Abstract:

Emotional Intelligence is conceptualized as a confluence of learned abilities resulting in wise behavior, high achievement and mental health. This case study is done on IT Sector employees of CAREERNET consultancy at Bangalore. Thus the present study intends to find out the difference in different dimensions of El and Js Scales among male and female employees and the existing relationship between emotional intelligence and job satisfaction for the beginner age group of employees (25 yrs - 40 yrs) in order to enhance the employees productivity level in the present scenario of recession in employment. It is observed that all promotions and increment are achieved at these 25 yrs - 40 yrs age group employees. Therefore, the sample is selected randomly and grouped. Survey method with the administration of Emotional Intelligence Scale and opinionScedule is used. The findings of the study has revealed that there is a positive relationship between emotional intelligence and performance excellence. The study is concluded with a remark that the relevance of this study should be followed by the administrative body of IT sectors to motivate them and to get more productive work from their employees

Keywords: emotional intelligence, job satisfaction, organisational behavior, IT sector

Procedia PDF Downloads 576
3848 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 389
3847 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 661
3846 Antecedents and Consequences of Organizational Intelligence in an R and D Organization

Authors: Akriti Srivastava, Soumi Awasthy

Abstract:

One of the disciplines that provoked increased interest in the importance of intelligence is the management and organization development literature. Organization intelligence is a key enabling force underlying many vital activities and processes dominating organizational life. Hence, the factors which lead to organizational intelligence and the result which comes out of the whole procedure is important to be understood with the understanding of OI. The focus of this research was to uncover potential antecedents and consequences of organizational intelligence, thus a non-experimental explanatory survey research design was used. A non-experimental research design is in which the manipulation of variables and randomization of samples are not present. The data was collected with the help of the questionnaire from 321 scientists from different laboratories of an R & D organization. Out of which 304 data were found suitable for the analysis. There were 194 males (age, M= 35.03, SD=7.63) and 110 females (age, M= 34.34, SD=8.44). This study tested a conceptual model linking antecedent variables (leadership and organizational culture) to organizational intelligence, followed by organizational innovational capability and organizational performance. Structural equation modeling techniques were used to analyze the hypothesized model. But, before that, confirmatory factor analysis of organizational intelligence scale was done which resulted in an insignificant model. Then, exploratory factor analysis was done which gave six factors for organizational intelligence scale. This structure was used throughout the study. Following this, the final analysis revealed relatively good fit of data to the hypothesized model with certain modifications. Leadership and organizational culture emerged out as the significant antecedents of organizational intelligence. Organizational innovational capability and organizational performance came out to be the consequent factors of organizational intelligence. But organizational intelligence did not predict organizational performance via organizational innovational capability. With this, additional significant pathway emerged out between leadership and organizational performance. The model offers a fresh and comprehensive view of the organizational intelligence. In this study, prior studies in related literature were reviewed to offer a basic framework of organizational intelligence. The study proved to be beneficial for organizational intelligence scholarship, seeing its importance in the competitive environment.

Keywords: leadership, organizational culture, organizational intelligence, organizational innovational capability

Procedia PDF Downloads 298
3845 The Professionalisation of British Intelligence Analysts

Authors: Michael S. Goodman

Abstract:

The Joint Intelligence Committee (JIC) has been the senior most analytical body in the UK since its creation in 1936. At various points in its history, most notably and recently in 2004, in the wake of the Iraq war, questions have been asked about its analytical process. In 1968 the British intelligence community saw one of its biggest transformations: the creation of an independent, central cadre of analysts. The ‘Assessments Staff’ was a novel attempt to improve the quality of analysis by fostering independence from departmental biases that had long plagued British intelligence. Seconded into the Cabinet Office, staff were allocated a ‘desk,’ and their role was to produce high level assessments for the most senior readers in the land. At the same time, efforts were made to ‘professionalise’ the analysts. This paper is based on a detailed archival examination of the JIC’s documentary files. It will recount the reasons behind this organisational reform, what the changes entailed, and whether they were a success. The changes were immediately brought to bear with the intelligence assessments prior to the Soviet invasion of Czechoslovakia, something that the JIC failed to appreciate.

Keywords: intelligence, cold war history, analysis, united kingdom

Procedia PDF Downloads 42
3844 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 242
3843 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 461
3842 The Effects of Multiple Levels of Intelligence in an Algebra 1 Classroom

Authors: Abigail Gragg

Abstract:

The goal of this research study was to adjudicate if implementing Howard Gardner’s multiple levels of intelligence would enhance student achievement levels in an Algebra 1 College Preparatory class. This was conducted within every class by incorporating one level of the eight levels of intelligence into small group work in stations. Every class was conducted utilizing small-group instruction. Achievement levels were measured through various forms of collected data that expressed student understandings in class through formative assessments versus student understandings on summative assessments. The data samples included: assessments (i.e. summative and formative assessments), observable data, video recordings, a daily log book, student surveys, and checklists kept during the observation periods. Formative assessments were analyzed during each class period to measure in-class understanding. Summative assessments were dissected per question per accuracy to review the effects of each intelligence implemented. The data was collated into a coding workbook for further analysis to conclude the resulting themes of the research. These themes include 1) there was no correlation to multiple levels of intelligence enhancing student achievement, 2) bodily-kinesthetic intelligence showed to be the intelligence that had the most improvement on test questions and 3) out of all of the bits of intelligence, interpersonal intelligence enhanced student understanding in class.

Keywords: stations, small group instruction, multiple levels of intelligence, Mathematics, Algebra 1, student achievement, secondary school, instructional Pedagogies

Procedia PDF Downloads 61
3841 Investigating the Relationship between Emotional Intelligence and Self-Efficacy of Physical Education Teachers in Ilam Province

Authors: Ali Heyrani, Maryam Saidyousefi

Abstract:

The aim of the present study was to investigate the relationship between emotional intelligence and Self-Efficacy of physical education teachers in Ilam province. The research method is descriptive correlational. The study participants were of 170 physical education teachers (90 males, 80 females) with an age range of 20 to 50 years, who were selected randomly. The instruments for data collection were Emotional Intelligence Questionnaire Bar-on (1997) to assess the Emotional Intelligence teachers and Self-Efficacy Questionnaire to measure their Self-Efficacy. The questionnaires used in the interior are reliable and valid. To analyze the data, descriptive statistics and inferential tests (Kolmogorov-Smirnov test, Pearson correlation and multiple regression) at a significance level of P <0/ 05 were used. The Results showed that there is a significant positive relationship between totall emotional intelligence and Self-Efficacy of teachers, so the more emotional intelligence of physical education teachers the better the extent of Self-Efficacy. Also, the results arising from regression analysis gradually showed that among components of emotional intelligence, three components, the General Mood, Adaptability, and Interpersonal Communication to Self-Efficacy are of a significant positive relationship and are able to predict the Self-Efficacy of physical education teachers. It seems the application of this study ҆s results can help to education authorities to promote the level of teachers’ emotional intelligence and therefore the improvement of their Self-Efficacy and success in learners’ teaching and training.

Keywords: emotional intelligence, self-efficacy, physical education teachers, Ilam province

Procedia PDF Downloads 491
3840 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 106
3839 Correlation between General Intelligence, Emotional Intelligence and Stress Response after One Month Practice of Moderate Intensity Physical Exercise

Authors: Mohita Singh, Sunil Sachdev, Amrita Singh

Abstract:

Background and Aim: Physical aerobic exercises promote positive changes in one’s mental health, intelligence, and ability to cope with stressful encounters. The present study was designed to explore the correlation between intelligence and stress parameters and to assess the correlation between the same parameters after the practice of one month of moderate-intensity physical exercise. Method: The study was conducted on thirty-five healthy male volunteer students to assess the correlation between stress parameters in subjects with varying level of general intelligence (GI) and emotional intelligence (EI). Correlation studies were again conducted after one month between the same parameters to evaluate the effect of moderate-intensity physical exercise (MIPE). Baseline values were recorded using standard scales. Result: IQ and EQ correlated negatively with both acute and chronic stress parameters and positively with each other. A positive correlation was found between acute and chronic stress. With the practice of one month of moderate-intensity physical exercise, there was significant increment between the parameters under study and hence improved results. Conclusion: MIPE improved correlation between GI, EI, stress parameters, and thus reduced stress and improved intelligence.

Keywords: emotional intelligence, general intelligence, moderate intensity physical exercise, stress response

Procedia PDF Downloads 104
3838 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 266
3837 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 482
3836 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 42
3835 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 385
3834 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 88
3833 Survey of Related Field for Artificial Intelligence Window Development

Authors: Young Kwon Yang, Bo Rang Park, Hyo Eun Lee, Tea Won Kim, Eun Ji Choi, Jin Chul Park

Abstract:

To develop an artificial intelligence based automatic ventilation system, recent research trends were analyzed and analyzed. This research method is as follows. In the field of architecture and window technology, the use of artificial intelligence, the existing study of machine learning model and the theoretical review of the literature were carried out. This paper collected journals such as Journal of Energy and Buildings, Journal of Renewable and Sustainable Energy Reviews, and articles published on Web-sites. The following keywords were searched for articles from 2000 to 2016. We searched for the above keywords mainly in the title, keyword, and abstract. As a result, the global artificial intelligence market is expected to grow at a CAGR of 14.0% from USD127bn in 2015 to USD165bn in 2017. Start-up investments in artificial intelligence increased from the US $ 45 million in 2010 to the US $ 310 million in 2015, and the number of investments increased from 6 to 54. Although AI is making efforts to advance to advanced countries, the level of technology is still in its infant stage. Especially in the field of architecture, artificial intelligence (AI) is very rare. Based on the data of this study, it is expected that the application of artificial intelligence and the application of architectural field will be revitalized through the activation of artificial intelligence in the field of architecture and window.

Keywords: artificial intelligence, window, fine dust, thermal comfort, ventilation system

Procedia PDF Downloads 234
3832 Gender Differences in Emotional Intelligence in a Middle Eastern Population

Authors: Said S. Aldhafri, Marwa N. Alrajhi

Abstract:

This study examines gender differences in emotional intelligence levels in the Sultanate of Oman, an Arabic country in the Middle East. As a collective culture, the Omani culture rears children differently based on the Islamic beliefs and the Arabic culture. Gender differences across the different dimensions of emotional intelligence are possible within this collective culture. Emotional intelligences reflect the ability to understand and act upon one’s and others’ emotions. The sample of the study consisted of 338 (50.6% were females) adults from different regions in Oman. The participants completed a 25-item emotional intelligence scale, using 5-point Likert type responses. The results showed that the total scores of the scale as well as the scores from the five dimensions (self management, self motivation, social skills, empathy, and self-awareness) all have good reliability coefficients. Using independent sample t-tests, the findings show that female adults scored higher than male adults. The differences were all statistically significant across the five dimensions of emotional intelligence. The findings are discussed from a cultural perspective and applications for the development of emotional intelligence skills are outlined.

Keywords: emotional intelligence, gender, Arab, Oman

Procedia PDF Downloads 430
3831 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 72
3830 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 497
3829 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 121
3828 Effects of Artificial Intelligence Technology on Children: Positives and Negatives

Authors: Paula C. Latorre Arroyo, Andrea C. Latorre Arroyo

Abstract:

In the present society, children are exposed to and impacted by technology from very early on in various ways. Artificial intelligence (AI), in particular, directly affects them, be it positively or negatively. The concept of artificial intelligence is commonly defined as the technological programming of computers or robotic mechanisms with humanlike capabilities and characteristics. These technologies are often designed as helpful machines or disguised as handy tools that could ultimately steal private information for illicit purposes. Children, being one of the most vulnerable groups due to their lack of experience and knowledge, do not have the ability to recognize or have the malice to distinguish if an apparatus with artificial intelligence is good or bad for them. For this reason, as a society, there must be a sense of responsibility to regulate and monitor different types of uses for artificial intelligence to protect children from potential risks that might arise. This article aims to investigate the many implications that artificial intelligence has in the lives of children, starting from a home setting, within the classroom, and, ultimately, in online spaces. Irrefutably, there are numerous beneficial aspects to the use of artificial intelligence. However, due to its limitless potential and lack of specific and substantial regulations to prevent the illicit use of this technology, safety and privacy concerns surface, specifically regarding the youth. This written work aims to provide an in-depth analysis of how artificial intelligence can both help children and jeopardize their safety. Concluding with resources and data supporting the aforementioned statement.

Keywords: artificial intelligence, children, privacy, rights, safety

Procedia PDF Downloads 30
3827 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 62
3826 One Plus One is More than Two: Why Nurse Recruiters Need to Use Various Multivariate Techniques to Understand the Limitations of the Concept of Emotional Intelligence

Authors: Austyn Snowden

Abstract:

Aim: To examine the construct validity of the Trait Emotional Intelligence Questionnaire Short form. Background: Emotional intelligence involves the identification and regulation of our own emotions and the emotions of others. It is therefore a potentially useful construct in the investigation of recruitment and retention in nursing and many questionnaires have been constructed to measure it. Design: Secondary analysis of existing dataset of responses to TEIQue-SF using concurrent application of Rasch analysis and confirmatory factor analysis. Method: First year undergraduate nursing and computing students completed Trait Emotional Intelligence Questionnaire-Short Form. Responses were analysed by synthesising results of Rasch analysis and confirmatory factor analysis.

Keywords: emotional intelligence, rasch analysis, factor analysis, nurse recruiters

Procedia PDF Downloads 430
3825 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 513