Search results for: privacy loss
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3744

Search results for: privacy loss

3654 Seasonal and Species Variations in Incidence of Foetal Loss at the Maiduguri Abattoir in Northern Nigeria

Authors: Abdulrazaq O. Raji, Abba Mohammed, Ibrahim D. Mohammed

Abstract:

This study was conducted to investigate foetal loss among slaughtered livestock species at the Maiduguri abattoir from 2009 to 2013. Record of animals slaughtered monthly and fetuses recovered were collected from the management of the Maiduguri abattoir. Data was subjected to Analysis of Variance using the General Linear Model of SPSS 13.0 with Season, Species and their interaction as fixed factors. Average yearly slaughter at the Maiduguri abattoir was 63,225 animals with cattle, camel, goat and sheep accounting for 19737, 7374, 19281 and 17540 of the total. The corresponding number of those pregnant were 3117, 839, 2281 and 2432 out of a total of 8522 animals. Thus, cattle, camel, goat and sheep accounted for 30.87, 11.53, 30.16 and 27.44%, respectively of the animals slaughtered at the Abattoir and 35.96, 9.68, 26.31 and 28.05% of the foetal loss. The effect of season and species on foetal loss was significant (P < 0.05). The number of pregnant animals slaughtered and foetal loss were higher during wet than dry season. Similarly, foetal loss at the abattoir was higher in the month of May in respect of camel, goat and sheep, and August for cattle. Camel was the least slaughtered animal and had the least number of pregnant females. Foetal loss (%) was higher (P < 0.05) for cattle compared to other species. The interaction showed that camel was the least slaughtered species in both seasons and cattle in the wet season had the highest foetal loss.

Keywords: abattoir, foetal loss, season, species

Procedia PDF Downloads 499
3653 Soil Loss Assessment at Steep Slope: A Case Study at the Guthrie Corridor Expressway, Selangor, Malaysia

Authors: Rabiul Islam

Abstract:

The study was in order to assess soil erosion at plot scale Universal Soil Loss Equation (USLE) erosion model and Geographic Information System (GIS) technique have been used for the study 8 plots in Guthrie Corridor Expressway, Selangor, Malaysia. The USLE model estimates an average soil loss soil integrating several factors such as rainfall erosivity factor(R ), Soil erodibility factor (K), slope length and steepness factor (LS), vegetation cover factor as well as conservation practice factor (C &P) and Results shows that the four plots have very low rates of soil loss, i.e. NLDNM, NDNM, PLDM, and NDM having an average soil loss of 0.059, 0.106, 0.386 and 0.372 ton/ha/ year, respectively. The NBNM, PLDNM and NLDM plots had a relatively higher rate of soil loss, with an average of 0.678, 0.757 and 0.493ton/ha/year. Whereas, the NBM is one of the highest rate of soil loss from 0.842 ton/ha/year to maximum 16.466 ton/ha/year. The NBM plot was located at bare the land; hence the magnitude of C factor(C=0.15) was the highest one.

Keywords: USLE model, GIS, Guthrie Corridor Expressway (GCE), Malaysia

Procedia PDF Downloads 494
3652 Resilience among Children with and without Hearing Loss: A Comparative Study in Pakistan

Authors: Bushra Akram, Amina Tariq

Abstract:

Objective: This cross-sectional descriptive study aimed to compare the level of resilience among children with and without hearing loss. Methodology: In this descriptive cross sectional study total 500 children (with hearing loss = 250 and without hearing loss = 250) were recruited conveniently. Children with hearing loss were recruited from the special schools whereas children without hearing loss were selected from regular schools located in cities of Gujrat and Jhelum of Pakistan. Respondents’ age ranged from 9-14 years. Resiliency scale named RSCA (Resiliency Scales for children and adolescents) developed by Sandra Prince Embury (2006) was used. RSCA consist of three core theoretical areas: MAS (Sense of Mastery Scale), REL (Sense of Relatedness Scale) and REA (Emotional Reactivity Scale). Results: Findings indicated that there was a significant difference in the resilience level of participants with and without hearing loss. The mean comparison showed that the children with hearing loss showed lower scores on MAS (X̅ = 43.32, SD = 7.55) as well as on REL (X̅ = 49.96, SD = 7.65) as compared to their counterparts on MAS (X̅ = 53.96, SD = 9.90, t= -7.31***) and on REL (X̅ = 68.43, SD = 14.57,t= -10.18***). However children with hearing loss showed higher scores on REA (X̅ = 42.12, SD = 5.84) as compared to hearing participants (X̅ = 28.84, SD = 13.97, t = -8.20***). The findings revealed no significance difference in the resilience level of hearing and deaf children on the basis of their gender and age. Research Outcomes and Future Scope: Children with hearing loss showed a lower level of resilience, therefore, needs a program to develop resilience for better social-emotional adjustment and enhancement of their psychological well-being. In the end, the researcher gave recommendations for future research.

Keywords: children with hearing loss, psychological Wellbeing, resiliency scales for children and adolescents, resilience

Procedia PDF Downloads 151
3651 Novel Approach to Privacy - Preserving Secure Multiparty Computation of Complex Solid Geometric Shape

Authors: Rizwan Rizwan

Abstract:

Secure Multiparty Computation is an emerging area of research within the cryptographic community, enabling secure collaboration among multiple parties while safeguarding their sensitive data. Secure Multiparty Computation has been extensively studied in the context of plane geometry, its application to complex solid geometry shapes remains relatively unexplored. This research paper aims to bridge this gap by proposing a solution for the secure multiparty computation of intersecting tetrahedra. We present an approach to calculate the volume of intersecting tetrahedra securely while preserving the privacy of the input data provided by each participating party. The proposed solution leverages accepted simulation paradigms to prove the privacy of the computation. We thoroughly analyze the computational and communication complexities of our approach, demonstrating that they closely align with the minimum theoretical complexity for the problems at hand. This optimal nature of our solution ensures efficient and secure collaborative geometric computations.

Keywords: cryptography, secure multiparty computation, solid geometry, protocol, simulation paradigm

Procedia PDF Downloads 24
3650 Development of a Secured Telemedical System Using Biometric Feature

Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese

Abstract:

Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.

Keywords: biometrics, telemedicine, privacy, patient information

Procedia PDF Downloads 265
3649 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 195
3648 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 87
3647 House Price Index Predicts a Larger Impact of Habitat Loss than Primary Productivity on the Biodiversity of North American Avian Communities

Authors: Marlen Acosta Alamo, Lisa Manne, Richard Veit

Abstract:

Habitat loss due to land use change is one of the leading causes of biodiversity loss worldwide. This form of habitat loss is a non-random phenomenon since the same environmental factors that make an area suitable for supporting high local biodiversity overlap with those that make it attractive for urban development. We aimed to compare the effect of two non-random habitat loss predictors on the richness, abundance, and rarity of nature-affiliated and human-affiliated North American breeding birds. For each group of birds, we simulated the non-random habitat loss using two predictors: the House Price Index as a measure of the attractiveness of an area for humans and the Normalized Difference Vegetation Index as a proxy for primary productivity. We compared the results of the two non-random simulation sets and one set of random habitat loss simulations using an analysis of variance and followed up with a Tukey-Kramer test when appropriate. The attractiveness of an area for humans predicted estimates of richness loss and increase of rarity higher than primary productivity and random habitat loss for nature-affiliated and human-affiliated birds. For example, at 50% of habitat loss, the attractiveness of an area for humans produced estimates of richness at least 5% lower and of a rarity at least 40% higher than primary productivity and random habitat loss for both groups of birds. Only for the species abundance of nature-affiliated birds, the attractiveness of an area for humans did not outperform primary productivity as a predictor of biodiversity following habitat loss. We demonstrated the value of the House Price Index, which can be used in conservation assessments as an index of the risks of habitat loss for natural communities. Thus, our results have relevant implications for sustainable urban land-use planning practices and can guide stakeholders and developers in their efforts to conserve local biodiversity.

Keywords: biodiversity loss, bird biodiversity, house price index, non-random habitat loss

Procedia PDF Downloads 55
3646 Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria

Authors: Augustine Osayande

Abstract:

This research is on Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria. The primary objective was to identify notable gullies sites and quantify the volume of soil loss in the study area. Direct field observation and measurement of gullies dimensions was done with the help of research assistants using a measuring tape, Camera and 3percent accuracy Global Positioning System (GPS). The result revealed that notable gullies in the area have resulted in the loss of lives and properties, destruction of arable lands and wastage of large areas of usable lands. Gullies in Edo North have Mean Volume of Soil Loss of 614, 763.33 m³, followed by Edo South with 79,604.76 m³ and Edo Central is 46,242.98 m³ and as such an average of 1,772, 888.7m3 of soil is lost annually in the study area due to gully erosion problem. The danger of gully erosion in helpless regions like Edo State called for urgent remedies in order to arrest the further loss of soil, buildings and other properties.

Keywords: Edo, magnitude, gully, volume, soil, sloss

Procedia PDF Downloads 114
3645 Using Nonhomogeneous Poisson Process with Compound Distribution to Price Catastrophe Options

Authors: Rong-Tsorng Wang

Abstract:

In this paper, we derive a pricing formula for catastrophe equity put options (or CatEPut) with non-homogeneous loss and approximated compound distributions. We assume that the loss claims arrival process is a nonhomogeneous Poisson process (NHPP) representing the clustering occurrences of loss claims, the size of loss claims is a sequence of independent and identically distributed random variables, and the accumulated loss distribution forms a compound distribution and is approximated by a heavy-tailed distribution. A numerical example is given to calibrate parameters, and we discuss how the value of CatEPut is affected by the changes of parameters in the pricing model we provided.

Keywords: catastrophe equity put options, compound distributions, nonhomogeneous Poisson process, pricing model

Procedia PDF Downloads 131
3644 Raising Awareness to Health Professionals about Emotional Needs of Families Suffering Perinatal Loss through a Short Documentary

Authors: Elisenda Camprecios, Alicia Macarrila, Montse Albiol, Neus Garriga Garriga

Abstract:

The loss of a child during pregnancy, or shortly after birth, is not a common occurrence, but it is a prevalent fact in our society. When this loss happens, life and death walk together. The grief that parents experience following a perinatal loss is a devastating experience. Professionals are aware that the quality of care offered during this first period is crucial to support the families experiencing a perinatal loss and meet their needs. However, it is not always easy for the health care professionals to know what to say and what to do in these difficult circumstances. Given the complexity of the Health, painful process that a family must face when is affected by such loss, we believe that the creation of a protocol that pays special attention to the emotional needs of those couples can be a very valuable tool for the professionals. The short documentary named ‘When the illusion vanished’ was created as part of the material of this protocol, which focuses on the emotional needs of the families who have suffered a perinatal loss. This video is designed to see what impact has a perinatal death and to raise awareness among professionals working in this field. The methodology is based on interviews with couples who have experienced perinatal death and to professionals who accompany families suffering from perinatal loss. The use of sensitive and empathized words, being encouraged to express feelings, respect the time, appropriate training for the professionals are some of the issues reflected in this documentary. We believe that this video has contributed to help health care professionals to empathize and understand the need to be able to accompany these families with the appropriate care, respectful, empathetic attitude and professionalism so that they can start the path to a ‘healthy’ mourning.

Keywords: neonatal loss, midwifery, perinatal bereavement, perinatal loss

Procedia PDF Downloads 129
3643 The Act of Care: Reimagined Rituals towards Unattachment

Authors: Ioana G. Turcan

Abstract:

reimagined rituals towards unattachment wants to look at an ambiguous loss through the perspective of caregivers, those that accompany us at the beginning and possibly the end of life, those that observe, accumulate, and are impacted by our behavior and needs, but also those that are the witnesses of the human vulnerability. Someone taking care of a patient with dementia experiences ambiguous loss, being in a present of a person partially present, partially absent. The one offering care needs care, not isolation and the aim of the project is to consolidate existing communities or engage other possible ones using performance, storytelling, and other artistic methods. The long-term aim is that with community work, we will manage to co-create rituals in order to help us live with this kind of loss. Looking at them through the lens of different cultures and individuals exercises both the ability to extract the universal essence of a ritual, but also the need and freedom to express the specificity of each situation. To be seen and acknowledged by others, but more importantly, to see oneself from outside with dignity, is very powerful. Oftentimes we forget to express, look and appreciate our own stories, and instead, we choose to outcast them.

Keywords: grief, socio-politics of loss, ambiguous loss, rituals

Procedia PDF Downloads 150
3642 Fair Federated Learning in Wireless Communications

Authors: Shayan Mohajer Hamidi

Abstract:

Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy.

Keywords: federated learning, wireless communications, fairness, imbalanced data, privacy preservation, resource allocation, differential privacy, optimization

Procedia PDF Downloads 45
3641 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 122
3640 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 69
3639 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 314
3638 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant

Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park

Abstract:

CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).

Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method

Procedia PDF Downloads 187
3637 Exploring Urbanization-Induced Wetland Loss within the Greater Toronto Area from 2005 To 2015

Authors: Kaushika Vinotheeswaran

Abstract:

The Greater Toronto Area (GTA), located in Ontario, Canada, is among the fastest-growing metropolitan areas in North America. Rapid urbanization within the GTA has led to increased imperviousness and surface runoff, contributing to wetland loss. Wetland cover and land cover data from the Southern Ontario Land Resource Information System were analyzed to characterize wetland loss to built-up areas and land conversions between 2005 and 2015, evaluating the extent of urbanization-induced wetland loss. Spatial analysis revealed a significant increase in the number of wetlands lost from 2005 to 2011 compared to the period from 2011 to 2015, with these losses attributed to increased urban expansions within the GTA. Non-wetland conversions, such as agricultural and impervious built-up uses to support urban expansions, played a significant role in wetland loss. Current approaches to wetland policy implementation and land-use planning strategies do not effectively identify or mitigate damage to wetlands in advance of development, resulting in significant wetland loss. Therefore, wetland conservation policies must be re-evaluated to address gaps in policy practice and focus on minimizing wetland loss.

Keywords: wetland loss, urbanization, impervious, pervious, wetland conservation

Procedia PDF Downloads 21
3636 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26
3635 Using of Particle Swarm Optimization for Loss Minimization of Vector-Controlled Induction Motors

Authors: V. Rashtchi, H. Bizhani, F. R. Tatari

Abstract:

This paper presents a new online loss minimization for an induction motor drive. Among the many loss minimization algorithms (LMAs) for an induction motor, a particle swarm optimization (PSO) has the advantages of fast response and high accuracy. However, the performance of the PSO and other optimization algorithms depend on the accuracy of the modeling of the motor drive and losses. In the development of the loss model, there is always a trade off between accuracy and complexity. This paper presents a new online optimization to determine an optimum flux level for the efficiency optimization of the vector-controlled induction motor drive. An induction motor (IM) model in d-q coordinates is referenced to the rotor magnetizing current. This transformation results in no leakage inductance on the rotor side, thus the decomposition into d-q components in the steady-state motor model can be utilized in deriving the motor loss model. The suggested algorithm is simple for implementation.

Keywords: induction machine, loss minimization, magnetizing current, particle swarm optimization

Procedia PDF Downloads 606
3634 On the Network Packet Loss Tolerance of SVM Based Activity Recognition

Authors: Gamze Uslu, Sebnem Baydere, Alper K. Demir

Abstract:

In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.

Keywords: activity recognition, support vector machines, acceleration sensor, wireless sensor networks, packet loss

Procedia PDF Downloads 444
3633 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers

Authors: Pankhudi Khandelwal

Abstract:

The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.

Keywords: data protection, dominance, ex ante regulation, ex post regulation

Procedia PDF Downloads 135
3632 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens

Authors: Mohamed Saad, Huda Ismail

Abstract:

The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.

Keywords: crime, cryptocurrency, money laundering, tokens.

Procedia PDF Downloads 60
3631 Core Loss Influence on MTPA Current Vector Variation of Synchronous Reluctance Machine

Authors: Huai-Cong Liu, Tae Chul Jeong, Ju Lee

Abstract:

The aim of this study was to develop an electric circuit method (ECM) to ascertain the core loss influence on a Synchronous Reluctance Motor (SynRM) in the condition of the maximum torque per ampere (MTPA). SynRM for fan usually operates on the constant torque region, at synchronous speed the MTPA control is adopted due to current vector. However, finite element analysis (FEA) program is not sufficient exactly to reflect how the core loss influenced on the current vector. This paper proposed a method to calculate the current vector with consideration of core loss. The precision of current vector by ECM is useful for MTPA control. The result shows that ECM analysis is closer to the actual motor’s characteristics by testing with a 7.5kW SynRM drive System.

Keywords: core loss, SynRM, current vector, magnetic saturation, maximum torque per ampere (MTPA)

Procedia PDF Downloads 487
3630 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 211
3629 A Systematic Review with Meta-Analyses Investigating the Association between Binge Eating and Poor Weight Loss Outcomes in People with Obesity

Authors: Isabella Lobo Sasaoka, Felipe Q. da Luz, Zubeyir Salis, Phillipa Hay, Tamiris Gaeta, Paula Costa Teixeira, Táki Cordás, Amanda Sainsbury

Abstract:

Background: A significant number of people with obesity that seek weight loss treatments experience binge eating episodes. Nonetheless, it is unknown whether binge eating episodes can hinder weight loss outcomes. Objective: To compare weight change in people with or without binge eating submitted to bariatric surgery, pharmacotherapy, nutritional orientation, and/or psychological therapies. Method: We conducted a systematic review with meta-analyses by searching studies in PubMed, American Psychological Association (APA), and Embase. Results: Thirty-four studies were included in our systematic review, and 17 studies were included in the meta-analyses. Overall, we found no significant difference in weight loss between people with or without binge eating submitted to any type of weight loss treatment. Additionally, we found no statistically significant differences in body weight between people with or without binge eating at short and long follow-up assessments following any type of weight loss treatment. We also examined changes in body weight in people with or without binge eating in three additional meta-analyses categorized by the type of weight loss treatment (i.e., behavioural and/or nutritional interventions; bariatric surgery; pharmacotherapy isolated or combined with behavior interventions) and found no difference in weight loss. Eleven out of the 17 studies that were assessed qualitatively (i.e., not included in meta-analyses) did not show differences in weight loss in people with or without binge eating submitted to any type of weight loss treatment. Conclusion: This systematic review with meta-analyses showed no difference in weight loss in people with or without binge eating submitted to a variety of weight loss treatments. Nonetheless, specialized therapies can be required to address eating disorder psychopathology and recurrent binge eating in people with obesity that seek weight loss.

Keywords: obesity, binge eating, weight loss, systematic review, meta-analysis

Procedia PDF Downloads 122
3628 Prevalence and Patterns of Hearing Loss among the Elderly with Hypertension in Southwest, Nigeria

Authors: Ayo Osisanya, Promise Ebuka Okonkwo

Abstract:

Reduced hearing sensitivity among the elderly has been attributed to some risk factors and influence of age-related degenerative conditions such as diabetes, cardiovascular disease, Alzheimer’s disease, bipolar disorder, and hypertension. Hearing loss; especially the age-related type (presbycusis), has been reported as one of the global burden affecting the general well-being and quality of life of the elderly with hypertension. Thus, hearing loss has been observed to be associated with hypertension and functional decline in elderly, as this condition makes them experience poor communication, fatigue, reduced social functions, mood-swing, and withdrawal syndrome. Emerging research outcomes indicate a strong relationship between hypertension and reduced auditory performance among the elderly. Therefore, this study determined the prevalence, types, and patterns of hearing loss associated with hypertension, with a bid to suggesting comprehensive management strategies and a model of creating awareness towards promoting good healthy living among the elderly in Nigeria. One hundred and seventy-two elderly, aged 65–85 with hypertension were purposively selected from patients undergoing treatment for hypertension in some tertiary hospitals in southwest Nigeria for the study. Participants were suggested to Pure-Tone Audiometry (PTA) through the use of Maico 53 Diagnostic Audiometer to determine the degree, types ad patterns of hearing loss among the elderly with hypertension. Results showed that 148 (86.05%) elderly with hypertension presented with different degrees, types, and patterns of hearing loss. Out of this number, 123 (83.11%) presented with bilateral hearing loss, while 25 (16.89%) had unilateral hearing loss. Degree of hearing loss, 74 moderate hearing loss, 118 moderately severe and 50 severe hearing loss. 36% of the hearing loss appeared as flat audiometric configuration, 24% were slopping, 19% were rising, while 21% were tough-shaped audiometric configurations. The findings showed high prevalence of hearing loss among the elderly with hypertension in Southwest, Nigeria. Based on the findings, management of elderly with hypertension should include regular audiological rehabilitation and total adherence to hearing conservation principles, otological management, regulation of blood pressure and adequate counselling / follow-up services.

Keywords: auditory performance, elderly, hearing loss, hypertension

Procedia PDF Downloads 266
3627 Processing and Characterization of (Pb0.55Ca0.45) (Fe0.5Nb0.5)O3 and (Pb0.45Ca0.55) (Fe0.5Nb0.5) O3 Dielectric Ceramics

Authors: Shalini Bahel, Maalti Puri, Sukhleen Bindra Narang

Abstract:

Ceramic samples of (Pb0.55Ca0.45) (Fe0.5Nb0.5)O3 and (Pb0.45Ca0.55)(Fe0.5Nb0.5)O3 were synthesized by columbite precursor method and characterized for structural and dielectric properties. Both the synthesized samples have perovskite structure with tetragonal symmetry. The variations in relative permittivity and loss tangent were measured as a function of frequency at room temperature. Both the relative permittivity and loss tangent decreased with increase in frequency. A reasonably high value of relative permittivity of 63.46, loss tangent of 0.0067 at 15 MHz and temperature coefficient of relative permittivity of -82 ppm/˚C was obtained for (Pb0.45Ca0.55) (Fe0.5Nb0.5) O3.

Keywords: loss tangent, perovskite, relative permittivity, X-ray diffraction

Procedia PDF Downloads 241
3626 Evaluation of Expected Annual Loss Probabilities of RC Moment Resisting Frames

Authors: Saemee Jun, Dong-Hyeon Shin, Tae-Sang Ahn, Hyung-Joon Kim

Abstract:

Building loss estimation methodologies which have been advanced considerably in recent decades are usually used to estimate socio and economic impacts resulting from seismic structural damage. In accordance with these methods, this paper presents the evaluation of an annual loss probability of a reinforced concrete moment resisting frame designed according to Korean Building Code. The annual loss probability is defined by (1) a fragility curve obtained from a capacity spectrum method which is similar to a method adopted from HAZUS, and (2) a seismic hazard curve derived from annual frequencies of exceedance per peak ground acceleration. Seismic fragilities are computed to calculate the annual loss probability of a certain structure using functions depending on structural capacity, seismic demand, structural response and the probability of exceeding damage state thresholds. This study carried out a nonlinear static analysis to obtain the capacity of a RC moment resisting frame selected as a prototype building. The analysis results show that the probability of being extensive structural damage in the prototype building is expected to 0.004% in a year.

Keywords: expected annual loss, loss estimation, RC structure, fragility analysis

Procedia PDF Downloads 378
3625 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 142