Search results for: secret authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 310

Search results for: secret authentication

40 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 511
39 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society

Authors: Ada Yurman

Abstract:

Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.

Keywords: militarism, political deviance, social construction, social control

Procedia PDF Downloads 93
38 Nuclear Energy: The Reorientations of the French Public Perception

Authors: Aurélia Jandot

Abstract:

With the oil and economic crises which began in the 1970’s, it has progressively appeared necessary to convince the French “general public“ that a use of new energy sources was essential. In this field, nuclear energy represented the future and concentrated lots of hopes. However, the discourse about nuclear energy has progressively seen negative arguments growing in the French media. The gradual changes in the perception of nuclear energy will be studied here through the arguments given in the main French weekly newsmagazines, which had a great impact on the readers, thus on the “general public“, from the 1970’s to the end of the 1980’s. Indeed, to understand better these changes will be taken into account the major international events, the reorientations of the French domestic policy, and the evolutions of the nuclear technology. As this represents a considerable amount of copies and thus of information, will be selected here the main articles which emphasize the “mental images“ aiming to direct the thought of the readers, and which have led the public awareness and acceptance to evolve. From the 1970’s to the end of the 1980’s, two dichotomous trends are in confrontation : one is promoting the perception of the nuclear energy, the other is discrediting it. Moreover, these two trends are organized in two axes. The first axis is about the engineerings evolutions, such as the main French media represent them, with its approximations, its exaggerations, its fictions sometimes. Is added the will to make accessible to the “general public“ some concepts which are quite difficult to understand for the largest number. The second axis rests on the way the major accidents of the period are approached, including those of Three Mile Island and Chernobyl. Thanks to these accidents and because of the international relations evolutions, the ecologist movements and their impacts have progressively grown, with evident consequences on the public perception of nuclear energy and on the way the successive governments can implement new power plants in France. Then, in both cases, over the period considered, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the newsmagazines editing. This is all these changes that will be emphasized, over a period where the nuclear energy technology, to there a field for specialists, bearing mystery and secret, has become a social issue seemingly open to all.

Keywords: social issues, public acceptance, mediatization, discourse changes

Procedia PDF Downloads 261
37 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 52
36 Phenotypic and Symbiotic Characterization of Rhizobia Isolated from Faba Bean (Vicia faba L.) in Moroccan Soils

Authors: Y. Hajjam, I. T. Alami, S. M. Udupa, S. Cherkaoui

Abstract:

Faba bean (Vicia faba L.) is an important food legume crop in Morocco. It is mainly used as human food and feed for animals. Faba bean also plays an important role in cereal-based cropping systems, when rotated with cereals it improves soil fertility by fixing N2 in root nodules mediated by Rhizobium. Both faba bean and its biological nitrogen fixation symbiotic bacterium Rhizobium are affected by different stresses such as: salinity, drought, pH, heavy metal, and the uptake of inorganic phosphate compounds. Therefore, the aim of the present study was to evaluate the phenotypic diversity among the faba bean rhizobial isolates and to select the tolerant strains that can fix N2 under environmental constraints for inoculation particularly for affected soils, in order to enhance the productivity of faba bean and to improve soil fertility. Result have shown that 62% of isolates were fast growing with the ability of producing acids compounds , while 38% of isolates are slow growing with production of alkalins. Moreover, 42.5% of these isolates were able to solubilize inorganic phosphate Ca3(PO4)2 and the index of solubilization was ranged from 2.1 to 3.0. The resistance to extreme pH, temperature, water stress heavy metals and antibiotics lead us to classify rhizobial isolates into different clusters. Finally, the authentication test under greenhouse conditions showed that 55% of the rhizobial isolates could induce nodule formation on faba bean (Vicia faba L.) under greenhouse experiment. This phenotypic characterization may contribute to improve legumes and non legumes crops especially in affected soils and also to increase agronomic yield in the dry areas.

Keywords: rhizobia, vicia faba, phenotypic characterization, nodule formation, environmental constraints

Procedia PDF Downloads 223
35 Changing Patterns of Marriage and Sexual Relations among Young Single Female Workers in Garment Factories in Gazipur, Bangladesh

Authors: Runa Laila

Abstract:

In Bangladesh, migration and employment opportunities in the ready-made garment factories presented an alternative to early and arranged-marriage to many young women from the countryside. Although the positive impact of young women’s labour migration and employment in the garment industry on economic independence, increased negotiation power, and enhancement of self-esteem have been well documented, impact of employment on sexual norms and practices remained under-researched. This ethnographic study comprising of an in-depth interview of 21 single young women working in various garment factories in Gazipur, Dhaka, explores the implication of work on sexual norms and practices. This study found young single garment workers experience a range of consensual and coercive sexual relations. The mixed-sex work environment in the garment manufacturing industry and private housing arrangements provide young single women opportunities to develop romantic and sexual relationships in the transient urban space, which was more restricted in the rural areas. The use of mobile phones further aids lovers to meet in amusement parks, friends’ houses, or residential hotels beyond the gaze of colleagues and neighbors. Due to sexual double standard, men’s sexual advantage is seen as natural and accepted, while women are being blamed as immoral for being engaged in pre-marital sex. Although self-choice marriage and premarital relations reported to be common among garment workers, stigma related to premarital sex lead young single women to resort to secret abortion practices. Married men also use power position to lure women in a subordinate position in coerce sexual relations, putting their reproductive and psychological health at risk. To improve sexual and reproductive health and wellbeing of young female garment workers, it is important to understand these changing sexual practices which otherwise remain taboo in public health discourses.

Keywords: female migration, ready-made garment, reproductive health, sexual practice

Procedia PDF Downloads 150
34 Tattooing: Personal Markings with Meaning: Themes Uncovered While Making a Video Documentary

Authors: Byrad Yyelland, Robert Bianchi

Abstract:

No longer the secret mark of outlaw bikers, criminals, and sailors, tattooing has become mainstream in much of the world. The current study showcases data gathered for a video documentary on the triangulated relationship connecting tattoos as a form of body modification, cultural norms, and personal meanings. This research has revealed that some religious belief systems, Buddhism in Thailand, is one example, connect tattooing with spirituality in an intimate manner. Buddhist monks provide tattoos using traditional bamboo implements and processes, and they pray over the tattoo, infusing magic into the tattoo and consequently, into the body of the receiver. In contrast, although there is no direct mention of tattooing in the Qur’an, many Islamic scholars argue that permanent tattooing is considered haram—forbidden for Muslims. Only the temporary henna is acceptable. In fact, tattooing is illegal in Qatar. Some Indigenous belief systems in Canada adopt a similar stance on the basis that we were all created by the Creator and as such, we do not have the right to alter what the Creator has made. Still other belief systems such as Spiritism in Brazil and mainstream Christianity in the West are more inclined to regard tattooing as a matter of personal choice. It is practically impossible for any culture to resist the dual impacts of time and globalization. Long term cultural change has resulted in mainstream acceptance of tattooing in the west and increased acceptance in Japan. Short-term cultural change is seen in Qatar where tattoos are on on public display amongst expats and migrant laborers. This tolerance of tattooed individuals was clearly evident with the choice of David Beckham as ambassador for the FIFA World Cup and during the corresponding tourist celebrations. Themes uncovered in this multicultural research also include individual meanings attributed to tattoo imagery and processes, experiences of personal empowerment, devotion to family, personal philosophy, gender identity, and aesthetics.

Keywords: culture, norms, tattooing, spirituality, personal motivations and personal meanings

Procedia PDF Downloads 46
33 Comparative Correlation Investigation of Polynuclear Aromatic Hydrocarbons (PAHs) in Soils of Different Land Uses: Sources Evaluation Perspective

Authors: O. Onoriode Emoyan, E. Eyitemi Akporhonor, Charles Otobrise

Abstract:

Polycyclic Aromatic Hydrocarbons (PAHs) are formed mainly as a result of incomplete combustion of organic materials during industrial, domestic activities or natural occurrence. Their toxicity and contamination of terrestrial and aquatic ecosystem have been established. Though with limited validity index, previous research has focused on PAHs isomer pair ratios of variable physicochemical properties in source identification. The objective of this investigation was to determine the empirical validity of Pearson correlation coefficient (PCC) and cluster analysis (CA) in PAHs source identification along soil samples of different land uses. Therefore, 16 PAHs grouped as endocrine disruption substances (EDSs) were determined in 10 sample stations in top and sub soils seasonally. PAHs was determined the use of Varian 300 gas chromatograph interfaced with flame ionization detector. Instruments and reagents used are of standard and chromatographic grades respectively. PCC and CA results showed that the classification of PAHs along kinetically and thermodyanamically-favoured and those derived directly from plants product through biologically mediated processes used in source signature is about the predominance PAHs are likely to be. Therefore the observed PAHs in the studied stations have trace quantities of the vast majority of the sixteen un-substituted PAHs which may ultimately inhabit the actual source signature authentication. Type and extent of bacterial metabolism, transformation products/substrates, and environmental factors such as: salinity, pH, oxygen concentration, nutrients, light intensity, temperature, co-substrates and environmental medium are hereby recommended as factors to be considered when evaluating possible sources of PAHs.

Keywords: comparative correlation, kinetically and thermodynamically-favored PAHs, pearson correlation coefficient, cluster analysis, sources evaluation

Procedia PDF Downloads 392
32 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access

Authors: Abdul Basit Kiani

Abstract:

The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.

Keywords: software development, empowering digital libraries, digital cataloging and access, management system

Procedia PDF Downloads 41
31 Evaluation of Ficus racemosa (Moraceae) as a Potential Source for Drug Formulation Against Coccidiosis

Authors: Naveeda Akhtar Qureshi, Wajiha

Abstract:

Coccidiosis is a protozoan parasitic disease of genus Eimeria. It is an avian infection causing a great economic loss of 3 billion USD per year globally. A number of anticoccidial drugs are in use however many of them have side effects and cost effective. With increase in poultry demand throughout the world there is a need of more drugs and vaccines against coccidiosis. The present study is based upon the use of F. racemosa a medicinal plant to be a potential source of anticoccidial agents. The methanolic leaves extract was fractionated by column and thin layer chromatography and got nineteen fractions. Each fraction different concentrations was evaluated for its anticoccidial properties in an invitro experiment against E. tenella, E. necatrix and E. mitis. The anticoccidial active fractions were further characterized by spectroscopy (UV-Vis, FTIR) and GC-MS analysis. The in silico molecular docking of active fractions identified compounds were carried out. Among all fractions significantly maximum sporulation inhibition efficacy was shown by F-19 (67.11±2.18) followed by F-15 (65.21±1.34) at concentration of 30mg/ml against E. tenella. The significantly highest sporozoites viability inhibition was shown by F-19 (69.23±2.11) followed by F-15 (67.14±1.52) against E. necatrix at concentration 30mg/ml. Anticoccidial active fractions 15 and 19 showed peak spectrum at 207 and 202nm respectively by UV analysis. Their FTIR analysis confirmed the presence of carboxylic acid, amines, phenols, etc. Anticoccidial active compounds like Cyclododecane methanol, oleic acid, Octadecanoic acid, etc were identified by GC-MS analysis. Identified compounds in silico molecular docking study showed that cyclododecane methanol of F-19 and oleic acid of F-15 showed highest binding affinity with target S-Adenosylmethionine synthase. Hence for further authentication in vivo anticoccidial studies are recommended.

Keywords: ficus racemosa, cluster fig, column chromatography, anticoccidial fractions, GC-MS, molecular docking., s-adenosylmethionine synthase

Procedia PDF Downloads 41
30 The Advantages of Using DNA-Barcoding for Determining the Fraud in Seafood

Authors: Elif Tugce Aksun Tumerkan

Abstract:

Although seafood is an important part of human diet and categorized highly traded food industry internationally, it is remain overlooked generally in the global food security aspect. Food product authentication is the main interest in the aim of both avoids commercial fraud and to consider the risks that might be harmful to human health safety. In recent years, with increasing consumer demand for regarding food content and it's transparency, there are some instrumental analyses emerging for determining food fraud depend on some analytical methodologies such as proteomic and metabolomics. While, fish and seafood consumed as fresh previously, within advanced technology, processed or packaged seafood consumption have increased. After processing or packaging seafood, morphological identification is impossible when some of the external features have been removed. The main fish and seafood quality-related issues are the authentications of seafood contents such as mislabelling products which may be contaminated and replacement partly or completely, by lower quality or cheaper ones. For all mentioned reasons, truthful consistent and easily applicable analytical methods are needed for assurance the correct labelling and verifying of seafood products. DNA-barcoding methods become popular robust that used in taxonomic research for endangered or cryptic species in recent years; they are used for determining food traceability also. In this review, when comparing the other proteomic and metabolic analysis, DNA-based methods are allowing a chance to identification all type of food even as raw, spiced and processed products. This privilege caused by DNA is a comparatively stable molecule than protein and other molecules. Furthermore showing variations in sequence based on different species and founding in all organisms, make DNA-based analysis more preferable. This review was performed to clarify the main advantages of using DNA-barcoding for determining seafood fraud among other techniques.

Keywords: DNA-barcoding, genetic analysis, food fraud, mislabelling, packaged seafood

Procedia PDF Downloads 140
29 Evaluation of Two DNA Extraction Methods for Minimal Porcine (Pork) Detection in Halal Food Sample Mixture Using Taqman Real-time PCR Technique

Authors: Duaa Mughal, Syeda Areeba Nadeem, Shakil Ahmed, Ishtiaq Ahmed Khan

Abstract:

The identification of porcine DNA in Halal food items is critical to ensuring compliance with dietary restrictions and religious beliefs. In Islam, Porcine is prohibited as clearly mentioned in Quran (Surah Al-Baqrah, Ayat 173). The purpose of this study was to compare two DNA extraction procedures for detecting 0.001% of porcine DNA in processed Halal food sample mixtures containing chicken, camel, veal, turkey and goat meat using the TaqMan Real-Time PCR technology. In this research, two different commercial kit protocols were compared. The processed sample mixtures were prepared by spiking known concentration of porcine DNA to non-porcine food matrices. Afterwards, TaqMan Real-Time PCR technique was used to target a particular porcine gene from the extracted DNA samples, which was quantified after extraction. The results of the amplification were evaluated for sensitivity, specificity, and reproducibility. The results of the study demonstrated that two DNA extraction techniques can detect 0.01% of porcine DNA in mixture of Halal food samples. However, as compared to the alternative approach, Eurofins| GeneScan GeneSpin DNA Isolation kit showed more effective sensitivity and specificity. Furthermore, the commercial kit-based approach showed great repeatability with minimal variance across repeats. Quantification of DNA was done by using fluorometric assay. In conclusion, the comparison of DNA extraction methods for detecting porcine DNA in Halal food sample mixes using the TaqMan Real-Time PCR technology reveals that the commercial kit-based approach outperforms the other methods in terms of sensitivity, specificity, and repeatability. This research helps to promote the development of reliable and standardized techniques for detecting porcine DNA in Halal food items, religious conformity and assuring nutritional.

Keywords: real time PCR (qPCR), DNA extraction, porcine DNA, halal food authentication, religious conformity

Procedia PDF Downloads 35
28 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 34
27 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348
26 The Diary of Dracula, by Marin Mincu: Inquiries into a Romanian 'Book of Wisdom' as a Fictional Counterpart for Corpus Hermeticum

Authors: Lucian Vasile Bagiu, Paraschiva Bagiu

Abstract:

The novel written in Italian and published in Italy in 1992 by the Romanian scholar Marin Mincu is meant for the foreign reader, aiming apparently at a better knowledge of the historical character of Vlad the Empalor (Vlad Dracul), within the European cultural, political and historical context of 1463. Throughout the very well written tome, one comes to realize that one of the underlining levels of the fiction is the exposing of various fundamental features of the Romanian culture and civilization. The author of the diary, Dracula, makes mention of Corpus Hermeticum no less than fifteen times, suggesting his own diary is some sort of a philosophical counterpart. The essay focuses on several ‘truths’ and ‘wisdom’ revealed in the fictional teachings of Dracula. The boycott of History by the Romanians is identified as an echo of the philosophical approach of the famous Romanian scholar and writer Lucian Blaga. The orality of the Romanian culture is a landmark opposed to written culture of the Western Europe. The religion of the ancient Dacian God Zalmoxis is seen as the basis for the Romanian existential and/or metaphysical ethnic philosophy (a feature tackled by the famous Romanian historian of religion Mircea Eliade), with a suggestion that Hermes Trismegistus may have written his Corpus Hermeticum being influenced by Zalmoxis. The historical figure of the last Dacian king Decebalus (death 106 AD) is a good pretext for a tantalizing Indo-European suggestion that the prehistoric Thraco-Dacian people may have been the ancestors of the first Romans settled in Latium. The lost diary of the Emperor Trajan The Bello Dacico may have proved that the unknown language of the Dacians was very much alike Latin language (a secret well hidden by the Vatican). The attitude towards death of the Dacians, as described by Herodotus, may have later inspired Pitagora, Socrates, the Eleusinian and Orphic Mysteries, etc. All of these within the Humanistic and Renascentist European context of the epoch, Dracula having a close relationship with scholars such as Nicolaus Cusanus, Cosimo de Medici, Marsilio Ficino, Pope Pius II, etc. Thus The Diary of Dracula turns out as exciting and stupefying as Corpus Hermeticum, a book impossible to assimilate entirely, yet a reference not wise to be ignored.

Keywords: Corpus Hermeticum, Dacians, Dracula, Zalmoxis

Procedia PDF Downloads 131
25 A Fine String between Weaving the Text and Patching It: Reading beyond the Hidden Symbols and Antithetical Relationships in the Classical and Modern Arabic Poetry

Authors: Rima Abu Jaber-Bransi, Rawya Jarjoura Burbara

Abstract:

This study reveals the extension and continuity between the classical Arabic poetry and modern Arabic poetry through investigation of its ambiguity, symbolism, and antithetical relationships. The significance of this study lies in its exploration and discovering of a new method of reading classical and modern Arabic poetry. The study deals with the Fatimid poetry and discovers a new method to read it. It also deals with the relationship between the apparent and the hidden meanings of words through focusing on how the paradoxical antithetical relationships change the meaning of the whole poem and give it a different dimension through the use of Oxymorons. In our unprecedented research on Oxymoron, we found out that the words in modern Arabic poetry are used in unusual combinations that convey apparent and hidden meanings. In some cases, the poet introduces an image with a symbol of a certain thing, but the reader soon discovers that the symbol includes its opposite, too. The question is: How does the reader find that hidden harmony in that apparent disharmony? The first and most important conclusion of this study is that the Fatimid poetry was written for two types of readers: religious readers who know the religious symbols and the hidden secret meanings behind the words, and ordinary readers who understand the apparent literal meaning of the words. Consequently, the interpretation of the poem is subject to the type of reading. In Fatimid poetry we found out that the hunting-journey is a journey of hidden esoteric knowledge; the Horse is al-Naqib, a religious rank of the investigator and missionary; the Lion is Ali Ibn Abi Talib. The words black and white, day and night, bird, death and murder have different meanings and indications. Our study points out the importance of reading certain poems in certain periods in two different ways: the first depends on a doctrinal interpretation that transforms the external apparent (ẓāher) meanings into internal inner hidden esoteric (bāṭen) ones; the second depends on the interpretation of antithetical relationships between the words in order to reveal meanings that the poet hid for a reader who participates in the processes of creativity. The second conclusion is that the classical poem employed symbols, oxymora and antonymous and antithetical forms to create two poetic texts in one mold and form. We can conclude that this study is pioneering in showing the constant paradoxical relationship between the apparent and the hidden meanings in classical and modern Arabic poetry.

Keywords: apparent, symbol, hidden, antithetical, oxymoron, Sophism, Fatimid poetry

Procedia PDF Downloads 233
24 Unlocking Health Insights: Studying Data for Better Care

Authors: Valentina Marutyan

Abstract:

Healthcare data mining is a rapidly developing field at the intersection of technology and medicine that has the potential to change our understanding and approach to providing healthcare. Healthcare and data mining is the process of examining huge amounts of data to extract useful information that can be applied in order to improve patient care, treatment effectiveness, and overall healthcare delivery. This field looks for patterns, trends, and correlations in a variety of healthcare datasets, such as electronic health records (EHRs), medical imaging, patient demographics, and treatment histories. To accomplish this, it uses advanced analytical approaches. Predictive analysis using historical patient data is a major area of interest in healthcare data mining. This enables doctors to get involved early to prevent problems or improve results for patients. It also assists in early disease detection and customized treatment planning for every person. Doctors can customize a patient's care by looking at their medical history, genetic profile, current and previous therapies. In this way, treatments can be more effective and have fewer negative consequences. Moreover, helping patients, it improves the efficiency of hospitals. It helps them determine the number of beds or doctors they require in regard to the number of patients they expect. In this project are used models like logistic regression, random forests, and neural networks for predicting diseases and analyzing medical images. Patients were helped by algorithms such as k-means, and connections between treatments and patient responses were identified by association rule mining. Time series techniques helped in resource management by predicting patient admissions. These methods improved healthcare decision-making and personalized treatment. Also, healthcare data mining must deal with difficulties such as bad data quality, privacy challenges, managing large and complicated datasets, ensuring the reliability of models, managing biases, limited data sharing, and regulatory compliance. Finally, secret code of data mining in healthcare helps medical professionals and hospitals make better decisions, treat patients more efficiently, and work more efficiently. It ultimately comes down to using data to improve treatment, make better choices, and simplify hospital operations for all patients.

Keywords: data mining, healthcare, big data, large amounts of data

Procedia PDF Downloads 32
23 Investigating Suicide Cases in Attica, Greece: Insight from an Autopsy-Based Study

Authors: Ioannis N. Sergentanis, Stavroula Papadodima, Maria Tsellou, Dimitrios Vlachodimitropoulos, Sotirios Athanaselis, Chara Spiliopoulou

Abstract:

Introduction: The aim of this study is the investigation of characteristics of suicide, as documented in autopsies during a five-year interval in the greater area of Attica, including the city of Athens. This could reveal possible protective or aggravating factors for suicide risk during a period strongly associated with the Greek debt crisis. Materials and Methods: Data was obtained following registration of suicide cases among autopsies performed in the Forensic Medicine and Toxicology Department, School of Medicine, National and Kapodistrian University of Athens, Greece, during the time interval from January 2011 to December 2015. Anonymity and medical secret were respected. A series of demographic and social factors in addition to special characteristics of suicide were entered into a specially established pre-coded database. These factors include social data as well as psychiatric background and certain autopsy characteristics. Data analysis was performed using descriptive statistics and Fisher’s exact test. The software used was STATA/SE 13 (Stata Corp., College Station, TX, USA). Results: A total of 162 cases were studied, 128 men and 34 women. Age ranged from 14 to 97 years old with an average of 53 years, presenting two peaks around 40 and 60 years. A 56% of cases were single/ divorced/ widowed. 25% of cases occurred during the weekend, and 66% of cases occurred in the house. A predominance of hanging as the leading method of suicide (41.4%) followed by jumping from a height (22.8%) and firearms (19.1%) was noted. Statistical analysis showed an association was found between suicide method and gender (P < 0.001, Fisher’s exact test); specifically, no woman used a firearm while only one man used medication overdose (against four women). Discussion: Greece has historically been one of the countries with the lowest suicide rates in Europe. Given a possible change in suicide trends during the financial crisis, further research seems necessary in order to establish risk factors. According to our study, suicide is more frequent in men who are not married, inside their house. Gender seems to be a factor affecting the method of suicide. These results seem in accordance with the international literature. Stronger than expected predominance in male suicide can be associated with failure to live up to social and family expectations for financial reasons.

Keywords: autopsy, Greece, risk factors, suicide

Procedia PDF Downloads 193
22 Multi-Elemental Analysis Using Inductively Coupled Plasma Mass Spectrometry for the Geographical Origin Discrimination of Greek Giant Beans “Gigantes Elefantes”

Authors: Eleni C. Mazarakioti, Anastasios Zotos, Anna-Akrivi Thomatou, Efthimios Kokkotos, Achilleas Kontogeorgos, Athanasios Ladavos, Angelos Patakas

Abstract:

“Gigantes Elefantes” is a particularly dynamic crop of giant beans cultivated in western Macedonia (Greece). This variety of large beans growing in this area and specifically in the regions of Prespes and Kastoria is a protected designation of origin (PDO) species with high nutritional quality. Mislabeling of geographical origin and blending with unidentified samples are common fraudulent practices in Greek food market with financial and possible health consequences. In the last decades, multi-elemental composition analysis has been used in identifying the geographical origin of foods and agricultural products. In an attempt to discriminate the authenticity of Greek beans, multi-elemental analysis (Ag, Al, As, B, Ba, Be, Ca, Cd, Co, Cr, Cs, Cu, Fe, Ga, Ge, K, Li, Mg, Mn, Mo, Na, Nb, Ni, P, Pb, Rb, Re, Se, Sr, Ta, Ti, Tl, U, V, W, Zn, Zr) was performed by inductively coupled plasma mass spectrometry (ICP-MS) on 320 samples of beans, originated from Greece (Prespes and Kastoria), China and Poland. All samples were collected during the autumn of 2021. The obtained data were analysed by principal component analysis (PCA), an unsupervised statistical method, which allows for to reduce of the dimensionality of the enormous datasets. Statistical analysis revealed a clear separation of beans that had been cultivated in Greece compared with those from China and Poland. An adequate discrimination of geographical origin between bean samples originating from the two Greece regions, Prespes and Kastoria, was also evident. Our results suggest that multi-elemental analysis combined with the appropriate multivariate statistical method could be a useful tool for bean’s geographical authentication. Acknowledgment: This research has been financed by the Public Investment Programme/General Secretariat for Research and Innovation, under the call “YPOERGO 3, code 2018SE01300000: project title: ‘Elaboration and implementation of methodology for authenticity and geographical origin assessment of agricultural products.

Keywords: geographical origin, authenticity, multi-elemental analysis, beans, ICP-MS, PCA

Procedia PDF Downloads 46
21 'Sex, Work and Sex-Work': The Clandestine Tale of a Tabooed Industry in Bangladesh

Authors: Parvez Sattar

Abstract:

There are around 150,000 female sex workers in Bangladesh, and the country hosts one of the largest brothels in the world. There are 20 brothel-villages in the country, of which 14 are recognized to be ‘official’, and at least 11 are currently operational. Although the national Constitution adopts a preventive policy against prostitution, law does not, as such, prohibit commercial sex work by an adult woman working in a brothel having made an affidavit in this regard. But, at the same time, the law renders at least some forms of floating and hotel based sex work illegal, while sex between males has been termed as sodomy and made culpable offence even on its own. All forms of sex works by MSM and Hijra are thus branded as criminal acts. Observations and findings drawn in this article are based on both primary and secondary sources collecting data from a series of field-based empirical studies conducted by the author through questionnaire survey, FGDs, key informant consultations and other PRA/PLA tools. General and specific conclusions have been based on analysis guided by international standards of human and labour rights approaches. It has been noted that neither the community attitudes nor the cultural mind-sets, or the State's institutional set up is supportive of the causes of sex workers engaged in the most exploitative forms of labour. Lack of respect for fundamental rights continues to diminish any chances of sex workers' reintegration to the mainstream of the society, perpetuates poverty, and increases their vulnerability to HIV/AIDS. To aggravate the scenario, the endemic practice of a complex debt-bondage masked by the so-called 'entry-cost' and ‘legal license’ to the industry is considered to be a somewhat accepted 'open secret' and that the police and administration keep their eyes off from such practices treating these as 'their internal affairs'. Often these practices are used by the Sardarni/Khala (landlady) and other 'managing' actors as the tool for further exploitation of the sex workers as well as a 'control strategy'. The paper concludes with the observation that the tabooed truths of commercial sex and sex workers are inherently embedded in the very factors that compel them into this endemically ostracised profession itself. While denial of both recognition and enjoyment of the fundamental human rights of sex workers is widespread, it is the same cycle of social vulnerability and economic exclusion that often confines these people within a continuous process of servitude and modern day slavery.

Keywords: commercial sex work and human rights, Labor protection in sex industry, Prostitution Law in Bangladesh, Sex work as modern day slavery

Procedia PDF Downloads 86
20 Ecological Crisis: A Buddhist Approach

Authors: Jaharlal Debbarma

Abstract:

The ecological crisis has become a threat to earth’s well-being. Man’s ambitious desire of wealth, pleasure, fame, longevity and happiness has extracted natural resources so vastly that it is unable to sustain a healthy life. Man’s greed for wealth and power has caused the setting up of vast factories which further created the problem of air, water and noise pollution, which have adversely affected both fauna and flora.It is no secret that man uses his inherent powers of reason, intelligence and creativity to change his environment for his advantage. But man is not aware that the moral force he himself creates brings about corresponding changes in his environment to his weal or woe whether he likes it or not. As we are facing the global warming and the nature’s gift such as air and water has been so drastically polluted with disastrous consequences that man seek for a ways and means to overcome all this pollution problem as his health and life sustainability has been threaten and that is where man try to question about the moral ethics and value.It is where Buddhist philosophy has been emphasized deeply which gives us hope for overcoming this entire problem as Buddha himself emphasized in eradicating human suffering and Buddhism is the strongest form of humanism we have. It helps us to learn to live with responsibility, compassion, and loving kindness.It teaches us to be mindful in our action and thought as the environment unites every human being. If we fail to save it we will perish. If we can rise to meet the need to all which ecology binds us - humans, other species, other everything will survive together.My paper will look into the theory of Dependent Origination (Pratītyasamutpāda), Buddhist understanding of suffering (collective suffering), and Non-violence (Ahimsa) and an effort will be made to provide a new vision to Buddhist ecological perspective. The above Buddhist philosophy will be applied to ethical values and belief systems of modern society. The challenge will be substantially to transform the modern individualistic and consumeristic values. The stress will be made on the interconnectedness of the nature and the relation between human and planetary sustainability. In a way environmental crisis will be referred to “spiritual crisis” as A. Gore (1992) has pointed out. The paper will also give important to global consciousness, as well as to self-actualization and self-fulfillment. In the words of Melvin McLeod “Only when we combine environmentalism with spiritual practice, will we find the tools to make the profound personal transformations needed to address the planetary crisis?”

Keywords: dependent arising, collective ecological suffering, remediation, Buddhist approach

Procedia PDF Downloads 238
19 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 91
18 The Policia Internacional e de Defesa do Estado 1933–1969 and Valtiollinen Poliisi 1939–1948 on Screen: Comparing and Contrasting the Images of the Political Police in Portuguese and Finnish Films between the 1930s and the 1960s

Authors: Riikka Elina Kallio

Abstract:

“The walls have ears” phrase is defining the era of dictatorship in Portugal (1926–1974) and political unrest decades in Finland (1917–1948). The phrase is referring to the policing of the political, secret police, PIDE (Policia Internacional e de Defesa do Estado 1933–1969) in Portugal and VALPO (Valtiollinen Poliisi 1939–1948) in Finland. Free speech at any public space and even in private events could be fatal. The members of the PIDE/VALPO or informers/collaborators could be listening. Strict censorship under the Salazar´s regime was controlling media for example newspapers, music, and the film industry. Similarly, the politically affected censorship influenced the media in Finland in those unrest decades. This article examines the similarities and the differences in the images of the political police in Finland and Portugal, by analyzing Finnish and Portuguese films from the nineteen-thirties to nineteensixties. The text addresses two main research questions: what are the common and different features in the representations of the Finnish and Portuguese political police in films between the 1930s and 1960s, and how did the national censorship affect these representations? This study approach is interdisciplinary, and it combines film studies and criminology. Close reading is a practical qualitative method for analyzing films and in this study, close reading emphasizes the features of the police officer. Criminology provides the methodological tools for analysis of the police universal features and European common policies. The characterization of the police in this study is based on Robert Reiner´s 1980s and Timo Korander´s 2010s definitions of the police officer. The research material consisted of the Portuguese films from online film archives and Finnish films from Movie Making Finland -project´s metadata which offered suitable material by data mining the keywords such as poliisi, poliisipäällikkö and konstaapeli (police, police chief, police constable). The findings of this study suggest that even though there are common features of the images of the political police in Finland and Portugal, there are still national and cultural differences in the representations of the political police and policing.

Keywords: censorship, film studies, images, PIDE, political police, VALPO

Procedia PDF Downloads 35
17 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts

Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter

Abstract:

Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).

Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings

Procedia PDF Downloads 83
16 The Convention of Culture: A Comprehensive Study on Dispute Resolution Pertaining to Heritage and Related Issues

Authors: Bhargavi G. Iyer, Ojaswi Bhagat

Abstract:

In recent years, there has been a lot of discussion about ethnic imbalance and diversity in the international context. Arbitration is now subject to the hegemony of a small number of people who are constantly reappointed. When a court system becomes exclusionary, the quality of adjudication suffers significantly. In such a framework, there is a misalignment between adjudicators' preconceived views and the interests of the parties, resulting in a biased view of the proceedings. The world is currently witnessing a slew of intellectual property battles around cultural appropriation. The term "cultural appropriation" refers to the industrial west's theft of indigenous culture, usually for fashion, aesthetic, or dramatic purposes. Selena Gomez exemplifies cultural appropriation by commercially using the “bindi,” which is sacred to Hinduism, as a fashion symbol. In another case, Victoria's Secret insulted indigenous peoples' genocide by stealing native Indian headdresses. In the case of yoga, a similar process can be witnessed, with Vedic philosophy being reduced to a type of physical practice. Such a viewpoint is problematic since indigenous groups have worked hard for generations to ensure the survival of their culture, and its appropriation by the western world for purely aesthetic and theatrical purposes is upsetting to those who practise such cultures. Because such conflicts involve numerous jurisdictions, they must be resolved through international arbitration. However, these conflicts are already being litigated, and the aggrieved parties, namely developing nations, do not believe it prudent to use the World Intellectual Property Organization's (WIPO) already established arbitration procedure. This practise, it is suggested in this study, is the outcome of Europe's exclusionary arbitral system, which fails to recognise the non-legal and non-commercial nature of indigenous culture issues. This research paper proposes a more comprehensive, inclusive approach that recognises the non-legal and non-commercial aspects of IP disputes involving cultural appropriation, which can only be achieved through an ethnically balanced arbitration structure. This paper also aspires to expound upon the benefits of arbitration and other means of alternative dispute resolution (ADR) in the context of disputes pertaining to cultural issues; positing that inclusivity is a solution to the existing discord between international practices and localised cultural points of dispute. This paper also hopes to explicate measures that will facilitate ensuring inclusion and ideal practices in the domain of arbitration law, particularly pertaining to cultural heritage and indigenous expression.

Keywords: arbitration law, cultural appropriation, dispute resolution, heritage, intellectual property

Procedia PDF Downloads 112
15 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 60
14 Strategies of Translation: Unlocking the Secret of 'Locksley Hall'

Authors: Raja Lahiani

Abstract:

'Locksley Hall' is a poem that Lord Alfred Tennyson (1809-1892) published in 1842. It is believed to be his first attempt to face as a poet some of the most painful of his experiences, as it is a study of his rising out of sickness into health, conquering his selfish sorrow by faith and hope. So far, in Victorian scholarship as in modern criticism, 'Locksley Hall' has been studied and approached as a canonical Victorian English poem. The aim of this project is to prove that some strategies of translation were used in this poem in such a way as to guarantee its assimilation into the English canon and hence efface to a large extent its Arabic roots. In its relationship with its source text, 'Locksley Hall' is at the same time mimetic and imitative. As part of the terminology used in translation studies, ‘imitation’ means almost the exact opposite of what it means in ordinary English. By adopting an imitative procedure, a translator would do something totally different from the original author, wandering far and freely from the words and sense of the original text. An imitation is thus aimed at an audience which wants the work of the particular translator rather than the work of the original poet. Hallam Tennyson, the poet’s biographer, asserts that 'Locksley Hall' is a simple invention of place, incidents, and people, though he notes that he remembers the poet claiming that Sir William Jones’ prose translation of the Mu‘allaqat (pre-Islamic poems) gave him the idea of the poem. A comparative work would prove that 'Locksley Hall' mirrors a great deal of Tennyson’s biography and hence is not a simple invention of details as asserted by his biographer. It would be challenging to prove that 'Locksley Hall' shares so many details with the Mu‘allaqat, as declared by Tennyson himself, that it needs to be studied as an imitation of the Mu‘allaqat of Imru’ al-Qays and ‘Antara in addition to its being a poem in its own right. Thus, the main aim of this work is to unveil the imitative and mimetic strategies used by Tennyson in his composition of 'Locksley Hall.' It is equally important that this project researches the acculturating assimilative tools used by the poet to root his poem in its Victorian English literary, cultural and spatiotemporal settings. This work adopts a comparative methodology. Comparison is done at different levels. The poem will be contextualized in its Victorian English literary framework. Alien details related to structure, socio-spatial setting, imagery and sound effects shall be compared to Arabic poems from the Mu‘allaqat collection. This would determine whether the poem is a translation, an adaption, an imitation or a genuine work. The ultimate objective of the project is to unveil in this canonical poem a new dimension that has for long been either marginalized or ignored. By proving that 'Locksley Hall' is an imitation of classical Arabic poetry, the project aspires to consolidate its literary value and open up new gates of accessing it.

Keywords: comparative literature, imitation, Locksley Hall, Lord Alfred Tennyson, translation, Victorian poetry

Procedia PDF Downloads 176
13 Modern Contraceptives versus Traditional Contraceptives and Abortion: An Ethnography of Fertiliy Control Practices in Burkina Faso

Authors: Seydou Drabo

Abstract:

This paper examines how traditional contraceptives and abortion practices challenges the use of modern contraceptives in Burkina Faso. It demonstrates how fears and ‘superstitions’ interact with knowledge about modern contraceptives methods to determine use in a context where other way of controlling fertility (traditional contraceptives, abortion) are available to women in the public, private and traditional health sectors. Furthermore, these issues come at the time when Burkina Faso is among countries with a high fertility rate which (6.0 in 2010) and a very low used of contraceptives as only 16% of married women of childbearing age were using a contraceptive method in 2010. The country also has a young population since 33 % of the population is between 10-24 years old and this number is expected to increase by 2050, generating fears that a growing population of youth will put excessive pressure on available resources, including access to education, health services, and employment. Despite over two decades of dedicated policy attention, 24% of women of reproductive age (15-49) was estimated to have an unmet need for contraception in 2010. This paper draws on ethnographic fieldwork conducted since march 2016 (The research is still in progress) in Burkina Faso. Data were collected from 25 women (users and non-users of modern contraceptives and /or traditional contraceptives, post abortion care patients), 4 street drugs vendors and 3 traditional healers through formal and informal interviews, as well as direct observation. The findings show that a variety of contraceptives methods and abortion drugs or methods, both traditional and modern circulate and are available to women. Traditional contraceptives called African contraceptives by some of our participants refer to several birth control method including plants decoction, magical ring, waist necklace, a ritual done with a mixture of lay coming from termite mound and menses. Abortion is a practice that is done in secret through the use of abortion drugs or through intra uterine manoeuvres. Modern contraceptives include Oral contraceptive, implants, injectable. Stereotypes about modern contraceptives, having regular menstrual cycles and adopt of natural birth control methods, bad experience with modern contraceptives methods, the side effect of modern contraceptives, irregularity of sexual activities and the availability of emergency contraceptives are among factors that limit their use among women. In addition, a negative perception is built around modern contraceptives seen as the drug of ‘white people’. In general, the information on these drugs circulates in women’s social network (first line of information on contraceptive). Some women prefer using what they call African contraceptives or inducing an abortion over modern contraceptives because of their side effect. Furthermore, the findings show that women practices and attitudes in controlling birth varies throughout different phases of their lives. Beyond global discourses and technical solution, the issue of Family planning is all about social practices.

Keywords: abortion, Burkina Faso, contraception, culture, women

Procedia PDF Downloads 166
12 Sculpted Forms and Sensitive Spaces: Walking through the Underground in Naples

Authors: Chiara Barone

Abstract:

In Naples, the visible architecture is only what emerges from the underground. Caves and tunnels cross it in every direction, intertwining with each other. They are not natural caves but spaces built by removing what is superfluous in order to dig a form out of the material. Architects, as sculptors of space, do not determine the exterior, what surrounds the volume and in which the forms live, but an interior underground space, perceptive and sensitive, able to generate new emotions each time. It is an intracorporeal architecture linked to the body, not in its external relationships, but rather with what happens inside. The proposed aims to reflect on the design of underground spaces in the Neapolitan city. The idea is to intend the underground as a spectacular museum of the city, an opportunity to learn in situ the history of the place along an unpredictable itinerary that crosses the caves and, in certain points, emerges, escaping from the world of shadows. Starting form the analysis and the study of the many overlapping elements, the archaeological one, the geological layer and the contemporary city above, it is possible to develop realistic alternatives for underground itineraries. The objective is to define minor paths to ensure the continuity between the touristic flows and entire underground segments already investigated but now disconnected: open-air paths, which abyss in the earth, retracing historical and preserved fragments. The visitor, in this way, passes from real spaces to sensitive spaces, in which the imaginary replaces the real experience, running towards exciting and secret knowledge. To safeguard the complex framework of the historical-artistic values, it is essential to use a multidisciplinary methodology based on a global approach. Moreover, it is essential to refer to similar design projects for the archaeological underground, capable of guide action strategies, looking at similar conditions in other cities, where the project has led to an enhancement of the heritage in the city. The research limits the field of investigation, by choosing the historic center of Naples, applying bibliographic and theoretical research to a real place. First of all, it’s necessary to deepen the places’ knowledge understanding the potentialities of the project as a link between what is below and what is above. Starting from a scientific approach, in which theory and practice are constantly intertwined through the architectural project, the major contribution is to provide possible alternative configurations for the underground space and its relationship with the city above, understanding how the condition of transition, as passage between the below and the above becomes structuring in the design process. Starting from the consideration of the underground as both a real physical place and a sensitive place, which engages the memory, imagination, and sensitivity of a man, the research aims at identifying possible configurations and actions useful for future urban programs to make the underground a central part of the lived city, again.

Keywords: underground paths, invisible ruins, imaginary, sculpted forms, sensitive spaces, Naples

Procedia PDF Downloads 72
11 Theoretical Framework and Empirical Simulation of Policy Design on Trans-Dimensional Resource Recycling

Authors: Yufeng Wu, Yifan Gu, Bin Li, Wei Wang

Abstract:

Resource recycling process contains a subsystem with interactions of three dimensions including coupling allocation of primary and secondary resources, responsibility coordination of stakeholders in forward and reverse supply chains, and trans-boundary transfer of hidden resource and environmental responsibilities between regions. Overlap or lack of responsibilities is easy to appear at the intersection of the three management dimensions. It is urgent to make an overall design of the policy system for recycling resources. From theoretical perspective, this paper analyzes the unique external differences of resource and environment in various dimensions and explores the reason why the effects of trans-dimensional policies are strongly correlated. Taking the example of the copper resources contained in the waste electrical and electronic equipment, this paper constructs reduction effect accounting model of resources recycling and set four trans-dimensional policy scenarios including resources tax and environmental tax reform of the raw and secondary resources, application of extended producer responsibility system, promotion of clean development mechanism, and strict entry barriers of imported wastes. In these ways, the paper simulates the impact effect of resources recycling process on resource deduction and emission reduction of waste water and gas, and constructs trans-dimensional policy mix scenario through integrating dominant strategy. The results show that combined application of various dimensional policies can achieve incentive compatibility and the trans-dimensional policy mix scenario can reach a better effect. Compared with baseline scenario, this scenario will increase 91.06% copper resources reduction effect and improve emission reduction of waste water and gas by eight times from 2010 to 2030. This paper further analyzes the development orientation of policies in various dimension. In resource dimension, the combined application of compulsory, market and authentication methods should be promoted to improve the use ratio of secondary resources. In supply chain dimension, resource value, residual functional value and potential information value contained in waste products should be fully excavated to construct a circular business system. In regional dimension, it should give full play to the comparative advantages of manufacturing power to improve China’s voice in resource recycling in the world.

Keywords: resource recycling, trans-dimension, policy design, incentive compatibility, life cycle

Procedia PDF Downloads 98