Search results for: secret societies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 720

Search results for: secret societies

540 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 140
539 There Is Nothing "BASIC" about Numeracy in Higher Education-a Case Study from an Accounting Programme

Authors: Shoba Rathilal

Abstract:

Numeracy, like Literacy is considered to be a core value of modern societies. Most higher education institutions in South Africa include being numerate as an important graduate attribute. It is argued that a suitability numerate society contributes to social justice, empowerment, financial and environmental sustainability and a lack of numeracy practices can contribute to disempowerment. Numeracy is commonly misconstrued as a basic and simple practice, similar in nature to basic arithmetic. This study highlights the complexities of higher education numeracy practices by analyzing a programme in a higher education institution in South Africa using the New Literacies Studies perspective.

Keywords: higher education, new literacy studies, numeracy practices, BASIC

Procedia PDF Downloads 420
538 Hate Speech Detection Using Deep Learning and Machine Learning Models

Authors: Nabil Shawkat, Jamil Saquer

Abstract:

Social media has accelerated our ability to engage with others and eliminated many communication barriers. On the other hand, the widespread use of social media resulted in an increase in online hate speech. This has drastic impacts on vulnerable individuals and societies. Therefore, it is critical to detect hate speech to prevent innocent users and vulnerable communities from becoming victims of hate speech. We investigate the performance of different deep learning and machine learning algorithms on three different datasets. Our results show that the BERT model gives the best performance among all the models by achieving an F1-score of 90.6% on one of the datasets and F1-scores of 89.7% and 88.2% on the other two datasets.

Keywords: hate speech, machine learning, deep learning, abusive words, social media, text classification

Procedia PDF Downloads 102
537 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 265
536 Problems Confronting the Teaching of Sex Education in Some Selected Secondary Schools in the Akoko Region of Ondo State, Nigeria

Authors: Jimoh Abiodun Alaba

Abstract:

Context: In many traditional African societies, sex education is often considered a taboo topic. However, the importance of sex education is becoming increasingly evident. This study aims to investigate the challenges faced in teaching sex education in selected secondary schools in the Akoko region of Ondo state, Nigeria. Research Aim: The aim of this study is to identify and examine the problems confronting the teaching of sex education in selected secondary schools in the Akoko region of Ondo state, Nigeria. Methodology: The study utilized a multi-stage sampling method. The first stage involved a purposive selection of ten (10) secondary schools in the Akoko region of Ondo State, while the second stage was a random selection of twenty (20) students, each in the selected secondary schools of the study area. This makes a total of two (200) hundred students that were considered for the survey. Descriptive analysis using percentages was employed to analyze the collected data. Factor analysis was also used to identify the most significant problems. Findings: The study revealed that sex education has been neglected in the sampled secondary schools due to traditional African beliefs that do not support the teaching and learning of this subject. Furthermore, there was evidence to suggest that parents also displayed reluctance towards the teaching of sex education, fearing that it might expose students to inappropriate behavior. Consequently, students were deprived of this essential aspect of education necessary for self-awareness and development. Theoretical Importance: This study contributes to the understanding of the challenges faced in teaching sex education in traditional African societies, specifically in the selected secondary schools in the Akoko region of Ondo state, Nigeria. Data Collection: Data were collected through the administration of 200 questionnaires in ten selected secondary schools. Additionally, information was gathered from federal, state, and local government authorities. Analysis Procedures: The collected data were analyzed using descriptive analysis, employing percentage calculations for better interpretation. Furthermore, factor analysis was conducted to isolate the most significant problems identified. Conclusion: The study concludes that sex education in the sampled secondary schools in the Akoko region of Ondo state, Nigeria, has suffered neglect due to traditional African beliefs and parental concerns. Consequently, students are denied an important aspect of education necessary for their self-awareness and development. Recommendations are made to change the negative perception of sex education, enrich the curriculum, and employ qualified personnel for its teaching. Additionally, it is suggested that sex education should be integrated with moral instruction.

Keywords: African traditional belief, sex, sex education, sexual misdemeanor, morality

Procedia PDF Downloads 43
535 Predicting the Success of Bank Telemarketing Using Artificial Neural Network

Authors: Mokrane Selma

Abstract:

The shift towards decision making (DM) based on artificial intelligence (AI) techniques will change the way in which consumer markets and our societies function. Through AI, predictive analytics is being used by businesses to identify these patterns and major trends with the objective to improve the DM and influence future business outcomes. This paper proposes an Artificial Neural Network (ANN) approach to predict the success of telemarketing calls for selling bank long-term deposits. To validate the proposed model, we uses the bank marketing data of 41188 phone calls. The ANN attains 98.93% of accuracy which outperforms other conventional classifiers and confirms that it is credible and valuable approach for telemarketing campaign managers.

Keywords: bank telemarketing, prediction, decision making, artificial intelligence, artificial neural network

Procedia PDF Downloads 113
534 The Secret Ingredient of Student Involvement: Applied Science Case Studies to Enhance Sustainability

Authors: Elizelle Juanee Cilliers

Abstract:

Recent planning thinking has laid the foundations for a general sense of best practice that aims to enhance the quality of life, suggesting an open and participatory process. It is accepted that integration of top-down and bottom-up approaches may lead to efficient action in environments and sustainable planning and development, although it is also accepted that such an integrated approach has various challenges of implementation. A flexible framework in which the strengths of both the top-down and bottom-up approaches were explored in this research, based on the EU Interreg VALUE Added project and five case studies where student education and student involvement played a crucial role within the participation process of the redesign of the urban environment. It was found that international student workshops were an effective tool to integrate bottom-up and top-down structures, as it acted as catalyst for communication, interaction, creative design, quick transformation from planning to implementation, building social cohesion, finding mutual ground between stakeholders and thus enhancing overall quality of life and quality of environments. It offered a good alternative to traditional participation modes and created a platform for an integrative planning approach. The role and importance of education and integration within the urban environment were emphasized.

Keywords: top-down, bottom-up, flexible, student involvement

Procedia PDF Downloads 188
533 Women Right in Islam and Misconceptions: A Critical Study

Authors: Abubakar Ibrahim Usman, Mustapha Halilu

Abstract:

The provisions of rights to women in Islam have generated and are creating a tense and serious debate among Muslims and non-Muslims alike. The Muslims are arguing that Islam provides right to Womenfolk, but their actions, cultural/traditional practices, and treatment reveal otherwise, Non-Muslims, on the other hand, held a different view, saying that Islam has never made such provision. One may not blame their misconception, due to the wide spectrum of treatment given to women in many Muslim societies, which generated, fueled and geared the misconceptions and ceaseless barrage of sensational articles, movies and negative portrayal of Islam today. It has to put in our minds, many actions and Crimes of some Muslims (Who are mostly minority) did not represent the teachings and precepts of Islam, just like one cannot put blame on the parents of a child whose actions fall short of his home background.

Keywords: Islam, women rights, cultural practices, religion

Procedia PDF Downloads 406
532 'Gender' and 'Gender Equalities': Conceptual Issues

Authors: Moustafa Ali

Abstract:

The aim of this paper is to discuss and question some of the widely accepted concepts within the conceptual framework of gender from terminological, scientific, and Muslim cultural perspectives, and to introduce a new definition and a model of gender in the Arab and Muslim societies. This paper, therefore, uses a generic methodology and document analysis and comes in three sections and a conclusion. The first section discusses some of the terminological issues in the conceptual framework of gender. The second section highlights scientific issues, introduces a definition and a model of gender, whereas the third section offers Muslim cultural perspectives on some issues related to gender in the Muslim world. The paper, then, concludes with findings and recommendations reached so far.

Keywords: gender definition, gender equalities, sex-gender separability, fairness-based model of gender

Procedia PDF Downloads 102
531 Can Sustainability Help Achieve Social Justice?

Authors: Maryam Davodi-Far

Abstract:

Although sustainability offers a vision to preserve the earth’s resources while sustaining life on earth, there tends to be injustice and disparity in how resources are allocated across the globe. As such, the question that arises is whom will sustainability benefit? Will the rich grow richer and the poor become worse off? Is there a way to find balance between sustainability and still implement and achieve success with distributive justice theories? One of the facets of justice is distributive justice; the idea of balancing benefits and costs associated with the way in which we disseminate and consume goods. Social justice relies on how the cost and burdens of our resource allocation can be done reasonably and equitably and spread across a number of societies, and within each society spread across diverse groups and communities. In the end, the question is how to interact with the environment and diverse communities of today and of those communities of the future.

Keywords: consumerism, sustainability, sustainable development, social justice, social equity, distributive justice

Procedia PDF Downloads 372
530 Nineteenth Century Colonial Discourse and Marxist Theory

Authors: Nikolaos Mavropoulos

Abstract:

Imperialism and colonialism had and still have a predominantly negative nuisance. In many ways the two terms are synonyms of racist behavior, exploitation, and oppression, imposed by the supposedly civilized West at Africa’s and Asia’s expense. Paradoxically enough, imperialism was not thoroughly negative for some Marxist scholars. For them, in reality, it served a historical necessity as the only mean to liberate the backward societies from their millennial stagnation and to introduce them to industrialization and progress. To Marx as immoral and cruel the imposition of imperial rule and the eradication of traditional structures may have been, the process is still a progressive step towards the formation of class consciousness, global revolution and socialism in a world scale. Overlooking the fact that imperialism could actually delay and put an end to capitalist development, some Marxists proponents considered it as a positive development for the colonized peoples.

Keywords: Colonialism, , Marxist theory, Modern history, , 19th century Imperialism,

Procedia PDF Downloads 95
529 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 47
528 Familiarity with Nursing and Description of Nurses Duties

Authors: Narges Solaymani

Abstract:

medical training of patients. Nursing is a very important profession in the societies of the world. Although in the past, all caregivers of the sick and disabled were called nurses, nowadays, a nurse is a person who has a university education in this field. There are nurses in bachelor's, master's, and doctoral degrees in nursing. New courses have been launched in the master's degree based on duty-oriented nurses. A nurse cannot have an independent treatment center but is a member of the treatment team in established treatment centers such as hospitals, clinics, or offices. Nurses can establish counseling centers and provide nursing services at home. According to the standards, the number of nurses should be three times the number of doctors or twice the number of hospital beds, or there should be three nurses for every thousand people. Also, international standards show that in the internal and surgical department, every 4 to 6 patients should have a nurse.

Keywords: Nurse, Intensive Care, CPR, Bandage

Procedia PDF Downloads 36
527 Beyond Rhetoric and Buzzword, Policies and Politics: Towards Practical Institutional Involvement in Science and Technology Teacher Education Programmes for Sustainable Development

Authors: Alvin Uchenna Ugwu

Abstract:

The United Nation’s 2030 agenda and Global Action Programme (GAP) for implementation of the Sustainable Development Goals (SDGs), has mandated all sectors in the societies, including education, to develop strategies towards actualizing sustainability in all facets of the society, by the year 2030. Education is no doubt a key tool for social change. However, educational institutions in most African nations need a paradigmatic shift to strike a balance between policies (curricular) and practices, with regards to Education for Sustainable Development (ESD). The paradigm shift in this regard is described as whole-institution/school approach. The whole institution approaches advocate action-focused ESD. In other words, ESD policy and curriculum makers, formal and non-formal education institutions, need to ‘practice what they preach’. This paper is developed from an ongoing study carried out by the author and guided by two research questions: -What are the views of intermediate phase science and technology preservice teachers on the ESD content included in the science and technology modules? -What challenges or enable intermediate phase science and technology pre-service teachers to learn about ESD in science and technology modules? The study drew from the views and experiences of preservice science teachers, learning about ESD in a university’s college of education in South Africa. Using qualitative case study research design, the research data were generated via questionnaires and focus group discussions. Analysis of generated data indicates that universities and institutions of higher learning need to demonstrate practical involvement while implementing ESD in societies, rather than just standing as knowledge media. Findings of the study further suggest that natural sciences and technology courses in teacher education programmes and other institutions of higher learning, should be perceived as key transformative tools in shaping the consciousness of students towards integrating and fostering ESD in developing countries such as South Africa. Thus, this paper seeks to promote ‘Whole Institution Involvement’ in teacher education colleges in South Africa, as a measure of improving ESD in higher education settings. The paper suggests that in order to achieve ESD in higher education settings and beyond, policies and practices should be reexamined beyond rhetoric and buzzwords. The paper further argues that implementation of ESD is largely influenced by context, hence two different contexts should be examined empirically.

Keywords: education for sustainable development, higher education institutions, pre-service science teachers, qualitative case study research, whole institution involvement

Procedia PDF Downloads 133
526 British Female Muslim Converts: An Investigation into Their De-Conversions from Islam

Authors: Mona Alyedreessy

Abstract:

This study, which is based on a qualitative study sample of thirty-four British converts from different ages, ethnicities, social classes, areas and religious backgrounds in London, investigates the common challenges, problems and abuse in the name of Islam that many British female Muslim converts experienced during their time as Muslims, which caused them to leave the faith. It is an important study, as it creates an awareness of the weaknesses found in western Muslim societies and in various Islamic educational programs that causes people to leave Islam and contribute towards its negative reputation in the media. The women in this study shared common problems regarding gender and racial discrimination, identity development, feminism, marriage, parenting, Muslim culture, isolation, extremism, belonging and practising Islam in both Muslim and non-Muslim societies with differing sacrifices and consequences that caused them to de-convert. The study argues that many of the personal, religious and social problems female Muslim converts experience are due to a lack of knowledge about Islam and their rights as Muslim women, which often results in them being vulnerable and influenced by the opinions, attitudes and actions of uneducated, abusive, non-practising and extremist Muslims. For example, it was found that young female converts in particular were often taken advantage of and manipulated into believing that many negative actions displayed by patriarchal Muslim husbands were a part of Islam. This created much confusion, especially when their husbands used specific Quran texts and Hadiths to justify their abuse, authority and attitudes that made them miserable. As a result and based on the positive experiences of some converts, the study found that obtaining a broad Islamic education that started with an intimate study of the Prophet Muhammad’s biography alongside being guided by the teachings of western Muslim scholars contributed greatly towards a more enjoyable conversion journey, as women were able to identify and avoid problematic Muslims and abuse in the name of Islam. This in turn helped to create a healthier family unit and Muslim society. Those who enjoyed being Muslims were able to create a balanced western Muslim identity by negotiating and applying their own morals and western values to their understanding of The Prophet’s biography and The Quran and integrated Islamic values into their own secular western environments that were free from foreign cultural practices. The outcomes of the study also highlight some effective modern approaches to da’wah based on the teachings of The Prophet Mohammad and other prophets for young Arab and Asian Muslims who marry, study and live among non-Muslims and converts.

Keywords: abuse, apostasy, converts, Muslims

Procedia PDF Downloads 204
525 Effects of Age and Energy Expenditure on Obesity Among Adults in Abeokuta, Nigeria

Authors: Adeniyi Samuel Adekoya

Abstract:

The study assessed the independent effects of age and energy expenditure on the risks of obesity among adults (20-64 years). A cross-sectional study with changes in age, changes in work and leisure-time, and physical activities information played roles, with cut-off for energy expenditure and BMI in rural and urban localities. Physical activity information determined the energy expenditure, while the BMI determined the risk of obesity among the subjects. Statistically, age has a strong and direct association with obesity in both rural and urban settings, while energy expenditure was inverse in its association. Findings from the this study showed that in developing societies, age tends to be a risk factor for obesity, whereas energy expenditure is to be protective. Level of education and economic development are also relevant modifiers of the influences exerted by these variables.

Keywords: age, energy expenditure, BMI, rural/urban

Procedia PDF Downloads 397
524 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 141
523 Exploring Peculiarities of a Leadership Style of Non-governmental Organization (NGO): Case of Six Non-governmental Organizations Based in Lebanon

Authors: Nour Mohamad Fayad

Abstract:

This study aims to investigate and explore the peculiarities of the leadership style of NGOs based in Lebanon. This study is supported by empirical testing that considers the case of Embrace and other NGOs performing in Lebanese society. Throughout this study researcher demonstrated leadership characteristics, styles, and competencies and demonstrated the evolvement of leadership in recent years. Moreover, this study sheds light on the different NGO leaders and exhibits the exceptional obstacles, on both personal and professional aspects and applies it to the Lebanese society by collecting primary data from 6 NGOs. The findings indicate that there is a positive correlation between peculiarities of leadership style and the performance of NGOs, but this is not consistent across all NGOs in Lebanese societies.

Keywords: leadership, peculiarities, NGOs, embrace, Lebanon

Procedia PDF Downloads 56
522 Increasing Preference for Culturally Incongruent Offerings in Traditional Cultures

Authors: Najam U. Saqib

Abstract:

Self-construal or an individual’s view of him or herself is an important variable by which culture affects the way people think and act. This notion of self-construal is identified with two distinct perspectives on the self. Within the independent construal, the self is seen as different from others, a way of defining the self, prominent in Western societies. The interdependent perspective which is typical for Eastern cultures emphasizes the connectedness of the self to others. The degree of independence-interdependence in one’s self-construal is thought to affect behavior, acceptance of social values, and decision making. This paper manipulates self-construal of Qatari consumers and investigates its effects on accepting incongruent changes in culture as a result of adopting market offerings and behavior that may be perceived as inconsistent with their self-construal. The research recommends strategies for policy makers in Qatar for successful advocacy of initiatives of national importance such as reducing diabetes and obesity by applying self-construal theory.

Keywords: cross-cultural, consumer behavior, self-construal, GCC (Gulf Cooperation Council)

Procedia PDF Downloads 159
521 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 304
520 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 164
519 Children Learning Chinese as a Home Language in an English-Dominant Society

Authors: Sinming Law

Abstract:

Many Chinese families face many difficulties in maintaining their heritage language for their children in English-dominant societies. This article first looks at the losses from monolingualism and benefits of bilingualism. Then, it explores the common methods used today in teaching Chinese. We conclude that families and community play an indispensable role in their children’s acquisition. For children to acquire adequate proficiency in the language, educators should inform families about this topic and partner with them. Families can indeed be active in the process. Hence, the article further describes a guide designed and written by the author to accommodate the needs of parents. It can be used as a model for future guides. Further, the article recommends effective media routes by which families can have access to similar guides.

Keywords: children learning Chinese, biliteracy and bilingual acquisition, family and community support, heritage language maintenance

Procedia PDF Downloads 347
518 Inducible Trans-Encapsidation System for Temporal Separation of Hepatitis C Virus Life Cycle

Authors: Ovidiu Vlaicu, Leontina Banica, Dan Otelea, Andrei-Jose Petrescu, Costin-Ioan Popescu

Abstract:

Hepatitis C Virus (HCV) infects 170 million peoples worldwide. Major advances have been made recently in HCV standard of care with interferon-free therapy being already approved. Despite major progress in HCV therapy, the genotype associated treatment efficacy and toxicity still represent issues to address. To identify endogenous factors involved in different stages of HCV life cycle, we have developed a trans-packaging system for HCV subgenomic replicons lacking core protein gene. Huh7 cells were used to generate a packaging cell line expressing the core protein in an inducible manner. The core packaging cell line was able to trans-complemented various subgenomic replicons to secret infectious trans-complemented HCV particles (HCV-TCP). Further, we constructed subgenomic replicons with foreign epitopes suitable for immunoaffinity purification or fluorescence microscopy studies. We have shown that the insertion has not effects on the efficacy of trans-complementation yielding similar titers to the control subgenomic replicon. This system will be a valuable tool in studying pre- and post-assembly events in HCV life cycle and for the fast identification of HCV assembly inhibitors.

Keywords: assembly inhibitors, core protein, HCV, trans-complementation

Procedia PDF Downloads 269
517 Distracted Driving among Young Drivers in Qatar

Authors: Khaled Shaaban

Abstract:

Distracted driving, which includes anything that distracts a driver from the main task of driving, is one of the main causes of traffic accidents in modern societies. The objective of this research was to understand the type of activities that young drivers perform while driving in Qatar and to identify which activities cause the most distraction to the driver based on their experience. The data was collected through administered questionnaires in the city of Doha, Qatar. According to the participants, the majority reported that they use their cell phone all the time or occasionally while driving. Other significantly cited activities while driving included listening to music or radio, talking with passengers, and eating, drinking or smoking. When asked about the activities that distract the driver, using cell phone was listed as the most distracting activity followed by mental activities and adjusting GPS and audio device vehicle.

Keywords: driver distraction, young drivers, cell phone use, Qatar

Procedia PDF Downloads 465
516 Climate Change and Extreme Weather: Understanding Interconnections and Implications

Authors: Johnstone Walubengo Wangusi

Abstract:

Climate change is undeniably altering the frequency, intensity, and geographic distribution of extreme weather events worldwide. In this paper, we explore the complex interconnections between climate change and extreme weather phenomena, drawing upon research from atmospheric science, geology, and climatology. We examine the underlying mechanisms driving these changes, the impacts on natural ecosystems and human societies, and strategies for adaptation and mitigation. By synthesizing insights from interdisciplinary research, this paper aims to provide a comprehensive understanding of the multifaceted relationship between climate change and extreme weather, informing efforts to address the challenges posed by a changing climate.

Keywords: climate change, extreme weather, atmospheric science, geology, climatology, impacts, adaptation, mitigation

Procedia PDF Downloads 18
515 Collective Behavior of Mice Passing through a Middle-Exit or Corner-Exit under Panic

Authors: Teng Zhang, Xuelin Zhang, Shouxiang Lu, Changhai Li

Abstract:

The existence of animal groups and collective migration are common in nature, and collective behavior is attracting more and more attention of researchers. Previous results have shown that architectural design had an important effect on the process of crowd evacuation. In this paper, collective behavior of mice passing through a middle-exit or corner-exit under panic was investigated. Selfish behavior and herd behavior were easily observed in our video, which caused the congregation with high density near the exit. Triangle structure of congregation formed near the middle-exit while arch structure formed near the corner-exit. It is noteworthy that the exit located at the middle of the wall was more effective for evacuation than at the corner. Meanwhile, the escape sequence of mouse passing through the exit was investigated, and the result showed that the priority depends largely on its location in the congregation. With the level of stimulus increasing, these phenomena still exist. The frequency distributions of time intervals and the burst sizes were also analyzed in this study to explore the secret of collective behavior of mice. These results could provide evidence for the hypothesis or prediction about human behavior in crowd evacuation. However, it is not clear whether the simulated results from different species can correspond to reality or not. Broader comparison among different species about this topic will be eager to be conducted to deepen our understanding of collective behavior in nature.

Keywords: collective behavior, mice, evacuation, exit location

Procedia PDF Downloads 277
514 The Impact of Professor Eugene Fischer on the Namibian Genocide and the Holocaust

Authors: Lanthony Slater

Abstract:

The paper will focus on the philosophy and practices of Eugene Fischer and his impact on the German Holocaust and the Namibian genocide. Fischer played a major role in racial superiority theory, eugenics, and the impact of human heredity. Through my research and comparative examination of his positionality in both societies, much is revealed about how philosophical notions would contribute to division and ultimately acts of genocide on two countries. In addition, this research will focus on the legacy in both events of genocide. The objective of the research is to connect both the Namibian genocide and the Holocaust in Germany. For many historians, when explaining the origins of the holocaust, connections to the Namibian genocide is often omitted. The main contribution to my research is to attribute the National Socialist ideology towards the ongoing issues that the country of Namibia is faced with. Additionally, it compares how Germany and Namibia deal with the legacies created under Nazism.

Keywords: genocide, namibia, rehoboth, experiments

Procedia PDF Downloads 181
513 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 314
512 Eco-Entrepreneurship: Practice Examples both in the World and Turkey

Authors: O. Esmen, A. Beduk, K. Eryesil, F. Karacelebi

Abstract:

Entrepreneurship is crucial for the economy of countries in development of economy, creating new jobs and increasing employment; therefore improving welfare and a modern point of view in the society. In the development of a country encouragement of entrepreneurship and entrepreneurial qualities also play a paramount role. The increase in the world population results in more production, which brings excessive use of resources and inevitably shortage of them. In addition to this; development in technology, mismanagement in production and deficiency of waste system cause negative effects on the environmental ecological balance. Nowadays, with the societies getting awareness of environment while buying products and services, they prefer companies which are careful about environment. And as a result of this, ecoentrepreneurship gains importance. In this study; ecoentrepreneurship, which we think will gain more importance in the world and Turkey, is presented with the examples from the world and Turkey.

Keywords: ecoentrepreneurship, entrepreneurship, environmental awareness, development of economy

Procedia PDF Downloads 234
511 The Effect of the Vernacular on Code-Switching Hebrew into Palestinian Arabic

Authors: Ward Makhoul

Abstract:

Code-switching (CS) is known as a ubiquitous phenomenon in multilingual societies and countries. Vernacular Palestinian Arabic (PA) variety spoken in Israel is among these languages, informally used for day-to-day conversations only. Such conversations appear to contain code-switched instances from Hebrew, the formal and dominant language of the country, even in settings where the need for CS seems to be unnecessary. This study examines the CS practices in PA and investigates the reason behind these CS instances in controlled settings and the correlation between bilingual dominance and CS. In the production-task interviews and Bilingual Language Profile test (BLP), there was a correlation between language dominance and CS; 13 participants were interviewed to elicit and analyze natural speech-containing CS instances, along with undergoing a BLP test. The acceptability judgment task observed the limits and boundaries of different code-switched linguistic structures.

Keywords: code-switching, Hebrew, Palestinian-Arabic, vernacular

Procedia PDF Downloads 83