Search results for: threat avoidance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1262

Search results for: threat avoidance

1232 Q-Learning of Bee-Like Robots Through Obstacle Avoidance

Authors: Jawairia Rasheed

Abstract:

Modern robots are often used for search and rescue purpose. One of the key areas of interest in such cases is learning complex environments. One of the key methodologies for robots in such cases is reinforcement learning. In reinforcement learning robots learn to move the path to reach the goal while avoiding obstacles. Q-learning, one of the most advancement of reinforcement learning is used for making the robots to learn the path. Robots learn by interacting with the environment to reach the goal. In this paper simulation model of bee-like robots is implemented in NETLOGO. In the start the learning rate was less and it increased with the passage of time. The bees successfully learned to reach the goal while avoiding obstacles through Q-learning technique.

Keywords: reinforlearning of bee like robots for reaching the goalcement learning for randomly placed obstacles, obstacle avoidance through q-learning, q-learning for obstacle avoidance,

Procedia PDF Downloads 66
1231 An Online Priority-Configuration Algorithm for Obstacle Avoidance of the Unmanned Air Vehicles Swarm

Authors: Lihua Zhu, Jianfeng Du, Yu Wang, Zhiqiang Wu

Abstract:

Collision avoidance problems of a swarm of unmanned air vehicles (UAVs) flying in an obstacle-laden environment are investigated in this paper. Given that the UAV swarm needs to adapt to the obstacle distribution in dynamic operation, a priority configuration is designed to guide the UAVs to pass through the obstacles in turn. Based on the collision cone approach and the prediction of the collision time, a collision evaluation model is established to judge the urgency of the imminent collision of each UAV, and the evaluation result is used to assign the priority of each UAV to further instruct them going through the obstacles in descending order. At last, the simulation results provide the promising validation in terms of the efficiency and scalability of the proposed approach.

Keywords: UAV swarm, collision avoidance, complex environment, online priority design

Procedia PDF Downloads 187
1230 Optimization Based Obstacle Avoidance

Authors: R. Dariani, S. Schmidt, R. Kasper

Abstract:

Based on a non-linear single track model which describes the dynamics of vehicle, an optimal path planning strategy is developed. Real time optimization is used to generate reference control values to allow leading the vehicle alongside a calculated lane which is optimal for different objectives such as energy consumption, run time, safety or comfort characteristics. Strict mathematic formulation of the autonomous driving allows taking decision on undefined situation such as lane change or obstacle avoidance. Based on position of the vehicle, lane situation and obstacle position, the optimization problem is reformulated in real-time to avoid the obstacle and any car crash.

Keywords: autonomous driving, obstacle avoidance, optimal control, path planning

Procedia PDF Downloads 342
1229 Support of Syrian Refugees: The Roles of Descriptive and Injunctive Norms, Perception of Threat, and Negative Emotions

Authors: Senay Yitmen

Abstract:

This research investigated individual’s support and helping intentions towards Syrian refugees in Turkey. This is examined in relation to perceived threat and negative emotions, and also to the perceptions of whether one’s intimate social network (family and friends) considers Syrians a threat (descriptive network norm) and whether this network morally supports Syrian refugees (injunctive norms). A questionnaire study was conducted among Turkish participants (n= 565) and the results showed that perception of threat was associated with negative emotions which, in turn, were related to less support of Syrian refugees. Additionally, descriptive norms moderated the relationship between perceived threat and negative emotions towards Syrian refugees. Furthermore, injunctive norms moderated the relationship between negative emotions and support to Syrian refugees. Specifically, the findings indicate that perceived threat is associated with less support of Syrian refugees through negative emotions when descriptive norms are weak and injunctive norms are strong. Injunctive norms appear to trigger a dilemma over the decision to conform or not to conform: when one has negative emotions as a result of perceived threat, it becomes more difficult to conform to the moral obligation of injunctive norms which is associated with less support of Syrian refugees. Hence, these findings demonstrate that both descriptive and injunctive norms are important and play different roles in individual’s support of Syrian refugees.

Keywords: descriptive norms, emotions, injunctive norms, the perception of threat

Procedia PDF Downloads 160
1228 Psychological Compatibility of Football Players According to Success Achievement and Failure Avoidance Motivation

Authors: Konstantin A. Bochaver, Alexandra O. Savinkina

Abstract:

The study analyzed the relationship between the homogeneity-heterogeneity of players in a football team and their efficiency. Compatible players were examined in terms of level of socio-psychological development of the team for which they act. It was shown that in teams of high level of socio-psychological development more compatible were athletes with different levels of failure avoidance motivation. But in low-level teams – bucking the trend. The homogeneity of success achievement motivation was not a factor in the effectiveness of the football team.

Keywords: compatibility, failure avoidance motivation, football, heterogeneity, homogeneity, soccer, sport team, success achievement motivation

Procedia PDF Downloads 334
1227 Collision Avoidance Maneuvers for Vessels Navigating through Traffic Separation Scheme

Authors: Aswin V. J., Sreeja S., R. Harikumar

Abstract:

Ship collision is one of the major concerns while navigating in the ocean. In congested sea routes where there are hectic offshore operations, ships are often forced to take close encounter maneuvers. Maritime rules for preventing collision at sea are defined in the International Regulations for Preventing Collision at Sea. Traffic Separation Schemes (TSS) are traffic management route systems ruled by International Maritime Organization (IMO), where the traffic lanes indicate the general direction of traffic flow. The Rule 10 of International Regulations for Preventing Collision at Sea prescribes the conduct of vessels while navigating through TSS. But no quantitative criteria regarding the procedures to detect and evaluate collision risk is specified in International Regulations for Preventing Collision at Sea. Most of the accidents that occur are due to operational errors affected by human factors such as lack of experience and loss of situational awareness. In open waters, the traffic density is less when compared to that in TSS, and hence the vessels can be operated in autopilot mode. A collision avoidance method that uses the possible obstacle trajectories in advance to predict “collision occurrence” and can generate suitable maneuvers for collision avoidance is presented in this paper. The suitable course and propulsion changes that can be used in a TSS considering International Regulations for Preventing Collision at Sea are found out for various obstacle scenarios.

Keywords: collision avoidance, maneuvers, obstacle trajectories, traffic separation scheme

Procedia PDF Downloads 47
1226 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 109
1225 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 110
1224 Performance Analysis of Vision-Based Transparent Obstacle Avoidance for Construction Robots

Authors: Siwei Chang, Heng Li, Haitao Wu, Xin Fang

Abstract:

Construction robots are receiving more and more attention as a promising solution to the manpower shortage issue in the construction industry. The development of intelligent control techniques that assist in controlling the robots to avoid transparency and reflected building obstacles is crucial for guaranteeing the adaptability and flexibility of mobile construction robots in complex construction environments. With the boom of computer vision techniques, a number of studies have proposed vision-based methods for transparent obstacle avoidance to improve operation accuracy. However, vision-based methods are also associated with disadvantages such as high computational costs. To provide better perception and value evaluation, this study aims to analyze the performance of vision-based techniques for avoiding transparent building obstacles. To achieve this, commonly used sensors, including a lidar, an ultrasonic sensor, and a USB camera, are equipped on the robotic platform to detect obstacles. A Raspberry Pi 3 computer board is employed to compute data collecting and control algorithms. The turtlebot3 burger is employed to test the programs. On-site experiments are carried out to observe the performance in terms of success rate and detection distance. Control variables include obstacle shapes and environmental conditions. The findings contribute to demonstrating how effectively vision-based obstacle avoidance strategies for transparent building obstacle avoidance and provide insights and informed knowledge when introducing computer vision techniques in the aforementioned domain.

Keywords: construction robot, obstacle avoidance, computer vision, transparent obstacle

Procedia PDF Downloads 48
1223 Friendship Love Orientation as Predictor of Attachment Style: A Gender Perspective

Authors: Maria Sana Amin, Anum Atiq, Haya Fatimah

Abstract:

Secure attachment in childhood creates a healthy love attitude in the adulthood. Child secure attachment develops a positive relation attitude in their adulthood, similarly, anxiety-avoidant attachment develops negative attitude toward relations. The aim of this paper is twofold: 1) We investigate the relationship between Friendship Attitude and Attachment Styles; and 2) explore the impact of gender on Love Attitudes and Attachment styles. Data was collected by convincing sampling among the students of University of Management and Technology age group 18- 25. The sample consists 60 young adults (Male=36, Female =54). The Love Attitudes Scales subscale Storage was used to measure attitudes towards friendship love and The Experiences in Close Relationships-Revised questionnaire was used to measure Adult Attachment Style. The result of Independent T-Test analysis shows that there was no significant difference in anxiety for female and male conditions; t (58) =-.768, p=.446 and avoidance for female and male conditions; t (58) =1.63, p=.108. Moreover, also there was no significant difference in friendship love for female (M=27.37, SD=6.371) and male (M=26.08, SD=5.709) conditions; t (58) =-.820, p=.416. Pearson correlation analysis shows significantly negative correlation between love attitude-friendship and attachment style- avoidance, (r=-.433, p=.008) among male and love attitude-friendship and attachment style- avoidance (r=-.438, p=.032) among female. There are no gender differences in attachment styles i.e. anxiety, avoidance and their relationship with friendship love attitude. People have avoidant attachment find it hard to fall in love and develop intimacy, and they tend to search for independence.

Keywords: avoidance attachment style, anxiety attachment style, friendship love attitude, gender difference/similarity

Procedia PDF Downloads 276
1222 Mediated and Moderated Effects of Insecure Attachment Style and Depressions

Authors: Li-Ting Chen, Chih-Tao Cheng, I-Ping Huang, Jen-Ho Chang, Nien-Tzu Chang, Fei-Hsiu Hsiao

Abstract:

Background: Insecurity adult attachment style may be triggered by cancer threat, which in turn influences depression symptoms. Dispositional mindfulness may have benefits of insecure attachment on depression for colorectal patient transfer to survivor. Objective: This study examined the mediating and moderating effects of quality of life (QOL) and dispositional mindfulness on the relationship between insecure attachment style and depression symptoms. Methods: A cross-sectional study design was used. Data were collected using the QOL functional and symptoms (EORTC-C30 and EORTC CR29), dispositional mindfulness (FFMQ), Short form of Experience in Close Relationships Revised Questionnaire (SF-ECRRQ), and depressive symptoms (BDI-II scale). Results: Of the 90 CRC survivors who participated, the indirect effect of both ECR anxiety (β=0.23, CI=0.05-0.44) and ECR avoidance (β=0.12, CI=0.02-0.24) on depression were significantly mediated through EORTC-C29 colorectal symptoms. Three components of dispositional mindfulness (i.e., acting of awareness, non-judging, non-reactivity) as the moderator in the relationship between ECR anxiety and depressive symptoms. Acting of awareness was a moderator in the relationship between ECR avoidance and depressive symptoms. Conclusions: There are two pathways from insecure attachment to depression: through the mediator of colorectal symptoms and the moderator of dispositional mindfulness. Cancer symptom management and mindfulness practices could improve the impact of insecure attachment on depression among CRC patients in a post-treatment transition period.

Keywords: acting of awareness, attachment style, colorectal cancer, disposisitonal mindfulness, depression

Procedia PDF Downloads 24
1221 Avoidance and Selectivity in the Acquisition of Arabic as a Second/Foreign Language

Authors: Abeer Heider

Abstract:

This paper explores and classifies the different kinds of avoidances that students commonly make in the acquisition of Arabic as a second/foreign language, and suggests specific strategies to help students lessen their avoidance trends in hopes of streamlining the learning process. Students most commonly use avoidance strategies in grammar, and word choice. These different types of strategies have different implications and naturally require different approaches. Thus the question remains as to the most effective way to help students improve their Arabic, and how teachers can efficiently utilize these techniques. It is hoped that this research will contribute to understand the role of avoidance in the field of the second language acquisition in general, and as a type of input. Yet some researchers also note that similarity between L1 and L2 may be problematic as well since the learner may doubt that such similarity indeed exists and consequently avoid the identical constructions or elements (Jordens, 1977; Kellermann, 1977, 1978, 1986). In an effort to resolve this issue, a case study is being conducted. The present case study attempts to provide a broader analysis of what is acquired than is usually the case, analyzing the learners ‘accomplishments in terms of three –part framework of the components of communicative competence suggested by Michele Canale: grammatical competence, sociolinguistic competence and discourse competence. The subjects of this study are 15 students’ 22th year who came to study Arabic at Qatar University of Cairo. The 15 students are in the advanced level. They were complete intermediate level in Arabic when they arrive in Qatar for the first time. The study used discourse analytic method to examine how the first language affects students’ production and output in the second language, and how and when students use avoidance methods in their learning. The study will be conducted through Fall 2015 through analyzing audio recordings that are recorded throughout the entire semester. The recordings will be around 30 clips. The students are using supplementary listening and speaking materials. The group will be tested at the end of the term to assess any measurable difference between the techniques. Questionnaires will be administered to teachers and students before and after the semester to assess any change in attitude toward avoidance and selectivity methods. Responses to these questionnaires are analyzed and discussed to assess the relative merits of the aforementioned strategies to avoidance and selectivity to further support on. Implications and recommendations for teacher training are proposed.

Keywords: the second language acquisition, learning languages, selectivity, avoidance

Procedia PDF Downloads 260
1220 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 54
1219 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 376
1218 Three-Dimensional Optimal Path Planning of a Flying Robot for Terrain Following/Terrain Avoidance

Authors: Amirreza Kosari, Hossein Maghsoudi, Malahat Givar

Abstract:

In this study, the three-dimensional optimal path planning of a flying robot for Terrain Following / Terrain Avoidance (TF/TA) purposes using Direct Collocation has been investigated. To this purpose, firstly, the appropriate equations of motion representing the flying robot translational movement have been described. The three-dimensional optimal path planning of the flying vehicle in terrain following/terrain avoidance maneuver is formulated as an optimal control problem. The terrain profile, as the main allowable height constraint has been modeled using Fractal Generation Method. The resulting optimal control problem is discretized by applying Direct Collocation numerical technique, and then transformed into a Nonlinear Programming Problem (NLP). The efficacy of the proposed method is demonstrated by extensive simulations, and in particular, it is verified that this approach could produce a solution satisfying almost all performance and environmental constraints encountering a low-level flying maneuver

Keywords: path planning, terrain following, optimal control, nonlinear programming

Procedia PDF Downloads 162
1217 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks

Authors: Yao-Hong Tsai

Abstract:

Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.

Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance

Procedia PDF Downloads 128
1216 Using Econometric Methods to Explore Obesity Stigma and Avoidance of Breast and Cervical Cancer Screening

Authors: Stephanie A. Schauder, Gosia Sylwestrzak

Abstract:

Overweight and obese women report avoiding preventive care due to fear of weight-related bias from medical professionals. Gynecological exams, due to their sensitive and personally invasive nature, are especially susceptible to avoidance. This research investigates the association between body mass index (BMI) and screening rates for breast and cervical cancer using claims data from 1.3 million members of a large health insurance company. Because obesity is associated with increased cancer risk, screenings for these cancers should increase as BMI increases. However, this paper finds that the distribution of cancer screening rates by BMI take an inverted U-shape with underweight and obese members having the lowest screening rates. For cervical cancer screening, those in the target population with a BMI of 23 have the highest screening rate at 68%, while Obese Class III members have a screening rate of 50%. Those in the underweight category have a screening rate of 58%. This relationship persists even after controlling for health and demographic covariates in regression analysis. Interestingly, there is no association between BMI and BRCA (BReast CAncer gene) genetic testing. This is consistent with the narrative that stigma causes avoidance because genetic testing does not involve any assessment of a person’s body. More work must be done to determine how to increase cancer screening rates in those who may feel stigmatized due to their weight.

Keywords: cancer screening, cervical cancer, breast cancer, weight stigma, avoidance of care

Procedia PDF Downloads 166
1215 Investigation of Possible Behavioural and Molecular Effects of Mobile Phone Exposure on Rats

Authors: Ç. Gökçek-Saraç, Ş. Özen, N. Derin

Abstract:

The N-methyl-D-aspartate (NMDA)-dependent pathway is the major intracellular signaling pathway implemented in both short- and long-term memory formation in the hippocampus which is the most studied brain structure because of its well documented role in learning and memory. However, little is known about the effects of RF-EMR exposure on NMDA receptor signaling pathway including activation of protein kinases, notably Ca2+/calmodulin-dependent protein kinase II alpha (CaMKIIα). The aim of the present study was to investigate the effects of acute and chronic 900 MHz RF-EMR exposure on both passive avoidance behaviour and hippocampal levels of CaMKIIα and its phosphorylated form (pCaMKIIα). Rats were divided into the following groups: Sham rats, and rats exposed to 900 MHz RF-EMR for 2 h/day for 1 week (acute group) or 10 weeks (chronic group), respectively. Passive avoidance task was used as a behavioural method. The hippocampal levels of selected kinases were measured using Western Blotting technique. The results of passive avoidance task showed that both acute and chronic exposure to 900 MHz RF-EMR can impair passive avoidance behaviour with minor effects on chronic group of rats. The analysis of western blot data of selected protein kinases demonstrated that hippocampal levels of CaMKIIα and pCaMKIIα were significantly higher in chronic group of rats as compared to acute groups. Taken together, these findings demonstrated that different duration times (1 week vs 10 weeks) of 900 MHz RF-EMR exposure have different effects on both passive avoidance behaviour of rats and hippocampal levels of selected protein kinases.

Keywords: hippocampus, protein kinase, rat, RF-EMR

Procedia PDF Downloads 231
1214 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 252
1213 A Study of Parental Acceptance: Avoidance Attitude and Adjustment of Urban and Rural Junior College Students

Authors: Ramesh K. Adsul, V. R. Shinde, S. S. Jadhav

Abstract:

The main aim of the present study was to explore the effect of various levels of parental acceptance – avoidance attitude on various areas of adjustment of urban and rural junior college students. It was hypothesized that 1. There exists no significant effect of various levels of parental acceptance attitude on adjustment of urban and rural junior college students. 2. There exists no significant effect of various levels of parental avoidance attitude on adjustment of urban and rural junior college students. 3. There would be no significant difference between urban and rural Junior College students on various areas of (home, health, social, and emotional) adjustment. The 847 students (427 boys and 420 girls) studying in 11th class of various Junior colleges in Sangli ,Satara and Kolhapur districts of Maharashtra State, India were selected by random sampling method. Study was conducted by using two psychological tests namely 1. Family Relationship Inventory. 2.Bell’s Adjustment Inventory. One way ANOVA was employed to find out the effect of parental acceptance – avoidance attitude and adjustment in various areas of urban and rural junior college students. ‘t’ test was used to find out the difference between urban and rural students on various areas of adjustment. The results of the study indicate that (1) It is observed that three groups of parental acceptance attitude (PA) are significantly varied on home and social adjustment. It means that PA affects home and social adjustment of adolescents. High PA creates excellent adjustment and low PA creates poor adjustment in adolescents. (2) Study revealed that PV significantly affects adjustment of adolescents. High PV significantly creates poor adjustment in adolescents than average and low PV. (3) There is significant difference between urban and rural adolescents on adjustment. Urban adolescents have better adjustment than rural adolescents.

Keywords: parental acceptance, avoidance attitude, adjustment, urban-rural student

Procedia PDF Downloads 385
1212 An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots

Authors: Baoshan Wei, Shuai Han, Xing Zhang

Abstract:

Local obstacle avoidance is critical for mobile robot navigation. It is a challenging task to ensure path optimality and safety in cluttered environments. We proposed an Environment Aware Dynamic Window Approach in this paper to cope with the issue. The method integrates environment characterization into Dynamic Window Approach (DWA). Two strategies are proposed in order to achieve the integration. The local goal strategy guides the robot to move through openings before approaching the final goal, which solves the local minima problem in DWA. The adaptive control strategy endows the robot to adjust its state according to the environment, which addresses path safety compared with DWA. Besides, the evaluation shows that the path generated from the proposed algorithm is safer and smoother compared with state-of-the-art algorithms.

Keywords: adaptive control, dynamic window approach, environment aware, local obstacle avoidance, mobile robots

Procedia PDF Downloads 124
1211 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 180
1210 Analysis of Education Faculty Students’ Attitudes towards E-Learning According to Different Variables

Authors: Eyup Yurt, Ahmet Kurnaz, Ismail Sahin

Abstract:

The purpose of the study is to investigate the education faculty students’ attitudes towards e-learning according to different variables. In current study, the data were collected from 393 students of an education faculty in Turkey. In this study, theattitude towards e‐learning scale and the demographic information form were used to collect data. The collected data were analyzed by t-test, ANOVA and Pearson correlation coefficient. It was found that there is a significant difference in students’ tendency towards e-learning and avoidance from e-learning based on gender. Male students have more positive attitudes towards e-learning than female students. Also, the students who used the internet lesshave higher levels of avoidance from e-learning. Additionally, it is found that there is a positive and significant relationship between the number of personal mobile learning devices and tendency towards e-learning. On the other hand, there is a negative and significant relationship between the number of personal mobile learning devices and avoidance from e-learning. Also, suggestions were presented according to findings.

Keywords: education faculty students, attitude towards e-learning, gender, daily internet usage time, m-learning

Procedia PDF Downloads 282
1209 The Correlation Between the Rise of China and the US-Iranian Conflict: An American Perspective

Authors: Ranj Tofik

Abstract:

This article aims to demonstrate a link and/or correlation between the rise of China and the US-Iranian conflict, from a US point of view. To demonstrate this link, the article relies on the content analysis method by analyzing American reports and official data. This article concludes that this correlation indicates that the more China rises and the greater the Chinese threat to America, the more changes will occur in the US-Iranian conflict and the US actions regarding this conflict will increase – in the form of imposing sanctions and using means of pressure on Iran, or trying to reach an agreement and settlement with Iran. This article, via noting and observing that correlation, also claims that before 2012, Iran was a regional threat to US interests in the Middle East. However, after 2012 when the rise of China became one of the major threats to America, Iran, because of its rapprochement with China, became also part of the Chinese threat, which is a threat to America's global standing. In addition, observing this correlation indicates the possibility that the rise of China and its threat to the USA has become one of the main drivers in the US-Iranian conflict. Consequently, it can be said that Iran has become a vital issue in the US-China rivalry, as it has become an appropriate gateway for China to enter the Middle East and undermine US hegemony there.

Keywords: China-Iran relations, China's rise, JCPOA, US-Chinese competition, US-Iranian conflict

Procedia PDF Downloads 57
1208 Personal Characteristics Related to Hasty Behaviour in Korea

Authors: Sun Jin Park, Kyung-Ja Cho

Abstract:

This study focused on characteristics related to hasty behaviour. To investigate the relation between personal characteristics and hasty behaviour, 601 data were collected, 335 males and 256 females answered their own 'social avoidance and distress’, ‘anxiety’, ‘sensation seeking', 'hope', and ' hasty behaviour. And then 591 data were used for the analysis. The factor analysis resulted hasty behaviour consisted of 5 factors, time pressure, isolation, uncomfortable situation, boring condition, and expectation of reward. The result showed anxiety, sensation seeking, and hope related to hasty behaviour. Specifically, anxiety was involved in every hasty behaviour. This result means that psychological tension and worry are related to hasty behaviour in common. 'Social avoidance and distress', 'sensation seeking' and 'hope' influenced on hasty behaviour under time pressure, in isolation, in expectation of rewards respectively. This means that each factor of hasty behaviour has anxiety as its basis, expressed through a varied nature.

Keywords: hasty behaviour, social avoidance and distress, anxiety, sensation seeking, hope

Procedia PDF Downloads 287
1207 The Effects of Self-Efficacy on Challenge and Threat States

Authors: Nadine Sammy, Mark Wilson, Samuel Vine

Abstract:

The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.

Keywords: cardiovascular, challenge, performance, threat

Procedia PDF Downloads 205
1206 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 411
1205 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience

Authors: Ayomide Oyedele

Abstract:

In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.

Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses

Procedia PDF Downloads 39
1204 Vehicle to Vehicle Communication: Collision Avoidance Scenarios

Authors: Ahmed Emad, Ahmed Salah, Abdelrahman Magdy, Omar Rashid, Mohammed Adel

Abstract:

This research paper discusses vehicle-to-vehicle technology as an important application of linear algebra. This communication technology represents an efficient and promising application to help to ensure the safety of the drivers by warning them when a crash possibility is close. The major link that combines our topic with linear algebra is the Laplacian matrix. Some main definitions used in the V2V were illustrated, such as VANET and its characteristics. The V2V technology could be applied in different applications with different traffic scenarios and various ways to warn car drivers. These scenarios were simulated programs such as MATLAB and Python to test how the V2V system would respond to the different scenarios and warn the car drivers exposed to the threat of collisions.

Keywords: V2V communication, vehicle to vehicle scenarios, VANET, FCW, EEBL, IMA, Laplacian matrix

Procedia PDF Downloads 118
1203 Fall Avoidance Control of Wheeled Inverted Pendulum Type Robotic Wheelchair While Climbing Stairs

Authors: Nan Ding, Motoki Shino, Nobuyasu Tomokuni, Genki Murata

Abstract:

The wheelchair is the major means of transport for physically disabled people. However, it cannot overcome architectural barriers such as curbs and stairs. In this paper, the authors proposed a method to avoid falling down of a wheeled inverted pendulum type robotic wheelchair for climbing stairs. The problem of this system is that the feedback gain of the wheels cannot be set high due to modeling errors and gear backlash, which results in the movement of wheels. Therefore, the wheels slide down the stairs or collide with the side of the stairs, and finally the wheelchair falls down. To avoid falling down, the authors proposed a slider control strategy based on skyhook model in order to decrease the movement of wheels, and a rotary link control strategy based on the staircase dimensions in order to avoid collision or slide down. The effectiveness of the proposed fall avoidance control strategy was validated by ODE simulations and the prototype wheelchair.

Keywords: EPW, fall avoidance control, skyhook, wheeled inverted pendulum

Procedia PDF Downloads 310