Search results for: vulnerable
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1051

Search results for: vulnerable

751 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields

Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen

Abstract:

A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.

Keywords: white-box, block cipher, composite field, threshold implementation

Procedia PDF Downloads 127
750 The Effects of Urbanization on Peri-Urban Livelihood in Ghana: A Case of Kumasi Peri-Urban Communities

Authors: Charles Kwaku Oppong

Abstract:

The research linked urban expansion resulting from urbanization with changing morphology processes happening in peri-urban communities. Two villages of Kumasi City peri-urban were used as a case study. Appropriate analytical framework and methodology (literature review and empirical evidence) were employed to ensure that all pertinent issues of peri-urban interface are brought to light. It was discovered from the study that since peri-urban livelihood is linked with assets base; it has been found that stock of asset, as well as transformation processes, were major factors in the shaping of livelihoods strategies. For that reason, success or failure of household livelihoods was seen to relate to the kind of livelihood strategy employed. With efforts to mitigate for livelihoods failure due to peri-urban development, households' recourse to remittances, land disposal, and other means as an alternative livelihood approach. The study calls for local government policy interventions in regulating peri-urban transformation process and providing safety nets for the vulnerable.

Keywords: urban expansion, peri-urban interface, livelihoods, asset

Procedia PDF Downloads 213
749 Disordered Eating Behaviors Among Sorority Women

Authors: Andrea J. Kirk-Jenkins

Abstract:

Women in late adolescence and young adulthood are particularly vulnerable to disordered eating, and prior research indicates that those within the college and sorority communities may be especially susceptible. Research has primarily involved comparing eating disorder symptoms between sorority women and non-sorority members using formal eating disorder assessments. This phenomenological study examined sorority members’ (N = 10) perceptions of and lived experiences with various disordered eating behaviors within the sorority culture. Data from individual interviews and photographs indicated two structural themes and 11 textural themes related to factors associated with disordered eating behaviors. These findings point to the existence of both positive and negative aspects of sorority culture, normalization of disordered eating behaviors, and pressure to attain or maintain an ideal body image. Implications for university stakeholders, including college counselors, health center staff, and extracurricular program leaders, are discussed. Further research on the identified textural themes as well as a longitudinal study exploring how perceptions change from rush to alumnae status is suggested.

Keywords: eating disorders, disorder eating behaviors, sorority women, sorority culture, college women

Procedia PDF Downloads 95
748 Safe Routes to Schools (SRTS): Children’ Safety Improvement Under COVID-19 Pandemic Conditions in Jordan

Authors: Khair Jadaan, Qasem Alqasem

Abstract:

School children are vulnerable road user groups and are particularly at high risk calling for the need to improve their safety. Safe Routes to Schools (SRTS) concept is considered as one safety improvement approach that would effectively help improve school children’s safety. This paper aims to determine the best practice SRTS for Jordan based on the international experience attained through extensive and selected literature review falling under the 5 E’s and additionally on information/data collected through a survey performed using an online predesigned questionnaire to investigate the reactions and attitudes of students and their parents towards the proposed SRTS program. Data are analyzed using SPSS and MS software, especially Excel, in addition to some literature reviews inserted in this study. The results represent some recommendations that are strongly believed to help decision makers to develop the current safety conditions of the school routes. The challenges that the implementation of this program would face including COVID-19 protection for teachers and students are addressed.

Keywords: children, COVID-19, Jordan, safety, school, SRTS, 5 E’s

Procedia PDF Downloads 88
747 Nutritional Composition of Iranian Desi and Kabuli Chickpea (Cicer arietinum L.) Cultivars in Autumn Sowing

Authors: Khosro Mohammadi

Abstract:

The grain quality of chickpea in Iran is low and instable, which may be attributed to the evolution of cultivars with a narrow genetic base making them vulnerable to biotic stresses. Four chickpea varieties from diverse geographic origins were chosen and arranged in a randomized complete block design. Mesorhizobium Sp. cicer strain SW7 was added to all the chickpea seeds. Chickpea seeds were planted on October 9, 2013. Each genotype was sown 5 m in length, with 35 cm inter-row spacing, in 3 rows. Weeds were removed manually in all plots. Results showed that analysis of variance on the studied traits showed significant differences among genotypes for N, P, K and Fe contents of chickpea, but there is not a significant difference among Ca, Zn and Mg continents of chickpea. The experimental coefficient of variation (CV) varied from 7.3 to 15.8. In general, the CV value lower than 20% is considered to be good, indicating the accuracy of conducted experiments. The highest grain N was observed in Hashem and Jam cultivars. The highest grain P was observed in Jam cultivar. Phosphorus content (mg/100g) ranged from 142.3 to 302.3 with a mean value of 221.3. The negative correlation (-0.126) was observed between the N and P of chickpea cultivars. The highest K and Fe contents were observed in Jam cultivar.

Keywords: cultivar, genotype, nitrogen, nutrient, yield

Procedia PDF Downloads 326
746 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 333
745 High School Students’ Seismic Risk Perception and Preparedness in Shavar, Dhaka

Authors: Mohammad Lutfur Rahman

Abstract:

School students of Dhaka are in extreme risk of natural disasters. However, the study on assessment of the real scenario of high school students about perceptions of earthquake is very little. The purpose of this cross-sectional study is to assess the seismic risk perception and preparedness levels about earthquake among high school students in Shavar, Dhaka. A questionnaire was developed, and data collection was done about a group of high school students in seven classrooms. The author uses a method of surveying high school students to identify and describe the factors that influence their knowledge and perceptions about earthquake. This study examines gender and grade differences in perceived risk and communication behavior in response to the earthquake. Female students’ preparation, participation, and communication with family are more frequent than that of male students. Female students have been found to be more likely to learn about a disaster than male students. Higher grade students have more awareness but less preparedness about earthquake than that of the younger one. This research concludes that irrespective of grades, high school students are vulnerable to earthquake due to the lack of a seismic education program.

Keywords: awareness, earthquake, risk perception, seismic

Procedia PDF Downloads 211
744 Encouraging Skills and Entrepreneurial Spirit to Improve Employability of Young Artists

Authors: Olga Lasaga, Carmen Parra

Abstract:

Within the EU 'New Skills for New Jobs' initiative, the art and music sector is considered one of the most vulnerable. Its graduates are faced with the threat of the dole or of not finding work in the sector in which they trained. In this regard, an increasing number of students are graduating every year from European Conservatories and Fine Arts Centres, while the number of job opportunities in this sector has stagnated or decreased. Moreover, the traditional teaching of these institutes does not favour the acquisition of basic skills, such as team building, entrepreneurship, marketing, website design and the design of events, which are among the most important facets of project management and are precisely those aspects that are often most related to the improvement of employability in the art world. To remedy this situation, the results of the European Erasmus+ OMEGA project (Opening More Employment Gates for Art and Music Students) are presented. The OMEGA project aims to increase the employability of art and music students by equipping them with additional skills needed for the search for work. As a result of this project, a manual has been created, a pilot course has been designed and taught, and a comparative study has been conducted on the state of play of the participating countries.

Keywords: artists, employability, entrepreneurship, musicians, skills

Procedia PDF Downloads 216
743 Creating Bridges: The Importance of Intergenerational Experiences in the Educational Context

Authors: A. Eiguren-Munitis, N. Berasategi, J. M. Correa

Abstract:

Changes in family structures, immigration, economic crisis, among others, hinder the connection between different generations. This situation gives rise to a greater lack of social protection of the groups in vulnerable situations, such as the elderly and children. There is a growing need to search for shared spaces where different generations manage to break negative stereotypes and interact with each other. The school environment provides a favourable context in which the approach of different generations can be worked on. The intergenerational experiences that take place within the school context help to introduce the educational ideology for a lifetime. This induces bilateral learning, which encourages citizen participation. For this reason, the general objective of this research is to deepen the impact that intergenerational experiences have on participating students. The research is carried out based on mixed methods. The qualitative and quantitative evaluation included pre-test and post-test questionnaires (n=148) and group interviews (n=43). The results indicate that the intergenerational experiences influence different levels, on the one hand, help to promote school motivation and on the other hand, help to reduce negative stereotypes towards older people thus contributing to greater social cohesion.

Keywords: intergenerational learning, school, stereotypes, social cohesion

Procedia PDF Downloads 110
742 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 194
741 Role of Authorized Agencies to Combat Financial Crime in Bangladesh

Authors: Khan Sarfaraz, Mohammad Ali Mia

Abstract:

Money laundering and other financial crime have become a global threat in recent years, impacting both developed and poor countries. In developing countries like Bangladesh, it is more difficult to combat financial crime than in developing countries because of the inadequate regulatory environment and vulnerable financial system. Bangladesh's central bank issues guidelines to facilitate the implementation of the prevention of the money laundering act. According to the guideline of Bangladesh Bank, all financial institution has to develop anti-money laundering policy to ensure the safety and soundness of their institutions. The paper aims to focus on the role of authorized agencies in combating financial crime. In this paper, the latest trends in financial crimes have been discussed from global and Asian perspectives. The preventive measures for money laundering and other financial crimes have been discussed elaborately. So far, financial crime is a sophisticated and dynamic crime, and criminals continuously took innovative processes to use the financial system to launder money. The study will take a step in pointing out new techniques, effects and challenges of financial crime in Bangladesh.

Keywords: financial crime, illegal money transfer, online gambling, money laundering, authorized agencies

Procedia PDF Downloads 56
740 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 3
739 Enhancing Seismic Resilience in Urban Environments

Authors: Beatriz González-rodrigo, Diego Hidalgo-leiva, Omar Flores, Claudia Germoso, Maribel Jiménez-martínez, Laura Navas-sánchez, Belén Orta, Nicola Tarque, Orlando Hernández- Rubio, Miguel Marchamalo, Juan Gregorio Rejas, Belén Benito-oterino

Abstract:

Cities facing seismic hazard necessitate detailed risk assessments for effective urban planning and vulnerability identification, ensuring the safety and sustainability of urban infrastructure. Comprehensive studies involving seismic hazard, vulnerability, and exposure evaluations are pivotal for estimating potential losses and guiding proactive measures against seismic events. However, broad-scale traditional risk studies limit consideration of specific local threats and identify vulnerable housing within a structural typology. Achieving precise results at neighbourhood levels demands higher resolution seismic hazard exposure, and vulnerability studies. This research aims to bolster sustainability and safety against seismic disasters in three Central American and Caribbean capitals. It integrates geospatial techniques and artificial intelligence into seismic risk studies, proposing cost-effective methods for exposure data collection and damage prediction. The methodology relies on prior seismic threat studies in pilot zones, utilizing existing exposure and vulnerability data in the region. Emphasizing detailed building attributes enables the consideration of behaviour modifiers affecting seismic response. The approach aims to generate detailed risk scenarios, facilitating prioritization of preventive actions pre-, during, and post-seismic events, enhancing decision-making certainty. Detailed risk scenarios necessitate substantial investment in fieldwork, training, research, and methodology development. Regional cooperation becomes crucial given similar seismic threats, urban planning, and construction systems among involved countries. The outcomes hold significance for emergency planning and national and regional construction regulations. The success of this methodology depends on cooperation, investment, and innovative approaches, offering insights and lessons applicable to regions facing moderate seismic threats with vulnerable constructions. Thus, this framework aims to fortify resilience in seismic-prone areas and serves as a reference for global urban planning and disaster management strategies. In conclusion, this research proposes a comprehensive framework for seismic risk assessment in high-risk urban areas, emphasizing detailed studies at finer resolutions for precise vulnerability evaluations. The approach integrates regional cooperation, geospatial technologies, and adaptive fragility curve adjustments to enhance risk assessment accuracy, guiding effective mitigation strategies and emergency management plans.

Keywords: assessment, behaviour modifiers, emergency management, mitigation strategies, resilience, vulnerability

Procedia PDF Downloads 39
738 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 50
737 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 138
736 Design of an Automatic Saw Cutting Machine for Wood and Aluminum

Authors: Jawad Ul Haq, Evan Mazur, Ahmed Qureshi, Mohamed Al-Hussein

Abstract:

The uses of wood in furniture, building, bridges and aluminum in transportation and construction, make aluminum and forest economy a prominent matter in North America. Machines available to date to cut the aforementioned materials are mostly industry oriented with complex structure and operations which require special training and skill. Furthermore, requirements such as pneumatics, 3-phase supply are associated with cost, maintenance, and safety hazards. Power saws are very useful tools used to cut and shape materials; however, they can cause serious hand injuries. Operator’s hands in table saw are vulnerable as they are used to guide pieces into the saw. Apart from hands, saw operator is also prone to material being kicked back out of the saw or sustain eye or respiratory injuries due to rapidly flying sawdust and other debris. In this paper, design of an automatic saw cutting machine has been proposed to ensure safety, portability, usage at domestic level and capability to cut both aluminum and wood. This paper demonstrates detailed Mechanical design in SOLIDWORKS and Control Systems using Programmable Logic Controller (PLC), based on the aforementioned design objectives.

Keywords: programmable logic controller, saw cutting, control, automation

Procedia PDF Downloads 240
735 Understanding Human Trafficking in Benin City: Implications for Social Work Intervention

Authors: Tracy B. E. Omorogiuwa

Abstract:

Human trafficking also known as modern-day slavery can be seen as an effort by some privileged and criminally minded persons to take advantage of vulnerable individuals for their economic gains. Some factors; poverty, unemployment, poor educational opportunities, ignorance and traditional attitudes are attributed as causes and psychological, sexual, moral and health problems as impacts of human trafficking. This study examines the phenomenon of human trafficking in Benin City, one of the cities in Nigeria, situated as a source of trafficked persons for exploitation in Europe and African countries. Even though the Nigerian government and Non-governmental organizations have made considerable efforts in the past to reduce the incidence of human trafficking, the result has been an adjustment in the personality of the trafficked persons rather than professional measures to combat the issue. Hence, the study adopts the focused group discussions as a method for data collection; to sort the opinions of community members towards the understanding of the phenomenon. In addition, this paper provides social work implications to address the issue of human trafficking in the Benin City, Nigeria.

Keywords: human trafficking, trafficking in persons, modern-day slavery, social work implication

Procedia PDF Downloads 161
734 Dietary Diversification and Nutritional Education: A Strategy to Improve Child Food Security Status in the Rural Mozambique

Authors: Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Abstract:

Nutrient deficiencies due to a diet low in quantitative and qualitative terms, are prevalent throughout the developing world, especially in sub-Saharan Africa. Children and women of childbearing age are especially vulnerable. Limited availability, access and intake of animal foods at home and lack of knowledge about their value in the diet and the role they play in health, contribute to poor diet quality. Poor bioavailability of micronutrients in diets based on foods high in fiber and phytates, the low content of some micronutrients in these foods are further factors to consider. Goats are deeply embedded in almost every Sub-Saharan African rural culture, generally kept for their milk, meat, hair or leather. Goats have played an important role in African social life, especially in food security. Goat meat has good properties for human wellbeing, with a special role in lower income households. It has a high-quality protein (20 protein g/100 meat g) including all essential amino acids, good unsaturated/satured fatty acids relationship, and it is an important B-vitamin source with high micronutrients bioavailability. Mozambique has major food security problems, with poor food access and utilization, undiversified diets, chronic poverty and child malnutrition. Our objective was to design a nutritional intervention based on a dietary diversification, nutritional education, cultural beliefs and local resources, aimed to strengthen food security of children at Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. Two surveys were conducted first of socio-productive local databases and then to 100 rural households about livelihoods, food diversity and anthropometric measurements in children under 5 years. Our results indicate that the main economic activity is goat production, based on a native breed with two deliveries per year in the absence of any management. Adult goats weighted 27.2±10.5 kg and raised a height of 63.5±3.8 cm. Data showed high levels of poverty, with a food diversity score of 2.3 (0-12 points), where only 30% of households consume protein and 13% iron, zinc, and B12 vitamin. The main constraints to food security were poor access to water and low income to buy food. Our dietary intervention was based on improving diet quality by increasing the access to dried goat meat, fresh vegetables, and legumes, and its utilization by a nutritional education program. This proposal was based on local culture and living conditions characterized by the absence of electricity power and drinkable water. The drying process proposed would secure the food maintenance under local conditions guaranteeing food safety for a longer period. Additionally, an ancient local drying technique was rescued and used. Moreover, this kind of dietary intervention would be the most efficient way to improve the infant nutrition by delivering macro and micronutrients on time to these vulnerable populations.

Keywords: child malnutrition, dietary diversification, food security, goat meat

Procedia PDF Downloads 278
733 An Alternative and Complementary Medicine Method in Vulnerable Pediatric Cancer Patients: Yoga

Authors: Ç. Erdoğan, T. Turan

Abstract:

Pediatric cancer patients experience multiple distressing, challenges, physical symptom such as fatigue, pain, sleep disturbance, and balance impairment that continue years after treatment completion. In recent years, yoga is often used in children with cancer to cope with these symptoms. Yoga practice is defined as a unique physical activity that combines physical practice, breath work and mindfulness/meditation. Yoga is an increasingly popular mind-body practice also characterized as a mindfulness mode of exercise. This study aimed to evaluate the impact of yoga intervention of children with cancer. This article planned searching the literature in this field. It has been determined that individualized yoga is feasible and provides benefits for inpatient children, improves health-related quality of life, physical activity levels, physical fitness. After yoga program, children anxiety score decreases significantly. Additionally, individualized yoga is feasible for inpatient children receiving intensive chemotherapy. As a result, yoga is an alternative and complementary medicine that can be safely used in children with cancer.

Keywords: cancer treatment, children, nursing, yoga

Procedia PDF Downloads 194
732 The Effects of Siltation in Seagrass along Claver Surigao Del Norte

Authors: Dawn Rosarie M. Fajardo

Abstract:

Seagrass plays a crucial role in sustaining marine ecosystem. In this investigation two areas (Panyug and Kinalablaban) were studied to assess the effect of siltation in seagrass condition. The size of the sediment was also examined. Data analysis showed that Panyug had higher level of silt compared to Kinalablaban. The results indicate that seagrass is vulnerable to environmental disturbances. The results also indicate that plants grown in undisturbed natural sediments were more successful than plants in sediments which were disturbed. In addition to that, there are total of seven species of seagrass that are found tolerant with siltation it includes Enhalus acoroides, Cymodocea rotundata, Halophila minor, Halodule pinifolia, Halodule uninervis, Syringodium isoetifolium, and Thalassia hemprichii. The results were given emphasis especially for the five representative quadrats in each area. Among these species of seagrass Cymodocea rotundata is the most tolerant to siltation. There is also no significant relationships between silt and seagrass percent cover which had r² = 0.192, Panyug and r² = 0.145, at Kinalablaban at P> 0.05. The data showed that Panyug (area 1) was characterized with high level of silt compared to that of Kinalablaban that contains more granulated sediments.

Keywords: seagrass, siltation, cymodocea rotundata, sediments, environmental issues

Procedia PDF Downloads 510
731 Food Insecurity Determinants Amidst the Covid-19 Pandemic: An Insight from Huntsville, Texas

Authors: Peter Temitope Agboola

Abstract:

Food insecurity continues to affect a large number of U.S households during this coronavirus COVID-19 pandemic. The pandemic has threatened the livelihoods of people, making them vulnerable to severe hardship and has had an unanticipated impact on the U.S economy. This study attempts to identify the food insecurity status of households and the determinant factors driving household food insecurity. Additionally, it attempts to discover the mitigation measures adopted by households during the pandemic in the city of Huntsville, Texas. A structured online sample survey was used to collect data, with a household expenditures survey used in evaluating the food security status of the household. Most survey respondents disclosed that the COVID-19 pandemic had affected their life and source of income. Furthermore, the main analytical tool used for the study is descriptive statistics and logistic regression modeling. A logistic regression model was used to determine the factors responsible for food insecurity in the study area. The result revealed that most households in the study area are food secure, with the remainder being food insecure.

Keywords: food insecurity, household expenditure survey, COVID-19, coping strategies, food pantry

Procedia PDF Downloads 177
730 Mapping Crime against Women in India: Spatio-Temporal Analysis, 2001-2012

Authors: Ritvik Chauhan, Vijay Kumar Baraik

Abstract:

Women are most vulnerable to crime despite occupying central position in shaping a society as the first teacher of children. In India too, having equal rights and constitutional safeguards, the incidences of crime against them are large and grave. In this context of crime against women, especially rape has been increasing over time. This paper explores the spatial and temporal aspects of crime against women in India with special reference to rape. It also examines the crime against women with its spatial, socio-economic and demographic associates using related data obtained from the National Crime Records Bureau India, Indian Census and other government sources of the Government of India. The simple statistical, choropleth mapping and other cartographic representation methods have been used to see the crime rates, spatio-temporal patterns of crime, and association of crime with its correlates.  The major findings are visible spatial variations across the country and are also in the rising trends in terms of incidence and rates over the reference period. The study also indicates that the geographical associations are somewhat observed. However, selected indicators of socio-economic factors seem to have no significant bearing on crime against women at this level.

Keywords: crime against women, crime mapping, trend analysis, society

Procedia PDF Downloads 294
729 Automatic Thresholding for Data Gap Detection for a Set of Sensors in Instrumented Buildings

Authors: Houda Najeh, Stéphane Ploix, Mahendra Pratap Singh, Karim Chabir, Mohamed Naceur Abdelkrim

Abstract:

Building systems are highly vulnerable to different kinds of faults and failures. In fact, various faults, failures and human behaviors could affect the building performance. This paper tackles the detection of unreliable sensors in buildings. Different literature surveys on diagnosis techniques for sensor grids in buildings have been published but all of them treat only bias and outliers. Occurences of data gaps have also not been given an adequate span of attention in the academia. The proposed methodology comprises the automatic thresholding for data gap detection for a set of heterogeneous sensors in instrumented buildings. Sensor measurements are considered to be regular time series. However, in reality, sensor values are not uniformly sampled. So, the issue to solve is from which delay each sensor become faulty? The use of time series is required for detection of abnormalities on the delays. The efficiency of the method is evaluated on measurements obtained from a real power plant: an office at Grenoble Institute of technology equipped by 30 sensors.

Keywords: building system, time series, diagnosis, outliers, delay, data gap

Procedia PDF Downloads 219
728 On the Development of a Homogenized Earthquake Catalogue for Northern Algeria

Authors: I. Grigoratos, R. Monteiro

Abstract:

Regions with a significant percentage of non-seismically designed buildings and reduced urban planning are particularly vulnerable to natural hazards. In this context, the project ‘Improved Tools for Disaster Risk Mitigation in Algeria’ (ITERATE) aims at seismic risk mitigation in Algeria. Past earthquakes in North Algeria caused extensive damages, e.g. the El Asnam 1980 moment magnitude (Mw) 7.1 and Boumerdes 2003 Mw 6.8 earthquakes. This paper will address a number of proposed developments and considerations made towards a further improvement of the component of seismic hazard. In specific, an updated earthquake catalog (until year 2018) is compiled, and new conversion equations to moment magnitude are introduced. Furthermore, a network-based method for the estimation of the spatial and temporal distribution of the minimum magnitude of completeness is applied. We found relatively large values for Mc, due to the sparse network, and a nonlinear trend between Mw and body wave (mb) or local magnitude (ML), which are the most common scales reported in the region. Lastly, the resulting b-value of the Gutenberg-Richter distribution is sensitive to the declustering method.

Keywords: conversion equation, magnitude of completeness, seismic events, seismic hazard

Procedia PDF Downloads 141
727 Trajectories of PTSD from 2-3 Years to 5-6 Years among Asian Americans after the World Trade Center Attack

Authors: Winnie Kung, Xinhua Liu, Debbie Huang, Patricia Kim, Keon Kim, Xiaoran Wang, Lawrence Yang

Abstract:

Considerable Asian Americans were exposed to the World Trade Center attack due to the proximity of the site to Chinatown and a sizeable number of South Asians working in the collapsed and damaged buildings nearby. Few studies focused on Asians in examining the disaster’s mental health impact, and even less longitudinal studies were reported beyond the first couple of years after the event. Based on the World Trade Center Health Registry, this study examined the trajectory of PTSD of individuals directly exposed to the attack from 2-3 to 5-6 years after the attack, comparing Asians against the non-Hispanic White group. Participants included 2,431 Asians and 31,455 Whites. Trajectories were delineated into the resilient, chronic, delayed-onset and remitted groups using PTSD checklist cut-off score at 44 at the 2 waves. Logistic regression analyses were conducted to compare the poorer trajectories against the resilient as a reference group, using predictors of baseline sociodemographic, exposure to the disaster, lower respiratory symptoms and previous depression/anxiety disorder diagnosis, and recruitment source as the control variable. Asians had significant lower socioeconomic status in terms of income, education and employment status compared to Whites. Over 3/4 of participants from both races were resilient, though slightly less for Asians than Whites (76.5% vs 79.8%). Asians had a higher proportion with chronic PTSD (8.6% vs 7.4%) and remission (5.9% vs 3.4%) than Whites. A considerable proportion of participants had delayed-onset in both races (9.1% Asians vs 9.4% Whites). The distribution of trajectories differed significantly by race (p<0.0001) with Asians faring poorer. For Asians, in the chronic vs resilient group, significant protective factors included age >65, annual household income >$50,000, and never married vs married/cohabiting; risk factors were direct disaster exposure, job loss due to 9/11, lost someone, and tangible loss; lower respiratory symptoms and previous mental disorder diagnoses. Similar protective and risk factors were noted for the delayed-onset group, except education being protective; and being an immigrant a risk. Between the 2 comparisons, the chronic group was more vulnerable than the delayed-onset as expected. It should also be noted that in both comparisons, Asians’ current employment status had no significant impact on their PTSD trajectory. Comparing between Asians against Whites, the direction of the relationships between the predictors and the PTSD trajectories were mostly the same, although more factors were significant for Whites than for Asians. A few factors showed significant racial difference: Higher risk for lower respiratory symptoms for Whites than Asians, higher risk for pre-9/11 mental disorder diagnosis for Asians than Whites, and immigrant a risk factor for the remitted vs resilient groups for Whites but not for Asians. Over 17% Asians still suffered from PTSD 5-6 years after the WTC attack signified its persistent impact which incurred substantial human, social and economic costs. The more disadvantaged socioeconomic status of Asians rendered them more vulnerable in their mental health trajectories relative to Whites. Together with their well-documented low tendency to seek mental health help, outreach effort to this population is needed to ensure follow-up treatment and prevention.

Keywords: PTSD, Asian Americans, World Trade Center Attack, racial differences

Procedia PDF Downloads 231
726 Reliability Analysis for Cyclic Fatigue Life Prediction in Railroad Bolt Hole

Authors: Hasan Keshavarzian, Tayebeh Nesari

Abstract:

Bolted rail joint is one of the most vulnerable areas in railway track. A comprehensive approach was developed for studying the reliability of fatigue crack initiation of railroad bolt hole under random axle loads and random material properties. The operation condition was also considered as stochastic variables. In order to obtain the comprehensive probability model of fatigue crack initiation life prediction in railroad bolt hole, we used FEM, response surface method (RSM), and reliability analysis. Combined energy-density based and critical plane based fatigue concept is used for the fatigue crack prediction. The dynamic loads were calculated according to the axle load, speed, and track properties. The results show that axle load is most sensitive parameter compared to Poisson’s ratio in fatigue crack initiation life. Also, the reliability index decreases slowly due to high cycle fatigue regime in this area.

Keywords: rail-wheel tribology, rolling contact mechanic, finite element modeling, reliability analysis

Procedia PDF Downloads 356
725 Comparative Analysis of Predictive Models for Customer Churn Prediction in the Telecommunication Industry

Authors: Deepika Christopher, Garima Anand

Abstract:

To determine the best model for churn prediction in the telecom industry, this paper compares 11 machine learning algorithms, namely Logistic Regression, Support Vector Machine, Random Forest, Decision Tree, XGBoost, LightGBM, Cat Boost, AdaBoost, Extra Trees, Deep Neural Network, and Hybrid Model (MLPClassifier). It also aims to pinpoint the top three factors that lead to customer churn and conducts customer segmentation to identify vulnerable groups. According to the data, the Logistic Regression model performs the best, with an F1 score of 0.6215, 81.76% accuracy, 68.95% precision, and 56.57% recall. The top three attributes that cause churn are found to be tenure, Internet Service Fiber optic, and Internet Service DSL; conversely, the top three models in this article that perform the best are Logistic Regression, Deep Neural Network, and AdaBoost. The K means algorithm is applied to establish and analyze four different customer clusters. This study has effectively identified customers that are at risk of churn and may be utilized to develop and execute strategies that lower customer attrition.

Keywords: attrition, retention, predictive modeling, customer segmentation, telecommunications

Procedia PDF Downloads 25
724 Nonlinear Relationship between Globalization and Control of Corruption along with Economic Growth

Authors: Elnaz Entezar, Reza Ezzati

Abstract:

In recent decades, trade flows, capital, workforce, technology and information have increased between international borders and the globalization has turned to an undeniable process in international economics. Meanwhile, despite the positive aspects of globalization, the critics of globalization opine that the risks and costs of globalization for developing vulnerable economies and the world's impoverished people are high and significant. In this regard, this study by using the data of KOF Economic Institute and the World Bank for 113 different countries during the period 2002-2012, by taking advantage of panel smooth transition regression, and by taking the gross domestic product as transmission variables discuss the nonlinear relationship between research variables. The results have revealed that globalization in low regime (countries with low GDP) has negative impact whereas in high regime (countries with high GDP) has a positive impact. In spite of the fact that in the early stages of growth, control of corruption has a positive impact on economic growth, after a threshold has a negative impact on economic growth.

Keywords: globalization, corruption, panel smooth transition model, economic growth, threshold, economic convergence

Procedia PDF Downloads 260
723 Developing Pan-University Collaborative Initiatives in Support of Diversity and Inclusive Campuses

Authors: David Philpott, Karen Kennedy

Abstract:

In recognition of an increasingly diverse student population, a Teaching and Learning Framework was developed at Memorial University of Newfoundland. This framework emphasizes work that is engaging, supportive, inclusive, responsive, committed to discovery, and is outcomes-oriented for both educators and learners. The goal of the Teaching and Learning framework was to develop a number of initiatives that builds on existing knowledge, proven programs, and existing supports in order to respond to the specific needs of identified groups of diverse learners: 1) academically vulnerable first year students; 2) students with individual learning needs associated with disorders and/or mental health issues; 3) international students and those from non-western cultures. This session provides an overview of this process. The strategies employed to develop these initiatives were drawn primarily from research on student success and retention (literature review), information on pre-existing programs (environmental scan), an analysis of in-house data on students at our institution; consultations with key informants at all of Memorial’s campuses. The first initiative that emerged from this research was a pilot project proposal for a first-year success program in support of the first-year experience of academically vulnerable students. This program offers a university experience that is enhanced by smaller classes, supplemental instruction, learning communities, and advising sessions. The second initiative that arose under the mandate of the Teaching and Learning Framework was a collaborative effort between two institutions (Memorial University and the College of the North Atlantic). Both institutions participated in a shared conversation to examine programs and services that support an accessible and inclusive environment for students with disorders and/or mental health issues. A report was prepared based on these conversations and an extensive review of research and programs across the country. Efforts are now being made to explore possible initiatives that address culturally diverse and non-traditional learners. While an expanding literature has emerged on diversity in higher education, the process of developing institutional initiatives is usually excluded from such discussions, while the focus remains on effective practice. The proposals that were developed constitute a co-ordination and strengthening of existing services and programs; a weaving of supports to engage a diverse body of students in a sense of community. This presentation will act as a guide through the process of developing projects addressing learner diversity and engage attendees in a discussion of institutional practices that have been implemented in support of overcoming challenges, as well as provide feedback on institutional and student outcomes. The focus of this session will be on effective practice, and will be of particular interest to university administrators, educational developers, and educators wishing to implement similar initiatives on their campuses; possible adaptations for practice will be addressed. A presentation of findings from this research will be followed by an open discussion where the sharing of research, initiatives, and best practices for the enhancement of teaching and learning is welcomed. There is much insight and understanding to be gained through the sharing of ideas and collaborative practice as we move forward to further develop the program and prepare other initiatives in support of diversity and inclusion.

Keywords: eco-scale, green analysis, environmentally-friendly, pharmaceuticals analysis

Procedia PDF Downloads 273
722 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 64