This document describes the development of a prototype for a Kenya National Domestic Violence Call Center (K-NDVCC) that uses geospatial technologies. The prototype automatically identifies callers' locations, assesses nearby advocate resources from its database, and publishes maps in KML format for viewing in software like Google Earth. It was tested using sample data from Juja, Kenya. The prototype integrates concepts like buffering, spatial selection, cartography, and geodatabases to provide rapid responses to domestic violence calls by locating appropriate resources. Its goals are to help callers access language, medical, financial and psychological support more quickly.
A large scale study of daily information needs captured in situWookjae Maeng
The goal of this work is to provide a fundamental understanding of the daily information needs of people through a large-scale, in-depth, quantitative investigation. To this end, we have conducted one of the most comprehensive studies of information needs to date, spanning a 3-month period and involving more than 100 users. The study employed a contextual experience sampling method, a snippet-based diary technique using SMS technology, and an online Web diary to gather in situ insights into the types of needs that occur from day to day, how those needs are addressed, and how contextual, technological, and demographic factors impact on those needs. Our results not only complement earlier studies but also provide a new understanding of the intricacies of people’s daily information needs.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A large scale study of daily information needs captured in situWookjae Maeng
The goal of this work is to provide a fundamental understanding of the daily information needs of people through a large-scale, in-depth, quantitative investigation. To this end, we have conducted one of the most comprehensive studies of information needs to date, spanning a 3-month period and involving more than 100 users. The study employed a contextual experience sampling method, a snippet-based diary technique using SMS technology, and an online Web diary to gather in situ insights into the types of needs that occur from day to day, how those needs are addressed, and how contextual, technological, and demographic factors impact on those needs. Our results not only complement earlier studies but also provide a new understanding of the intricacies of people’s daily information needs.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Being out of touch with a loved one is concerning and not hearing from someone you care about is terrifying. Several cases of missing people have been reported for many years, where most of the searches turn out unsuccessful. In order to quickly reunite families and friends with their missing loved ones, a solution for effectively searching for the missing people is presented. In
evaluation of this solution, an F1 score test was simulated using 20 scenarios, out of which an impressive score of 0.72 was attained.The study concludes that we need to leverage on mobile based technology to device a more efficient method of finding missing persons more easily and quickly.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
This paper presents suggestions for an exploratory approach to understanding cybercrime that we call “cybercartography” using a set of tools that have not been frequently applied to this domain. We refer to 1) fifty-plus years of experience by scientists and governments in integrating socioeconomic and political data organized by administrative boundaries with satellite raster and global gridded global data sets 2) gridded global models 3) global event data sets 4) centuries of experience with the art and science of cartography. To make this less abstract, consider the broad generalization that most current generation cyberthreat maps involve lots of blinking dots and network graphs superimposed over an outline or “blue marble” view of the world. Then compare some of the cartographic techniques that are often used to map other knowledge domains—for example, National Geographic-style cartography, high-resolution administrative boundary maps produced using the US census, and gridded global data sets. A deeper level of insight into the world of cybercrime can be gained in combining the standard cyberthreat network analyses with place-specific variables which can lead to greater insights into who the cybercriminals are, what makes a particular region fertile ground for these activities, why some regions are less susceptible to developing cybercriminals, and where new criminal activities are likely to spring-up and flourish. These different approaches are not superior to one another, but they can be complementary.
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
Divert: Mother-in-law
Representing and Evaluating Social Context on Mobile Devices
Kris Mihalic, Manfred Tscheligi
ICT&S Center, University of Salzburg, Austria
MobileHCI 2007, Singapore
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
This paper presents an in-house created software application that emulates and virtualizes computer networking laboratory hardware and proprietary equipment on PCs and servers. A user friendly remote laboratory manage system is developed using .NET technology. Through the presented lab management system, the students are able to conduct more than 200 lab assignments covering 10 courses from both lower level routing and switching classes to upper level network management and security classes that demand a large amount of physical equipment and a great number of student lab contact hours prior to the emulated lab. This emulation solution eliminates our dependencies on expensive proprietary networking equipment. It also reduces the burden of system administration. This remote lab has been used and tested in three networking courses. The feedbacks show that the lab delivers similar or better lab experiences for the DE students while the lab construction and maintenance cost is reduced to the minimum.
SAFARILAB: A Rugged and Reliable Optical Imaging System Characterization Set-...drboon
This work proposes a rugged and reliable set-up to characterize incoherently illuminated optical imaging systems. It complies with the ISO 12233 standard and is suitable for industrial applications. The standard has been implemented taking advantage of the allowed degrees of freedom to optimize noise robustness. Key points of the algorithm are automatization of the whole measurement procedure and customization, to comply with specific needs. Experimental results confirming the successful implementation are presented and discussed.
A Novel Finite Element Model for Annulus Fibrosus Tissue Engineering Using Ho...drboon
In this work, a novel finite element model using the mechanical homogenization techniques of the human annulus fibrosus (AF) is proposed to accurately predict relevant moduli of the AF lamella for tissue engineering application. A general formulation for AF homogenization was laid out with appropriate boundary conditions. The geometry of the fibre and matrix were laid out in such a way as to properly mimic the native annulus fibrosus tissue’s various, location-dependent geometrical and histological states. The mechanical properties of the annulus fibrosus calculated with this model were then compared with the results obtained from the literature for native tissue. Circumferential, axial, radial, and shear moduli were all in agreement with the values found in literature. This study helps to better understand the anisotropic nature of the annulus fibrosus tissue, and possibly could be used to predict the structure-function relationship of a tissue-engineered AF.
In a world of rapidly increasing urbanization, striving to develop more livable cities, the city’s streets designing and planning should be high on the agenda for policymakers, city planners and other practitioners, as well as researchers. Designing streets is not as easy as it might originally seem, however, done correctly it means that one third of the city was designed successfully with an immense impact on the rest of the city. The key challenge in developing sustainable and fulfilling streets is to develop an integrated approach in planning them, where it is necessary to consider all aspects involved. Meanwhile, efforts devoted to this topic vary considerably from place to place. Thus, this paper aims at discussing the main elements involved in designing streets for a livable city, in a comprehensive approach including pedestrians, vehicles, and parking areas.
Rainfall and Chemical Weathering of Basalt Facade at Puebla Cathedral, Mexicodrboon
Pollutant emissions from anthropogenic activities have modified frequency, amount and chemical quality of rainfall at a specific site. Interactions of atmospheric dust with rainfall have induced weathering at Puebla Cathedral basalt facade. Chemical damage in exposed construction materials becomes evident as crusts, color bleaching, or salt deposits either into the stone or onto its surface. This work presents data on atmospheric dust (2012), rainfall (2009, 2011, 2012 years) and weathered basalt samples collected at downtown Puebla. Samples were characterized by gravimetric and spectrophotometric techniques for anions and metals. Results have provided evidence that atmospheric dust contains carbonates (>300 mg/g), sulfate and chloride (< 10 mg/g); otherwise main anions in rain samples are bicarbonate>chloride>sulfate, this order is reproduced in the results of most weathered basalt samples.
Crossroads Vertical Speed Control Devices: Suggestion from Observation drboon
This work focused on traffic audits and investigation of the vertical speed control devices installed at crossroads as traffic speed being controlled but rear-end accidents can still be found. The speed monitoring through 85th percentile speeds for various types of vehicles: i) passenger cars, ii) pickup trucks, iii) motorbikes, and iv) passenger buses and lorries (i.e., more than four wheels vehicles) was performed. Discussion and recommendation from the obtained results have been made. As an alternative choice to reduce crossroad rear-end collisions, this work introduced crossroad speed table.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
nformation Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of
sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The
advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things,
its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense
mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates
detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This
research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic
framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include
evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with
optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality
of alert and recognize attack strategy
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
Brian Wrote :
There is a wide range of cybersecurity initiatives that exist on the international level through collaborative efforts between the Department of Homeland Security (DHS) and numerous organizational units (UMUC, 2012). According to UMUC (2012), some examples of these initiatives are:
· Federal Law Enforcement Training Center
· National Cyber Security Division
· National Communications System
· Office of Infrastructure Protection
· Office of Operations Coordination
· Privacy Office
· U.S. Secret Service
· U.S. Immigration and Customs Enforcement
· Organization of American States Assistance
“The National Cyber Security Division works to secure cyberspace and America’s cyber assets in cooperation with public, private, and international entities” (UMUC, 2012). This is done using several strategic plans and directives, such as the Presidential Decision Directive 7, the Information Technology Sector Specific Plan, the National Strategy to Secure Cyber Space, National Infrastructure Preparedness Plan, and the National Response Plan (UMUC, 2012). A challenge that the National Cyber Security Division faces in providing an effective deterrent to cybersecurity threats are the constant evolving technologies. These include for both good and bad. Cyber attacks are constantly evolving and so are the technologies use to protect from them. In order for the National Cyber Security Division to effectively deter them not only do they have to stay up-to-date but also so do all of the strategic plans and directives that they use.
Another initiative is the Federal Law Enforcement Training Center (FLETC) that emerged in the 1980s. This initiative puts forth “efforts to counter international hijackings and financial crimes” (UMUC, 2012). It now also extends law enforcement abroad to help against terrorist activity, international crime, and drug-trafficking (UMUC, 2012). It does those with the partner of Department of State. A challenge that the FLETC faces in providing an effective deterrent to cybersecurity threats are their international limitations. All though they have partnered abroad with select foreign nations they still have restrictions and limitations as to what exactly they can do.
Justin Wrote:
Mutual Legal Assistance Treaties (MLATs) are established between two or more nations and provide a formal means of exchanging evidence and information pertaining to criminal acts or cases that occur outside of a nation’s legal jurisdiction. The primary issue associated with MLATs and cybercrime is the inconsistency of host nation laws. Many nations feel that the idea of a global anti-crime initiative may contradict a nation’s fundamental principles (Finklea & Theohary, 2012, p.24). There is no standardized definition for cybercrime which means that one nation may view a virtual act as a crime and the other, with which the MLAT exists, may not. If the two nations agree on the legality of the act then the requesting nation may sub ...
Review on effectiveness of deep learning approach in digital forensicsIJECEIAES
Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.
Being out of touch with a loved one is concerning and not hearing from someone you care about is terrifying. Several cases of missing people have been reported for many years, where most of the searches turn out unsuccessful. In order to quickly reunite families and friends with their missing loved ones, a solution for effectively searching for the missing people is presented. In
evaluation of this solution, an F1 score test was simulated using 20 scenarios, out of which an impressive score of 0.72 was attained.The study concludes that we need to leverage on mobile based technology to device a more efficient method of finding missing persons more easily and quickly.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
This paper presents suggestions for an exploratory approach to understanding cybercrime that we call “cybercartography” using a set of tools that have not been frequently applied to this domain. We refer to 1) fifty-plus years of experience by scientists and governments in integrating socioeconomic and political data organized by administrative boundaries with satellite raster and global gridded global data sets 2) gridded global models 3) global event data sets 4) centuries of experience with the art and science of cartography. To make this less abstract, consider the broad generalization that most current generation cyberthreat maps involve lots of blinking dots and network graphs superimposed over an outline or “blue marble” view of the world. Then compare some of the cartographic techniques that are often used to map other knowledge domains—for example, National Geographic-style cartography, high-resolution administrative boundary maps produced using the US census, and gridded global data sets. A deeper level of insight into the world of cybercrime can be gained in combining the standard cyberthreat network analyses with place-specific variables which can lead to greater insights into who the cybercriminals are, what makes a particular region fertile ground for these activities, why some regions are less susceptible to developing cybercriminals, and where new criminal activities are likely to spring-up and flourish. These different approaches are not superior to one another, but they can be complementary.
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
Divert: Mother-in-law
Representing and Evaluating Social Context on Mobile Devices
Kris Mihalic, Manfred Tscheligi
ICT&S Center, University of Salzburg, Austria
MobileHCI 2007, Singapore
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
This paper presents an in-house created software application that emulates and virtualizes computer networking laboratory hardware and proprietary equipment on PCs and servers. A user friendly remote laboratory manage system is developed using .NET technology. Through the presented lab management system, the students are able to conduct more than 200 lab assignments covering 10 courses from both lower level routing and switching classes to upper level network management and security classes that demand a large amount of physical equipment and a great number of student lab contact hours prior to the emulated lab. This emulation solution eliminates our dependencies on expensive proprietary networking equipment. It also reduces the burden of system administration. This remote lab has been used and tested in three networking courses. The feedbacks show that the lab delivers similar or better lab experiences for the DE students while the lab construction and maintenance cost is reduced to the minimum.
SAFARILAB: A Rugged and Reliable Optical Imaging System Characterization Set-...drboon
This work proposes a rugged and reliable set-up to characterize incoherently illuminated optical imaging systems. It complies with the ISO 12233 standard and is suitable for industrial applications. The standard has been implemented taking advantage of the allowed degrees of freedom to optimize noise robustness. Key points of the algorithm are automatization of the whole measurement procedure and customization, to comply with specific needs. Experimental results confirming the successful implementation are presented and discussed.
A Novel Finite Element Model for Annulus Fibrosus Tissue Engineering Using Ho...drboon
In this work, a novel finite element model using the mechanical homogenization techniques of the human annulus fibrosus (AF) is proposed to accurately predict relevant moduli of the AF lamella for tissue engineering application. A general formulation for AF homogenization was laid out with appropriate boundary conditions. The geometry of the fibre and matrix were laid out in such a way as to properly mimic the native annulus fibrosus tissue’s various, location-dependent geometrical and histological states. The mechanical properties of the annulus fibrosus calculated with this model were then compared with the results obtained from the literature for native tissue. Circumferential, axial, radial, and shear moduli were all in agreement with the values found in literature. This study helps to better understand the anisotropic nature of the annulus fibrosus tissue, and possibly could be used to predict the structure-function relationship of a tissue-engineered AF.
In a world of rapidly increasing urbanization, striving to develop more livable cities, the city’s streets designing and planning should be high on the agenda for policymakers, city planners and other practitioners, as well as researchers. Designing streets is not as easy as it might originally seem, however, done correctly it means that one third of the city was designed successfully with an immense impact on the rest of the city. The key challenge in developing sustainable and fulfilling streets is to develop an integrated approach in planning them, where it is necessary to consider all aspects involved. Meanwhile, efforts devoted to this topic vary considerably from place to place. Thus, this paper aims at discussing the main elements involved in designing streets for a livable city, in a comprehensive approach including pedestrians, vehicles, and parking areas.
Rainfall and Chemical Weathering of Basalt Facade at Puebla Cathedral, Mexicodrboon
Pollutant emissions from anthropogenic activities have modified frequency, amount and chemical quality of rainfall at a specific site. Interactions of atmospheric dust with rainfall have induced weathering at Puebla Cathedral basalt facade. Chemical damage in exposed construction materials becomes evident as crusts, color bleaching, or salt deposits either into the stone or onto its surface. This work presents data on atmospheric dust (2012), rainfall (2009, 2011, 2012 years) and weathered basalt samples collected at downtown Puebla. Samples were characterized by gravimetric and spectrophotometric techniques for anions and metals. Results have provided evidence that atmospheric dust contains carbonates (>300 mg/g), sulfate and chloride (< 10 mg/g); otherwise main anions in rain samples are bicarbonate>chloride>sulfate, this order is reproduced in the results of most weathered basalt samples.
Crossroads Vertical Speed Control Devices: Suggestion from Observation drboon
This work focused on traffic audits and investigation of the vertical speed control devices installed at crossroads as traffic speed being controlled but rear-end accidents can still be found. The speed monitoring through 85th percentile speeds for various types of vehicles: i) passenger cars, ii) pickup trucks, iii) motorbikes, and iv) passenger buses and lorries (i.e., more than four wheels vehicles) was performed. Discussion and recommendation from the obtained results have been made. As an alternative choice to reduce crossroad rear-end collisions, this work introduced crossroad speed table.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
nformation Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of
sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The
advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things,
its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense
mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates
detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This
research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic
framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include
evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with
optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality
of alert and recognize attack strategy
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
Brian Wrote :
There is a wide range of cybersecurity initiatives that exist on the international level through collaborative efforts between the Department of Homeland Security (DHS) and numerous organizational units (UMUC, 2012). According to UMUC (2012), some examples of these initiatives are:
· Federal Law Enforcement Training Center
· National Cyber Security Division
· National Communications System
· Office of Infrastructure Protection
· Office of Operations Coordination
· Privacy Office
· U.S. Secret Service
· U.S. Immigration and Customs Enforcement
· Organization of American States Assistance
“The National Cyber Security Division works to secure cyberspace and America’s cyber assets in cooperation with public, private, and international entities” (UMUC, 2012). This is done using several strategic plans and directives, such as the Presidential Decision Directive 7, the Information Technology Sector Specific Plan, the National Strategy to Secure Cyber Space, National Infrastructure Preparedness Plan, and the National Response Plan (UMUC, 2012). A challenge that the National Cyber Security Division faces in providing an effective deterrent to cybersecurity threats are the constant evolving technologies. These include for both good and bad. Cyber attacks are constantly evolving and so are the technologies use to protect from them. In order for the National Cyber Security Division to effectively deter them not only do they have to stay up-to-date but also so do all of the strategic plans and directives that they use.
Another initiative is the Federal Law Enforcement Training Center (FLETC) that emerged in the 1980s. This initiative puts forth “efforts to counter international hijackings and financial crimes” (UMUC, 2012). It now also extends law enforcement abroad to help against terrorist activity, international crime, and drug-trafficking (UMUC, 2012). It does those with the partner of Department of State. A challenge that the FLETC faces in providing an effective deterrent to cybersecurity threats are their international limitations. All though they have partnered abroad with select foreign nations they still have restrictions and limitations as to what exactly they can do.
Justin Wrote:
Mutual Legal Assistance Treaties (MLATs) are established between two or more nations and provide a formal means of exchanging evidence and information pertaining to criminal acts or cases that occur outside of a nation’s legal jurisdiction. The primary issue associated with MLATs and cybercrime is the inconsistency of host nation laws. Many nations feel that the idea of a global anti-crime initiative may contradict a nation’s fundamental principles (Finklea & Theohary, 2012, p.24). There is no standardized definition for cybercrime which means that one nation may view a virtual act as a crime and the other, with which the MLAT exists, may not. If the two nations agree on the legality of the act then the requesting nation may sub ...
Review on effectiveness of deep learning approach in digital forensicsIJECEIAES
Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.
● Design of Intelligent Home Security Alarm System under STC89C51 Single Chip Microcomputer
https://ojs.bilpublishing.com/index.php/jcsr/article/view/2159
● Human-Centered A.I. and Security Primitives
https://ojs.bilpublishing.com/index.php/jcsr/article/view/2534
● Machine Learning Approach to Mobile Forensics Framework for Cyber Crime Detection in Nigeria
https://ojs.bilpublishing.com/index.php/jcsr/article/view/2147
● Quality Models for Open, Flexible, and Online Learning
https://ojs.bilpublishing.com/index.php/jcsr/article/view/2357
● Researching the Research: Applying Machine Learning Techniques to Dissertation Classification
https://ojs.bilpublishing.com/index.php/jcsr/article/view/2230
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
Network Forensics is fairly a new area of research which would be used after an intrusion in various
organizations ranging from small, mid-size private companies and government corporations to the defence
secretariat of a country. At the point of an investigation valuable information may be mishandled which
leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks
such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the
identity of the intruder. The aim of this research was to map the correlation between network security and
network forensic mechanisms. There are three sub research questions that had been studied. Those have
identified Network Security issues, Network Forensic investigations used in an incident, and the use of
network forensics mechanisms to eliminate network security issues. Literature review has been the
research strategy used in order study the sub research questions discussed. Literature such as research
papers published in Journals, PhD Theses, ISO standards, and other official research papers have been
evaluated and have been the base of this research. The deliverables or the output of this research was
produced as a report on how network forensics has assisted in aligning network security in case of an
intrusion. This research has not been specific to an organization but has given a general overview about
the industry. Embedding Digital Forensics Framework, Network Forensic Development Life Cycle, and
Enhanced Network Forensic Cycle could be used to develop a secure network. Through the mentioned
framework, and cycles the author has recommended implementing the 4R Strategy (Resistance,
Recognition, Recovery, Redress) with the assistance of a number of tools. This research would be of
interest to Network Administrators, Network Managers, Network Security personnel, and other personnel interested in obtaining knowledge in securing communication devices/infrastructure. This research provides a framework that can be used in an organization to eliminate digital anomalies through network forensics, helps the above mentioned persons to prepare infrastructure readiness for threats and also enables further research to be carried on in the fields of computer, database, mobile, video, and audio.
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
Network Forensics is fairly a new area of research which would be used after an intrusion in various
organizations ranging from small, mid-size private companies and government corporations to the defence
secretariat of a country. At the point of an investigation valuable information may be mishandled which
leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks
such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the
identity of the intruder. The aim of this research was to map the correlation between network security and
network forensic mechanisms. There are three sub research questions that had been studied. Those have
identified Network Security issues, Network Forensic investigations used in an incident, and the use of
network forensics mechanisms to eliminate network security issues. Literature review has been the
research strategy used in order study the sub research questions discussed. Literature such as research
papers published in Journals, PhD Theses, ISO standards, and other official research papers have been
evaluated and have been the base of this research. The deliverables or the output of this research was
produced as a report on how network forensics has assisted in aligning network security in case of an
intrusion. This research has not been specific to an organization but has given a general overview about
the industry. Embedding Digital Forensics Framework, Network Forensic Development Life Cycle, and
Enhanced Network Forensic Cycle could be used to develop a secure network. Through the mentioned
framework, and cycles the author has recommended implementing the 4R Strategy (Resistance,
Recognition, Recovery, Redress) with the assistance of a number of tools. This research would be of
interest to Network Administrators, Network Managers, Network Security personnel, and other personnel
interested in obtaining knowledge in securing communication devices/infrastructure. This research
provides a framework that can be used in an organization to eliminate digital anomalies through network
forensics, helps the above mentioned persons to prepare infrastructure readiness for threats and also
enables further research to be carried on in the fields of computer, database, mobile, video, and audio.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...UN Global Pulse
The goal of this project was to determine how insights from mobile data might be used to maximum effect in support of policy planning and crisis response with minimal risk to privacy. The project aimed to determine the impact that aggregating mobile data to protect privacy has upon the utility of the data for (i) transportation planning and (ii) pandemic control and prevention. Utility of each data set was evaluated by surveying transportation experts and epidemiologists; re-identification risk for each data set was also assessed. Risk of re-identification was subsequently considered together with data utility to determine which level of aggregation is the minimum required to adequately protect individual privacy while preserving its value for policy planning and crisis response.
Cite as: “Mapping the Risk-Utility Landscape: Mobile Data for Sustainable Development & Humanitarian Action”, Global Pulse Project Series no. 18, 2015.
A Deep Learning Model For Crime Surveillance In Phone Calls.vivatechijri
Public surveillance Systems are creating ground-breaking impact to secure lives, ensuring public safety with the interventions that will curb crime and improve well-being of communities, law enforcement agencies are employing and deploying tools like CCTV for video surveillance in banks, residential societies shopping malls,markets,roads almost everywhere to detect where and who was responsible for events like robbery, rough driving, insolence, murder etc. Other surveillance system tools like phone tapping is used to plot an event to catch a suspected person who is threatening an innocent or conspiring a violent activity over a phone call which is being done voluntarily by authorities . Now analyzing both the scenarios in the case of CCTV the crime(robbery,murder) has already occured and in the case of phone tapping there must be information in advance about the suspected person who is going to commit a crime, Now to overcome this issue a system is proposed to know in advance who is suspected and what conspiracy is being done over phone calls as well to detect it automatically and report it to law enforcemet authorities.
A MOBILE DISASTER MANAGEMENT SYSTEM USING THE ANDROID TECHNOLOGYAM Publications
The numbers countries in the world vulnerable to natural hazards because of its geographic location. It
also lacks an efficient disaster management system that will help in times of need. One common scenario during
disasters is that the activity of rescue and relief is not well-coordinated. For this reason, there is a need for a system
that will help in the efficient provision of rescue and relief to disaster-affected areas. Since the use of smart phones is
gaining interest in people, the disaster management system was implemented as a smart phone application using
Google’s Android operating system. The disaster management system Android application known as MyDisasterDroid
determines the optimum route along different geographical locations that the volunteers and rescuers need to take in
order to serve the most number of people and provide maximum coverage of the area in the shortest possible time.
Genetic algorithm was applied for optimization and different parameters were varied to determine the most optimum
route.
Similar to Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Prototype and Pilot Implementation (20)
11(4) 2020 ITJEMAST Multidisciplinary Research Articlesdrboon
Research papers 2020 Behavioral finance; Personality traits; Behavioral factors; Overconfidence bias; Locus of control; Decision-making; Biased behavior Carbon (CO2) emissions; Economic Growth; Energy consumption; Trade; ARDL Approach; Granger Causality; Energy use Pedestrian start-up time; Street crosswalk, Pedestrian traffic signals; Pedestrians traffic lights; zebra crossings; Intersection crossings Service Attributes; Relationship quality; Relationship outcomes; Banking services; Electronic Customer Relationship Management; Virtual relationships; eBanking; eCRM College town landscape; College town character; Campus community; Urban identity; College town space; Sense of a place; Public Space; University gardens; Cultural identity; Campus identity; Businesses in college towns Emotional quotient; Self-emotional appraisal; Workplace Advice Network (WAN) Centrality; Service Sector Organizations; Sociometric matrix; Interconnectivity of nodes
11(3) 2020 ITJEMAST Multidisciplinary Research Articles drboon
Non-destructive testing method Heat loss Thermal conductivity Specific heat Know-how Psychological contract breach Employees' Workplace behaviour Workplace spirituality Human resource management (HRM) Power sector Positive classroom Male teachers Classroom management system Public primary schools Private primary school Positive motivation students Quality primary education Grout rheology Construction workings High-precision lining Tunneling complex Cement slurry Reinforcement solutions Smart building systems Green architecture Green roof Green design Sustainable environmental architecture Smart energy management Architecture technology Neo-Functionalism Trade integration CPEC agreement Economic integration Regional cooperation Pak-China relations Pak-Iran relations Central Asia Republics Sino-Pakistan Agreement
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...drboon
Multidisciplinary Management, Journalism and Mass Communication Science (Information and Media Sciences), Political Sciences (International Affairs), Global Studies), Animal Sciences, Feeding Technology, Healthcare Management.
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...drboon
Research articles published in V8(3) 2017:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies ==>
Awareness of Passive Design on Apartment Façade Designs in Putrajaya, Malaysia
127
Comparative Analysis of Low-Cost Housing Policies in Malaysia and Nigeria
139
A Study on Kevin Lynch’s Urban Design Elements: Precinct 9 East Putrajaya
153
Investigating Urban Design Elements of Bandar Baru Sentul, Kuala Lumpur
169
A Study on Sharing Home Ownership Schemes in Malaysia
183
The Impact of Window to Wall Ratio (WWR) and Glazing Type on Energy Consumption in Air-Conditioned Office Buildings
197
Competitiveness Factors of Thai Construction Industry within the AEC Context: A Qualitative Approach
209
Application of Confirmatory Factor Analysis in Government Construction Procurement Problems in Thailand
221
Impact of Building Envelope Modification on Energy Performance of High-Rise A...drboon
In residential buildings, providing comfortable living environment for building occupants is a major challenge for architects, engineers and those who involved in the building industry. It is reported that considerable energy is consumed to provide and maintain acceptable indoor conditions for thermal comfort in residential buildings in hot-humid climate. The observable increase in energy consumption is chiefly resulting from the growing use of air conditioning system. There are various energy conservation measures which can be applied to reduce energy consumption and among these measures are passive envelope design measures. This paper addresses the energy performance of selected high-rise apartments in Kuala Lumpur. Energy Plus software is utilized in measuring the performance because of its availability, validity and accuracy. Possible energy savings due to passive envelope design measures integration are investigated. This includes investigating the effect of thermal insulation and glazing type on potential energy savings.
Enhancement of Space Environment Via Healing Gardendrboon
Green nature, sunlight and fresh air have been known as important component of healing in healthcare facilities. This paper presents the finding of an exploratory study on healing garden elements in healthcare facilities. The purpose of the paper is to find the elements of healing gardens and its healing factors in the existing garden design. In conducting this research study, site observation and informal interview at selected healthcare facilities have been performed. The study reveals the elements of existing garden design, the interactivity and the end users expectation on a garden. The finding shows that lacking some of the elements of garden design lead to less user friendliness and interactivity in the garden. It also shows that the visibility, accessibility, quietness and comfortable condition in the garden give impact to the utilization of the garden.
Design of Quadruped Walking Robot with Spherical Shelldrboon
We propose a new quadruped walking robot with a spherical shell, called "QRoSS." QRoSS is a transformable robot that can store its legs in the spherical shell. The shell not only absorbs external forces from all directions, but also improves mobile performance because of its round shape. In rescue operations at a disaster site, carrying robots into a site is dangerous for operators because doing so may result in a second accident. If QRoSS is used, instead of carrying robots in, they are thrown in, making the operation safe and easy. This paper reports details of the design concept and development of the prototype model. Basic experiments were conducted to verify performance, which includes landing, rising and walking through a series of movements.
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...drboon
We developed a small flapping robot on the basis of movements made by a butterfly with a low flapping frequency of approximately 10 Hz, a few degrees of freedom of the wings, and a large flapping angle. In this study, we clarify the pitch rotation mechanism that is used to control its posture during takeoff for different initial pitch and flapping angles by the experiments of both manufactured robots and simulation models. The results indicate that the pitch angle can be controlled by altering the initial pitch angle at takeoff and the flapping angles. Furthermore, it is suggested that the initial pitch angle generates a proportional increase in the pitch angle during takeoff, and that certain flapping angles are conducive to increasing the tendency for pitch angle transition. Thus, it is shown that the direction of the flight led by periodic changing in the pitch angle can be controlled by optimizing control parameters such as initial pitch and flapping angles.
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...drboon
In this paper, we investigated the aerodynamic characteristics during roll rotation of a butterfly based on computational fluid dynamics using a three-dimensional high-speed camera information. This method allows to create a numerical model of a butterfly from the camera images and to analyze the flow field corresponding to the captured behavior. We photographed two behaviors different in rotational axis and analyzed the roll rotational mechanism. In a typical pitch rotational flight, the differential pressure was concentrated on the tip of fore wings. The magnitudes of reaction forces on left and right wings were roughly matched each other. On the other hands, the differential pressure of the roll rotational flight was distributed in the whole of wings. The magnitude of the right reaction force was twice greater than that of left at the first down stroke. The roll angle changed largely at the same time. These results show that a butterfly rotates about roll by changing the reaction forces on each side.
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitrodrboon
Apical shoots and lateral buds of Anthurium andraeanum about 0.5 cm grew very well when cultured on MS medium supplemented with NAA, kinetin, sucrose and gelrite. When brought young plantlets (the same sized) of A. andraeanum soaked in various concentrations of oryzalin with different duration times. The A. andraeanum plantlets were subcultured into the same medium every 4 weeks for 3 times. It was found that 5.0 mg/l oryzalin with 24 and 72 hours gave the best average number of leaves per bunch, plant height and diameter of bunch. These parameters were reverse proportion, when increased concentration of oryzalin, the growth rate in each parameter was decreased with thick and pale green leaves.
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...drboon
Stem node of Miniature Rose with axillary bud were used as explants. These explants cultured on MS medium supplemented with different concentrations of 2,4-D. It was found that MS medium supplemented with 0.5 mg/l 2,4-D gave the highest number of green callus. The callus cultured on MS medium supplemented with different combinations of NAA and BA to form new shoot and root. From the result, we are able to find the highest number of young shoots that were induced from callus when cultured callus on MS medium supplemented with NAA and BA. When subcultured all new shoots with the same size to MS medium supplemented with different concentrations of NAA and BA, and 2,4- D for six weeks. The result was significant difference (P≤0.5) when compared the average height of plant and percentage of root formation, but their duration time for flowering were not significant different.
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...drboon
Earthquakes are cause of serious damage through the building. Therefore, moment resistant frame buildings are widely used as lateral resisting system. Generally three types of moment resisting frames are designed namely Special ductile frames (SDF), Intermediate ductile frames (IDF) and Gravity load designed (GLD) frames, each of which has a certain level of ductility. Comparative studies on the seismic performance of three different ductility of building are performed in this study. The analytical models are considered about failure mode of column (i.e. shear failure, flexural to shear failure and flexural failure); beam-column joint connection, infill wall and flexural foundation. Concepts of incremental dynamic analysis are practiced to assess the required data for performance based evaluations. This study found that the lateral load capacity of GLD, IDF, and SDF building was 19.25, 27.87, and 25.92 %W respectively. The average response spectrum at the collapse state for GLD, IDF, and SDF are 0.75 g, 1.19 g, and 1.33 g, respectively. The results show that SDF is more ductile than IDF and the initial strength of SDF is close to IDF. The results indicate that all of frames are able to resistant a design earthquake.
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...drboon
An After-Stay Satisfaction Survey of Residents Living in Prefabricated Concrete Structures in Thailand
Hydrothermal Assisted Microwave Pyrolysis of Water Hyacinth for Electrochemical Capacitors Electrodes
Group Technology Paves the Road for Automation
Effect of Laser Priming on accumulation of Free Proline in Spring Durum Wheat (Triticum turgidum L.) under Salinity Stress
Livable Public Open Space for Citizen’s Quality of Life in Medan, Indonesia
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...drboon
Latest Research from International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies ITJEMAST5(1):
Effects of Calcination Treatment of Diatomite on Dimethyl Ether Synthesis from Methanol
Effect of Blend Ratio on Cure Characteristics, Mechanical Properties, and Aging Resistance of Silica-filled ENR/SBR Blends
An Efficient Formulation of Off-line Model Predictive Control for Nonlinear Systems Using Polyhedral Invariant Sets
Effect of Modeling Parameters on System Hydrodynamics of Air Reactor in Chemical Looping Combustion Using CFD Simulation
Flow Behavior of Geldart A and Geldart C Particles in a Co-current Downflow Circulating Fluidized Bed Reactor
Optimization of Enzymatic Clarification from Corncob
Synthesis of Alkali Metal/CaO Sorbent for CO2 Capture at Low Temperature
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...drboon
Geosynthetic clay liners (GCLs) are thin hydraulic barriers which contain the bentonite sandwiched between geotextiles or geomembrane. Bentonite swelling is a very common phenomenon observed in GCLs. It is one of the major causes for permeability reduction in hydraulic barriers. The aim of this study is to characterize the swelling behavior of bentonite in GCLs by exchangeable cations. X-ray diffraction test and scanning electron microscopy were used to quantify the swelling characteristics of this bentonite under contact with salt solutions, as in the hydraulic barriers. The results from X-ray diffraction test showed that the presence of clay minerals was swelling montmorillonite. The swell volume of bentonite decreases with increasing valence of cations. In the case of the same valence the free swell volume of bentonite increased with decreasing concentration of permeant liquids. From another test, the scanning electron microscopy, it can be seen that the bentonite appears as corn flake like crystals for air-dried bentonite. However, specimen permeated with salt solutions, the clay has become more porous and fluffy and porous size seemed to be diminished.
City Space and Social Values: A Lesson from the Past of Historical City of Tu...drboon
Theory that emerges and tends to impose a new urbanity and liveability is that of Ecopolis of the future - ecologically clean city-which focuses on the concept of sustainable development while giving priority to the relationship between economic, social development and quality of life in the built environment. Traditionally cultural aspect of urbanism contains components with an appropriate sacred cosmic symbolism and an urbanism of social consensus between residents, government and professionals in the creation of the Ecopolis. The empirical focus of this paper is the city within the Islamic cultural tradition. This paper is an attempt to grasp the cultural conception of the Medina of Tunis, Tunisia and the traditional urban regulations by a study of classical religio-architectural treatises of Islam. This article will discuss the approach and the lesson we can learn from the traditional modele in a time of ecological crisis and high urbanization.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Prototype and Pilot Implementation
1. 2012 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies.
International Transaction Journal of Engineering,
Management, & Applied Sciences & Technologies
http://www.TuEngr.com, http://go.to/Research
Setting up of a Kenya National Domestic Violence
Call Center (K-NDVCC): Prototype and Pilot
Implementation
a* b
David Ndegwa Kuria , Moses Murimi Ngigi , Moses Karoki
a,b c
Gachari , and John Gitau Kahiu
a
Department of Geomatic Engineering and Geospatial Information Sciences, Kimathi University
College of Technology, KENYA
b
Department of Geomatic Engineering and Geospatial Information Systems, Jomo Kenyatta University
of Agriculture and Technology, KENYA
c
SERVIR-Africa, Regional Center for Mapping of Resources for Development, KENYA
ARTICLEINFO A B S T RA C T
Article history: Domestic violence can involve men to women, men to
Received 23 August 2011
Received in revised form children, women to children and sometimes women to men.
26 January 2012 Domestic violence in Kenya is mostly prevalent in middle-income
Accepted 27 January 2012 and lower-income levels of the society. In this paper, a prototype
Available online
27 January 2012 system is implemented to administer and manage a national
Keywords: domestic violence call center. This is a GIS-based call center
Domestic violence; system supporting distress calls by: (i) automatically identifying
Geospatial Information callers’ locations, (ii) Quickly assessing accurate spatial
System; information from its database about nearby advocate resources and
National Call Center; reporting back to the caller, the identified advocate, and (iii)
Information Technology. publishing maps in Keyhole Markup Language for viewing in
software supporting open standards such as Google Earth. The
system was validated using sample data collected from Juja
location. This prototype shows promise of being able to offer rapid
and timely responses to domestic violence (and other) distress
requests utilizing geospatially enabled technologies.
2012 International Transaction Journal of Engineering, Management, &
Applied Sciences & Technologies. Some Rights Reserved.
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
55
Online Available at http://TuEngr.com/V03/55-74.pdf.
2. 1. Introduction
Domestic violence, defined as abuse involving intimate partners, is the most common
cause of injury to women (Chambliss et al 1995). Domestic violence occurs and can involve
men to women, men to children, women to children and sometimes women to men. Frequently,
the violence is a combination of physical, sexual and psychological abuse that occurs in a cyclic
and intensifying pattern that can ultimately result in serious assaults with weapons or even
death (UNICEF, 2000). Domestic violence also encompasses economic control and progressive
social isolation. It is acknowledged that domestic violence is prevalent in all racial, educational,
geographic and socio-economic segments of society. The results, from a baseline survey among
women in Nairobi, (FIDA, 1998) identified the various modes in which domestic violence is
propagated in Kenya as captured in Figure 1.
Figure 1: Varying definitions of domestic violence.
Some factors that precipitate domestic violence have been identified as discussed hereafter.
Men who show inadequacy, jealousy or controlling, suspicious behavior are more likely to be
involved in spouse violence. Domestic violence in Kenya has been a long standing issue, with
experts showing that it is on the rise (Majtenyi, 2010). Domestic violence in pregnancy is also
highly correlated with the male patient’s use of injectable drugs. Gielen et al (1994) found that
better education opportunities for women were associated with higher risks of domestic
violence, serving to redress the balance of power within the relationship and bolster the man’s
self-esteem and control.
56 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
3. With rising levels of poverty, rape incidences have increased in the urban areas (Gullota,
2006). Domestic violence in Kenya is mostly prevalent in middle-income and lower-income
levels of the society. The rising levels of crime have also demonstrated new trends in the type of
crime that women are experiencing, such as rape from carjacking. In 2009, a total of 3496
incidences of offences against morality (including rape, defilement, incest, among other
offences) were reported, with the number rising to 3972 representing an increase of 14%
(Kenya Police, 2010).
Currently there is no National Domestic Violence Call Centre in the country. The current
modus operandi is that any domestic violence related distress calls are made to the police as
victims usually do not know of any other sources of help. The police in turn have to rely on the
description provided by the caller in order for them to locate the appropriate services. The most
obvious choice for acquiring such information would be through paper-based inventory
systems such as maps. This is cumbersome with respect to storage, retrieval, analysis and data
update. Consequently, this process is more often than not slow, cumbersome and unreliable
since in some cases police even have to ask their colleagues, casually, of the nearest services
within the area depending on where the call is coming from. This also leads to reluctance by
victims to report these cases and hence, suffer ‘silently’ without getting professional help be it
legal and/or medical. It should be appreciated that even a few seconds of giving vital
information can save victims lives.
1.1 Concepts applied in the research
A Geographical Information System (GIS) can assist in alleviating the suffering of victims
by providing a streamlined set of tools allowing quick and efficient retrieval of location
information, storing of such information and performing sophisticated spatial analyses. In this
research the following concepts are applied and an overview of each is given.
Buffering: It involves the creation of a zone of a specified width around a point, line or
polygonal area. The resulting buffer is a new polygon, which can be used in queries to
determine which entities occur either within or outside the defined buffer zone (Aronoff, 1989).
This technique was used to create buffers based on user-defined distances.
Spatial selection: This involves the selection of features that are within or outside the boundary
defined by another feature dataset i.e. spatial intersection. The help providers were selected
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
57
Online Available at http://TuEngr.com/V03/55-74.pdf.
4. based on those which were within the buffer zones created from the buffering technique defined
above. It performs such a task as: “Select all help providers within 1km radius from call origin
location”.
Cartography: Cartography can be described as the graphic principles supporting the art,
science, and techniques used in making maps or charts (Longley et al, 2005). The visualization
of maps used to display the base map elements, base stations, help providers and common
reference points were highly customized for the system view settings such that the scale and
elements to be shown were highly optimized in terms of visual perception.
Interpolation: This is the process by which a surface is created, usually a raster data set,
through the input of data collected at a number of sample points. There are several forms of
interpolation, with each treating data differently, depending on the properties of the data set.
Interpolation is justified on the basis of the “spatial autocorrelation principle” which recognizes
that data collected at any position will have a great similarity to, or influence of those locations
within its immediate neighbourhood. Interpolation was used to create raster datasets from
number of calls values in the Call Origin feature class; this raster was used in the subsequent
analysis when selecting suitable sites for setting up emergency help centers in an area.
Map algebra: This is the process of adding, subtracting, multiplying, and dividing maps by
applying mathematical operations to map themes. Map algebra utilities allow the user to specify
mathematical relationships between map layers (Longley et al, 2005; Melnick, 2002). This
technique is used to add the cell values of the raster datasets which will be used when selecting
the best site for setting up an emergency domestic violence help center based on the criteria
specified
Database requirements: A GIS must allow the operator to: (a) Incorporate (import) data from
outside sources. The method of updating the database that is to be employed in the system is by
manually entering the data; this done by creating new geographic objects of interests. This
technique is used to add a relatively small amount of new objects at a time. The DBMS will
allow for error checking as new records are created or existing ones are updated. The system
will also the provide the ability to create data files that can be exported to other systems in a
common format which can be imported in other systems; in this case, creating KML format of
the existing datasets.
(b) Easily update and alter data. Another common task will be updating or editing the database.
Since no user can foresee all future data needs and applications, the system will provide ways to
easily modify refine or correct the database. Attribute data are seldom static. Therefore,
58 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
5. maintaining the currency of the data depends on updating the capability.
(c) Query the database. This refers to manipulating the database to answer specific data-related
questions through a process known as database analysis. GIS systems take this a step further by
performing spatial queries. The database management system (DBMS) software that is part of a
GIS provides these capabilities.
This concept of spatially-enabled databases gives rise to a specialized DBMS referred to as
geodatabase which is a database with extensions for storing, indexing, querying and
manipulating geographic information and spatial data. The main benefit of a geodatabase is in
the ‘database type’ capabilities that it gives to spatial data. Some of these capabilities include
easy access of spatial data, the ability to easily link and join data tables, indexing and grouping
of spatial datasets independent of software platform.
GIS open standards: These are specifications developed to address specific interoperability
challenges between different formats and different kinds of spatial processing systems
spearheaded by the Open Geospatial Consortium (OGC, 2006). It aims to come up with
standard geographic file formats or components which are compatible with existing GIS
systems and for the future even for customized mapping systems. Some of these formats
include Geographic Markup Language (GML), Keyhole Markup Language (KML) (Google,
2008, Wikipedia 2006), Web Map Service (WMS), Web Feature Service (WFS), and Simple
Features (SFS). National Spatial Data Infrastructures (SDI), specifically the proposed Kenya
National SDI, require spatial information for sustainable development and economic decision
making by different stakeholders involved and open standards facilitate the implementation of
these initiatives; as such, the Call Centre system will solve part of the problem by publishing
data held in the geodatabase to KML format for viewing in various systems which are freely
downloadable from the internet. Most common of these are Google Earth, ArcGIS Explorer,
GRASS GIS, and Quantum GIS. The main advantages of KML are: (a) it speeds the
development of web-based mapping applications; (b) It encourages greater interoperability of
existing GIS products; (c) It ensures easier movement of data between applications
1.1.1 System analysis and design
System design involves the generation of a design document which serves as a blue-print
for the proposed system (Epstein, 1993). This document includes graphical depictions of the
system structure as well as contextual material, which documents the pre- and post- conditions
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
59
Online Available at http://TuEngr.com/V03/55-74.pdf.
6. of the system components.
1.2 Research objectives
This research therefore set out to develop “an on-screen GIS based solution that
automatically identifies the general geographic area of the incoming phone number, allows
search and selection of the appropriate services from a database of providers, map the location
of the selection and is able to publish these maps in KML format.”
This objective is set to be achieved by satisfying the following sub-objectives: (i) enable an
advocate to focus on a caller’s individual needs such as the language (Kenya has 42 ethnic
communities), medical, financial and psychological needs; (ii) decreased time required to find
resources for the caller; (iii) move the caller to a safe place more quickly; (iv) act as a decision
support tool on recommending sites for new help centers; (v) enhance information availability
by publishing in open source standards.
2. Methodology
When designing any custom GIS solution, analysis of the functionality of the required
output is necessary. This might include harnessing the strengths of each function and putting
them together to solve real world problems in as short a time as possible (Stroustrup, 2009). As
such the Kenya National Domestic Violence Call Centre (K-NDVCC) system brings together
such techniques as cartographic modeling to represent features, raster analysis to selected sites
to provide a comprehensive system to administer and manage most, if not all, spatially-related
activities in a call centre. It is important to note that the results given by the system are
dependent on the quality and integrity of the data held in the geodatabase. Also, they are
dependent on the continual update of the database with time; hence, maintenance is an integral
part of the development cycle of the system.
2.1 Pilot study area
Figure 2 show the study area considered in this work for testing the prototype. It is one of
the sixteen locations in the larger Thika district of Kiambu County. It is a cosmopolitan
location hosting the Jomo Kenyatta Univeristy of Agriculture and Technology which is the
engine for most of the economic activities. It is relatively dry experiencing low rainfall and
with temperatures ranging from 20°C - 35°C from the cold periods (June – July) and the hot
periods (January – March). It had a population of 43,500 according to the 1999 census and a
60 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
7. population density of between 264 – 416 persons per km2 (NCAPD, 2005).
Figure 2: The pilot study area (Juja location) used for testing the prototype.
2.2 Database design
In order to come up with a compact and efficient database, the design process aimed to
address the following issues: (i) The spatial database platform or environment to use; (ii) The
kind of data that will be stored in the database; (c) The projection of this data i.e. whether
projected or geographic; (d) The organization of the object classes such as tables, feature
classes, topology rules and shapefiles.
Figure 3: The call center data model.
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
61
Online Available at http://TuEngr.com/V03/55-74.pdf.
8. The overall aim was to design a database that met the system requirements and performed
well. Consequently, a good design ensures that data retrieval is fast and efficient. Figure 3
shows the data model adopted in this research. Tables 1 – 4 shows the spatial object classes
created together with their individual properties/attributes:
Table 1: Help providers feature class.
Field Name Data Type Domain Name
Name* String -
Alias String -
Category* String Provider Category
Contact Person* String -
Night Contact Person String -
Counsel Service* Boolean -
Medical Service* Boolean -
Location* String -
Table 2: Common reference point feature class.
Field Name Data Type Domain Name
Name* String -
Alias String -
Description* String -
Table 3: Call history feature class.
Field Name Data Type Domain Name
Call Location* String -
Time of Call* Date/Time -
Sex of Caller* String Caller Gender
Domestic Violence String Call Nature
Category*
Age* Integer -
Marital Status* String Marital Status
Comments String -
User* String -
Table 4: Call origin/Base station feature class.
Field Name Data Type Domain Name
Name* String -
Unique Code Identifier String -
Location* String -
Number of Calls* Long -
Area Category* String Area Category
2.3 System analysis and design
System analysis involved careful study of the requirements with regard to development of
62 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
9. the solution. It entailed: (i) Fact finding – This was done by building undersatanding of the
reporting mechainisms currently in place addressing domestic violence. From this
understanding, the strengths and weaknsess of the mechanisms will be identified and used to
inform the formulation of strategies to address the limitations. (ii) Recording of facts – This
was done at every stage where all the data acquired was verified, checked for relevance and
then recorded for use. (iii) Compiling of data – All the collected data was compiled to form
a meaningful sequence of activities to be done to achieve the objectives.
System design was the most crucial stage in this research where features of the new system
were specified. The activities involved in system design were: (a) Program flowcharting,
which is a detailed data flow diagram (DFD) of the project activities. (b) Design of the
graphical depiction required to make the flow of the program logical and consistent with the
flowcharts constructed. (c) Design of the geodatabase to accommodate the geographic
datasets required to run the system, and (d) Design of the required output formats. The design
of the system was structured, since it is the blue print of the automated solution to a given
problem (Stroustrup, 2009; Tucker et al, 1995). The tools and techniques used for design
include: (a) Flowcharts; (b) Data Flow Diagrams; (c) Data Dictionary; (d) Structured English
and (e) Decision table. The system developed in this research comprises of 4 modules: (a)
Display query-defined features; (b) Spatial Analysis; (c) Export to KML and (d) Database
editing
2.3.1 Display QueryDefined Features
This is the main module which will provide the advocate with the interface to capture caller
details (figure 4). The system will simulate the automatic call location by loading the location
of the Base Stations (referred to as Master Switching Stations) in a list from where the advocate
will select the specific location and then will quickly access accurate information about the
nearby resources i.e. the help providers/centers.
In this module, the location field of the Call Origin feature class is referenced by the system
such that it populates the Call Location field in the Caller Details form. The advocate will then
fill the particular caller needs, which once appropriately entered and the Query Command hit,
the system will automatically create a buffer (whose distance is dependent on the area category
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
63
Online Available at http://TuEngr.com/V03/55-74.pdf.
10. of the call location i.e. urban, semi-urban or rural) and search for Help Provider features which
are contained within the buffer. If a Help Provider centre (such as a Police Station) is found then
a tag will be placed on the digital map identifying the characteristics of the feature; on the other
hand, if no features are found, a user-defined increment will be applied on the initial buffer
distance according to
Buffer distance =Buffer distance + Increment
The Buffer distance will be incremented 3 times and if no features are found then advocate
will be notified that no features (Help Providers) were found.
Figure 4: Caller detail form. Figure 5: Query settings interface.
The system is customizable such that the minimum buffer and increment distance can be
specified by the user or some defaults values can be used. If a user wishes to define the
minimum buffer and incremental distance and save them in computer memory for future reuse.
Figure 5 shows the interface for specifying the minimum and increments for the various land
use categories.
2.3.2 Spatial Analysis
This module is used to generate suitability maps when one needs to set up an emergency
help center in area based on specific parameters which directly influence its justification and
existence. These parameters are subjective and are subject to modification and addition based
on the specific needs which may arise once the system is up and running. These parameters are:
(i) Number of domestic violence related calls received through each base station, (ii) the
distance from nearest help facility, (iii) distance from the road, (iv) land use and (v) population.
Figure 6 shows the spatial analysis dialog.
64 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
11. Figure 6: Spatial analysis dialog.
Spatial analysis is based on cell-based modeling of each parameter meaning that they have
to be in raster format in order for the analysis to take place. For the number of calls through each
base station parameter, interpolation (kriging) of the numerical value of the calls for each base
station is used to generate the raster surface; Euclidian (or straight line) distance is used to
generate the numerical value distance of each source point to the next nearest point for both the
distance from nearest help facility and distance from road parameters.
Using geoprocessing tools available, the land use and population parameters are converted
to raster datasets using land use type and population number respectively. A reclassification of
the values of the each cell of each raster participating in the analysis is done by altering the
values of these cells. This is done so as to assign the values of the raster datasets to a common
scale through relative weighting of the minimum and maximum of cell values within each raster
dataset. In this case, a scale of 1 to 10 was used to reclassify the cells of each raster dataset, with
1 being the most suitable and 10 the least suitable. Hence, the suitability criteria would be as
follows: highest number of calls most suitable (assigned value 1 during reclassification) and
least number of calls (assigned 10); should be further away from nearest help facility hence, the
greater the distance the more suitable (assigned 1); should be nearer the road such that the
smaller the distance the more suitable (assigned 1); in land use, town type of land use is most
suitable (assigned 1) while forest least suitable, and since the study area (Thika) is within an
agricultural zone then not all land uses are represented in the suitability modeling but the rest
can always be included if the system were to be fully implemented countrywide; finally, should
be in an area with high population such that the higher the population the more suitable
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
65
Online Available at http://TuEngr.com/V03/55-74.pdf.
12. (assigned 1). The final step involves weighting the reclassified raster datasets through map
algebra and overlay techniques. The weighting is based on those specified in the SPATIAL
ANALYSIS tab in the system settings. The output of the map algebra cell-addition is a new
raster showing the classification of the suitability range of areas based on the parameters
selected and the respective weights assigned.
2.3.3 Export to KML
This module simply exports the visible layers in the map or the map document to KML
format; once they have been created, the user is requested whether to open them in Google
Earth. The output paths to the two options can be set by the user in the KML EXPORT tab
which are saved in a text document and as defaults to be loaded at the start of a new session.
2.3.4 Database Management
This module provides the necessary interface required to carry out routine database
management tasks (add item, edit item and delete item) in the 3 core feature classes that
uniquely identify the geodatabase i.e. Help Providers, Base Station and Common reference
Points feature classes. It is designed in such a manner that the attribute fields for each feature
class are clearly labeled requiring only the user to provide the correct corresponding values.
With regard to the spatial coordinates of each feature, all that is required are the GPS
Northings/Southings and Eastings decimal degrees values obtained in the field and the system
will automatically convert them to the required Universal Transverse Mercator projected
(UTM) coordinates.
3. Data collection
In this research, location data (x, y) of spatial objects such as help providers and mobile
phone base stations were collected, with their corresponding non-spatial attributes such as
name, location, and category were recorded.
3.1 Data sources
The main data capture methods used in the research were (a) Global Positioning Systems
(GPS), (b) Google Earth and (c) Topographical maps
3.1.1 GPS
Global Positioning System is a space-based radio navigation system consisting of 24
satellites and ground support, providing users with accurate information about their position
66 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
13. and velocity. Point features (i.e. help providers and base stations) positions were collected using
GPS civilian signal gained an average accuracy of ±10m which was sufficient for this work. A
Garmin GPS 60 was used and which enabled the accompanying names of the features to be
recorded in its inbuilt memory for future transfer to a computer system. Non-spatial attribute
information was recorded on paper against the name of the particular feature. The saved
features were then transferred into a new database. Non-spatial attributes were directly entered
into the database. The resulting database was merged with the geodatabase feature class to form
a uniform database.
3.1.2 Google Earth
This is a virtual globe program which maps the earth by the superimposition of images
obtained from satellite imagery, aerial photography and GIS 3D globe. For most part of the
study area, the freely available remote sensing dataset of Google Earth was found to be of
adequate resolution. It was used to digitize road features due to coincidence with the GPS tracks
over the same road features.
3.1.3 Topographical Maps
In reasearch, topographical maps for Juja and Thika were used to provide base data for
digitizing road features in those instances where Google Earth imagery was of a coarse
resolution or was severely impeded by cloud cover.
3.2 Data processing
This involved preparation of data into forms suitable for use within the GIS system. This
involved projecting the vector data to their required reference, creating fields for each specific
feature class. Generally, the tasks involved here encompass assigning map co-ordinates and
spatial location, transforming between different reference systems, creating fields and
assigning attributes to individual features. All the datasets in the geodatabase were projected to
Universal Transverse Mercator (UTM) Zone 37 South.
4. Results and discussion
To verify the accuracy and correctness of the output of the program against the expected
design procedures, sample system GIS routines were performed in parallel with those
automated in the solution.
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
67
Online Available at http://TuEngr.com/V03/55-74.pdf.
14. Figure 7: Call center toolbox as a GIS extension.
The sample sites used are within the study area and the results are assumed to be consistent even
for other areas within the country implying scalability and extensibility. This is equivalent to
testing the system by providing it with a specific problem in terms of particular domestic
violence scenarios and assessing whether the results outputted by the system match with
expected results, in some cases by manually carrying out the individual GIS techniques and
using the outputs from one process as input to the subsequent process. This is done at a modular
level on the four modules that constitute the system. These are uniquely grouped together in a
separate toolbar with the commands clearly marked and contain tool tips which summarize the
functionality of each command, and a settings tool which enables the user to customize the
operations of the system. This toolbar is illustrated in figure 7.
4.1 Automated help providers location
Problem: A female caller in her mid-thirties, who is married, suffers from marital rape
inflicted by her partner who is currently under medication for a sexually transmitted infection
(STI). The locality of the call is coming from is Juja Town. The query distance parameters are
set as in Table 5.
Table 5: Automated help provider parameters.
Area Category Minimum Distance Increment
Urban Area 1500 100
Semi Urban Area 2000 250
Rural Area 3000 400
68 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
15. Figure 8 shows the origination of the distress call and based on the help provider
parameters, the call center can inform the distressed caller the nearest help provider, including
details of how to get to the help (moving her from the danger to safety), who to contact at the
facility, the type of facility and the distance from the caller to the facility.
The results are automatically written to the geodatabase allowing study of history and
trends which maybe of importance to various stakeholders who may want to study these
relationships and patterns together with dependent external factors. The table contents are
reproduced in figure 9.
(a) (b)
Figure 8: Caller details input form (a) and the corresponding query results map (b).
Figure 9: geodatabase table results persisting the entries.
4.2 Database management
The three main database tasks (add, edit and delete) for the three core feature classes (i.e.
Common Reference Points, Help Providers and Call Origin) will not be highlighted in paper
for each scenario. This module solves the following sample problems.
Problem 1 (Insertion): The following data has been collected from the field using a GPS and
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
69
Online Available at http://TuEngr.com/V03/55-74.pdf.
16. details for the Help Provider recorded in a specially designed paper form. The spatial
reference is given as: Southings = -1.165530°, Eastings = 36.96856°, with properties of the
help centre are highlighted in a user form.
Problem 2 (Update): Senate Hotel, stored in the database as a common reference point, has
its name changed to Hill Springs Hotel.
Problem 3 (Deletion): The mobile service provider has decided to discontinue and
decommission the base station with the unique ID CTL9101X. Hence, this feature has to
be deleted from the Call Origin database.
4.3 Export geodatasets to KML
Problem: Export the following geographic datasets that to KML format. They include
Common Reference Points, Thika Town, Call Origin and Roads. The resulting file should
be viewable in various freeware and open source software supporting this format.
4.4 Spatial analysis
Problem: A new emergency help centre is to be setup within Juja town. The minimum analysis
area is to be 30 km2, the parameters that are to be included in the analysis are: Number of
calls (Weight - 60%), Distance to Nearest Help Centre (Weight - 35%) and Distance from
Road (Weight- 5%). Figure 10 captures these settings. This allows users finer control on
the weighting (relevance) of the layers (rasters) in determining the location of the new
facility. The current user has selected the option of adding the suitability raster to the current
view once the analysis is complete.
Figure 10: Spatial analysis settings.
70 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
17. Figure 11: Spatial analysis results.
Figure 11 shows the area suitability for setting up an emergency domestic violence help
center as generated by the prototype system. Notice the classification is done automatically by
the system based on 4 natural break classification categories – highlighted in the map legend by
the green -outlined rectangle. The analysis is based on the parameters which are deemed to have
the greatest influence but are subject to modification and enhancement if the system is adopted
at the national level. The SPATIAL ANALYSIS parameters can be tweaked with different
values to come up with various suitability scenarios
5. Conclusion
In this work, the prototype developed has shown the ability to quickly and efficiently
connect a distressed caller to a help advocate who is also informed on the location of the
caller so that immediate remedial actions can be taken to move him/her to safety. This system
is thus able to minimise the risks of continued abuse by reducing the time taken to get to the
aggrieved person. This system is also able to produce analyses that can be used to inform
decisions on the location of new advocates, e.g. depending on the frequency of distress calls,
levels of violence severity and distances to the nearest existing respondents.
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
71
Online Available at http://TuEngr.com/V03/55-74.pdf.
18. For each program module, the results obtained compared exceptionally well to those
computed manually from digital maps showing the integrity of the system in terms of
accuracy and speed of data selection and display showing that it is possible to do complex
spatial operations very fast. This is especially significant since every second lost before
moving the caller to safety can have serious ramifications, sometimes to the extent of death.
This solution has demonstrated its potential and it is necessary to fully automate all the
GIS processes in the Call Centre system. An aspect that must be given due attention is the
quality of the data that is referenced by the system as the accuracy of the information given by
the advocate is solely dependent on the underlying database. This system used base stations as
call originators for simplicity, however, in the eventual implementation, the actual call
location can be identified by utilizing Global System for Mobile communication (GSM)
technology, with very minimal modification to the source code. The synergy leading to GSM
– based GIS services has huge potential in such fields as fleet management, logistics and
stolen vehicle tracking applications, road-side assistance, medical emergency services and
crime-response services. The same concepts can be applied in these applications such that
their implementation and maintenance times will be much shorter as they will share the same
components i.e. geographic datasets and automated GIS processes.
While this system has been implemented based on the ArcGIStm software system, the
concepts used in implementing the prototype are generic and it can thus be implemented in
any other GIS platform such as GeoMediatm, MapInfotm, GRASS and Quantum GIS.
6. Acknowledgements
The authors acknowledge the support accorded to the research effort by the Jomo Kenyatta
University of Agriculture and Technology with respect to data acquisition.
7. References
Aronoff, S., (1989). Geographic Information Systems: A management perspective, WDL
Publications.
Chambliss, L.R., Bay, C., and Jones R.F. (1995). “Domestic violence: An educational
72 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU
19. imperative?” International Journal of Gynecology and Obstetrics. 51(3), pp. 295-295
Epstein, R. G. (1993). The power of OOPS (abstract): heterogeneous data structures in C++.
ACM SIGCSE Bulletin, 25(1), 311.
Gielen A. C., O'Campo P. J., Faden R. R., Kass N. E., and Xiaonan Xue. (1994)
“Interpersonal conflict and physical violence during the childbearing year.” Social
science & medicine. 39 (6), pp. 781-787
Google (2008). “KML Developer Support”, KML 2.2 Reference.
FIDA Kenya (1998). Domestic Violence in Kenya - Report of a Baseline Survey Among Women
in Nairobi.
Kenya Police, (2010). Annual Crime report 2010. Government Printers. Online
(http://www.kenyapolice.go.ke/resources/Crime%20report%202010.pdf, accessed 4th
June, 2011)
Longley, P. A., Goodchild, M. F., Maguire, D. J. and Rhind, D. W., (2005). Geographic
Information Systems and Science, 2nd Edtion. John Wiley and Sons.
Majtenyi, Kathy (2010). Cases of Domestic violence increase in Kenya. Voice of America.
Online
(http://www.voanews.com/english/news/Cases-of-Domestic-Violence-Increase-in-Ken
ya-86691287.html, accessed 2nd June 2011).
Melnick, A., (2002). Introduction to geographic information systems in public health, Aspen
Publishers.
NCAPD (2005). Thika district: District strategic plan 2005 – 2010 for implementation of the
national policy for sustainable development. Ministry of Planning and National
Development
Open Geospatial Consortium (2005) Open Standards.
Stroustrup, B., (2009). Programming: principles and practice using C++, Volume 10.
Addison-Weslay.
Thomas P. Gullotta, (2006). Interpersonal Violence in the African-American Community:
Evidence-Based Prevention and Treatment Practices (Issues in Children's and
Families' Lives), Springer Verlag.
Tucker A. B., Cupper, R. D., Bradley W. J, Epstein, R. G. and Kelemen, C. F. (1995).
Fundamentals of Computing II: abstraction, data structures and large software
systems. Mc Graw Hill, Inc, New York, 1993;
*Corresponding author (David Kuria). Tel: +254-727-399208. E-mail address:
dn.kuria@gmail.com. 2012. International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 3 No.1 ISSN 2228-9860 eISSN 1906-9642.
73
Online Available at http://TuEngr.com/V03/55-74.pdf.
20. UNICEF, (2000). Domestic Violence against women and girls, 6. Florence, Italy: Innocenti
Research Group.
Wikipedia (2007). Keyhole Markup Language.
Dr.David Kuria is a Senior Lecturer in the department of Geomatic Engineering and Geospatial Information
Science of the Kimathi University College of Technology. He received his B. Sc (Surveying) with Honors
from the University of Nairobi (Kenya) in 1998. He holds an M. Sc (Photogrammetry and Geoinformatics)
from the Stuttgart University of Applied Sciences (Germany) awarded in 2003. He undertook Ph. D. studies
at the University of Tokyo (Japan) completing it in 2007. He has lectured for more than 4 years at the Jomo
Kenyatta University of Agriculture and Technology. Dr. Kuria’s current interests are in webmapping, climate
research and geospatial application development.
Dr.Moses Ngigi is a Lecturer in the department of Geomatic Engineering and Geospatial Information
Systems of the Jomo Kenyatta University of Agriculture and Technology. He received his B. Sc (Surveying)
with Honors from the University of Nairobi (Kenya) in 1996. He holds an M. Sc (Photogrammetry and
Geoinformatics) from the Stuttgart University of Applied Sciences (Germany) awarded in 2001. He
undertook Ph. D. studies at the University of Tsukuba (Japan) completing it in 2007. He has lectured for more
than 8 years at the Jomo Kenyatta University of Agriculture and Technology and at the Kenya Institute of
Surveying and Mapping. Dr. Ngigi’s current interests are in GIS applications in health and food security.
Dr.Moses Gachari is a Senior Lecturer in department of Geomatic Engineering and Geospatial Information
Systems at Jomo Kenyatta University of Agriculture Technology. He is currently seconded to Kimathi
University College of Technology at the Department of Geomatic Engineering and Geospatial Information
Science and is the Deputy Principal in-charge of Administration and Finance. He received his B.Sc
(Surveying and Photogrametry) with Honors from the University of Nairobi (Kenya) in 1981. He holds an
M.Sc. and PhD degrees from the University of Oxford (UK) in 1985 and 1996 respectively. Dr. Gachari has
research interests in geospatial applications in development and environment.
John Kahiu is a Technology Specialist currently engaged on the SERVIR-Africa project hosted at the
Regional Center for Mapping of Resources for Development. He holds a B. Sc. (Geomatic Engineering and
Geospatial Information Systems) from the Jomo Kenyatta University of Agriculture and Technology. Mr.
Kahiu’s interests are in geospatial application development and webmapping.
Peer Review: This article has been internationally peer-reviewed and accepted for publication
according to the guidelines given at the journal’s website.
74 David KURIA, Moses NGIGI, Moses GACHARI and John KAHIU