Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7123

Search results for: national security exception

4063 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 47
4062 Overview of Wireless Body Area Networks

Authors: Rashi Jain

Abstract:

The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.

Keywords: vehicular networks, sensors, MicroController 8085, LTE

Procedia PDF Downloads 259
4061 Role of Corporate Social Responsibility in Corporate Governance: Effectiveness of CSR in Human Rights

Authors: Md. Awal Hossain Mollah

Abstract:

Corporate governance is playing a crucial role for ensuring social accountability and responsibility of business organization through Corporate Social Responsibility (CSR) for the last two decades. In Bangladesh, CSR is a growing and popular concept and a recent development. Various business and corporate organizations are playing crucial role for helping vulnerable sections of our society now. For instance, Dutch Bangla Bank has been providing scholarship for under graduate and graduate students in our country which is very helpful for promoting poor and meritorious students in Bangladesh. In this study, how far CSR is playing its role for ensuring human right in Bangladesh will be examined with specific case studies. The study focus will reflect on both developed and developing nations based on literature review and possible empirical evidence.

Keywords: CSR, corporate governance, social security, Bangladesh, scholarships, graduate students, Dutch angla Bank

Procedia PDF Downloads 364
4060 Impact of Insect-Feeding and Fire-Heating Wounding on Wood Properties of Lodgepole Pine

Authors: Estelle Arbellay, Lori D. Daniels, Shawn D. Mansfield, Alice S. Chang

Abstract:

Mountain pine beetle (MPB) outbreaks are currently devastating lodgepole pine forests in western North America, which are also widely disturbed by frequent wildfires. Both MPB and fire can leave scars on lodgepole pine trees, thereby diminishing their commercial value and possibly compromising their utilization in solid wood products. In order to fully exploit the affected resource, it is crucial to understand how wounding from these two disturbance agents impact wood properties. Moreover, previous research on lodgepole pine has focused solely on sound wood and stained wood resulting from the MPB-transmitted blue fungi. By means of a quantitative multi-proxy approach, we tested the hypotheses that (i) wounding (of either MPB or fire origin) caused significant changes in wood properties of lodgepole pine and that (ii) MPB-induced wound effects could differ from those induced by fire in type and magnitude. Pith-to-bark strips were extracted from 30 MPB scars and 30 fire scars. Strips were cut immediately adjacent to the wound margin and encompassed 12 rings from normal wood formed prior to wounding and 12 rings from wound wood formed after wounding. Wood properties evaluated within this 24-year window included ring width, relative wood density, cellulose crystallinity, fibre dimensions, and carbon and nitrogen concentrations. Methods used to measure these proxies at a (sub-)annual resolution included X-ray densitometry, X-ray diffraction, fibre quality analysis, and elemental analysis. Results showed a substantial growth release in wound wood compared to normal wood, as both earlywood and latewood width increased over a decade following wounding. Wound wood was also shown to have a significantly different latewood density than normal wood 4 years after wounding. Latewood density decreased in MPB scars while the opposite was true in fire scars. By contrast, earlywood density was presented only minor variations following wounding. Cellulose crystallinity decreased in wound wood compared to normal wood, being especially diminished in MPB scars the first year after wounding. Fibre dimensions also decreased following wounding. However, carbon and nitrogen concentrations did not substantially differ between wound wood and normal wood. Nevertheless, insect-feeding and fire-heating wounding were shown to significantly alter most wood properties of lodgepole pine, as demonstrated by the existence of several morphological anomalies in wound wood. MPB and fire generally elicited similar anomalies, with the major exception of latewood density. In addition to providing quantitative criteria for differentiating between biotic (MPB) and abiotic (fire) disturbances, this study provides the wood industry with fundamental information on the physiological response of lodgepole pine to wounding in order to evaluate the utilization of scarred trees in solid wood products.

Keywords: elemental analysis, fibre quality analysis, lodgepole pine, wood properties, wounding, X-ray densitometry, X-ray diffraction

Procedia PDF Downloads 319
4059 The Role of Biosecurity in Sustainable Aquaculture

Authors: Barbara Montwill

Abstract:

The last three decades of continuing increase in the farming of aquatic animals worldwide placed a biosecurity in a different perspective. An introduction of new countries, technologies, species to aquaculture, increased movement of animals are a few factors the might be associated with biosecurity risks. Most farms depend on trade for various inputs such as broodstock, post-larvae/fingerlings and feed. These inputs represent potential pathways by which pathogens can enter farming operations and create conditions for emergence of new or reoccurrence of diseases and production loses. Farm biosecurity should be considered an essential component of a national aquatic animal biosecurity program and together with adequate import and export controls can lead to the development of successful aquaculture industry as a reliable source of safe seafood product. This presentation would describe some biosecurity management approaches to minimize the negative impact of aquatic diseases on production and preserve the power of antibiotics.

Keywords: aquaculture, biosecurity, antibiotics, antibiotics residues

Procedia PDF Downloads 280
4058 Development of a Risk Governance Index and Examination of Its Determinants: An Empirical Study in Indian Context

Authors: M. V. Shivaani, P. K. Jain, Surendra S. Yadav

Abstract:

Risk management has been gaining extensive focus from international organizations like Committee of Sponsoring Organizations and Financial Stability Board, and, the foundation of such an effective and efficient risk management system lies in a strong risk governance structure. In view of this, an attempt (perhaps a first of its kind) has been made to develop a risk governance index, which could be used as proxy for quality of risk governance structures. The index (normative framework) is based on eleven variables, namely, size of board, board diversity in terms of gender, proportion of executive directors, executive/non-executive status of chairperson, proportion of independent directors, CEO duality, chief risk officer (CRO), risk management committee, mandatory committees, voluntary committees and existence/non-existence of whistle blower policy. These variables are scored on a scale of 1 to 5 with the exception of the variables, namely, status of chairperson and CEO duality (which have been scored on a dichotomous scale with the score of 3 or 5). In case there is a legal/statutory requirement in respect of above-mentioned variables and there is a non-compliance with such requirement a score of one has been envisaged. Though there is no legal requirement, for the larger part of study, in context of CRO, risk management committee and whistle blower policy, still a score of 1 has been assigned in the event of their non-existence. Recognizing the importance of these variables in context of risk governance structure and the fact that the study basically focuses on risk governance, the absence of these variables has been equated to non-compliance with a legal/statutory requirement. Therefore, based on this the minimum score is 15 and the maximum possible is 55. In addition, an attempt has been made to explore the determinants of this index. For this purpose, the sample consists of non-financial companies (429) that constitute S&P CNX500 index. The study covers a 10 years period from April 1, 2005 to March 31, 2015. Given the panel nature of data, Hausman test was applied, and it suggested that fixed effects regression would be appropriate. The results indicate that age and size of firms have significant positive impact on its risk governance structures. Further, post-recession period (2009-2015) has witnessed significant improvement in quality of governance structures. In contrast, profitability (positive relationship), leverage (negative relationship) and growth (negative relationship) do not have significant impact on quality of risk governance structures. The value of rho indicates that about 77.74% variation in risk governance structures is due to firm specific factors. Given the fact that each firm is unique in terms of its risk exposure, risk culture, risk appetite, and risk tolerance levels, it appears reasonable to assume that the specific conditions and circumstances that a company is beset with, could be the biggest determinants of its risk governance structures. Given the recommendations put forth in the paper (particularly for regulators and companies), the study is expected to be of immense utility in an important yet neglected aspect of risk management.

Keywords: corporate governance, ERM, risk governance, risk management

Procedia PDF Downloads 252
4057 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 504
4056 Subsidiary Strategy and Importance of Standards: Re-Interpreting the Integration-Responsiveness Framework

Authors: Jo-Ann Müller

Abstract:

The integration-responsiveness (IR) framework presents four distinct internationalization strategies which differ depending on the extent of pressure the company faces for local responsiveness and global integration. This study applies the framework to standards by examining differences in the relative importance of three types of standards depending on the role the subsidiary plays within the corporate group. Hypotheses are tested empirically in a two-stage procedure. First, the subsidiaries are grouped performing cluster analysis. In the second step, the relationship between cluster affiliation and subsidiary strategy is tested using multinomial Probit estimation. While the level of local responsiveness of a firm relates to the relative importance of national and international formal standards, the degree of vertical integration is associated with the application of internal company.

Keywords: FDI, firm-level data, standards, subsidiary strategy

Procedia PDF Downloads 286
4055 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 51
4054 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation

Authors: Y. Atilgan Şengül

Abstract:

Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.

Keywords: healthcare, health informatics, medical record system, questionnaire

Procedia PDF Downloads 173
4053 Influence of Cryo-Grinding on Particle Size Distribution of Proso Millet Bran Fraction

Authors: Maja Benkovic, Dubravka Novotni, Bojana Voucko, Duska Curic, Damir Jezek, Nikolina Cukelj

Abstract:

Cryo-grinding is an ultra-fine grinding method used in the pharmaceutical industry, production of herbs and spices and in the production and handling of cereals, due to its ability to produce powders with small particle sizes which maintain their favorable bioactive profile. The aim of this study was to determine the particle size distributions of the proso millet (Panicum miliaceum) bran fraction grinded at cryogenic temperature (using liquid nitrogen (LN₂) cooling, T = - 196 °C), in comparison to non-cooled grinding. Proso millet bran is primarily used as an animal feed, but has a potential in food applications, either as a substrate for extraction of bioactive compounds or raw material in the bakery industry. For both applications finer particle sizes of the bran could be beneficial. Thus, millet bran was ground for 2, 4, 8 and 12 minutes using the ball mill (CryoMill, Retsch GmbH, Haan, Germany) at three grinding modes: (I) without cooling, (II) at cryo-temperature, and (III) at cryo-temperature with included 1 minute of intermediate cryo-cooling step after every 2 minutes of grinding, which is usually applied when samples require longer grinding times. The sample was placed in a 50 mL stainless steel jar containing one grinding ball (Ø 25 mm). The oscillation frequency in all three modes was 30 Hz. Particle size distributions of the bran were determined by a laser diffraction particle sizing method (Mastersizer 2000) using the Scirocco 2000 dry dispersion unit (Malvern Instruments, Malvern, UK). Three main effects of the grinding set-up were visible from the results. Firstly, grinding time at all three modes had a significant effect on all particle size parameters: d(0.1), d(0.5), d(0.9), D[3,2], D[4,3], span and specific surface area. Longer grinding times resulted in lower values of the above-listed parameters, e.g. the averaged d(0.5) of the sample (229.57±1.46 µm) dropped to 51.29±1.28 µm after 2 minutes grinding without LN₂, and additionally to 43.00±1.33 µm after 4 minutes of grinding without LN₂. The only exception was the sample ground for 12 minutes without cooling, where an increase in particle diameters occurred (d(0.5)=62.85±2.20 µm), probably due to particles adhering to one another and forming larger particle clusters. Secondly, samples with LN₂ cooling exhibited lower diameters in comparison to non-cooled. For example, after 8 minutes of non-cooled grinding d(0.5)=46.97±1.05 µm was achieved, while the LN₂ cooling enabled collection of particles with average sizes of d(0.5)=18.57±0.18 µm. Thirdly, the application of intermediate cryo-cooling step resulted in similar particle diameters (d(0.5)=15.83±0.36 µm, 12 min of grinding) as cryo-milling without this step (d(0.5)=16.33±2.09 µm, 12 min of grinding). This indicates that intermediate cooling is not necessary for the current application, which consequently reduces the consumption of LN₂. These results point out the potential beneficial effects of millet bran grinding at cryo-temperatures. Further research will show if the lower particle size achieved in comparison to non-cooled grinding could result in increased bioavailability of bioactive compounds, as well as protein digestibility and solubility of dietary fibers of the proso millet bran fraction.

Keywords: ball mill, cryo-milling, particle size distribution, proso millet (Panicum miliaceum) bran

Procedia PDF Downloads 145
4052 Human Rights Impact on Citizens Evolution

Authors: Joseph Marzouk Gerais Abdelmalak

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 73
4051 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP

Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin

Abstract:

Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.

Keywords: analytical hierarchy process, job selection, multi-criteria, decision making

Procedia PDF Downloads 400
4050 Evaluating the Performance of Offensive Lineman in the National Football League

Authors: Nikhil Byanna, Abdolghani Ebrahimi, Diego Klabjan

Abstract:

How does one objectively measure the performance of an individual offensive lineman in the NFL? The existing literature proposes various measures that rely on subjective assessments of game film, but has yet to develop an objective methodology to evaluate performance. Using a variety of statistics related to an offensive lineman’s performance, we develop a framework to objectively analyze the overall performance of an individual offensive lineman and determine specific linemen who are overvalued or undervalued relative to their salary. We identify eight players across the 2013-2014 and 2014-2015 NFL seasons that are considered to be overvalued or undervalued and corroborate the results with existing metrics that are based on subjective evaluation. To the best of our knowledge, the techniques set forth in this work have not been utilized in previous works to evaluate the performance of NFL players at any position, including offensive linemen.

Keywords: offensive lineman, player performance, NFL, machine learning

Procedia PDF Downloads 144
4049 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 138
4048 Political Determinants of Sovereign Spread: The Great East-West Divide

Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic

Abstract:

We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.

Keywords: sovereign bonds, European Union, developing countries, political determinants

Procedia PDF Downloads 311
4047 A Policy Review on the Transitional Period from MDGs to SDGs: Experience from the Local Economy of Tigrai Regional State of Ethiopia

Authors: Tewele Gerlase Haile

Abstract:

Sustainable development is development that meets the needs of the present without compromising the ability of future generations to meet their own needs. The global development landscape underwent a transformative shift in 2015 as the international community pivoted from the MDGs to the more ambitious and comprehensive SDGs. The NDGs were a set of eight international development goals established by the United Nations in 2000, with the aim of improving the lives of people around the world by 2015. SDGs are a continuation of the MDGs. Unlike on the other development goals, progress on eradication of extreme hunger and poverty (MDG 1) has been slow at a continental level. The implementation of the MDGs was uneven: some countries have already achieved many of them, while the others have not started any of them yet. With its Poverty Reduction Strategic Papers (PRSPs), Ethiopia has been given special attention to the first MDG since 1993. The Ethiopian government was actively engaged in anti-poverty political campaign leaving other agendas as secondary issues. Poverty in Ethiopia progressively reduced over the years; it was 44.2% in 2000, 38.7% in 2007, 29.6 % in 2011, and it is projected to further reduce to 16.7% by the end of 2020. The long-term impact of war on the sustainability and effectiveness of SDG-related initiatives in post-conflict regions, particularly in how local governance and community resilience are affected. This could involve exploring how war interrupts progress, which specific SDGs are most vulnerable, and what strategies might mitigate these impacts. Reviewing a transitional period enables policy makers to align global or national development goals into local development goals with an uninterrupted policy continuity. The existing literature on development economics often neglects the importance of reviewing the transitional period of consecutive global development goals in a local or regional perspective. Reviewing a transitional period enables policy makers to align global or national development goals into local development goals with an uninterrupted policy continuity. Using a Policy Coherence for Development (PCD) approach as analytical tool, this paper is intended to retrospectively review what happened to the local economy of Tigrai Regional State during the transitional period from MDGs (2000-2015) to SDGs (2015-2030). Taking a retrospective facts and observations into account, policy discontinuity is witnessed in Tigrai following the dissolution of the EPRDF that followed with a terrible war that claimed about a million human lives and worth of over a hundred Billion US dollars economic costs. The unhealthy political reform caused not only a terrible war but also breaks the promising SDGs. Unlike other regional states, Tigrai left unprivileged to translate the ambitious SDGs into its local development policies.

Keywords: local development, political reform, war, MDGs, SDGs, Ethiopia, tigrai

Procedia PDF Downloads 20
4046 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 38
4045 The Study of Participant Motivation, Social Support, and Training Satisfaction of Collegiate Teakwondo Athlete

Authors: Wen-Goang Yang, Li-Wei Liu, Peli-Ling Liu

Abstract:

The purpose of this study was to explore relations among athletic participant motivation, social support, and training satisfaction. The approach was tested using structural equation modeling, involving 300 Teakwondo Athletics from 2017 National Intercollegiate Athletic Games, using a revised scale for Participant Motivation, Social Support, and Training Satisfaction. Statistical method included descriptive statistics and PLS-SEM. The results of the research as a follow: (1) The athletes ‘participant motivation’ positively effects the ‘social support’. (2) The athletes ‘participant motivation’ positively effects the ‘training satisfaction’. (3) The athletes ‘social support’ positively effects the ‘training satisfaction’.

Keywords: teakwondo, collegiate athlete, PLS-SEM, social support

Procedia PDF Downloads 223
4044 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 74
4043 Collaborative Environmental Management: A Case Study Research of Stakeholders' Collaboration in the Nigerian Oil-Producing Region

Authors: Favour Makuochukwu Orji, Yingkui Zhao

Abstract:

A myriad of environmental issues face the Nigerian industrial region, resulting from; oil and gas production, mining, manufacturing and domestic wastes. Amidst these, much effort has been directed by stakeholders in the Nigerian oil producing regions, because of the impacts of the region on the wider Nigerian economy. Research to date has suggested that collaborative environmental management could be an effective approach in managing environmental issues; but little attention has been given to the roles and practices of stakeholders in effecting a collaborative environmental management framework for the Nigerian oil-producing region. This paper produces a framework to expand and deepen knowledge relating to stakeholders aspects of collaborative roles in managing environmental issues in the Nigeria oil-producing region. The knowledge is derived from analysis of stakeholders’ practices – studied through multiple case studies using document analysis. Selected documents of key stakeholders – Nigerian government agencies, multi-national oil companies and host communities, were analyzed. Open and selective coding was employed manually during document analysis of data collected from the offices and websites of the stakeholders. The findings showed that the stakeholders have a range of roles, practices, interests, drivers and barriers regarding their collaborative roles in managing environmental issues. While they have interests for efficient resource use, compliance to standards, sharing of responsibilities, generating of new solutions, and shared objectives; there is evidence of major barriers which includes resource allocation, disjointed policy and regulation, ineffective monitoring, diverse socio- economic interests, lack of stakeholders’ commitment and limited knowledge sharing. However, host communities hold deep concerns over the collaborative roles of stakeholders for economic interests, particularly, where government agencies and multi-national oil companies are involved. With these barriers and concerns, a genuine stakeholders’ collaboration is found to be limited, and as a result, optimal environmental management practices and policies have not been successfully implemented in the Nigeria oil-producing region. A framework is produced that describes practices that characterize collaborative environmental management might be employed to satisfy the stakeholders’ interests. The framework recommends critical factors, based on the findings, which may guide a collaborative environmental management in the oil producing regions. The recommendations are designed to re-define the practices of stakeholders in managing environmental issues in the oil producing regions, not as something wholly new, but as an approach essential for implementing a sustainable environmental policy. This research outcome may clarify areas for future research as well as to contribute to industry guidance in the area of collaborative environmental management.

Keywords: collaborative environmental management framework, case studies, document analysis, multinational oil companies, Nigerian oil producing regions, Nigerian government agencies, stakeholders analysis

Procedia PDF Downloads 174
4042 Evaluation of DNA Paternity Testing Accuracy of Child Trafficking Cases

Authors: Wing Kam Fung, Kexin Yu

Abstract:

Child trafficking has been a serious problem in modern China. The Chinese government has established a national anti-trafficking DNA database to help reunite missing children with their families. The database collects DNA information from missing children's parents, trafficked and homeless children, then conducts paternity tests to find matched pairs. This paper considers the matching accuracy in such cases by looking into the exclusion probability in paternity testing. First, the situation of child trafficking in China is introduced. Next, derivations of the exclusion probability for both one-parent and two-parents cases are given, followed by extension to allow for 1 or 2 mutations. The accuracy of paternity testing of child trafficking cases is then assessed using the exclusion probabilities and available data. Finally, the number of loci that should be used to ensure a correct match is investigated.

Keywords: child trafficking, DNA database, exclusion probability, paternity testing

Procedia PDF Downloads 457
4041 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 418
4040 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria

Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria

Abstract:

The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.

Keywords: dental surgeon, medical devices, sterilization, survey

Procedia PDF Downloads 402
4039 The Rebound Effect of Energy Efficiency in Residential Energy Demand: Case of Saudi Arabia

Authors: Mohammad Aldubyan, Fateh Belaid, Anwar Gasim

Abstract:

This paper aims at linking to link residential energy efficiency to the rebound effect concept, a well-known behavioral phenomenon in which service consumption increases when consumers notice a reduction in monetary spending on energy due to improvements in energy efficiency. It provides insights on into how and why the rebound effect happens when energy efficiency improves and whether this phenomenon is positive or negative. It also shows one technique to estimate the rebound effect on the national residential level. The paper starts with a bird’s eye view of the rebound effect and then dives in in-depth into measuring the rebound effect and evaluating its impact. Finally, the paper estimates the rebound effect in the Saudi residential sector through by linking pre-estimated price elasticities of demand to the Saudi residential building stock.

Keywords: energy efficiency, rebound effect, energy consumption, residential electricity demand

Procedia PDF Downloads 108
4038 Row Detection and Graph-Based Localization in Tree Nurseries Using a 3D LiDAR

Authors: Ionut Vintu, Stefan Laible, Ruth Schulz

Abstract:

Agricultural robotics has been developing steadily over recent years, with the goal of reducing and even eliminating pesticides used in crops and to increase productivity by taking over human labor. The majority of crops are arranged in rows. The first step towards autonomous robots, capable of driving in fields and performing crop-handling tasks, is for robots to robustly detect the rows of plants. Recent work done towards autonomous driving between plant rows offers big robotic platforms equipped with various expensive sensors as a solution to this problem. These platforms need to be driven over the rows of plants. This approach lacks flexibility and scalability when it comes to the height of plants or distance between rows. This paper proposes instead an algorithm that makes use of cheaper sensors and has a higher variability. The main application is in tree nurseries. Here, plant height can range from a few centimeters to a few meters. Moreover, trees are often removed, leading to gaps within the plant rows. The core idea is to combine row detection algorithms with graph-based localization methods as they are used in SLAM. Nodes in the graph represent the estimated pose of the robot, and the edges embed constraints between these poses or between the robot and certain landmarks. This setup aims to improve individual plant detection and deal with exception handling, like row gaps, which are falsely detected as an end of rows. Four methods were developed for detecting row structures in the fields, all using a point cloud acquired with a 3D LiDAR as an input. Comparing the field coverage and number of damaged plants, the method that uses a local map around the robot proved to perform the best, with 68% covered rows and 25% damaged plants. This method is further used and combined with a graph-based localization algorithm, which uses the local map features to estimate the robot’s position inside the greater field. Testing the upgraded algorithm in a variety of simulated fields shows that the additional information obtained from localization provides a boost in performance over methods that rely purely on perception to navigate. The final algorithm achieved a row coverage of 80% and an accuracy of 27% damaged plants. Future work would focus on achieving a perfect score of 100% covered rows and 0% damaged plants. The main challenges that the algorithm needs to overcome are fields where the height of the plants is too small for the plants to be detected and fields where it is hard to distinguish between individual plants when they are overlapping. The method was also tested on a real robot in a small field with artificial plants. The tests were performed using a small robot platform equipped with wheel encoders, an IMU and an FX10 3D LiDAR. Over ten runs, the system achieved 100% coverage and 0% damaged plants. The framework built within the scope of this work can be further used to integrate data from additional sensors, with the goal of achieving even better results.

Keywords: 3D LiDAR, agricultural robots, graph-based localization, row detection

Procedia PDF Downloads 139
4037 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 504
4036 Organ Donation after Medical Aid in Dying: A Critical Study of Clinical Processes and Legal Rules in Place

Authors: Louise Bernier

Abstract:

Under some jurisdictions (including Canada), eligible patients can request and receive medical assistance in dying (MAiD) through lethal injections, inducing their cardiocirculatory death. Those same patients can also wish to donate their organs in the process. If they qualify as organ donors, a clinical and ethical rule called the 'dead donor rule' (DDR) requires the transplant teams to wait after cardiocirculatory death is confirmed, followed by a 'no touch' period (5 minutes in Canada) before they can proceed with organ removal. The medical procedures (lethal injections) as well as the delays associated with the DDR can damage organs (mostly thoracic organs) due to prolonged anoxia. Yet, strong scientific evidences demonstrate that operating differently and reconsidering the DDR would result in more organs of better quality available for transplant. This idea generates discomfort and resistance, but it is also worth considering, especially in a context of chronic shortage of available organs. One option that could be examined for MAiD’ patients who wish and can be organ donors would be to remove vital organs while patients are still alive (and under sedation). This would imply accepting that patient’s death would occur through organ donation instead of lethal injections required under MAiD’ legal rules. It would also mean that patients requesting MAiD and wishing to be organ donors could aspire to donate better quality organs, including their heart, an altruistic gesture that carries important symbolic value for many donors and their families. Following a patient centered approach, our hypothesis is that preventing vital organ donation from a living donor in all circumstance is neither perfectly coherent with how legal mentalities have evolved lately in the field of fundamental rights nor compatible with the clinical and ethical frameworks that shape the landscape in which those complex medical decisions unfold. Through a study of the legal, ethical, and clinical rules in place, both at the national and international levels, this analysis raises questions on the numerous inconsistencies associated with respecting the DDR with patients who have chosen to die through MAiD. We will begin with an assessment of the erosion of certain national legal frameworks that pertain to the sacred nature of the right to life which now also includes the right to choose how one wishes to die. We will then study recent innovative clinical protocols tested in different countries to help address acute organ shortage problems in creative ways. We will conclude this analysis with an ethical assessment of the situation, referring to principles such as justice, autonomy, altruism, beneficence, and non-malfeasance. This study will build a strong argument in favor of starting to allow vital organ donations from living donors in countries where MAiD is already permitted.

Keywords: altruism, autonomy, dead donor rule, medical assistance in dying, non-malfeasance, organ donation

Procedia PDF Downloads 178
4035 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations

Authors: Mark A. Spooner

Abstract:

The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.

Keywords: digital forensics, forensic examination, small device, trends

Procedia PDF Downloads 199
4034 An Investigation on the Internal Quality Assurance System of Higher Education in Indonesia

Authors: Andi Mursidi

Abstract:

This study aims to investigate why the internal quality assurance system as the basis for the assessment of external quality assurance systems is not well developed at universities in Indonesia. To answer this problem, technical analysis used single instrumental case study with the respondents from ten universities. The findings of this study are the internal quality assurance system that is applied so far (1) only to gain accreditation; and (2) considered as a liability rather than as a necessity to meet the demands of quality standards. It needs strong commitment from internal stakeholders at the college/university to establish internal quality assurance systems that exceed the national standards of higher education. A high quality college/ university will have a good accreditation rank.

Keywords: internal stakeholders, internal quality assurance system, commitment, higher education

Procedia PDF Downloads 289