Search results for: harm mitigation
912 Generating Individualized Wildfire Risk Assessments Utilizing Multispectral Imagery and Geospatial Artificial Intelligence
Authors: Gus Calderon, Richard McCreight, Tammy Schwartz
Abstract:
Forensic analysis of community wildfire destruction in California has shown that reducing or removing flammable vegetation in proximity to buildings and structures is one of the most important wildfire defenses available to homeowners. State laws specify the requirements for homeowners to create and maintain defensible space around all structures. Unfortunately, this decades-long effort had limited success due to noncompliance and minimal enforcement. As a result, vulnerable communities continue to experience escalating human and economic costs along the wildland-urban interface (WUI). Quantifying vegetative fuels at both the community and parcel scale requires detailed imaging from an aircraft with remote sensing technology to reduce uncertainty. FireWatch has been delivering high spatial resolution (5” ground sample distance) wildfire hazard maps annually to the community of Rancho Santa Fe, CA, since 2019. FireWatch uses a multispectral imaging system mounted onboard an aircraft to create georeferenced orthomosaics and spectral vegetation index maps. Using proprietary algorithms, the vegetation type, condition, and proximity to structures are determined for 1,851 properties in the community. Secondary data processing combines object-based classification of vegetative fuels, assisted by machine learning, to prioritize mitigation strategies within the community. The remote sensing data for the 10 sq. mi. community is divided into parcels and sent to all homeowners in the form of defensible space maps and reports. Follow-up aerial surveys are performed annually using repeat station imaging of fixed GPS locations to address changes in defensible space, vegetation fuel cover, and condition over time. These maps and reports have increased wildfire awareness and mitigation efforts from 40% to over 85% among homeowners in Rancho Santa Fe. To assist homeowners fighting increasing insurance premiums and non-renewals, FireWatch has partnered with Black Swan Analytics, LLC, to leverage the multispectral imagery and increase homeowners’ understanding of wildfire risk drivers. For this study, a subsample of 100 parcels was selected to gain a comprehensive understanding of wildfire risk and the elements which can be mitigated. Geospatial data from FireWatch’s defensible space maps was combined with Black Swan’s patented approach using 39 other risk characteristics into a 4score Report. The 4score Report helps property owners understand risk sources and potential mitigation opportunities by assessing four categories of risk: Fuel sources, ignition sources, susceptibility to loss, and hazards to fire protection efforts (FISH). This study has shown that susceptibility to loss is the category residents and property owners must focus their efforts. The 4score Report also provides a tool to measure the impact of homeowner actions on risk levels over time. Resiliency is the only solution to breaking the cycle of community wildfire destruction and it starts with high-quality data and education.Keywords: defensible space, geospatial data, multispectral imaging, Rancho Santa Fe, susceptibility to loss, wildfire risk.
Procedia PDF Downloads 108911 Experimental Evaluation of Foundation Settlement Mitigations in Liquefiable Soils using Press-in Sheet Piling Technique: 1-g Shake Table Tests
Authors: Md. Kausar Alam, Ramin Motamed
Abstract:
The damaging effects of liquefaction-induced ground movements have been frequently observed in past earthquakes, such as the 2010-2011 Canterbury Earthquake Sequence (CES) in New Zealand and the 2011 Tohoku earthquake in Japan. To reduce the consequences of soil liquefaction at shallow depths, various ground improvement techniques have been utilized in engineering practice, among which this research is focused on experimentally evaluating the press-in sheet piling technique. The press-in sheet pile technique eliminates the vibration, hammering, and noise pollution associated with dynamic sheet pile installation methods. Unfortunately, there are limited experimental studies on the press-in sheet piling technique for liquefaction mitigation using 1g shake table tests in which all the controlling mechanisms of liquefaction-induced foundation settlement, including sand ejecta, can be realistically reproduced. In this study, a series of moderate scale 1g shake table experiments were conducted at the University of Nevada, Reno, to evaluate the performance of this technique in liquefiable soil layers. First, a 1/5 size model was developed based on a recent UC San Diego shaking table experiment. The scaled model has a density of 50% for the top crust, 40% for the intermediate liquefiable layer, and 85% for the bottom dense layer. Second, a shallow foundation is seated atop an unsaturated sandy soil crust. Third, in a series of tests, a sheet pile with variable embedment depth is inserted into the liquefiable soil using the press-in technique surrounding the shallow foundations. The scaled models are subjected to harmonic input motions with amplitude and dominant frequency properly scaled based on the large-scale shake table test. This study assesses the performance of the press-in sheet piling technique in terms of reductions in the foundation movements (settlement and tilt) and generated excess pore water pressures. In addition, this paper discusses the cost-effectiveness and carbon footprint features of the studied mitigation measures.Keywords: excess pore water pressure, foundation settlement, press-in sheet pile, soil liquefaction
Procedia PDF Downloads 97910 Urban Noise and Air Quality: Correlation between Air and Noise Pollution; Sensors, Data Collection, Analysis and Mapping in Urban Planning
Authors: Massimiliano Condotta, Paolo Ruggeri, Chiara Scanagatta, Giovanni Borga
Abstract:
Architects and urban planners, when designing and renewing cities, have to face a complex set of problems, including the issues of noise and air pollution which are considered as hot topics (i.e., the Clean Air Act of London and the Soundscape definition). It is usually taken for granted that these problems go by together because the noise pollution present in cities is often linked to traffic and industries, and these produce air pollutants as well. Traffic congestion can create both noise pollution and air pollution, because NO₂ is mostly created from the oxidation of NO, and these two are notoriously produced by processes of combustion at high temperatures (i.e., car engines or thermal power stations). We can see the same process for industrial plants as well. What have to be investigated – and is the topic of this paper – is whether or not there really is a correlation between noise pollution and air pollution (taking into account NO₂) in urban areas. To evaluate if there is a correlation, some low-cost methodologies will be used. For noise measurements, the OpeNoise App will be installed on an Android phone. The smartphone will be positioned inside a waterproof box, to stay outdoor, with an external battery to allow it to collect data continuously. The box will have a small hole to install an external microphone, connected to the smartphone, which will be calibrated to collect the most accurate data. For air, pollution measurements will be used the AirMonitor device, an Arduino board to which the sensors, and all the other components, are plugged. After assembling the sensors, they will be coupled (one noise and one air sensor) and placed in different critical locations in the area of Mestre (Venice) to map the existing situation. The sensors will collect data for a fixed period of time to have an input for both week and weekend days, in this way it will be possible to see the changes of the situation during the week. The novelty is that data will be compared to check if there is a correlation between the two pollutants using graphs that should show the percentage of pollution instead of the values obtained with the sensors. To do so, the data will be converted to fit on a scale that goes up to 100% and will be shown thru a mapping of the measurement using GIS methods. Another relevant aspect is that this comparison can help to choose which are the right mitigation solutions to be applied in the area of the analysis because it will make it possible to solve both the noise and the air pollution problem making only one intervention. The mitigation solutions must consider not only the health aspect but also how to create a more livable space for citizens. The paper will describe in detail the methodology and the technical solution adopted for the realization of the sensors, the data collection, noise and pollution mapping and analysis.Keywords: air quality, data analysis, data collection, NO₂, noise mapping, noise pollution, particulate matter
Procedia PDF Downloads 212909 A Risk Management Approach for Nigeria Manufacturing Industries
Authors: Olaniyi O. Omoyajowo
Abstract:
To be successful in today’s competitive global environment, manufacturing industry must be able to respond quickly to changes in technology. These changes in technology introduce new risks and hazards. The management of risk/hazard in a manufacturing process recommends method through which the success rate of an organization can be increased. Thus, there is a continual need for manufacturing industries to invest significant amount of resources in risk management, which in turn optimizes the production output and profitability of any manufacturing industry (if implemented properly). To help improve the existing risk prevention and mitigation practices in Small and Medium Enterprise (SME) in Nigeria Manufacturing Industries (NMI), the researcher embarks on this research to develop a systematic Risk Management process.Keywords: manufacturing management, risk, risk management, SMEs
Procedia PDF Downloads 402908 Fraud in the Higher Educational Institutions in Assam, India: Issues and Challenges
Authors: Kalidas Sarma
Abstract:
Fraud is a social problem changing with social change and it has a regional and global impact. Introduction of private domain in higher education along with public institutions has led to commercialization of higher education which encourages unprecedented mushrooming of private institutions resulting in fraudulent activities in higher educational institutions in Assam, India. Presently, fraud has been noticed in in-service promotion, fake entry qualification by teachers in different levels of work-place by using fake master degrees, master of philosophy and doctor of philosophy degree certificates. The aim and objective of the study are to identify grey areas in maintenance of quality in higher educational institutions in Assam and also to draw the contour for planning and implementation. This study is based on both primary and secondary data collected through questionnaire and seeking information through Right to Information Act 2005. In Assam, there are 301 undergraduate and graduate colleges distributed in 27 (Twenty seven) administrative districts with 11000 (Eleven thousand) college teachers. Total 421 (Four hundred twenty one) college teachers from the 14 respondent colleges have been taken for analysis. Data collected has been analyzed by using 'Hypertext Pre-processor' (PhP) application with My Sequel Structure Query Language (MySQL) and Google Map Application Programming Interface (APIs). Graph has been generated by using open source tool Chart.js. Spatial distribution maps have been generated with the help of geo-references of the colleges. The result shows: (i) the violation of University Grants Commission's (UGCs) Regulation for the awards of M. Phil/Ph.D. clearly exhibits. (ii) There is a gap between apex regulatory bodies of higher education at national and as well as state level to check fraud. (iii) Mala fide 'No Objection Certificate' (NOC) issued by the Government of Assam have played pivotal role in the occurrence of fraudulent practices in higher educational institutions of Assam. (iv) Violation of verdict of the Hon'ble Supreme Court of India regarding territorial jurisdiction of Universities for the awards of Ph.D. and M. Phil degrees in distance mode/study centre is also a responsible factor for the spread of these academic frauds in Assam and other states. The challenges and mitigation of these issues have been discussed.Keywords: Assam, fraud, higher education, mitigation
Procedia PDF Downloads 167907 Green Aviation System: The Way Forward for Better Environment
Authors: Ramana Reddy, Vijay Kothari
Abstract:
Aircraft provide a fast, reliable mode of transport with no comparable alternative for long distance travel. Throughout the years, technology improvements have been made to aircraft and engines to make them more fuel efficient. Air traffic continues to grow around the world and needs more aircrafts to accommodate such rapid growth. This has direct consequences on two of the most important environmental factors i.e. emissions and noise. Aviation contributes about 2% of global greenhouse gas emissions. Aviation emits a number of pollutants that alter the chemical composition of the atmosphere, changing its radiative balance and hence influencing the climate. In order to reduce or if possible eliminate potential harm to the environment and also make air travel efficient and economical, an environmentally beneficial concept called “Green Aviation System” is required. This is a structured frame work with elements like innovative technologies/tools in engineering design, manufacturing, airport and fleet operations.Keywords: air traffic, environment, emissions, noise, green aviation system
Procedia PDF Downloads 456906 From Forked Tongues to Tinkerbell Ears: Rethinking the Criminalization of Alternative Body Modification in the UK
Authors: Luci V. Hyett
Abstract:
The criminal law of England and Wales currently deems that a person cannot consent to the infliction of injury upon their own body, where the level of harm is considered to be Actual or Grevious. This renders the defence of consent of the victim as being unavailable to those persons carrying out an Alternative Body Modification procedure. However, the criminalization of consensual injury is more appropriately deemed as being categorized as an offense against public morality and not one against the person, which renders the State’s involvement in the autonomous choices of a consenting adult, when determining what can be done to one’s own body, an arbitrary one. Furthermore, to recognise in law that a person is capable of giving a valid consent to socially acceptable cosmetic interventions that largely consist of procedures designed to aesthetically please men and, not those of people who want to modify their bodies for other reasons means that patriarchal attitudes are continuing to underpin public repulsion and inhibit social acceptance of such practices. Theoretical analysis will begin with a juridical examination of R v M(B) [2019] QB 1 where the High Court determined that Alternative Body Modification was not a special category exempting a person so performing from liability for Grevious Bodily Harm using the defence of consent. It will draw from its reasoning which considered that ‘the removal of body parts were medical procedures being carried out for no medical reason by someone not qualified to carry them out’ which will form the basis of this enquiry. It will consider the philosophical work of Georgio Agamben when analysing whether the biopolitical climate in the UK, which places the optimization of the perfect, healthy body at the centre of political concern can explain why those persons who wish to engage in Alternative Body Modification are treated as the ‘Exception’ to that which is normal using the ‘no medical reason’ canon to justify criminalisation, rather than legitimising the industry through regulation. It will consider, through a feminist lens, the current conflict in law between traditional cosmetic interventions which alter one’s physical appearance for socially accepted aesthetic purposes such as those to the breast, lip and buttock and, modifications described as more outlandish such as earlobe stretching, tooth filing and transdermal implants to create horns and spikes under the skin. It will assert that ethical principles relating to the psychological impact of body modification described as ‘alternative’ is used as a means to exclude person’s seeking such a procedure from receiving safe and competent treatment via a registered cosmetic surgeon which leads to these increasingly popular surgery’s being performed in Tattoo parlours throughout the UK as an extension to other socially acceptable forms of self-modification such as piercings. It will contend that only by ‘inclusive exclusion’ will those ‘othered’ through ostracisation be welcomed into the fold of normality and this can only be achieved through recognition of alternative body modification as a legitimate cosmetic intervention, subject to the same regulatory framework as existing practice. This would assist in refocusing the political landscape by erring on the side of liberty rather than that of biology.Keywords: biopolitics, body modification, consent, criminal law
Procedia PDF Downloads 107905 Fuzzy Expert Approach for Risk Mitigation on Functional Urban Areas Affected by Anthropogenic Ground Movements
Authors: Agnieszka A. Malinowska, R. Hejmanowski
Abstract:
A number of European cities are strongly affected by ground movements caused by anthropogenic activities or post-anthropogenic metamorphosis. Those are mainly water pumping, current mining operation, the collapse of post-mining underground voids or mining-induced earthquakes. These activities lead to large and small-scale ground displacements and a ground ruptures. The ground movements occurring in urban areas could considerably affect stability and safety of structures and infrastructures. The complexity of the ground deformation phenomenon in relation to the structures and infrastructures vulnerability leads to considerable constraints in assessing the threat of those objects. However, the increase of access to the free software and satellite data could pave the way for developing new methods and strategies for environmental risk mitigation and management. Open source geographical information systems (OS GIS), may support data integration, management, and risk analysis. Lately, developed methods based on fuzzy logic and experts methods for buildings and infrastructure damage risk assessment could be integrated into OS GIS. Those methods were verified base on back analysis proving their accuracy. Moreover, those methods could be supported by ground displacement observation. Based on freely available data from European Space Agency and free software, ground deformation could be estimated. The main innovation presented in the paper is the application of open source software (OS GIS) for integration developed models and assessment of the threat of urban areas. Those approaches will be reinforced by analysis of ground movement based on free satellite data. Those data would support the verification of ground movement prediction models. Moreover, satellite data will enable our mapping of ground deformation in urbanized areas. Developed models and methods have been implemented in one of the urban areas hazarded by underground mining activity. Vulnerability maps supported by satellite ground movement observation would mitigate the hazards of land displacements in urban areas close to mines.Keywords: fuzzy logic, open source geographic information science (OS GIS), risk assessment on urbanized areas, satellite interferometry (InSAR)
Procedia PDF Downloads 159904 Financial Feasibility of Clean Development Mechanism (CDM) Projects in India
Authors: Renuka H. Deshmukh, Snehal Nifadkar, Anil P. Dongre
Abstract:
The research study aims to analyze the financial performance of the companies associated with CDM projects implemented in India from 2001 to 2014 by calculating net profit with and without CDM revenue. Further the study also highlights the Year-wise and sector-wise lending to CDM projects in India as well as in the state of Maharashtra. The study further aims to examine the year-wise trend of Certified Emission Reductions (CER) issued by the CDM projects implemented in Maharashtra from 2001-2014. The study as well analyses the responses of selected corporate with respect to the challenges in implementing and obtaining finance from commercial banks.Keywords: adaptation costs, internal rate of return, mitigation, vulnerability, CER
Procedia PDF Downloads 347903 A Case of Borderline Personality Disorder: An Explanatory Study of Unconscious Conflicts through Dream-Analysis
Authors: Mariam Anwaar, Kiran B. Ahmad
Abstract:
Borderline Personality Disorder (BPD) is an invasive presence of affect instability, disturbance in self-concept and attachment in relationships. The profound indicator is the dichotomous approach of the world in which the ego categorizes individuals, especially their significant others, into secure or threatful beings, leaving little room for a complex combination of characteristics in one person. This defense mechanism of splitting their world has been described through the explanatory model of unconscious conflict theorized by Sigmund Freud’s Electra Complex in the Phallic Stage. The central role is of the father with whom the daughter experiences penis envy, thus identifying with the mother’s characteristics to receive the father’s attention. However, Margret Mahler, an object relation theorist, elucidates the central role of the mother and that the split occurs during the pre-Electra complex stage. Amid the 14 and 24 months of the infant, it acknowledges the world away from the mother as they have developed milestones such as crawling. In such novelty, the infant crawls away from the mother creating a sense of independence (individuation). On the other hand, being distant causes anxiety, making them return to their original object of security (separation). In BPD, the separation-individuation stage is disrupted, due to contradictory actions of the caregiver, which results in splitting the object into negative and positive aspects, repressing the former and adhering to the latter for survival. Thus, with time, the ego distorts the reality into dichotomous categories, using the splitting defenses, and the mental representation of the self is distorted due to the internalization of the negative objects. The explanatory model was recognized in the case study of Fizza, at 21-year-old Pakistani female, residing in Karachi. Her marital status is single with an occupation being a dental student. Fizza lives in a nuclear family but is surrounded by her extended family as they all are in close vicinity. She came with the complaints of depressive symptoms for two-years along with self-harm due to severe family conflicts. Through the intervention of Dialectical Behavior Therapy (DBT), the self-harming actions were reduced, however, this libidinal energy transformed into claustrophobic symptoms and, along with this, Fizza has always experienced vivid dreams. A retrospective method of Jungian dream-analysis was applied to locate the origins of the splitting in the unconscious. The result was the revelation of a sexual harassment trauma at the age of six-years which was displaced in the form of self-harm. In addition to this, the presence of a conflict at the separation-individuation stage was detected during the dream-analysis, and it was the underlying explanation of the claustrophobic symptoms. This qualitative case study implicates the use of a patient’s subjective experiences, such as dreams, to journey through the spiral of the unconscious in order to not only detect repressed memories but to use them in psychotherapy as a means of healing the patient.Keywords: borderline personality disorder, dream-analysis, Electra complex, separation-individuation, splitting, unconscious
Procedia PDF Downloads 153902 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies
Authors: Kedar Baral
Abstract:
This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.Keywords: community forest, conflict mitigation, wildlife conservation, climate change
Procedia PDF Downloads 117901 Adaptation of Extra Early Maize 'Zea Mays L.' Varieties for Climate Change Mitigation in South Western Nigeria
Authors: Akinwumi Omotayo, Badu-B Apraku, Joseph Olobasola, Petra Abdul Saghir, Yinka Sobowale
Abstract:
In southwestern Nigeria, climate change has led to loss of at least two months of rainfall. Consequently, only one cycle of maize can now be grown because of the shorter duration of rainy season as against two cycles in the past. The Early and Extra-early maturing varieties of maize were originally developed for the semi-arid and arid zones of West and Central Africa where there are seasonal challenges of water threatening optimum performance of the traditional maize grown, which are commonly late in maturity (115 to 120 days). The early varieties of maize mature in 90 to 95 days; while the Extra-Early maize varieties reach physiological maturity in less than 90 days. It was broadly hypothesized that the extra early varieties of maize could mitigate the effects of climate change in southwestern Nigeria with higher levels of rainfall by reinstating the original two cycles of rain-fed maize crop. Trials were therefore carried out in southwestern Nigeria on the possibility of adapting the extra early maize to mitigate the effects of climate change. The trial was the Mother/Baby design. The mother trial involves the evaluation of extra-early varieties following ideal recommendations and closely supervised centrally at the University research farm and the Agricultural Development Programmes (ADPs). This requires farmers to observe and evaluate the technology and the management regime meant to precede the second stage of evaluation at several satellite farmers field managed by selected farmers. The Baby Trial is expected to provide a realistic assessment of the technology by farmers in their own environment. A stratified selection of thirty farmers for the Baby Trial ensured appropriate representation across the different categories of the farming population by age and gender. Data from the trials indicate that extra early maize can be grown in two cycles rain fed in south west Nigeria and a third and fourth cycle could be obtained with irrigation. However the long duration varieties outyielded the extra early maize in both the mother and baby trials. When harvested green, the extra early maize served as source of food between March and May when there was scarcity of food. This represents a major advantage. The study recommends that further work needs to be done to improve the yield of extra early maize to encourage farmers to adopt.Keywords: adaptation, climate change, extra early, maize varieties, mitigation
Procedia PDF Downloads 200900 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 86899 A Review of Psychiatric Practices in Issues of Anomalous Experiences
Authors: Prosper Kudzanai Mushauri
Abstract:
In issues of anomalous experiences commonly referred to as madness or mental illness, attempts have been made to deal with it so that people manage to live their lives in a more functional way. It is in this stance that psychiatry has sort of portraying itself as seeking to ameliorate perturbations which individuals live with via nosological systems and use of medicine to anomalous experiences. It is from this hegemony that has led to the untold harm which people living with madness have endured from antique to contemporary life. The paper reflects via a literature review on the history of psychiatry and argues that it is akin to contemporary psychiatry to be involved in iatrogenic acts. As antique psychiatry meddled with gory issues of inhumanity, deceit and mass murders which some of those the contemporary psychiatry has not weaned itself from such diabolical acts. The objective of the paper is to suggest to psychiatry that it has not comported to the mores of psychological ethics. In doing this, the paper hopes that psychiatry will reflect and reform its curricular and praxis so that it comports to ethical standards in psychological science in ameliorating anomalous experiences.Keywords: nosology, psychiatry, madness, diagnosis, eugenics
Procedia PDF Downloads 161898 Time-Dependent Analysis of Composite Steel-Concrete Beams Subjected to Shrinkage
Authors: Rahal Nacer, Beghdad Houda, Tehami Mohamed, Souici Abdelaziz
Abstract:
Although the shrinkage of the concrete causes undesirable parasitic effects to the structure, it can then harm the resistance and the good appearance of the structure. Long term behaviourmodelling of steel-concrete composite beams requires the use of the time variable and the taking into account of all the sustained stress history of the concrete slab constituting the cross section. The work introduced in this article is a theoretical study of the behaviour of composite beams with respect to the phenomenon of concrete shrinkage. While using the theory of the linear viscoelasticity of the concrete, and on the basis of the rate of creep method, in proposing an analytical model, made up by a system of two linear differential equations, emphasizing the effects caused by shrinkage on the resistance of a steel-concrete composite beams. Results obtained from the application of the suggested model to a steel-concrete composite beam are satisfactory.Keywords: composite beams, shrinkage, time, rate of creep method, viscoelasticity theory
Procedia PDF Downloads 528897 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 11896 An Intelligent Baby Care System Based on IoT and Deep Learning Techniques
Authors: Chinlun Lai, Lunjyh Jiang
Abstract:
Due to the heavy burden and pressure of caring for infants, an integrated automatic baby watching system based on IoT smart sensing and deep learning machine vision techniques is proposed in this paper. By monitoring infant body conditions such as heartbeat, breathing, body temperature, sleeping posture, as well as the surrounding conditions such as dangerous/sharp objects, light, noise, humidity and temperature, the proposed system can analyze and predict the obvious/potential dangerous conditions according to observed data and then adopt suitable actions in real time to protect the infant from harm. Thus, reducing the burden of the caregiver and improving safety efficiency of the caring work. The experimental results show that the proposed system works successfully for the infant care work and thus can be implemented in various life fields practically.Keywords: baby care system, Internet of Things, deep learning, machine vision
Procedia PDF Downloads 224895 Design and Implementation of an Effective Machine Learning Approach to Crime Prediction and Prevention
Authors: Ashish Kumar, Kaptan Singh, Amit Saxena
Abstract:
Today, it is believed that crimes have the greatest impact on a person's ability to progress financially and personally. Identifying places where individuals shouldn't go is crucial for preventing crimes and is one of the key considerations. As society and technologies have advanced significantly, so have crimes and the harm they wreak. When there is a concentration of people in one place and changes happen quickly, it is even harder to prevent. Because of this, many crime prevention strategies have been embraced as a component of the development of smart cities in numerous cities. However, crimes can occur anywhere; all that is required is to identify the pattern of their occurrences, which will help to lower the crime rate. In this paper, an analysis related to crime has been done; information related to crimes is collected from all over India that can be accessed from anywhere. The purpose of this paper is to investigate the relationship between several factors and India's crime rate. The review has covered information related to every state of India and their associated regions of the period going in between 2001- 2014. However various classes of violations have a marginally unique scope over the years.Keywords: K-nearest neighbor, random forest, decision tree, pre-processing
Procedia PDF Downloads 90894 Role of Biotechnology to Reduce Climate-Induced Impacts
Authors: Sandani Muthukumarana, Pavithra Rathnasiri
Abstract:
Climate change is one of the greatest challenges our generation faces, but by embracing biotechnology, we can turn this challenge into an opportunity to grow the economy. Biotechnology provides the sector with a range of solutions that help mitigate the effects of global warming. However, research efforts on investigating the potential and challenges for further utilization of biotechnology to mitigate climate change impacts are still lacking. To address this issue, existing context over the use of biotechnology for climate change mitigation, potential applications, practices being used, and challenges that exist need to be investigated to provide a broader understanding for future researchers and practitioners. This paper, therefore, reviews the existing literature addressing these perspectives to facilitate the application of biotechnology in mitigating hazards arising from climate change.Keywords: climate change, impacts, biotechnology, solutions
Procedia PDF Downloads 91893 Rumination in Borderline Personality Disorder: A Meta-Analytic Review
Authors: Mara J. Richman, Zsolt Unoka, Robert Dudas, Zsolt Demetrovics
Abstract:
Borderline personality disorder (BPD) is characterized by deficits in emotion regulation and effective liability. Of this domain, ruminative behaviors have been considered a core feature of emotion dysregulation difficulties. Taking this into consideration, a meta-analysis was performed to assess how BPD symptoms correlate with rumination, while also considering clinical moderator variables such as comorbidity, GAF score, and type of BPD symptom and demographic moderator variables such as age, gender, and education level. Analysis of correlation across rumination domains for the entire sample revealed a medium overall correlation. When assessing types of rumination, the largest correlation was among pain rumination followed by anger, depressive, and anxious rumination. Furthermore, affective instability had the strongest correlation with increased rumination, followed by unstable relationships, identity disturbance, and self-harm/ impulsivity, respectively. Demographic variables showed no significance. Clinical implications are considered and further therapeutic interventions are discussed in the context of rumination.Keywords: borderline personality disorder, meta-analysis, rumination, symptoms
Procedia PDF Downloads 194892 On the Estimation of Crime Rate in the Southwest of Nigeria: Principal Component Analysis Approach
Authors: Kayode Balogun, Femi Ayoola
Abstract:
Crime is at alarming rate in this part of world and there are many factors that are contributing to this antisocietal behaviour both among the youths and old. In this work, principal component analysis (PCA) was used as a tool to reduce the dimensionality and to really know those variables that were crime prone in the study region. Data were collected on twenty-eight crime variables from National Bureau of Statistics (NBS) databank for a period of fifteen years, while retaining as much of the information as possible. We use PCA in this study to know the number of major variables and contributors to the crime in the Southwest Nigeria. The results of our analysis revealed that there were eight principal variables have been retained using the Scree plot and Loading plot which implies an eight-equation solution will be appropriate for the data. The eight components explained 93.81% of the total variation in the data set. We also found that the highest and commonly committed crimes in the Southwestern Nigeria were: Assault, Grievous Harm and Wounding, theft/stealing, burglary, house breaking, false pretence, unlawful arms possession and breach of public peace.Keywords: crime rates, data, Southwest Nigeria, principal component analysis, variables
Procedia PDF Downloads 444891 Strategic Public Procurement: A Lever for Social Entrepreneurship and Innovation
Authors: B. Orser, A. Riding, Y. Li
Abstract:
To inform government about how gender gaps in SME ( small and medium-sized enterprise) contracting might be redressed, the research question was: What are the key obstacles to, and response strategies for, increasing the engagement of women business owners among SME suppliers to the government of Canada? Thirty-five interviews with senior policymakers, supplier diversity organization executives, and expert witnesses to the Canadian House of Commons, Standing Committee on Government Operations and Estimates. Qualitative data were conducted and analysed using N’Vivo 11 software. High order response categories included: (a) SME risk mitigation strategies, (b) SME procurement program design, and (c) performance measures. Primary obstacles cited were government red tape and long and complicated requests for proposals (RFPs). The majority of 'common' complaints occur when SMEs have questions about the federal procurement process. Witness responses included use of outcome-based rather than prescriptive procurement practices, more agile procurement, simplified RFPs, making payment within 30 days a procurement priority. Risk mitigation strategies included provision of procurement officers to assess risks and opportunities for businesses and development of more agile procurement procedures and processes. Recommendations to enhance program design included: improved definitional consistency of qualifiers and selection criteria, better co-ordination across agencies; clarification about how SME suppliers benefit from federal contracting; goal setting; specification of categories that are most suitable for women-owned businesses; and, increasing primary contractor awareness about the importance of subcontract relationships. Recommendations also included third-party certification of eligible firms and the need to enhance SMEs’ financial literacy to reduce financial errors. Finally, there remains the need for clear and consistent pre-program statistics to establish baselines (by sector, issuing department) performance measures, targets based on percentage of contracts granted, value of contract, percentage of target employee (women, indigenous), and community benefits including hiring local employees. The study advances strategies to enhance federal procurement programs to facilitate socio-economic policy objectives.Keywords: procurement, small business, policy, women
Procedia PDF Downloads 113890 Effect of Urbanization on Basic Environmental Components
Authors: Sehba Saleem
Abstract:
A country with a spread of only 2.4 percent of the total land surface area of the world, India is home to 17.5 percent of the world population. This fact is sufficient enough to delineate as well as simultaneously bringing to fore the paradox which exists between land and human population. It is evident that the relation which exists between both is an unequal one where the latter has the ability to multiply self, but the former remains constant. This unequal relation that exists has very significantly contributed to the depletion in the quality of land. This is because construction of every kind and nature has been forced on the land to assimilate the ever increasing population which has altered the not only the land but the environment which existed on the land. To get behind this alteration, it becomes imperative to delve into concepts like urbanization, ecology and their amalgam viz. urban ecology. The concept of urban ecology does not only involve study of buildings, flora, and fauna which exists in a given land space. It goes further into establishing a relation between construction on land and the consequent harm, which the same is causing to the environmental resources like air, water etc. This paper shall try cerebrating concepts of urbanization, ecology and urban ecology in the light of relation which exists between man and nature.Keywords: asymmetrical growth, environment, urbanisation, urban space
Procedia PDF Downloads 334889 Energy Efficiency Measures in Canada’s Iron and Steel Industry
Authors: A. Talaei, M. Ahiduzzaman, A. Kumar
Abstract:
In Canada, an increase in the production of iron and steel is anticipated for satisfying the increasing demand of iron and steel in the oil sands and automobile industries. It is predicted that GHG emissions from iron and steel sector will show a continuous increase till 2030 and, with emissions of 20 million tonnes of carbon dioxide equivalent, the sector will account for more than 2% of total national GHG emissions, or 12% of industrial emissions (i.e. 25% increase from 2010 levels). Therefore, there is an urgent need to improve the energy intensity and to implement energy efficiency measures in the industry to reduce the GHG footprint. This paper analyzes the current energy consumption in the Canadian iron and steel industries and identifies energy efficiency opportunities to improve the energy intensity and mitigate greenhouse gas emissions from this industry. In order to do this, a demand tree is developed representing different iron and steel production routs and the technologies within each rout. The main energy consumer within the industry is found to be flared heaters accounting for 81% of overall energy consumption followed by motor system and steam generation each accounting for 7% of total energy consumption. Eighteen different energy efficiency measures are identified which will help the efficiency improvement in various subsector of the industry. In the sintering process, heat recovery from coolers provides a high potential for energy saving and can be integrated in both new and existing plants. Coke dry quenching (CDQ) has the same advantages. Within the blast furnace iron-making process, injection of large amounts of coal in the furnace appears to be more effective than any other option in this category. In addition, because coal-powered electricity is being phased out in Ontario (where the majority of iron and steel plants are located) there will be surplus coal that could be used in iron and steel plants. In the steel-making processes, the recovery of Basic Oxygen Furnace (BOF) gas and scrap preheating provides considerable potential for energy savings in BOF and Electric Arc Furnace (EAF) steel-making processes, respectively. However, despite the energy savings potential, the BOF gas recovery is not applicable in existing plants using steam recovery processes. Given that the share of EAF in steel production is expected to increase the application potential of the technology will be limited. On the other hand, the long lifetime of the technology and the expected capacity increase of EAF makes scrap preheating a justified energy saving option. This paper would present the results of the assessment of the above mentioned options in terms of the costs and GHG mitigation potential.Keywords: Iron and Steel Sectors, Energy Efficiency Improvement, Blast Furnace Iron-making Process, GHG Mitigation
Procedia PDF Downloads 396888 Inter-Cell-Interference Mitigation Scheme in Wireless Communication System
Authors: Jae-Hyun Ro, Yong-Jun Kim, Eui-Hak Lee, Hyoung-Kyu Song
Abstract:
Mobile communication has been developing very rapidly since it appeared. However, although mobile communication market has been rapidly developing, many mobile users are not offered good quality of service (QoS) due to increment of the amount of data traffic. Recently, femtocell is very hot issue in mobile communication because femtocell can solve the problems of data traffic and offer better QoS to mobile users. However, the deployment of femtocell in existing macrocell coverage area is not so simple due to the influence of inter-cell-interference (ICI) with existing macrocell. Thus, this paper proposes femtocell scheme which is able to reduce the influence of ICI to deploy femtocell easily.Keywords: CDD, femtocell, interference, macrocell, OFDM
Procedia PDF Downloads 502887 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 112886 The Economic System (Islam) and Riba's Prohibition on Historical Perspective
Authors: Risanda Alirastra Budiantoro, Riesanda Najmi Sasmita, Sri Herianingrum
Abstract:
Allah has given the guidance in the form of Islam for Muslim to take and lead all the aspects of life including the economic activity. The Islamic economic system is believed to be the answer to the economic problems that exist at this time. The goal is to achieve falah in kaffah by not doing some economic activities that are in violation as prescribed by Islam. An example for this is riba. Discourse on riba can be said ‘classical’ both in the development of Islamic thought and in Islamic civilization because riba often occurs in all aspects of public life, especially economic transactions (in Islam called muamalah). Riba is an additional retrieval, either in a sale and purchase transaction or lending in a false or contrary to the principle of muamalah in Islam. Prohibition of riba is obtained from various sources by the Qur'an and Hadith Rasulullah SAW, so the scholars firmly and clearly defined the prohibition of riba because there are exploitative elements that can harm the others. So, this study is aimed to identify Islamic economic system and the prohibition of riba in historical perspective. From the results of this study, it is expected to be a good reference for the reader to understand the Islamic economic system and riba in the future.Keywords: economics system, riba, historical perspective, economy
Procedia PDF Downloads 318885 A Pattern Practise for Awareness Educations on Information Security: Information Security Project
Authors: Fati̇h Apaydin
Abstract:
Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.Keywords: computer, information security, education, technology, development
Procedia PDF Downloads 594884 Kocuria Keratitis: A Rare and Diagnostically Challenging Infection of the Cornea
Authors: Sarah Jacqueline Saram, Diya Baker, Jaishree Gandhewar
Abstract:
Named after the Slovakian microbiologist, Miroslav Kocur, the Kocuria spp. are an emerging cause of significant human infections. Their predilection for immunocompromised states, such as malignancy and metabolic disorders, is highlighted in the literature. The coagulase-negative, gram-positive cocci are commensals found in the skin and oropharynx of humans, and their growing presence as responsible organisms in ocular infections cannot be ignored. The severe, rapid, and unrelenting disease course associated with Kocuria keratitis is underlined in the literature. However, the clinical features are variable, which may impede making a diagnosis. Here, we describe a first account of an initial misdiagnosis due to reliance on subjective analysis features on a confocal microscope, which ultimately led to a delay in commencing the correct treatment. In documenting this, we hope to underline to clinicians the difficulties in recognising a Kocuria Rhizophilia keratitis due to its similar clinical presentation to an Acanthamoeba Keratitis, thus emphasizing the need for early investigations such as corneal scrapes to secure the correct diagnosis and prevent further harm and vision loss for the patient.Keywords: keratitis, cornea, infection, rare, Kocuria
Procedia PDF Downloads 54883 Dynamical Characteristics of Interaction between Water Droplet and Aerosol Particle in Dedusting Technology
Authors: Ding Jue, Li Jiahua, Lei Zhidi, Weng Peifen, Li Xiaowei
Abstract:
With the rapid development of national modern industry, people begin to pay attention to environmental pollution and harm caused by industrial dust. Based on above, a numerical study on the dedusting technology of industrial environment was conducted. The dynamic models of multicomponent particles collision and coagulation, breakage and deposition are developed, and the interaction of water droplet and aerosol particle in 2-Dimension flow field was researched by Eulerian-Lagrangian method and Multi-Monte Carlo method. The effects of the droplet scale, movement speed of droplet and the flow field structure on scavenging efficiency were analyzed. The results show that under the certain condition, 30μm of droplet has the best scavenging efficiency. At the initial speed 1m/s of droplets, droplets and aerosol particles have more time to interact, so it has a better scavenging efficiency for the particle.Keywords: water droplet, aerosol particle, collision and coagulation, multi-monte carlo method
Procedia PDF Downloads 306