Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5490

Search results for: general attacks

5160 Children with Autistic Spectrum Disorders in Co-Taught Classes in Greece: Teachers’ View

Authors: Tryfon Mavropalias, Anastasia Alevriadou

Abstract:

Co-teaching is a relatively recent model of providing teaching services to students with disabilities in Greece. According to recent studies, it seems that the largest number of students who take part in the Greek co-teaching programme are children with Autistic Spectrum Disorders (ASD). The aim of the suggested study is to investigate the effectiveness and usefulness of co-teaching to students with ASD as well as skills students with ASD develop during co-teaching in primary education classes. To conduct the research, quantitative method of research was used, with the means of research being a questionnaire including open and close type questions. The sample of this research consists of 142 primary school co-teachers from all over Northern Greece (71 general education teachers and 71 special education teachers). Given the results, it was concluded that co-teachers believe that including and educating children with Autistic Spectrum Disorders in the general class benefits those who autism is measured from the middle to the upper end of the spectrum. Additionally, children develop social skills first, followed by emotional and cognitive skills. Ultimately, educators declared that they are prepared only to a limited degree to effectively support students with Autistic Spectrum Disorders in general classes.

Keywords: Autistic spectrum disorders, co-teaching, co-teachers, co-taught class

Procedia PDF Downloads 328
5159 A General Framework for Knowledge Discovery from Echocardiographic and Natural Images

Authors: S. Nandagopalan, N. Pradeep

Abstract:

The aim of this paper is to propose a general framework for storing, analyzing, and extracting knowledge from two-dimensional echocardiographic images, color Doppler images, non-medical images, and general data sets. A number of high performance data mining algorithms have been used to carry out this task. Our framework encompasses four layers namely physical storage, object identification, knowledge discovery, user level. Techniques such as active contour model to identify the cardiac chambers, pixel classification to segment the color Doppler echo image, universal model for image retrieval, Bayesian method for classification, parallel algorithms for image segmentation, etc., were employed. Using the feature vector database that have been efficiently constructed, one can perform various data mining tasks like clustering, classification, etc. with efficient algorithms along with image mining given a query image. All these facilities are included in the framework that is supported by state-of-the-art user interface (UI). The algorithms were tested with actual patient data and Coral image database and the results show that their performance is better than the results reported already.

Keywords: active contour, Bayesian, echocardiographic image, feature vector

Procedia PDF Downloads 420
5158 Non-State Actors and Their Liabilities in International Armed Conflicts

Authors: Shivam Dwivedi, Saumya Kapoor

Abstract:

The Israeli Supreme Court in Public Committee against Torture in Israel v. Government of Israel observed the presence of non-state actors in cross-border terrorist activities thereby making the role of non-state actors in terrorism the center of discussion under the scope of International Humanitarian Law. Non-state actors and their role in a conflict have also been traversed upon by the Tadic case decided by the International Criminal Tribunal for the former Yugoslavia. However, there still are lacunae in International Humanitarian Law when it comes to determining the nature of a conflict, especially when non-state groups act within the ambit of various states, for example, Taliban in Afghanistan or the groups operating in Ukraine and Georgia. Thus, the objective of writing this paper would be to observe the ways by which non-state actors particularly terrorist organizations could be brought under the ambit of Additional Protocol I. Additional Protocol I is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of international conflicts which basically outlaws indiscriminate attacks on civilian populations, forbids conscription of children and preserves various other human rights during the war. In general, the Additional Protocol I reaffirms the provisions of the original four Geneva Conventions. Since provisions of Additional Protocol I apply only to cases pertaining to International Armed Conflicts, the answer to the problem should lie in including the scope for ‘transnational armed conflict’ in the already existing definition of ‘International Armed Conflict’ within Common Article 2 of the Geneva Conventions. This would broaden the applicability of the provisions in cases of non-state groups and render an international character to the conflict. Also, the non-state groups operating or appearing to operate should be determined by the test laid down in the Nicaragua case by the International Court of Justice and not under the Tadic case decided by the International Criminal Tribunal for Former Yugoslavia in order to provide a comprehensive system to deal with such groups. The result of the above proposal, therefore, would enhance the scope of the application of International Humanitarian Law to non-state groups and individuals.

Keywords: Geneva Conventions, International Armed Conflict, International Humanitarian Law, non-state actors

Procedia PDF Downloads 353
5157 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 374
5156 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 382
5155 A Physical Theory of Information vs. a Mathematical Theory of Communication

Authors: Manouchehr Amiri

Abstract:

This article introduces a general notion of physical bit information that is compatible with the basics of quantum mechanics and incorporates the Shannon entropy as a special case. This notion of physical information leads to the Binary data matrix model (BDM), which predicts the basic results of quantum mechanics, general relativity, and black hole thermodynamics. The compatibility of the model with holographic, information conservation, and Landauer’s principles are investigated. After deriving the “Bit Information principle” as a consequence of BDM, the fundamental equations of Planck, De Broglie, Beckenstein, and mass-energy equivalence are derived.

Keywords: physical theory of information, binary data matrix model, Shannon information theory, bit information principle

Procedia PDF Downloads 138
5154 An Experiment of Three-Dimensional Point Clouds Using GoPro

Authors: Jong-Hwa Kim, Mu-Wook Pyeon, Yang-dam Eo, Ill-Woong Jang

Abstract:

Construction of geo-spatial information recently tends to develop as multi-dimensional geo-spatial information. People constructing spatial information is also expanding its area to the general public from some experts. As well as, studies are in progress using a variety of devices, with the aim of near real-time update. In this paper, getting the stereo images using GoPro device used widely also to the general public as well as experts. And correcting the distortion of the images, then by using SIFT, DLT, is acquired the point clouds. It presented a possibility that on the basis of this experiment, using a video device that is readily available in real life, to create a real-time digital map.

Keywords: GoPro, SIFT, DLT, point clouds

Procedia PDF Downloads 444
5153 A General Framework for Knowledge Discovery Using High Performance Machine Learning Algorithms

Authors: S. Nandagopalan, N. Pradeep

Abstract:

The aim of this paper is to propose a general framework for storing, analyzing, and extracting knowledge from two-dimensional echocardiographic images, color Doppler images, non-medical images, and general data sets. A number of high performance data mining algorithms have been used to carry out this task. Our framework encompasses four layers namely physical storage, object identification, knowledge discovery, user level. Techniques such as active contour model to identify the cardiac chambers, pixel classification to segment the color Doppler echo image, universal model for image retrieval, Bayesian method for classification, parallel algorithms for image segmentation, etc., were employed. Using the feature vector database that have been efficiently constructed, one can perform various data mining tasks like clustering, classification, etc. with efficient algorithms along with image mining given a query image. All these facilities are included in the framework that is supported by state-of-the-art user interface (UI). The algorithms were tested with actual patient data and Coral image database and the results show that their performance is better than the results reported already.

Keywords: active contour, bayesian, echocardiographic image, feature vector

Procedia PDF Downloads 396
5152 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 298
5151 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 112
5150 Developing the Morphological Field of Problem Context to Assist Multi-Methodology in Operations Research

Authors: Mahnaz Hosseinzadeh, Mohammad Reza Mehregan

Abstract:

In this paper, we have developed a morphological field to assist multi- methodology (combining methodologies together in whole or part) in Operations Research (OR) for the problem contexts in Iranian organizations. So, we have attempted to identify some dimensions for problem context according to Iranian organizational problems. Then, a general morphological program is designed which helps the OR practitioner to determine the suitable OR methodology as output for any configuration of conditions in a problem context as input and to reveal the fields necessary to be improved in OR. Applying such a program would have interesting results for OR practitioners.

Keywords: hard, soft and emancipatory operations research, General Morphological Analysis (GMA), multi-methodology, problem context

Procedia PDF Downloads 281
5149 The Impact of the General Data Protection Regulation on Human Resources Management in Schools

Authors: Alexandra Aslanidou

Abstract:

The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.

Keywords: general data protection regulation, human resource management, educational system

Procedia PDF Downloads 80
5148 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 476
5147 Einstein’s General Equation of the Gravitational Field

Authors: A. Benzian

Abstract:

The generalization of relativistic theory of gravity based essentially on the principle of equivalence stipulates that for all bodies, the grave mass is equal to the inert mass which leads us to believe that gravitation is not a property of the bodies themselves, but of space, and the conclusion that the gravitational field must curved space-time what allows the abandonment of Minkowski space (because Minkowski space-time being nonetheless null curvature) to adopt Riemannian geometry as a mathematical framework in order to determine the curvature. Therefore the work presented in this paper begins with the evolution of the concept of gravity then tensor field which manifests by Riemannian geometry to formulate the general equation of the gravitational field.

Keywords: inertia, principle of equivalence, tensors, Riemannian geometry

Procedia PDF Downloads 132
5146 Nature of the Prohibition of Discrimination on Grounds of Sexual Orientation in EU Law

Authors: Anna Pudlo

Abstract:

The EU law encompasses many supranational legal systems (EU law, ECHR, international public law and constitutional traditions common to the Member States) which guarantee the protection of fundamental rights, with partly overlapping scopes of applicability, various principles of interpretation of legal norms and a different hierarchy. In EU law, the prohibition of discrimination on grounds of sexual orientation originates from both the primary and secondary EU legislation. At present, the prohibition is considered to be a fundamental right in pursuance of Article 21 of the Charter, but the Court has not yet determined whether it is a right or a principle within the meaning of the Charter. Similarly, the Court has not deemed this criterion to be a general principle of EU law. The personal and materials scope of the prohibition of discrimination on grounds of sexual orientation based on Article 21 of the Charter requires each time to be specified in another legal act of the EU in accordance with Article 51 of the Charter. The effect of the prohibition of discrimination on grounds of sexual orientation understood as above will be two-fold, for the States and for the Union. On the one hand, one may refer to the legal instruments of review of EU law enforcement by a Member State laid down in the Treaties. On the other hand, EU law does not provide for the right to individual petition. Therefore, it is the duty of the domestic courts to protect the right of a person not to be discriminated on grounds of sexual orientation in line with the national procedural rules, within the limits and in accordance with the principles set out in EU law, in particular in Directive 2000/78. The development of the principle of non-discrimination in the Court’s case-law gives rise to certain doubts as to its applicability, namely whether the principle as the general principle of EU law may be granted an autonomous character, with respect to the applicability to matters not included in the personal or material scope of the Directives, although within the EU’s competence. Moreover, both the doctrine and the opinions of the Advocates-General have called for the general competence of CJEU with regard to fundamental rights which, however, might lead to a violation of the principle of separation of competence. The aim of this paper is to answer the question what is the nature of the prohibition of discrimination on grounds of sexual orientation in EU law (a general principle in EU law, or a principle or right under the Charter’s terminology). Therefore, the paper focuses on the nature of Article 21 of the Charter (a right or a principle) and the scope (personal and material) of the prohibition of discrimination based on sexual orientation in EU law as well as its effect (vertical or horizontal). The study has included the provisions of EU law together with the relevant CJEU case-law.

Keywords: EU law, EU principles, non-discrimination in EU law, Charter of the Fundamental Rights

Procedia PDF Downloads 220
5145 Self-Esteem, Self-Efficacy and Psychological Distress among the High School Teachers in Afghanistan

Authors: Mustafa Jahanara

Abstract:

The purpose of the research was to study the relationship between self-esteem, self-Efficacy with psychological distress in the high school teachers. A total of 245 teachers (92 male and 153 female) in the high school of Kabul and Mazar-e-Sharif from Afghanistan completed inventories General Self-Efficacy, Rosenberg Self-Esteem Scale, and General Health Questionnaire-12 and that assessed their Self-Efficacy, self-esteem with psychological distress. Correlational analysis showed that self-efficacy and self-esteem were significantly and positively correlated with each other. The results of the study indicated that psychological distress is negatively related to self-esteem, and self-efficacy. However, the findings suggest that self-esteem, and self-efficacy could influence on mental health.

Keywords: high school teachers, self-esteem, self-efficacy, psychological distress

Procedia PDF Downloads 346
5144 The Orthodontic Management of Multiple Tooth Agenesis with Macroglossia in Adult Patient: Case Report

Authors: Yanuarti Retnaningrum, Cendrawasih A. Farmasyanti, Kuswahyuning

Abstract:

Orthodontists find challenges in treating patients who have cases of macroglossia and multiple tooth agenesis because difficulties in determining the causes, formulating a diagnosis and the potential for relapse after treatment. Definition of macroglossia is a tongue enlargement due to muscle hypertrophy, tumor or an endocrine disturbance. Macroglossia may cause many problems such as anterior proclination of upper and lower incisors, development of general diastema and anterior and/ or posterior open bite. Treatment for such patients with multiple tooth agenesis and macroglossia can be complex and must consider orthodontic and/or surgical interventions. This article discusses an orthodontic non surgical approach to a patient with a general diastema in both maxilla and mandible associated with multiple tooth agenesis and macroglossia. Fixed orthodontic therapy with straightwire appliance was used for space closure in anterior region of maxilla and mandible, also to create a space suitable for future prosthetic restoration. After 12 months treatment, stable and functional occlusal relationships was achieved, although still have edentulous area in both maxilla and mandible. At the end of the orthodontic treatment was obtained with correct overbite and overjet values. After removal of the brackets, a maxillary and mandibular removable retainer combine with artificial tooth were placed for retention.

Keywords: general diastema, macroglossia, space closure, tooth agenesis

Procedia PDF Downloads 157
5143 Electability of Stable Insiders’ Coalition Governments

Authors: Tryphon Kollintzas, Lambros Pechlivanos

Abstract:

In this paper, we formulate a general equilibrium theory that explains the existence and stability of democratically elected governments that support certain groups of individuals in society (insiders) to the detriment of everybody else (outsiders), even if the latter constitute a majority. The vehicle is a dynamic general equilibrium model, where insiders get monopoly rents and outsiders get less than what they would have gotten under a common good regime. We construct such political economy equilibria, and we identify the conditions under which such political regimes (coalitions of insiders): (a) can safeguard against opportunistic behavior (i.e., do not fall from within) and (b) may come to power in the first place (i.e., manage to get elected). To that end, we highlight the role of perception manipulation and self-serving bias as a gluing device to garner an electable coalition.

Keywords: insiders, coalition governments, stability, electability, politico-economic equilibrium, perceptions manipulation

Procedia PDF Downloads 40
5142 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 103
5141 Improving the Weekend Handover in General Surgery: A Quality Improvement Project

Authors: Michael Ward, Eliana Kalakouti, Andrew Alabi

Abstract:

Aim: The handover process is recognized as a vulnerable step in the patient care pathway where errors are likely to occur. As such, it is a major preventable cause of patient harm due to human factors of poor communication and systematic error. The aim of this study was to audit the general surgery department’s weekend handover process compared to the recommended criteria for safe handover as set out by the Royal College of Surgeons (RCS). Method: A retrospective audit of the General Surgery department’s Friday patient lists and patient medical notes used for weekend handover in a London-based District General Hospital (DGH). Medical notes were analyzed against RCS's suggested criteria for handover. A standardized paper weekend handover proforma was then developed in accordance with guidelines and circulated in the department. A post-intervention audit was then conducted using the same methods for cycle 1. For cycle 2, we introduced an electronic weekend handover tool along with Electronic Patient Records (EPR). After a one-month period, a second post-intervention audit was conducted. Results: Following cycle 1, the paper weekend handover proforma was only used in 23% of patient notes. However, when it was used, 100% of them had a plan for the weekend, diagnosis and location but only 40% documented potential discharge status and 40% ceiling of care status. Qualitative feedback was that it was time-consuming to fill out. Better results were achieved following cycle 2, with 100% of patient notes having the electronic proforma. Results improved with every patient having documented ceiling of care, discharge status and location. Only 55% of patients had a past surgical history; however, this was still an increase when compared to paper proforma (45%). When comparing electronic versus paper proforma, there was an increase in documentation in every domain of the handover outlined by RCS with an average relative increase of 1.72 times (p<0.05). Qualitative feedback was that the autofill function made it easy to use and simple to view. Conclusion: These results demonstrate that the implementation of an electronic autofill handover proforma significantly improved handover compliance with RCS guidelines, thereby improving the transmission of information from week-day to weekend teams.

Keywords: surgery, handover, proforma, electronic handover, weekend, general surgery

Procedia PDF Downloads 134
5140 Assessment of Implementation of the Health and Safety Contents of the Nigerian Factories Act by Small and Medium Scale Industries in Anambra State, Nigeria

Authors: Vivian Uchechi Okpala

Abstract:

Background: Millions of workers die every year as a result of occupational hazards, accidents and injuries, which are as a result of non- compliance to the laws or legislations guiding the health, safety and welfare of workers in the industries. This and many more lead to the assessment of implementation of the health and safety contents of the Nigerian Factories Act (NFA) by small and medium scale industries in Anambra State. Objectives: The study is aimed at achieving the following specific objectives; to assess the extent of implementation of Part-II Health and Part -III Safety (General Provisions), implementation of Part II Health and Part -III Safety (General Provisions Nigerian Factories Acts based on the age of the industries, locations of the industries and level of education of the workers of the small and medium scale industries Methods: the research design that was used for this study was descriptive survey research design, Area of this study was Anambra state, The population for this study comprised 180 chairmen/presidents of union workers of manufacturing industries in Anambra State, The instrument used for this study was structured questionnaire titled ‘assessment of implementation of NFA health and safety contents by small and medium scale industries, results: From the analysis, the following findings were made: Results: The medium scale industries implemented the Part-II Health and Part III Safety (General provisions) better than the small scale industries in Anambra state, the age of the industries, location of the industries and the level of education of the workers in the industries significantly influenced the implementation of the Part III Safety (General Provisions) of NFA, the location of the industries significantly influenced the implementation of the Part II-Health (General Provisions) of NFA. Conclusion: there was generally a certain level of implementation of the factories Act, there is need for more improvement, strict inspection by the regulatory agencies. Implications of the study were highlighted and several suggestions for further studies were made. Based on the findings, several recommendations were made including that the Ministry of Labour and Productivity and the Ministry of Health should strengthen planned information, strict policies to sanction the offenders. Keywords: Occupational Health and Safety, Nigerian Factories Act

Keywords: occupational health and safety, Nigerian factories act, workers, welfare

Procedia PDF Downloads 122
5139 A Psychosocial Impact of the Covid-19 Pandemic Among Frontline Workers and General Populations in Kathmandu

Authors: Nabin Prasad Joshi

Abstract:

A new variant of the coronavirus family found in the Wuhan city market of China is causing serious harm to human beings. After the WHO decided COVID-19 was a pandemic situation, everyone started to measure the prevention of infectious diseases according to WHO guidelines. It includes social distancing, isolation, quarantine, lockdown, sanitation, and masking, respectively. During this time, the researcher has observed the difficulties of cultivating the new normal in people in Nepal. People have perceived the single coronavirus differently; common populations and frontline workers have different perceptions of coronavirus. The researcher started to measure the psychosocial impact of the COVID-19 pandemic on frontline workers and general populations in Kathmandu valley. The total number of sample units for this research is 82; it includes 52 general populations and 30 frontline workers. These sample units are selected through convenient sampling and purposive sampling, respectively. This research is based on descriptive and exploratory design. DASS-21 of the Nepali version is a comprehensive data collection tool for depression, anxiety, and stress measurement in this research, and simultaneously the psychosocial checklist, key-informant interview, and case study have been done. Quantitative data are analyzed with the help of excel, and qualitative data are through thematic analysis. The study has shown that the occurrence of psychosocial issues among frontline workers is greater than in general populations. It is found that the informants with higher education status have greater psychosocial issues in comparison to low education status. In the context of a pandemic, family/friends’ support can function as a protective factor when at adequate levels.

Keywords: anxiety, depression, isolation, lockdown

Procedia PDF Downloads 55
5138 Correlation between General Intelligence, Emotional Intelligence and Stress Response after One Month Practice of Moderate Intensity Physical Exercise

Authors: Mohita Singh, Sunil Sachdev, Amrita Singh

Abstract:

Background and Aim: Physical aerobic exercises promote positive changes in one’s mental health, intelligence, and ability to cope with stressful encounters. The present study was designed to explore the correlation between intelligence and stress parameters and to assess the correlation between the same parameters after the practice of one month of moderate-intensity physical exercise. Method: The study was conducted on thirty-five healthy male volunteer students to assess the correlation between stress parameters in subjects with varying level of general intelligence (GI) and emotional intelligence (EI). Correlation studies were again conducted after one month between the same parameters to evaluate the effect of moderate-intensity physical exercise (MIPE). Baseline values were recorded using standard scales. Result: IQ and EQ correlated negatively with both acute and chronic stress parameters and positively with each other. A positive correlation was found between acute and chronic stress. With the practice of one month of moderate-intensity physical exercise, there was significant increment between the parameters under study and hence improved results. Conclusion: MIPE improved correlation between GI, EI, stress parameters, and thus reduced stress and improved intelligence.

Keywords: emotional intelligence, general intelligence, moderate intensity physical exercise, stress response

Procedia PDF Downloads 123
5137 Quality of Life in People with Hearing Loss: A Study of Patients Referred to an Audiological Service

Authors: Peder O. Laugen Heggdal, Oyvind Nordvik, Jonas Brannstrom, Flemming Vassbotn, Anne Kari Aarstad, Hans Jorgen Aarstad

Abstract:

Background: Hearing loss (HL) affect people of all ages and stages in life. To author's best knowledge, if patients with an HL have reduced Generic Quality of life (QoL), has yet not been answered. Aim: The aim of the present study was to investigate the relationship between HL and generic and disease-specific Health Related Quality of Life (HRQoL) in adult patients (aged 18–78 years) with an HL, seeking Hearing Aid (HA). Material and Methods: 158 adult (aged 18-78 years) patients with HL, referred for HA fitting at Haukeland University Hospital in western Norway, participated in the study. Both first-time users, as well as patients referred for HA renewals, were included. First-time users had been pre-examined by an Ear Nose and Throat specialist. The questionnaires were answered before the actual HA fitting procedure. The pure-tone average (PTA; frequencies 0.5, 1, 2 and 4 kHz) was determined for each ear. The generic European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Questionnaire general part and a shortened version of the Abbreviated Profile of Hearing Aid Benefit (APHAB) were answered. In addition, EORTC HRQoL answers from a general population and patients with former head and neck cancer served as comparison. Results: In general, no lowered HRQoL scores were determined among HL patients compared to the general population. Patients with unilateral HL to some extent showed lower HRQoL than those with bilateral HL (social function and fatigue). The APHAB scores correlated significantly with the EORTC HRQoL scores. By stepwise linear regression analysis, the APHAB scores were scored secondary to PTA (best ear), cognitive and physical function. Conclusion: HRQoL scores in HL patients, in general, seems to be at the population level, but the unilateral HL patients scored to some extent lower than the bilateral HI patients. APHAB and generic QoL scores levels are associated. Both HRQoL and APHAB scores are generated more complexly than anticipated.

Keywords: quality of life, hearing loss, hearing impairment, distress, depression, anxiety, hearing aid

Procedia PDF Downloads 278
5136 Genetic Data of Deceased People: Solving the Gordian Knot

Authors: Inigo de Miguel Beriain

Abstract:

Genetic data of deceased persons are of great interest for both biomedical research and clinical use. This is due to several reasons. On the one hand, many of our diseases have a genetic component; on the other hand, we share genes with a good part of our biological family. Therefore, it would be possible to improve our response considerably to these pathologies if we could use these data. Unfortunately, at the present moment, the status of data on the deceased is far from being satisfactorily resolved by the EU data protection regulation. Indeed, the General Data Protection Regulation has explicitly excluded these data from the category of personal data. This decision has given rise to a fragmented legal framework on this issue. Consequently, each EU member state offers very different solutions. For instance, Denmark considers the data as personal data of the deceased person for a set period of time while some others, such as Spain, do not consider this data as such, but have introduced some specifically focused regulations on this type of data and their access by relatives. This is an extremely dysfunctional scenario from multiple angles, not least of which is scientific cooperation at the EU level. This contribution attempts to outline a solution to this dilemma through an alternative proposal. Its main hypothesis is that, in reality, health data are, in a sense, a rara avis within data in general because they do not refer to one person but to several. Hence, it is possible to think that all of them can be considered data subjects (although not all of them can exercise the corresponding rights in the same way). When the person from whom the data were obtained dies, the data remain as personal data of his or her biological relatives. Hence, the general regime provided for in the GDPR may apply to them. As these are personal data, we could go back to thinking in terms of a general prohibition of data processing, with the exceptions provided for in Article 9.2 and on the legal bases included in Article 6. This may be complicated in practice, given that, since we are dealing with data that refer to several data subjects, it may be complex to refer to some of these bases, such as consent. Furthermore, there are theoretical arguments that may oppose this hypothesis. In this contribution, it is shown, however, that none of these objections is of sufficient substance to delegitimize the argument exposed. Therefore, the conclusion of this contribution is that we can indeed build a general framework on the processing of personal data of deceased persons in the context of the GDPR. This would constitute a considerable improvement over the current regulatory framework, although it is true that some clarifications will be necessary for its practical application.

Keywords: collective data conceptual issues, data from deceased people, genetic data protection issues, GDPR and deceased people

Procedia PDF Downloads 137
5135 Partner Selection for Horizontal Logistic Cooperation

Authors: Mario Winkelhaus, Franz Vallée

Abstract:

Many companies see horizontal cooperation as a promising possibility to increase their efficiency in outbound logistics. The selection of suitable partners has particular importance in the formation of horizontal cooperation. Up until now, literature mainly focused on general applicable methods for the identification of cooperation partners without a closer examination of the specific area where the cooperation takes place. Thus, specific criteria as a basis for the partner selection in the field of logistics cooperation are missing. To close this scientific gap, an explorative research approach is used to answer the open question of the article. To collect the needed criteria, a qualitative experiment with 20 participants from 16 companies was done. Within this workshop, general criteria, as well as sector-specific requirements, have been identified which were integrated in a partner selection model.

Keywords: horizontal cooperation, logistics cooperation partnering criteria, partner selection

Procedia PDF Downloads 403
5134 A Review on the Vulnerability of Rural-Small Scale Farmers to Insect Pest Attacks in the Eastern Cape Province, South Africa

Authors: Nolitha L. Skenjana, Bongani P. Kubheka, Maxwell A. Poswal

Abstract:

The Eastern Cape Province of South Africa is characterized by subsistence farming, which is mostly distributed in the rural areas of the province. It is estimated that cereal crops such as maize and sorghum, and vegetables such as cabbage are grown in more than 400.000 rural households, with maize being the most dominant crop. However, compared to commercial agriculture, small-scale farmers receive minimal support from research and development, limited technology transfer on the latest production practices and systems and have poor production infrastructure and equipment. Similarly, there is limited farmers' appreciation on best practices in insect pest management and control. The paper presents findings from the primary literature and personal observations on insect pest management practices of small-scale farmers in the province. Inferences from literature and personal experiences in the production areas have led to a number of deductions regarding the level of exposure and extent of vulnerability. Farmers' pest management practices, which included not controlling at all though there is a pest problem, resulted in their crop stands to be more vulnerable to pest attacks. This became more evident with the recent brown locust, African armyworm, and Fall armyworm outbreaks, and with the incidences of opportunistic phytophagous insects previously collected on wild hosts only, found causing serious damages on crops. In most of these occurrences, damage to crops resulted in low or no yield. Improvements on farmers' reaction and response to pest problems were only observed in areas where focused awareness campaigns and trainings on specific pests and their management techniques were done. This then calls for a concerted effort from all role players in the sphere of small-scale crop production, to train and equip farmers with relevant skills, and provide them with information on affordable and climate-smart strategies and technologies in order to create a state of preparedness. This is necessary for the prevention of substantial crop losses that may exacerbate food insecurity in the province.

Keywords: Eastern Cape Province, small-scale farmers, insect pest management, vulnerability

Procedia PDF Downloads 119
5133 On Estimating the Headcount Index by Using the Logistic Regression Estimator

Authors: Encarnación Álvarez, Rosa M. García-Fernández, Juan F. Muñoz, Francisco J. Blanco-Encomienda

Abstract:

The problem of estimating a proportion has important applications in the field of economics, and in general, in many areas such as social sciences. A common application in economics is the estimation of the headcount index. In this paper, we define the general headcount index as a proportion. Furthermore, we introduce a new quantitative method for estimating the headcount index. In particular, we suggest to use the logistic regression estimator for the problem of estimating the headcount index. Assuming a real data set, results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the traditional estimator of the headcount index.

Keywords: poverty line, poor, risk of poverty, Monte Carlo simulations, sample

Procedia PDF Downloads 403
5132 Hypergeometric Solutions to Linear Nonhomogeneous Fractional Equations with Spherical Bessel Functions of the First Kind

Authors: Pablo Martin, Jorge Olivares, Fernando Maass

Abstract:

The use of fractional derivatives to different problems in Engineering and Physics has been increasing in the last decade. For this reason, we have here considered partial derivatives when the integral is a spherical Bessel function of the first kind in both regular and modified ones simple initial conditions have been also considered. In this way, the solution has been found as a combination of hypergeometric functions. The case of a general rational value for α of the fractional derivative α has been solved in a general way for alpha between zero and two. The modified spherical Bessel functions of the first kind have been also considered and how to go from the regular case to the modified one will be also shown.

Keywords: caputo fractional derivatives, hypergeometric functions, linear differential equations, spherical Bessel functions

Procedia PDF Downloads 300
5131 Smart Structures for Cost Effective Cultural Heritage Preservation

Authors: Tamara Trček Pečak, Andrej Mohar, Denis Trček

Abstract:

This article investigates the latest technological means, which deploy smart structures that are based on (advanced) wireless sensors technologies and ubiquitous computing in general in order to support the above mentioned decision making. Based on two years of in-field research experiences it gives their analysis for these kinds of purposes and provides appropriate architectures and architectural solutions. Moreover, the directions for future research are stated, because these technologies are currently the most promising ones to enable cost-effective preservation of cultural heritage not only in uncontrolled places, but also in general.

Keywords: smart structures, wireless sensors, sensors networks, green computing, cultural heritage preservation, monitoring, cost effectiveness

Procedia PDF Downloads 422