Search results for: vulnerability recurrence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 899

Search results for: vulnerability recurrence

569 Pollutant Loads of Urban Runoff from a Mixed Residential-Commercial Catchment

Authors: Carrie Ho, Tan Yee Yong

Abstract:

Urban runoff quality for a mixed residential-commercial land use catchment in Miri, Sarawak was investigated for three storm events in 2011. Samples from the three storm events were tested for five water quality parameters, Namely, TSS, COD, BOD5, TP, and Pb. Concentration of the pollutants were found to vary significantly between storms, but were generally influenced by the length of antecedent dry period and the strength of rainfall intensities. Runoff from the study site showed a significant level of pollution for all the parameters investigated. Based on the National Water Quality Standards for Malaysia (NWQS), stormwater quality from the study site was polluted and exceeded class III water for TSS and BOD5 with maximum EMCs of 177 and 24 mg/L, respectively. Design pollutant load based on a design storm of 3-month average recurrence interval (ARI) for TSS, COD, BOD5, TP, and Pb were estimated to be 40, 9.4, 5.4, 1.7, and 0.06 kg/ha, respectively. The design pollutant load for the pollutants can be used to estimate loadings from similar catchments within Miri City.

Keywords: mixed land-use, urban runoff, pollutant load, national water quality

Procedia PDF Downloads 324
568 Association between Neurofibromatosis Type 1 and Breast Sarcoma: A Case Report

Authors: Ines Zemni, Maher Slimane, Jamel Ben Hassouna, Khaled Rahal

Abstract:

Background: Neurofibromatosis type 1 (NF1) is a genetic disease, which is associated with an increased risk of developing different malignancies including breast cancer. The association between NF1 band breast sarcoma is a rare entity. Herein we present a 25-year-old woman with NF1 who had fibrosarcoma of the left breast. Case presentation: The patient has multiple thoraco-abdominal 'café au lait' spots. Clinical examination showed a lump of the left breast measuring 9 cm of diameter, which was noticed for 6 months. There was a left inguinal mass of 6 cm of diameter. The patient underwent first a left lumpectomy. Histopathological exam revealed a high-grade fibrosarcoma of the left breast measuring 7.5 cm. Three months later, the patient underwent a left mastectomy and excision of the inguinal mass, which was a neurofibroma. An adjuvant chemotherapy and radiation therapy were indicated, but not applied because of the timeout. The patient is now alive after a follow up of 6 years, with no loco-regional recurrence or metastasis. Conclusion: The relationship between NF1 and breast cancer need to be more clarified by further studies. Establishing a specific screening program of these patients may help to make an earlier diagnosis of breast cancer.

Keywords: neurofibromatosis, breast, sarcoma, cancer

Procedia PDF Downloads 115
567 Care as a Situated Universal: Defining Care as a Practical Phenomenology Study

Authors: Amanda Aliende da Matta

Abstract:

This communication presents an aspect of phenomenon selection in an applied hermeneutic phenomenology study on care and vulnerability: the need to consider it as a situated universal. For that, we will first present the study and its methodology. Secondly, we will expose the need to understand phenomena as situation-defined, incorporating feminist thought. In an informatics class for 14 year olds, we explained the exercise: students have to make a 5 slide presentation about a topic of their choice. A does it on streetwear, B on Cristiano Ronaldo, C on Marvel, but J did it on Down Syndrome. Introducing it to the class, J explains the physical and cognitive differences caused by trisomy; when asked to explain it further, he says: "they are angels, teacher," and shows us a poster on his cellphone that says: if you laugh at a different child he will laugh with you because his innocence outweighs your ignorance. The anecdote shows, better than any theoretical explanation, something that some vulnerable people have; something beautiful and special but difficult to define. Let's call this something caring. The research has the main objective of accounting for the experience of caregiving in vulnerability, and it will be carried out with Applied Hermeneutic Phenomenology (AHP). The method's objective is to investigate the lived human experience in its pre-reflexive dimension to know its meaning structures. Contrary to other research methods, AHP does not produce theory about a specific context but seeks the meaning of the lived experience, in its characteristic of human experience. However, it is necessary that we understand care as defined in a concrete situation. We cannot start the research with an a priori definitive concept of care, or we would fall into the mistake of closing ourselves to only what we already know, as explained by Levinas. We incorporate, then, the notion of situated universals. Loyal to phenomenology, the definition of the phenomenon should start with an investigation of the word's etymology: the word cura, in its etymological root, means care. And care comes from the Latin word cogitātus/cōgĭto, which means "to pursue something in mind" and "to consider thoroughly." The verb cōgĭto, meanwhile, is composed of co- (altogether) and agitare (to deal with or think committedly about something, to concern oneself with) / ăgĭto (to set in motion, to move). Care, therefore, has in its origin a meditation on something, a concern about something, a verb that has a sense of action and movement. To care is to act out of concern for something/someone. This etymology, though, is not the final definition of the phenomenon, but only its skeleton. It needs to be embodied in the concrete situation to become a possible lived experience. And that means that the lived experience descriptions (LEDs) should be selected by taking into consideration how and if care was engendered in that concrete experience. Defining the phenomenon has to take into consideration situated knowledge.

Keywords: applied hermeneutic phenomenology, care ethics, hermeneutics, phenomenology, situated universalism

Procedia PDF Downloads 82
566 O-(2-18F-Fluoroethyl)-L-Tyrosine Positron Emission Tomography/Computed Tomography in Patients with Suspicious Recurrent Low and High-Grade Glioma

Authors: Mahkameh Asadi, Habibollah Dadgar

Abstract:

The precise definition margin of high and low-grade glioma is crucial for choosing best treatment approach after surgery and radio-chemotherapy. The aim of the current study was to assess the O-(2-18F-fluoroethyl)-L-tyrosine (18F-FET) positron emission tomography (PET)/computed tomography (CT) in patients with low (LGG) and high grade glioma (HGG). We retrospectively analyzed 18F-FET PET/CT of 10 patients (age: 33 ± 12 years) with suspicious for recurrent LGG and HGG. The final decision of recurrence was made by magnetic resonance imaging (MRI) and registered clinical data. While response to radio-chemotherapy by MRI is often complex and sophisticated due to the edema, necrosis, and inflammation, emerging amino acid PET leading to better interpretations with more specifically differentiate true tumor boundaries from equivocal lesions. Therefore, integrating amino acid PET in the management of glioma to complement MRI will significantly improve early therapy response assessment, treatment planning, and clinical trial design.

Keywords: positron emission tomography, amino acid positron emission tomography, magnetic resonance imaging, low and high grade glioma

Procedia PDF Downloads 166
565 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 55
564 Disaster and Emergency Management in Nigeria: The Case of Chibok School Girls Abducted by Boko Haram Insurgents

Authors: Aidelunuoghene Sunday Ojeifo

Abstract:

More than a decade ago, the Islamist Terrorist group called Boko Haram has caused terrible violence in the north-eastern part of Nigeria. The group’s use of suicide attacks is a dreadful trait of international terrorist violence. It is certainly not in doubt that Boko Haram is the biggest headache of the Nigerian Government right now. The objective of this paper is to answer four fundamental questions about the extremist group: Who is Boko Haram? Why does the group rebel? How has the Nigerian state responded to the emergency and disaster in which more than 200 schoolgirls were abducted from their school in Chibok? Is there any assistance from other nations of the world to help Nigeria out of the grips of this cruel dilemma?

Keywords: Boko Haram, disaster, hazards, vulnerability, insurgents

Procedia PDF Downloads 373
563 Case Report: Rare Case of Endometrial Stromal Sarcoma with Omental Metastasis in a 19-Year Old Girl

Authors: Mukurdipi Ray, Seema Singh

Abstract:

Extrauterine endometrial stromal sarcoma (ESS) is a rare entity and typified by delayed recurrence of primary ESS. Here, we present an unusual case of uterine ESS in a woman with a history of hysterectomy. A 19-year-old girl, underwent a hysterectomy and bilateral salpingo-oophorectomy for uterine ESS 12 months ago and now after remaining disease free for nine months ago she presented with ascites along with pelvic and peritoneal mass. Intraoperatively, the large omental mass was found, and optimal cytoreduction with total omentomy (supracolic and infracolic ) total peritonectomy and hyperthermic intraperitoneal chemotherapy (HIPEC) was offered to the patient. Final histopathology report showed the involvement of only omentum by ESS cells. Immunohistochemistry (IHC) and receptor study were done and it was positive for CD-10 and desmin and negative for CK- 7. This case highlights the rarity of extrauterine ESS in the omentum with a known history of primary uterine ESS which was treated successfully with the above-mentioned procedure. Though active and long-term surveillance is recommended to monitor for late recurrences.

Keywords: endrometrial stromal sarcoma, complete cytoreduction, hyperthermic intra peritoneal chemotherapy, total omentectomy

Procedia PDF Downloads 202
562 Accurate Calculation of the Penetration Depth of a Bullet Using ANSYS

Authors: Eunsu Jang, Kang Park

Abstract:

In developing an armored ground combat vehicle (AGCV), it is a very important step to analyze the vulnerability (or the survivability) of the AGCV against enemy’s attack. In the vulnerability analysis, the penetration equations are usually used to get the penetration depth and check whether a bullet can penetrate the armor of the AGCV, which causes the damage of internal components or crews. The penetration equations are derived from penetration experiments which require long time and great efforts. However, they usually hold only for the specific material of the target and the specific type of the bullet used in experiments. Thus, penetration simulation using ANSYS can be another option to calculate penetration depth. However, it is very important to model the targets and select the input parameters in order to get an accurate penetration depth. This paper performed a sensitivity analysis of input parameters of ANSYS on the accuracy of the calculated penetration depth. Two conflicting objectives need to be achieved in adopting ANSYS in penetration analysis: maximizing the accuracy of calculation and minimizing the calculation time. To maximize the calculation accuracy, the sensitivity analysis of the input parameters for ANSYS was performed and calculated the RMS error with the experimental data. The input parameters include mesh size, boundary condition, material properties, target diameter are tested and selected to minimize the error between the calculated result from simulation and the experiment data from the papers on the penetration equation. To minimize the calculation time, the parameter values obtained from accuracy analysis are adjusted to get optimized overall performance. As result of analysis, the followings were found: 1) As the mesh size gradually decreases from 0.9 mm to 0.5 mm, both the penetration depth and calculation time increase. 2) As diameters of the target decrease from 250mm to 60 mm, both the penetration depth and calculation time decrease. 3) As the yield stress which is one of the material property of the target decreases, the penetration depth increases. 4) The boundary condition with the fixed side surface of the target gives more penetration depth than that with the fixed side and rear surfaces. By using above finding, the input parameters can be tuned to minimize the error between simulation and experiments. By using simulation tool, ANSYS, with delicately tuned input parameters, penetration analysis can be done on computer without actual experiments. The data of penetration experiments are usually hard to get because of security reasons and only published papers provide them in the limited target material. The next step of this research is to generalize this approach to anticipate the penetration depth by interpolating the known penetration experiments. This result may not be accurate enough to be used to replace the penetration experiments, but those simulations can be used in the early stage of the design process of AGCV in modelling and simulation stage.

Keywords: ANSYS, input parameters, penetration depth, sensitivity analysis

Procedia PDF Downloads 388
561 Mitigating the Vulnerability of Subsistence Farmers through Ground Water Optimisation

Authors: Olayemi Bakre

Abstract:

The majoritant of the South African rural populace are directly or indirectly engaged in agricultural practices for a livelihood. However, impediments such as the climate change and inadequacy of governmental support has undermined the once thriving subsistence farming communities of South Africa. Furthermore, the poor leadership in hydrology, coupled with lack of depths in skills to facilitate the understanding and acceptance of groundwater from national level to local governance has made it near impossible for subsistence farmers to optimally benefit from the groundwater beneath their feet. The 2012 drought experienced in South Africa paralysed the farming activities across several subsistence farming communities across the KwaZulu-Natal Province. To revamp subsistence farming, a variety of interventions and strategies such as the Resource Poor Farmers (RPF) and Water Allocation Reforms (WAR) have been launched by the Department of Water and Sanitation (DWS) as an agendum to galvanising the defunct subsistence farming communities of KwaZulu-Natal as well as other subsistence farming communities across South Africa. Despite the enormous resources expended on the subsistence farming communities whom often fall under the Historically Disadvantaged Individuals (HDI); indicators such as the unsustainable farming practices, poor crop yield, pitiable living condition as well as the poor standard of living, are evidential to the claim that these afore cited interventions and a host of other similar strategies indicates that these initiatives have not yield the desired result. Thus, this paper seeks to suggest practicable interventions aimed at salvaging the vulnerability of subsistence farmers within the province understudy. The study pursued a qualitative approach as the view of experts on ground water and similarly related fields from the DWS were solicited as an agendum to obtaining in-depth perspective into the current study. Some of the core challenges undermining the sustainability and growth of subsistence farming in the area of study were - inadequacy of experts (engineers, scientist, researchers) in ground water; water shortages; lack of political will as well as lack of coordination among stakeholders. As an agendum to optimising the ground water usage for subsistence farming, this paper advocates the strengthening of geohydrological skills, development of technical training capacity, interactive participation among stakeholders as well as the initiation of Participatory Action Research as an agenda to optimising the available ground water in KwaZulu-Natal which is intended to orchestrate a sustainable and viable subsistence farming practice within the province.

Keywords: subsistence farming, ground water optimisation, resource poor farmers, and water allocation reforms, hydrology

Procedia PDF Downloads 241
560 Impact Analysis Based on Change Requirement Traceability in Object Oriented Software Systems

Authors: Sunil Tumkur Dakshinamurthy, Mamootil Zachariah Kurian

Abstract:

Change requirement traceability in object oriented software systems is one of the challenging areas in research. We know that the traces between links of different artifacts are to be automated or semi-automated in the software development life cycle (SDLC). The aim of this paper is discussing and implementing aspects of dynamically linking the artifacts such as requirements, high level design, code and test cases through the Extensible Markup Language (XML) or by dynamically generating Object Oriented (OO) metrics. Also, non-functional requirements (NFR) aspects such as stability, completeness, clarity, validity, feasibility and precision are discussed. We discuss this as a Fifth Taxonomy, which is a system vulnerability concern.

Keywords: artifacts, NFRs, OO metrics, SDLC, XML

Procedia PDF Downloads 332
559 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 160
558 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 160
557 Evaluation of Soil Erosion Risk and Prioritization for Implementation of Management Strategies in Morocco

Authors: Lahcen Daoudi, Fatima Zahra Omdi, Abldelali Gourfi

Abstract:

In Morocco, as in most Mediterranean countries, water scarcity is a common situation because of low and unevenly distributed rainfall. The expansions of irrigated lands, as well as the growth of urban and industrial areas and tourist resorts, contribute to an increase of water demand. Therefore in the 1960s Morocco embarked on an ambitious program to increase the number of dams to boost water retention capacity. However, the decrease in the capacity of these reservoirs caused by sedimentation is a major problem; it is estimated at 75 million m3/year. Dams and reservoirs became unusable for their intended purposes due to sedimentation in large rivers that result from soil erosion. Soil erosion presents an important driving force in the process affecting the landscape. It has become one of the most serious environmental problems that raised much interest throughout the world. Monitoring soil erosion risk is an important part of soil conservation practices. The estimation of soil loss risk is the first step for a successful control of water erosion. The aim of this study is to estimate the soil loss risk and its spatial distribution in the different fields of Morocco and to prioritize areas for soil conservation interventions. The approach followed is the Revised Universal Soil Loss Equation (RUSLE) using remote sensing and GIS, which is the most popular empirically based model used globally for erosion prediction and control. This model has been tested in many agricultural watersheds in the world, particularly for large-scale basins due to the simplicity of the model formulation and easy availability of the dataset. The spatial distribution of the annual soil loss was elaborated by the combination of several factors: rainfall erosivity, soil erodability, topography, and land cover. The average annual soil loss estimated in several basins watershed of Morocco varies from 0 to 50t/ha/year. Watersheds characterized by high-erosion-vulnerability are located in the North (Rif Mountains) and more particularly in the Central part of Morocco (High Atlas Mountains). This variation of vulnerability is highly correlated to slope variation which indicates that the topography factor is the main agent of soil erosion within these basin catchments. These results could be helpful for the planning of natural resources management and for implementing sustainable long-term management strategies which are necessary for soil conservation and for increasing over the projected economic life of the dam implemented.

Keywords: soil loss, RUSLE, GIS-remote sensing, watershed, Morocco

Procedia PDF Downloads 453
556 Making Unorganized Social Groups Responsible for Climate Change: Structural Analysis

Authors: Vojtěch Svěrák

Abstract:

Climate change ethics have recently shifted away from individualistic paradigms towards concepts of shared or collective responsibility. Despite this evolving trend, a noticeable gap remains: a lack of research exclusively addressing the moral responsibility of specific unorganized social groups. The primary objective of the article is to fill this gap. The article employs the structuralist methodological approach proposed by some feminist philosophers, utilizing structural analysis to explain the existence of social groups. The argument is made for the integration of this framework with the so-called forward-looking Social Connection Model (SCM) of responsibility, which ascribes responsibilities to individuals based on their participation in social structures. The article offers an extension of this model to justify the responsibility of unorganized social groups. The major finding of the study is that although members of unorganized groups are loosely connected, collectively they instantiate specific external social structures, share social positioning, and the notion of responsibility could be based on that. Specifically, if the structure produces harm or perpetuates injustices, and the group both benefits from and possesses the capacity to significantly influence the structure, a greater degree of responsibility should be attributed to the group as a whole. This thesis is applied and justified within the context of climate change, based on the asymmetrical positioning of different social groups. Climate change creates a triple inequality: in contribution, vulnerability, and mitigation. The study posits that different degrees of group responsibility could be drawn from these inequalities. Two social groups serve as a case study for the article: first, the Pakistan lower class, consisting of people living below the national poverty line, with a low greenhouse gas emissions rate, severe climate change-related vulnerability due to the lack of adaptation measures, and with very limited options to participate in the mitigation of climate change. Second, the so-called polluter elite, defined by members' investments in polluting companies and high-carbon lifestyles, thus with an interest in the continuation of structures leading to climate change. The first identified group cannot be held responsible for climate change, but their group interest lies in structural change and should be collectively maintained. On the other hand, the responsibility of the second identified group is significant and can be fulfilled by a justified demand for some political changes. The proposed approach of group responsibility is suggested to help navigate climate justice discourse and environmental policies, thus helping with the sustainability transition.

Keywords: collective responsibility, climate justice, climate change ethics, group responsibility, social ontology, structural analysis

Procedia PDF Downloads 54
555 Islamic Extremist Groups' Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe

Authors: Muhammad Irfan

Abstract:

The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally.

Keywords: populism, radicalization, de-radicalization, social media, ISIS, Taliban, shariah, jihad, Islam, Europe, political communication, terrorism, migrants, refugees, extremism, global terror, predictive analysis, early warning detection, models, strategic communication, populist narratives, Islamic extremism

Procedia PDF Downloads 115
554 A Review on Disaster Risk Reduction and Sustainable Development in Nigeria

Authors: Kudu Dangana

Abstract:

The occurrences of disaster often call for the support of both government and non-government organization. Consequently, disaster relief remains extremely important in disaster management. However, this approach alone does not proactively address the need to adduce the human and environment impacts of future disasters. Recent thinking in the area of disaster management is indicative of the need for a new paradigm that focuses on reducing the risk of disasters with the involvement and participation of communities. This paper reviews the need for communities to place more emphasis on a holistic approach to disaster risk reduction. This approach involves risk assessment, risk reduction, early warning and disaster preparedness in order to effectively address the reduction of social, economic, and environmental costs of disasters nationally and at the global level.

Keywords: disaster, early, management, warning, relief, risk vulnerability

Procedia PDF Downloads 641
553 Hospital Evacuation: Best Practice Recommendations

Authors: Ronald Blough

Abstract:

Hospitals, clinics, and medical facilities are the core of the Health Services sector providing 24/7 medical care to those in need. Any disruption of these important medical services highlights the vulnerabilities in the medical system. An internal or external event can create a catastrophic incident paralyzing the medical services causing the facility to shift into emergency operations with the possibility of evacuation. The hospital administrator and government officials must decide in a very short amount of time whether to shelter in place or evacuate. This presentation will identify best practice recommendations regarding the hospital evacuation decision and response analyzing previous hospital evacuations to encourage hospitals in the region to review or develop their own emergency evacuation plans.

Keywords: disaster preparedness, hospital evacuation, shelter-in-place, incident containment, health services vulnerability, hospital resources

Procedia PDF Downloads 361
552 A Methodology for Optimisation of Water Containment Systems

Authors: Amir Hedjripour

Abstract:

The required dewatering configuration for a contaminated sediment dam is discussed to meet no-spill criteria for a defined Average Recurrence Interval (ARI). There is an option for the sediment dam to pump the contaminated water to another storage facility before its capacity is exceeded. The system is subjected to a range of storm durations belonging to the design ARI with concurrent dewatering to the other storage facility. The model is set up in 1-minute time intervals and temporal patterns of storm events are used to de-segregate the total storm depth into partial durations. By running the model for selected storm durations, the maximum water volume in the dam is recorded as the critical volume, which indicates the required storage capacity for that storm duration. Runoff from upstream catchment and the direct rainfall over the dam open area are calculated by taking into account the time of concentration for the catchment. Total 99 different storm durations from 5 minutes to 72 hours were modelled together with five dewatering scenarios from 50 l/s to 500 l/s. The optimised dam/pump configuration is selected by plotting critical points for all cases and storage-dewatering envelopes. A simple economic analysis is also presented in the paper using Present-Value (PV) analysis to assist with the financial evaluation of each configuration and selection of the best alternative.

Keywords: contaminated water, optimisation, pump, sediment dam

Procedia PDF Downloads 362
551 Comparative Acaricidal Efficacy of Fluralaner vs Oral Ivermectin Against Tick Infestation in Dogs

Authors: Tayyaba Zahra, Shehla Gul Bokhari, Asim Khalid Mahmood, Raheela Akhtar, Khizar Matloob

Abstract:

In Pakistan, dogs are commonly infested with ticks, especially in summers, causing not only dermatological issues but also systemic problems. Persistence of tick infestation often leads to heavy losses. Different acaricides are locally available with variable efficacy; however, recurrence of infestation is commonly reported. The present study was thus designed to compare the efficacy of a novel drug Fluralaner and conventionally used Ivermectin against tick infestation. Dogs positive for tick infestation were randomly divided into 2 groups viz, Groups A and B having 8 dogs each. Ticks were enumerated manually from the whole body of dogs at day 0 before the administration of drugs Dogs in Group A were treated with Fluralaner at day 0, and dogs in Group B were treated with Ivermectin. Post-treatment, ticks were counted again at days 7, 14, 21, 28, and 35. At day 07 of the study, no tick was found on the dogs treated with Fluralaner, while many ticks were present on the dogs treated with Ivermectin showing an efficacy up to 50%. On the consecutive follow-up evaluations, similar results were found for Fluralaner while the efficacy of Ivermectin was further reduced to less than 50%. Furthermore, Fluralaner treated dogs had better RBC counts, PCV, Hgb concentration, LFTs, RFTs post-treatment than the dogs treated with Ivermectin. Statistically, oral Fluralaner proved a more effective drug (P≤0.05)than oral Ivermectin against tick infestation in dogs.

Keywords: fluralaner, ivermectin, dogs, tick infestations

Procedia PDF Downloads 193
550 Estimation Cytokines IL-2, IL-4, IL-8 in Serum and Nasal Secretions of Patients with Various Forms of Chronic Polypoid Rhinosinusitis

Authors: U. N. Vokhidov, U. S. Khasanov, A. A. Ismailova

Abstract:

Background: Currently, the researches on the development of chronic polypoid rhinosinusitis cytokines play a major role. The aim of this study was the comparison of indicators IL-2, IL-4, IL-8 in the peripheral blood and nasal secretions of patients with various forms of chronic polypoid rhinosinusitis. Material and methods: We studied 50 patients with chronic polypoid rhinosinusitis receiving hospital treatment in the ENT department of the 3-rd clinic of Tashkent Medical Academy. It was carried out a comprehensive study including morphological examination, immunological study of blood and nasal secretions on the IL-2, IL-4 and IL-8. Results: The results of immunological studies of peripheral blood showed that patients with ‘eosinophilic’ polyps were increased IL-2 and IL-4 in patients with ‘neutrophils’ polyps were increased IL-2 and IL-8. Immunological investigation nasal secretions taken from patients with nasal polyposis rhinosinusitis showed that patients with ‘eosinophilic’ polyps also increased IL- 2 and IL- 4 in patients with ‘neutrophils’ polyps - increased IL-2 and IL-8. Conclusion: In patients with ‘eosinophilic’ polyps revealed the presence of immunity to the allergy of the body, patients with ‘neutrophilic’ polyps identified immunity to the presence of inflammation, it is necessary to take into account the doctor-otolaryngologist when choosing a treatment strategy for the prevention of recurrence of the disease.

Keywords: chronic polypoid rhinosinusitis, immunology, cytikines, nasal secretion

Procedia PDF Downloads 216
549 Strabismus Management in Retinoblastoma Survivors

Authors: Babak Masoomian, Masoud Khorrami Nejad, Hamid Riazi Esfahani

Abstract:

Purpose: To report the result of strabismus surgery in eye-salvaged retinoblastoma (Rb) patients. Methods: A retrospective case series including 18 patients with Rb and strabismus who underwent strabismus surgery after completing tumor treatment by a single pediatric ophthalmologist. Results: A total of 18 patients (10 females and 8 males) were included with a mean age of 13.3 ± 3.0 (range, 2-39) months at the time tumor presentation and 6.0 ± 1.5 (range, 4-9) years at the time of strabismus surgery. Ten (56%) patients had unilateral, and 8(44%) had bilateral involvement, and the most common worse eye tumor’s group was D (n=11), C (n=4), B (n=2) and E (n=1). Macula was involved by the tumors in 12 (67%) patients. The tumors were managed by intravenous chemotherapy (n=8, 47%), intra-arterial chemotherapy (n=7, 41%) and both (n=3, 17%). After complete treatment, the average time to strabismus surgery was 29.9 ± 20.5 (range, 12-84) months. Except for one, visual acuity was equal or less than 1.0 logMAR (≤ 20/200) in the affected eye. Seven (39%) patients had exotropia, 11(61%) had esotropia (P=0.346) and vertical deviation was found in 8 (48%) cases. The angle of deviation was 42.0 ± 10.4 (range, 30-60) prism diopter (PD) for esotropic and 35.7± 7.9 (range, 25-50) PD for exotropic patients (P=0.32) that after surgery significantly decreased to 8.5 ± 5.3 PD in esotropic cases and 5.9±6.7 PD in exotropic cases (P<0.001). The mean follow-up after surgery was 15.2 ± 2.0 (range, 10-24) months, in which 3 (17%) patients needed a second surgery. Conclusion: Strabismus surgery in treated Rb is safe, and results of the surgeries are acceptable and close to the general population. There was not associated with tumor recurrence or metastasis.

Keywords: retinoblastoma, strabismus, chemotherapy, surgery

Procedia PDF Downloads 55
548 Coastal Resources Spatial Planning and Potential Oil Risk Analysis: Case Study of Misratah’s Coastal Resources, Libya

Authors: Abduladim Maitieg, Kevin Lynch, Mark Johnson

Abstract:

The goal of the Libyan Environmental General Authority (EGA) and National Oil Corporation (Department of Health, Safety & Environment) during the last 5 years has been to adopt a common approach to coastal and marine spatial planning. Protection and planning of the coastal zone is a significant for Libya, due to the length of coast and, the high rate of oil export, and spills’ potential negative impacts on coastal and marine habitats. Coastal resource scenarios constitute an important tool for exploring the long-term and short-term consequences of oil spill impact and available response options that would provide an integrated perspective on mitigation. To investigate that, this paper reviews the Misratah coastal parameters to present the physical and human controls and attributes of coastal habitats as the first step in understanding how they may be damaged by an oil spill. This paper also investigates costal resources, providing a better understanding of the resources and factors that impact the integrity of the ecosystem. Therefore, the study described the potential spatial distribution of oil spill risk and the coastal resources value, and also created spatial maps of coastal resources and their vulnerability to oil spills along the coast. This study proposes an analysis of coastal resources condition at a local level in the Misratah region of the Mediterranean Sea, considering the implementation of coastal and marine spatial planning over time as an indication of the will to manage urban development. Oil spill contamination analysis and their impact on the coastal resources depend on (1) oil spill sequence, (2) oil spill location, (3) oil spill movement near the coastal area. The resulting maps show natural, socio-economic activity, environmental resources along of the coast, and oil spill location. Moreover, the study provides significant geodatabase information which is required for coastal sensitivity index mapping and coastal management studies. The outcome of study provides the information necessary to set an Environmental Sensitivity Index (ESI) for the Misratah shoreline, which can be used for management of coastal resources and setting boundaries for each coastal sensitivity sectors, as well as to help planners measure the impact of oil spills on coastal resources. Geographic Information System (GIS) tools were used in order to store and illustrate the spatial convergence of existing socio-economic activities such as fishing, tourism, and the salt industry, and ecosystem components such as sea turtle nesting area, Sabkha habitats, and migratory birds feeding sites. These geodatabases help planners investigate the vulnerability of coastal resources to an oil spill.

Keywords: coastal and marine spatial planning advancement training, GIS mapping, human uses, ecosystem components, Misratah coast, Libyan, oil spill

Procedia PDF Downloads 360
547 Inflammatory Cytokine (Interleukin-8): A Diagnostic Marker in Leukemia

Authors: Sandeep Pandey, Nimra Habib, Ranjana Singh, Abbas Ali Mahdi

Abstract:

Leukemia is a malignancy of blood that mainly affects children and young adults; while advancement in the early diagnosis will have the potential to improve the outcome of diseases. A wide range of disease including leukemia shows inflammatory signals in their pathogenesis. In a pilot study conducted in our laboratory, 52 people were screened, of which 26 had leukemia and 26 were free from any kind of malignancy. We performed the estimation of the inflammatory cytokine Interleukin-8 and it was found significantly raised in all the leukemia patients concerning healthy volunteers who participated in the study. Flow cytometry had been performed for the confirmation of leukemia and further genomic, and proteomic, analyses of the sample revealed that IL-8 levels showed a positive correlation in patients with leukemia. The results had shown constitutive secretion of interleukin-8 by leukemia cells. So, our finding demonstrated that IL-8 is considered to have a role in the pathogenesis of leukemia, and quantification of IL-8 levels in leukemia conditions might be more useful and feasible in the clinical setting for the prediction of drug responses where it may represent a putative target for innovative diagnostic toward effective therapeutic approaches. However, further research explorations in this area are needed that include a greater number of patients with all different forms of leukemia, and estimating their IL-8 levels may hold the key for the additional predictive values on the recurrence of leukemia and its prognosis.

Keywords: T-ALL, IL-8, leukemia pathogenesis, cancer therapeutics

Procedia PDF Downloads 65
546 Spinal Hydatidosis: Therapeutic Management of 5 Cases

Authors: Ghoul Rachid Brahim, Trad Khodja Rafik

Abstract:

Vertebral localization of the hydatid cyst is a severe form of bone hydatidosis, is a parasitic infection caused by the larval forms of the tapeworms Echinococcus granulosus, The disease is slowly remaining silent (a long incubation period) which may explain why this pathology is often discovered at the stage of neurological complications. The objective of this study is to recall the clinical and radiological aspects of this condition and the importance of early diagnosis and appropriate management. We report a study of 5 patients with vertebral hydatidosis, four men and one woman, four (04) patients operated in the emergency setting for spinal cord compression (decompression by wide laminectomy with evacuation of intra and extra canal vesicles).Albendazole-based medical treatment is instituted in all patients. Results: The evolution was favorable for three patients, the other two patients reoperated for a local recurrence. Conclusion: Vertebral hydatidosis is a rare condition with a poor prognosis due to the risk of neurological damage, the infiltrating nature of bone lesions, the frequency of relapses and therapeutic difficulties. The only curative method remains surgery, which must aim for complete and large excision of the lesions as if it were a “malignant tumour”.

Keywords: hydatidosis, Echinococcosis granulosus, hydatid cyst, spinal cord compression, laminectomy

Procedia PDF Downloads 92
545 A Correlational Study between Parentification and Memory Retention among Parentified Female Adolescents: A Neurocognitive Perspective on Parentification

Authors: Mary Dorothy Roxas, Jeian Mae Dungca, Reginald Agor, Beatriz Figueroa, Lennon Andre Patricio, Honey Joy Cabahug

Abstract:

Parentification occurs when children are expected to provide instrumental or emotional caregiving within the family. It was found that parentification has the latter effect on adolescents’ cognitive and emotional vulnerability. Attachment theory helps clarify the process of parentification as it involves the relationship between the child and the parent. Carandang theory of “taga-salo” helps explain parentification in the Philippines setting. The present study examined the potential risk of parentification on adolescent’s memory retention by hypothesizing that there is a correlation between the two. The research was conducted with 249 female adolescents ages 12-24, residing in Valenzuela City. Results indicated that there is a significant inverse correlation between parentification and memory retention.

Keywords: memory retention, neurocognitive, parentification, stress

Procedia PDF Downloads 637
544 Deforestation, Vulnerability and Adaptation Strategies of Rural Farmers: The Case of Central Rift Valley Region of Ethiopia

Authors: Dembel Bonta Gebeyehu

Abstract:

In the study area, the impacts of deforestation for environmental degradation and livelihood of farmers manifest in different faces. They are more vulnerable as they depend on rain-fed agriculture and immediate natural forests. On the other hand, after planting seedling, waste disposal and management system of the plastic cover is poorly practiced and administered in the country in general and in the study area in particular. If this situation continues, the plastic waste would also accentuate land degradation. Besides, there is the absence of empirical studies conducted comprehensively on the research under study the case. The results of the study could suffice to inform any intervention schemes or to contribute to the existing knowledge on these issues. The study employed a qualitative approach based on intensive fieldwork data collected via various tools namely open-ended interviews, focus group discussion, key-informant interview and non-participant observation. The collected data was duly transcribed and latter categorized into different labels based on pre-determined themes to make further analysis. The major causes of deforestation were the expansion of agricultural land, poor administration, population growth, and the absence of conservation methods. The farmers are vulnerable to soil erosion and soil infertility culminating in low agricultural production; loss of grazing land and decline of livestock production; climate change; and deterioration of social capital. Their adaptation and coping strategies include natural conservation measures, diversification of income sources, safety-net program, and migration. Due to participatory natural resource conservation measures, soil erosion has been decreased and protected, indigenous woodlands started to regenerate. These brought farmers’ attitudinal change. The existing forestation program has many flaws. Especially, after planting seedlings, there is no mechanism for the plastic waste disposal and management. It was also found out organizational challenges among the mandated offices In the studied area, deforestation is aggravated by a number of factors, which made the farmers vulnerable. The current forestation programs are not well-planned, implemented, and coordinated. Sustainable and efficient seedling plastic cover collection and reuse methods should be devised. This is possible through creating awareness, organizing micro and small enterprises to reuse, and generate income from the collected plastic etc.

Keywords: land-cover and land-dynamics, vulnerability, adaptation strategy, mitigation strategies, sustainable plastic waste management

Procedia PDF Downloads 382
543 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 378
542 Understanding the Architecture of Hindu Temples: A Philosophical Interpretation

Authors: A. Bandyopadhyay

Abstract:

Vedic philosophy is one of the oldest existing philosophies of the world. Started around 6500 BC, in Western Indian subcontinent, the Indus valley Civilizations developed a theology which, gradually developed into a well-established philosophy of beliefs, popularly known as ‘Hindu religion’. In Vedic theology, the abstract concept of God was formulated mostly by close observation of the dynamicity and the recurrence of natural and universal phenomena. Through the ages, the philosophy of this theology went through various discursions, debates, and questionings and the abstract concept of God was, in time, formalized into more representational forms by the means of various signs and symbols. Often, these symbols were used in more subtle ways in the construction of “sacred” sculptures and structures. Apparently, two different philosophies were developed from the Vedic philosophy and these two philosophies are mostly seen in the northern part and southern part of the Indian subcontinent. This paper tries to summarize the complex philosophical treaties of Hinduism of northern and southern India and seeks to understand the meanings of the various signs and symbolisms that were incorporated in the architecture of Hindu temples, including the names given to various parts of the temples. The Hindu temples are not only places of worship or ‘houses of Gods’ like the Greek and Roman temples but are also structures that symbolize the dynamicity and also spiritual upliftment of human beings.

Keywords: Hindu, philosophy, temple, Vedic

Procedia PDF Downloads 132
541 Modeling of Tsunami Propagation and Impact on West Vancouver Island, Canada

Authors: S. Chowdhury, A. Corlett

Abstract:

Large tsunamis strike the British Columbia coast every few hundred years. The Cascadia Subduction Zone, which extends along the Pacific coast from Vancouver Island to Northern California is one of the most seismically active regions in Canada. Significant earthquakes have occurred in this region, including the 1700 Cascade Earthquake with an estimated magnitude of 9.2. Based on geological records, experts have predicted a 'great earthquake' of a similar magnitude within this region may happen any time. This earthquake is expected to generate a large tsunami that could impact the coastal communities on Vancouver Island. Since many of these communities are in remote locations, they are more likely to be vulnerable, as the post-earthquake relief efforts would be impacted by the damage to critical road infrastructures. To assess the coastal vulnerability within these communities, a hydrodynamic model has been developed using MIKE-21 software. We have considered a 500 year probabilistic earthquake design criteria including the subsidence in this model. The bathymetry information was collected from Canadian Hydrographic Services (CHS), and National Oceanic Atmospheric and Administration (NOAA). The arial survey was conducted using a Cessna-172 aircraft for the communities, and then the information was converted to generate a topographic digital elevation map. Both survey information was incorporated into the model, and the domain size of the model was about 1000km x 1300km. This model was calibrated with the tsunami occurred off the west coast of Moresby Island on October 28, 2012. The water levels from the model were compared with two tide gauge stations close to the Vancouver Island and the output from the model indicates the satisfactory result. For this study, the design water level was considered as High Water Level plus the Sea Level Rise for 2100 year. The hourly wind speeds from eight directions were collected from different wind stations and used a 200-year return period wind speed in the model for storm events. The regional model was set for 12 hrs simulation period, which takes more than 16 hrs to complete one simulation using double Xeon-E7 CPU computer plus a K-80 GPU. The boundary information for the local model was generated from the regional model. The local model was developed using a high resolution mesh to estimate the coastal flooding for the communities. It was observed from this study that many communities will be effected by the Cascadia tsunami and the inundation maps were developed for the communities. The infrastructures inside the coastal inundation area were identified. Coastal vulnerability planning and resilient design solutions will be implemented to significantly reduce the risk.

Keywords: tsunami, coastal flooding, coastal vulnerable, earthquake, Vancouver, wave propagation

Procedia PDF Downloads 128
540 Prevalence of Menopausal Women with Clinical Symptoms of Allergy and Evaluation the Effect of Sex Hormone Combined with Anti-Allergy Treatment

Authors: Yang Wei, Xueyan Wang, Hui Zou

Abstract:

Objective: Investigation the prevalence of menopausal symptoms in patients with allergic symptoms, evaluation of the effect of sex hormones combined with anti-allergic therapy in these patients. Method: Age of 45-65 years old women with allergic symptoms at the same time in gynecological-endocrinology clinic in our hospital were selected from Feb 1 to May 31, 2010, randomly. The patients were given oral estradiol valerate plus progestin pills combined with anti-allergy treatment and then evaluated twice a week and one month later. Evaluation criterion: Menopause Rating Scale (MRS) and the degree of clinical symptoms were used to evaluate menopause and allergy separately. Results: 1) There were 195 cases of patients with menopausal symptoms at the age. Their MRS were all over 15. 2) Among them 45 patients were with allergic symptom accounted for 23% which were diagnosed by allergic department. 3) Evaluated after one week: the menopausal symptoms were improved and MRS were less than or equal to 5 in all these patients; the skin symptom of allergic symptoms vanished completely. 4) Evaluated after one month: Menopause symptoms were improved steadily; other clinical symptoms of allergy were also improved or without recurrence. Conclusion: The incidence rate of menopausal women with clinical symptoms of allergic diseases is high and it needs attention. The effect of sex hormones combined with anti-allergic therapy is obvious.

Keywords: menopausal, allergy, sex hormone, anti-allergy treatment

Procedia PDF Downloads 268