Search results for: vulnerability discoverers
322 Co-Seismic Surface Deformation Induced By 24 September 2019 Mirpur, Pakistan Earthquake Along an Active Blind Fault Estimated Using Sentinel-1 TOPS Interferometry
Authors: Muhammad Ali, Zeeshan Afzal, Giampaolo Ferraioli, Gilda Schirinzi, Muhammad Saleem Mughal, Vito Pascazio
Abstract:
On 24 September 2019, an earthquake with 5.6 Mw and 10 km depth stroke in Mirpur. The Mirpur area was highly affected by this earthquake, with the death of 34 people. This study aims to estimate the surface deformation associated with this earthquake. The interferometric synthetic aperture radar (InSAR) technique is applied to study earthquake induced surface motion. InSAR data using 9 Sentinel-1A SAR images from 11 August 2019 to 22 October 2019 is used to investigate the pre, co-, and post-seismic deformation trends. Time series investigation reveals that there was not such deformation in pre-seismic time period. In the co-seismic time period, strong displacement was observed, and in post-seismic results, small displacement is seen due to aftershocks. Our results show the existence of a previously unpublished blind fault in Mirpur and help to locate the fault line. Previous this fault line was triggered during the 2005 earthquake, and now it’s activated on 24 September 2019. Study area is already facing many problems due to natural hazards where additional surface deformations, particularly because of an earthquake with an activated blind fault, have increased its vulnerability.Keywords: surface deformation, InSAR, earthquake, sentinel-1, mirpur
Procedia PDF Downloads 128321 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 39320 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 153319 Lifestyle Diseases in Urban India: A Case Study of Obesity
Authors: Monika Yadav
Abstract:
The incorporation of a healthy lifestyle significantly contributes to the advancement of economic development. Urbanization, industrialization, and economic growth have enhanced living conditions, promoting sedentary behaviours among individuals with elevated socio-economic statuses. The prevalence of overweight and obesity has increased globally, along with the rise in living standards, posing a growing health risk. Overweight and obesity are known to be precursors to a range of modifiable and metabolic risk factors, contributing to the increase in lifestyle diseases. Unhealthy dietary choices and lifestyle practices primarily drive these diseases. Lifestyle diseases refer to chronic and non-communicable illnesses, encompassing conditions such as hypertension, heart disease, kidney disorders, infertility, polycystic ovary syndrome (PCOD), diabetes, respiratory diseases, and certain forms of cancer. This study examines the prevalence of lifestyle diseases among urban Indian women, explicitly differentiating between individuals with normal weight and those classified as obese. The main aim of this study is to investigate whether there is a correlation between a higher body mass index (BMI) in women and an increased vulnerability to lifestyle diseases when compared to women with a normal BMI. This research provides insights into the intricate relationship between lifestyle, health, and economic development within urban areas.Keywords: urbanization, economic development, BMI, NCDs, urban, women, lifestyle practices
Procedia PDF Downloads 65318 Problems of Water Resources : Vulnerability to Climate Change, Modeling with Software WEAP 21 (Upper and Middle Cheliff)
Authors: Mehaiguene Madjid, Meddi Mohamed
Abstract:
The results of applying the model WEAP 21 or 'Water Evaluation and Planning System' in Upper and Middle Cheliff are presented in cartographic and graphic forms by considering two scenarios: -Reference scenario 1961-1990, -Climate change scenarios (low and high) for 2020 and 2050. These scenarios are presented together in the results and compared them to know the impact on aquatic systems and water resources. For the low scenario for 2050, a decrease in the rate of runoff / infiltration will be 81.4 to 3.7 Hm3 between 2010 and 2050. While for the high scenario for 2050, the reduction will be 87.2 to 78.9 Hm3 between 2010 and 2050. Comparing the two scenarios, shows that the water supplied will increase by 216.7 Hm3 to 596 Hm3 up to 2050 if we do not take account of climate change. Whereas, if climate change will decrease step by step: from 2010 to 2026: for the climate change scenario (high scenario) by 2050, water supplied from 346 Hm3 to 361 Hm3. That of the reference scenario (1961-1990) will increase to 379.7 Hm3 in 2050. This is caused by the increased demand (increased population, irrigated area, etc ). The balance water management basin is positive for the different Horizons and different situations. If we do not take account of climate change will be the outflow of 5881.4 Hm3. This excess at the basin can be used as part of a transfer for example.Keywords: balance water, management basin, climate change scenario, Upper and Middle Cheliff
Procedia PDF Downloads 312317 The Effectiveness of Attachment-Based Family Therapy on Maladaptive Schemas and Depressive Symptoms in Adolescence
Authors: Mohamad Reza Khodabakhsh
Abstract:
The present study investigated the effectiveness of attachment-based family therapy on maladaptive schemas and depressive symptoms of adolescence. This study was a quasi-experimental study, and a pre-test and post-test design with a control group were used. In this study, the study population included all adolescence. The sample consisted of 30 adolescents who were selected by the available sampling method. Then they were randomly divided into experimental (n = 15) and control (n = 15) groups. Data were collected in this study using the Beck Depression Inventory (1974) and the short form of Young's early maladaptive schema questionnaire (1988). After taking the pre-test, group implementation of family therapy based on attachment style was presented for 11 sessions of two and a half hours for two months in the experimental group. At the end of the sessions, both groups were retested, and the data were analyzed using analysis of covariance in SPSS-22 software. The results showed that attachment-based family therapy led to a significant reduction in maladaptive schemas, including emotional deprivation, rejection/abandonment, mistrust/abuse, social isolation, disability/shame, dependence/inadequacy, vulnerability/trauma, and depressive symptoms were compared to the control group. It can be concluded that this treatment has an effect on maladaptive schemas and symptoms of depression.Keywords: attachment-based family therapy, maladaptive schemas, depressive symptoms, adolescence
Procedia PDF Downloads 106316 Attachment Style, Attachment Figure, and Intimate Relationship among Emerging Adults with Anxiety and Depression
Authors: P. K. Raheemudheen, Vibha Sharma, C. B. Tripathi
Abstract:
Background and Aim: Intimate relationships are one of the major sources of unhappiness for emerging adults(18-25 years) and the extent of worry from it is higher for them as compared to older adults. This increases their vulnerability to develop anxiety and depression. Current academic literature have highlighted adult attachment have a crucial role in determining the psycho social adjustment and psychopathology in Emerging Adulthood. In this context, present study is an attempt to explore patterns of adult attachment styles, availability of attachment figures and dimensions of intimate relationship among emerging adults. Method: The participants(n=30) were emerging adults diagnosed with anxiety or/and depression seeking treatment from IHBAS, Delhi. Relationship Style Questionnaire was used to assess the adult attachment styles and Multidimensional Relationship Questionnaire was used to assess dimensions of intimate relationship. Results& Discussion: Results showed that majority of the participants have insecure attachment styles. They perceived their attachment figure as insensitive and unavailable. Further, it was found that participants experience multiple difficulties to establish and maintain healthy intimate relationships. These findings highlight Adult attachment insecurities seem to contribute to anxiety and depression among emerging adults. It proved a conceptual foundation for planning interventions to deal with these attachment based correlate of anxiety and depression which may be more amenable to therapeutic change.Keywords: emerging adult, adult attachment, intimate relationship, anxiety
Procedia PDF Downloads 307315 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security
Authors: Katie Wood
Abstract:
Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity
Procedia PDF Downloads 242314 Effects of Climate Change and Livelihood Diversification on Gendered Productivity Gap of Farmers in Northern Regions of Ghana
Authors: William Adzawla
Abstract:
In the midst of climate variability and change, the role of gender in ensuring food production remains vital. Therefore, this study analysed the gendered productivity among maize farmers, and the effects of climate change and variability as well as livelihood diversification on gendered productivity gap. This involved a total of 619 farmers selected through a multistage sampling procedure. The data was analysed using Oaxaca Blinder decomposition model. From the result, there is a significant productivity gap of 58.8% and 44.8% between male and female heads, and between male heads and female spouses, respectively. About 87.47% and 98.08% of the variations in gendered productivity were explained by resource endowment. While livelihood diversification significantly influenced gendered productivity through endowment and coefficient effect, climate variables significantly affect productivity gap through only coefficient effects. The study concluded that there is a substantial gendered productivity gap among farmers and this is particularly due to differences in endowment. Generally, there is a high potential of reducing gendered productivity gaps through the provision of equal diversification opportunities and reducing females’ vulnerability to climate change. Among the livelihood activities, off-farm activities such as agro-processing and shea butter processing should be promoted. Similarly, the adoption of on-farm adaptation strategies should be promoted among the farmers.Keywords: climate change and variability, gender, livelihood diversification, oaxaca-blinder decomposition, productivity gap
Procedia PDF Downloads 170313 The Perspectives of Adult Learners Towards Online Learning
Authors: Jacqueline Żammit
Abstract:
Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning
Procedia PDF Downloads 60312 Assessing the Impact of Urbanization on Flood Risk: A Case Study
Authors: Talha Ahmed, Ishtiaq Hassan
Abstract:
Urban areas or metropolitan is portrayed by the very high density of population due to the result of these economic activities. Some critical elements, such as urban expansion and climate change, are driving changes in cities with exposure to the incidence and impacts of pluvial floods. Urban communities are recurrently developed by huge spaces by which water cannot enter impermeable surfaces, such as man-made permanent surfaces and structures, which do not cause the phenomena of infiltration and percolation. Urban sprawl can result in increased run-off volumes, flood stage and flood extents during heavy rainy seasons. The flood risks require a thorough examination of all aspects affecting to severe an event in order to accurately estimate their impacts and other risk factors associated with them. For risk evaluation and its impact due to urbanization, an integrated hydrological modeling approach is used on the study area in Islamabad (Pakistan), focusing on a natural water body that has been adopted in this research. The vulnerability of the physical elements at risk in the research region is analyzed using GIS and SOBEK. The supervised classification of land use containing the images from 1980 to 2020 is used. The modeling of DEM with selected return period is used for modeling a hydrodynamic model for flood event inundation. The selected return periods are 50,75 and 100 years which are used in flood modeling. The findings of this study provided useful information on high-risk places and at-risk properties.Keywords: urbanization, flood, flood risk, GIS
Procedia PDF Downloads 175311 Causes and Effects of the 2012 Flood Disaster on Affected Communities in Nigeria
Authors: Abdulquadri Ade Bilau, Richard Ajayi Jimoh, Adejoh Amodu Adaji
Abstract:
The increasing exposures to natural hazards have continued to severely impair on the built environment causing huge fatalities, mass damage and destruction of housing and civil infrastructure while leaving psychosocial impacts on affected communities. The 2012 flood disaster in Nigeria which affected over 7 million inhabitants in 30 of the 36 states resulted in 363 recorded fatalities with about 600,000 houses and a number of civil infrastructure damaged or destroyed. In Kogi State, over 500 thousand people were displaced in 9 out of the 21 local government affected while Ibaji and Lokoja local governments were worst hit. This study identifies the causes and 2012 flood disasters and its effect on housing and livelihood. Personal observation and questionnaire survey were instruments used in carrying out the study and data collected were analysed using descriptive statistical tool. Findings show that the 2012 flood disaster was aided by the gap in hydrological data, sudden dam failure, and inadequate drainage capacity to reduce flood risk. The study recommends that communities residing along the river banks in Lokoja and Ibaji LGAs must be adequately educated on their exposure to flood hazard and mitigation and risk reduction measures such as construction of adequate drainage channel are constructed in affected communities.Keywords: flood, hazards, housing, risk reduction, vulnerability
Procedia PDF Downloads 262310 Terrorism and Sustainable Tourism Development
Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu
Abstract:
Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness
Procedia PDF Downloads 620309 Groundwater Quality in the Rhiss-Nekor Plain, Morocco: Impacts of Human Activities
Authors: Ali Ait Boughrous, Said Benyoussef, Hossain El Ouarghi, Moulay Abdelazize Aboulhassan, Samah Aitbnichou, Said Benguamra
Abstract:
The Rhiss-Nekor aquifer represents a primary water source for the central Rif region. Many operating structures were built for irrigation and drinking water supply. Because of the vulnerability of this aquifer, a thorough knowledge of the environment is needed to evaluate and protect resources. This work aims at the quality assessment of the water table of the plain Ghiss-Nekor and determination of pollution sources in order to establish a map of the web. The plain-Rhiss Nekor, with an area of 100 km2, is located on the Mediterranean coast of Morocco. It has a particular geological structure resulting from the opening of a graben at the end of the Tertiary, which is filled by the accumulation of hundreds of meters of sediment, generating considerable heterogeneity in deposits. This heterogeneity gives various hydrodynamic properties within the aquifer of the plain. The analysis of the water quality of twenty water points, well distributed over the plain, showed high natural salinity linked to the geological nature of the area. This salinity increases in the littoral area by the seawater intrusion phenomenon. This is accentuated by overexploitation of the ground water due to the growing demand. Some wells, located inland, are characterized by organic pollution caused by wastewater seepage from septic tanks and lost wells widespread in the region.Keywords: anthropogenic factors, groundwater quality, marine intrusion, Rhiss-Nekor aquifer
Procedia PDF Downloads 140308 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 79307 Typhoon Disaster Risk Assessment of Mountain Village: A Case Study of Shanlin District in Kaohsiung
Abstract:
Taiwan is mountainous country, 70% of land is covered with mountains. Because of extreme climate, the mountain villages with sensitive and fragile environment often get easily affected by inundation and debris flow from typhoon which brings huge rainfall. Due to inappropriate development, overuse and fewer access roads, occurrence of disaster becomes more frequent through downpour and rescue actions are postponed. However, risk map is generally established through administrative boundaries, the difference of urban and rural area is ignored. The neglect of mountain village characteristics eventually underestimates the importance of factors related to vulnerability and reduces the effectiveness. In disaster management, there are different strategies and actions at each stage. According to different tasks, there will be different risk indices and weights to analyze disaster risk for each stage and then it will contribute to confront threat and reduce impact appropriately on right time. Risk map is important in mitigation, but also in response stage because some factors such as road network will be changed by disaster. This study will use risk assessment to establish risk map of Shanlin District which is mountain village in Kaohsiung as a case study in mitigation and response stage through Analytic Hierarchy Process (AHP). AHP helps to recognize the composition and weights of risk factors in mountain village by experts’ opinions through survey design and is combined with present potential hazard map to produce risk map.Keywords: risk assessment, mountain village, risk map, analytic hierarchy process
Procedia PDF Downloads 399306 The Vulnerability of a Small, Open Economy in a Situation of Global Fiscal Crisis: The Impact of the Greek Debt Crisis on the Foreign Direct Investments to Macedonia
Authors: Viktorija Mano
Abstract:
The objective of my research is to critique the International Monetary Fund (IMF) stance on foreign investment and the benefits for small, open economies of allowing the free movement of capital. In my research as a whole I will explore the extent to which this stance impacted upon and influenced the economic policies of Macedonia. This will involve providing a contextualized, critical account of the policy of the IMF focusing on a comparison of its policies during the early 2000s through policy documents, political discourse and enacted policies in Macedonia. The conditionality associated with these policies, such as the enforcement of austerity measures (including cutting public spending and reducing debt) and the privatization of public institutions has provoked strong reactions in countries which receive such loans. My main focus in my research is on exploring how the process of Financial Liberalization (FL) of the Macedonian economy affected capital flows in the form of foreign direct investments (FDI) in the private sector and how the recent Greek crisis of 2008 has impacted on this. In the case of Macedonia, the reality of FL was tested by the collapse of the Greek economy. However, this paper will highlight the main duties of the IMF and the goals of the FL process implemented in various countries.Additionally, I will undertake a rhetorical documentary analysis on the IMF reports regarding the process of FL in Macedonia since its independence until today.Keywords: FDI, financial liberalization, Greece, IMF, Macedonia
Procedia PDF Downloads 564305 Body, Sex and Culture: Gender Dissidences through Cinema
Authors: Piedad Lucia Bolivar Goez, Daniel Ignacio Garzon Luna, Maria Camila Balcero Angel, Sara Carolina Martinez Roman, Daniela Natalia Polo Rivas, Sandra Liliana Rocha Guitierrez
Abstract:
This article provides a critical analysis on the conception of disorders of sexual development (DSDs) within the bioethics framework. By means of analytical thought, the objective is to approach topics such as the rediscovery of the body, the reinvention of sexuality and link them to the liability that health personnel have to inform people about the options they have to decide over their health and body. The medicalization of sexed bodies in both psychosocial and anatomo-morpho-physiological dimensions from a legal standpoint were analyzed. Its also explored the gender stereotypes established by society and the role of laws in guaranteeing the right of autonomy that takes on greater relevance in DSD. Through this analysis, it was concluded that despite intersexuality having been analyzed by Colombia’s Constitutional Court, that it is stated as a fair entity, the stigmatization by society has not allowed these individuals to belong to an egalitarian context in which everyone has the same opportunities of access to the goods and services that they need. This leads individuals to hide their identity and expression of genre in order to be accepted in a set of contexts. Thus creating a vulnerability that the health system must be able to identify and in which it is necessary to intervene at a biopsychosocial level, in order to guarantee the protection of the individual within an unquestionable frame of equality and solidarity.Keywords: disorders of sex development, gender identity, sexuality, transgender persons
Procedia PDF Downloads 192304 Resilient Analysis as an Alternative to Conventional Seismic Analysis Methods for the Maintenance of a Socioeconomical Functionality of Structures
Authors: Sara Muhammad Elqudah, Vigh László Gergely
Abstract:
Catastrophic events, such as earthquakes, are sudden, short, and devastating, threatening lives, demolishing futures, and causing huge economic losses. Current seismic analyses and design standards are based on life safety levels where only some residual strength and stiffness are left in the structure leaving it beyond economical repair. Consequently, it has become necessary to introduce and implement the concept of resilient design. Resilient design is about designing for ductility over time by resisting, absorbing, and recovering from the effects of a hazard in an appropriate and efficient time manner while maintaining the functionality of the structure in the aftermath of the incident. Resilient analysis is mainly based on the fragility, vulnerability, and functionality curves where eventually a resilience index is generated from these curves, and the higher this index is, the better is the performance of the structure. In this paper, seismic performances of a simple two story reinforced concrete building, located in a moderate seismic region, has been evaluated using the conventional seismic analyses methods, which are the linear static analysis, the response spectrum analysis, and the pushover analysis, and the generated results of these analyses methods are compared to those of the resilient analysis. Results highlight that the resilience analysis was the most convenient method in generating a more ductile and functional structure from a socio-economic perspective, in comparison to the standard seismic analysis methods.Keywords: conventional analysis methods, functionality, resilient analysis, seismic performance
Procedia PDF Downloads 116303 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law
Authors: Ida D. Souza, Lena Ashok
Abstract:
Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.Keywords: child protection, best practices, juvenile justice, reformation teamwork
Procedia PDF Downloads 363302 Environmental Governance and Opportunities for Disaster Risk Reduction in Nigeria
Authors: Willie Eselebor
Abstract:
Environmental governance is not new, but may consist of a series of actions taken to establish sanity and ensure sustainable environment. While there is a growing accord linking disaster risk reduction with the management of environment and natural resources, little is known about failure to act which constitute vulnerability and how improved governance reduces risk globally. The paper reviews emerging trends in the field of application of governance tools and approaches for reducing disaster risk. The Hyogo Framework for Action (HFA) enjoin all stakeholders to stimulate the sustainable use and management of ecosystems, which promote the implementation of integrated environmental and natural resource planning that incorporate disaster risk reduction, including structural and non-structural measures, such as integrated management of fragile ecosystems. The methodology adopted is a case study of disaster-prone sites, prompting guided analysis on which hazards are traceable to environmental degradation, why a degraded environment reduces community resilience; how healthy ecosystems provide natural defense, and which opportunities exist to address gaps in reduction of disasters in Nigeria. The paper further analyses the interaction between disaster risk and environmental change. It is established that environmental governance remains a challenge; which implies that there is the need for a shift in traditional approaches to disaster risk management; exploring new initiatives and allowing environmental managers to be docketed as disaster risk managers in context, potentially opening up a window of dialogue on disaster risk management.Keywords: disaster, ecosystem, environment, risk
Procedia PDF Downloads 352301 Feasibility of Building Structure Due to Decreased Concrete Quality of School Building in Banda Aceh City 19 Years after Tsunami
Authors: Rifqi Irvansyah, Abdullah Abdullah, Yunita Idris, Bunga Raihanda
Abstract:
Banda Aceh is particularly susceptible to heightened vulnerability during natural disasters due to its concentrated exposure to multi-hazard risks. Despite urgent priorities during the aftermath of natural disasters, such as the 2004 Indian Ocean earthquake and tsunami, several public facilities, including school buildings, sustained damage yet continued operations without adequate repairs, even though they were submerged by the tsunami. This research aims to evaluate the consequences of column damage induced by tsunami inundation on the structural integrity of buildings. The investigation employs interaction diagrams for columns to assess their capacity, taking into account factors such as rebar deterioration and corrosion. The analysis result shows that one-fourth of the K1 columns on the first floor fall outside of the column interaction diagram, indicating that the column structure cannot handle the load above it, as evidenced by the presence of Pu and Mu, which are greater than the column's design strength. This suggests that the five columns of K1 should be cause for concern, as the column's capacity is decreasing. These results indicate that the structure of the building cannot sustain the applied load because the column cross-section has deteriorated. In contrast, all K2 columns meet the design strength, indicating that the column structure can withstand the structural loads.Keywords: tsunami inundation, column damage, column interaction diagram, mitigation effort
Procedia PDF Downloads 67300 Fault Detection and Diagnosis of Broken Bar Problem in Induction Motors Base Wavelet Analysis and EMD Method: Case Study of Mobarakeh Steel Company in Iran
Authors: M. Ahmadi, M. Kafil, H. Ebrahimi
Abstract:
Nowadays, induction motors have a significant role in industries. Condition monitoring (CM) of this equipment has gained a remarkable importance during recent years due to huge production losses, substantial imposed costs and increases in vulnerability, risk, and uncertainty levels. Motor current signature analysis (MCSA) is one of the most important techniques in CM. This method can be used for rotor broken bars detection. Signal processing methods such as Fast Fourier transformation (FFT), Wavelet transformation and Empirical Mode Decomposition (EMD) are used for analyzing MCSA output data. In this study, these signal processing methods are used for broken bar problem detection of Mobarakeh steel company induction motors. Based on wavelet transformation method, an index for fault detection, CF, is introduced which is the variation of maximum to the mean of wavelet transformation coefficients. We find that, in the broken bar condition, the amount of CF factor is greater than the healthy condition. Based on EMD method, the energy of intrinsic mode functions (IMF) is calculated and finds that when motor bars become broken the energy of IMFs increases.Keywords: broken bar, condition monitoring, diagnostics, empirical mode decomposition, fourier transform, wavelet transform
Procedia PDF Downloads 149299 Real-Time Monitoring Approaches of Groundwater Conductivity and Level to Pre-Alert the Seawater Intrusion in Sand Coast of Liaodong Bay of China
Authors: Yuguang Wang, Chuanjun Wang
Abstract:
At present, many coastal areas around the world suffer from seawater intrusion. Seawater intrusion is the superimposed result of two factors which are nature and human social economical activities in particular area. In recent years, due to excessive exploitation of groundwater, the seawater intrusion phenomenon aggravate in coastal zone of the Bohai and Huanghai seas in our country. Moreover, with sea-level rising, the original hydrodynamic equilibrium between saltwater and freshwater has been damaged to a certain extent, and it will further aggravate seawater intrusion in the land plains. In addition, overexploitation of groundwater declined groundwater level and increase saltwater intrusion in coastal areas. Therefore, in view of the sensitivity and vulnerability of the impact of sea-level rise in the future, the risk of sea-level rise in coastal zone should be considered, reasonable exploitation, utilization and management of coastal zone’s groundwater should be formulated. The response mechanism of sea-level rise should be studied to prevent and reduce the harm of seawater intrusion, which has important theoretical and realistic significances. In this paper, through the long-term monitoring of groundwater level and conductibility in the transition region of seawater intrusion for the sand coast area, realtimely master the situation of seawater intrusion. Combined with the seasonal exploitation station of groundwater and sea level variation, early alert the seawater intrusion to prevent and reduce the harm of seawater intrusion.Keywords: groundwater level, sea level, seawater intrusion, sand coast
Procedia PDF Downloads 469298 Climate Change and Global Warming: Effect on Indian Agriculture and Legal Control
Authors: Aman Guru, Chiron Singhi
Abstract:
The Earth’s climate is being changed at an unrivalled rate since beginning of the evolution of the Earth, 4–5 billion years back, but presently it gained pace due to unintentional anthropogenic disturbances and also increased global warming since the mid-20th century, and these incessant changes in the climatic pattern may bring unpropitious effect on global health and security. Today, however, it is not only the air, or water that are polluted, but the whole atmosphere is prone to pollution and this resulted in other cascading ramification in the form of change in the pattern of rainfall, melting of ice, the rise in the sea level etc. Human activities like production, transport, burning of fuels are adding umpteen dangerous pollutants to the atmosphere which in turn gives rise to global warming. Agriculture plays an imperative part in India's economy. Agriculture, along with fisheries and forestry, is one of the largest contributors to the Gross Domestic Product in India. Research on the effect of climate change and vulnerability of agriculture is a high need in India. A steady increase of CO2 is a primary cause of climate change and global warming and which in turn have a great impact on Indian agriculture. The research focuses on the effect of climate change on Indian agriculture and the proceedings and legal control of legislative measures on such issues and the ways to implement such laws which can help to provide a solution to these problems which can prove beneficial to Indian farmers and their agricultural produce.Keywords: agriculture, climate change, global warming, India laws, legislative measures
Procedia PDF Downloads 314297 “It Takes a Community to Save a Child”: A Qualitative Analysis of Child Trafficking Interventions from Practitioner Perspectives
Authors: Crispin Rakibu Mbamba
Abstract:
Twenty-two years after the adoption of the United Nation Trafficking Protocol, evidence suggest that child trafficking continues to rise. Community level factors, like poverty which creates the conditions for children’s vulnerability is key to the rise in trafficking cases in Ghana. Albeit, growing evidence suggestthat despite the vulnerabilities, communities have the capacity to prevent and address child trafficking issues. This study contributes to this positive agenda by exploring the ways in which communities (and the key actors) in Ghana contribute to child trafficking interventions.The study objective is explored through in-depth interviews with practitioners (including social workers) from an organization working in trafficking hotspots in Ghana. Interviews wereanalyzed thematically with the help of HyperRESEARCH software. From the in-depth interviews, three themes were identified as the ways in which communities are involved in child trafficking interventions: 1) engagement of community leaders, 2) community-led anti-trafficking committees and 3) knowledge about trafficking. Albeit the cultural differences, evidence on the instrumental role of community chiefs and leaders provide important learning on how to harness trafficking intervention measures and ensure better child protection practices. Based on the findings, we recommend the need to intensify trafficking awareness campaigns in rural communities where education is lacking to contribute to United Nations (UN) promoting Just, Peaceful and Inclusive societies’ mandate.Keywords: child trafficking, community interventions, knowledge on trafficking, human trafficking intervention
Procedia PDF Downloads 115296 Postoperative Emergence Delirium in Children: An Incomprehensible Scenario For Parents’
Authors: Jenny Ringblom, Marie Proczkowska, Laura Korhonen, Ingrid Wåhlin
Abstract:
Background: Emergence delirium is a well-known behaviour of perceptual disturbances that may occur after general anaesthesia in children. Children with emergence delirium are often confused; they cry, are involuntarily physically active and are almost impossible to console. The prevalence varies considerably between about 13% and 53%. Research has mainly focused on how different medication accents affect the incidence of emergence delirium, but less is known about parents’ experiences of emergence delirium during the recovery process. Aim: The aim of this study was to describe parents’ experiences and reflections during their child's emergence delirium behaviour when recovering from anaesthesia. Method: The study has a qualitative design, and the data has been analyzed using thematic analysis. A total of 16 parents were interviewed at two county hospitals in Sweden. Results: When the parents reunited with their child at the recovering unit, they felt as if they were encountering an incomprehensible scenario. When watching their child demonstrating emergence delirium, they experienced fear and insecurity and had feelings of powerlessness and guilt. Information and previous experience turned out to offer relief and being seen by the healthcare staff when they, in their vulnerability, failed to reach or console their child gave hope and energy. Conclusion: Emergence delirium must be extensively considered in children undergoing general anaesthesia. Healthcare staff needs to be aware of the parental difficulties it may cause. There is also important to know what parents experience as relieving, such as receiving information and when staff members are being available, responsive and supportive during the wake-up period.Keywords: emergence delirium, experiences, pediatrics, parents, postoperative care
Procedia PDF Downloads 130295 NGOs from the Promotion of Civic Participation to Public Problems Solving: Case Study Urmia, Iran
Authors: Amin Banae Babazadeh
Abstract:
In the contemporary world, NGOs are considered as important tool for motivating the community. So they committed their true mission and the promotion of civic participation and strengthen social identities. Functional characteristics of non-governmental organizations are the element to leverage the centers of political and social development of powerful governments since they are concrete and familiar with the problems of society and the operational strategies which would facilitate this process of mutual trust between the people and organizations. NGOs on the one hand offer reasonable solutions in line with approved organizations as agents to match between the facts and reality of society and on the other hand changes to a tool to have true political, social and economic behavior. However, the NGOs are active in the formulation of national relations and policy formulation in an organized and disciplined based on three main factors, i.e., resources, policies, and institutions. Organizations are not restricted to state administration in centralized system bodies and this process in the democratic system limits the accumulation of desires and expectations and at the end reaches to the desired place. Hence, this research will attempt to emphasis on field research (questionnaire) and according to the development evolution and role of NGOs analyze the effects of this center on youth. Therefore, the hypothesis is that there is a direct relationship between the Enlightenment and the effectiveness of policy towards NGOs and solving social damages.Keywords: civic participation, community vulnerability, insightful, NGO, urmia
Procedia PDF Downloads 241294 Exposure to Bullying and General Psychopathology: A Prospective, Longitudinal Study
Authors: Jolien Rijlaarsdam, Charlotte A. M. Cecil, J. Marieke Buil, Pol A. C. Van Lier, Edward D. Barker
Abstract:
Although there is mounting evidence that the experience of being bullied associates with both internalizing and externalizing symptoms, it is not known yet whether the identified associations are specific to these symptoms or shared between them. The primary focus of this study is to assess the prospective associations of bullying exposure with both general and specific (i.e., internalizing, externalizing) factors of psychopathology. This study included data from 6,210 children participating in the Avon Longitudinal Study of Parents and Children (ALSPAC). Child bullying was measured by self-report at ages 8 and 10 years. Child psychopathology symptoms were assessed by parent-interview, using the Development and Well-being Assessment (DAWBA) at ages 7 and 13 years. Bullying exposure is significantly associated with the general psychopathology factor in early adolescence. In particular, chronically victimized youth exposed to multiple forms of bullying (i.e., both overt and relational) showed the highest levels of general psychopathology. Bullying exposure is also associated with both internalizing and externalizing factors from the correlated-factors model. However, the effect estimates for these factors decreased considerably in size and dropped to insignificant for the internalizing factor after extracting the shared variance that belongs to the general factor of psychopathology. In an integrative longitudinal model, higher levels of general psychopathology at age seven are associated with bullying exposure at age eight, which, in turn, is associated with general psychopathology at age 13 through its two-year continuity. Findings suggest that exposure to bullying is a risk factor for a more general vulnerability to psychopathology through mutually influencing relationships.Keywords: bullying exposure, externalizing, general psychopathology, internalizing, longitudinal
Procedia PDF Downloads 139293 Protecting Migrants at Risk as Internally Displaced Persons: State Responses to Foreign Immigrants Displaced by Natural Disasters in Thailand, The United States, and Japan
Authors: Toake Endoh
Abstract:
Cross-border migration of people is a critical driver for sustainable economic development in the Asia-Pacific region. Meanwhile, the region is susceptible to mega-scale natural disasters, such as tsunami, earthquakes, and typhoons. When migrants are stranded in a foreign country by a disaster, who should be responsible for their safety and security? What legal or moral foundation is there to advocate for the protection and assistance of “migrants at risk (M@R)”? How can the states practice “good governance” in their response to displacement of the foreign migrants? This paper inquires how to protect foreign migrants displaced by a natural disaster under international law and proposes protective actions to be taken by of migrant-receiver governments. First, the paper discusses the theoretical foundation for protection of M@R and argues that the nation-states are charged of responsibility to protect at-risk foreigners as “internally displaced persons” in the light of the United Nations’ Guiding Principles of Internal Displacement (1998). Second, through the case study of the Kobe Earthquake in Japan (1995), the Tsunami in Thailand (2004), and the Hurricane Katrina in the U.S. (2005), the paper evaluates how effectively (or poorly) institutions and state actors addressed the specific vulnerability felt by M@R in these crises.Keywords: internal displaced persons, natural disaster, international migration, responsibility to protect
Procedia PDF Downloads 318