Search results for: HIV transmission risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3524

Search results for: HIV transmission risks

3134 Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This research seeks to identify how money laundering activities are executed through the real estate sector. This article provides academics with literature on the topic and provides scholars, and practitioners with a better understanding of the risks and challenges involved. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help identifying the factors attracting criminals to the real estate sector and develop an understanding of the methods used to launder illicit funds through this sector and the indicators of suspicion for reporting entities. Further analysis reveals the risks posed by money laundering and terrorist financing on the real estate sector and challenges facing states in this regard.

Keywords: money laundering, terrorism financing, real estate sector, Middle East and North Africa

Procedia PDF Downloads 134
3133 Assessment of Environmental Risk Factors of Railway Using Integrated ANP-DEMATEL Approach in Fuzzy Conditions

Authors: Mehrdad Abkenari, Mehmet Kunt, Mahdi Nourollahi

Abstract:

Evaluating the environmental risk factors is a combination of analysis of transportation effects. Various definitions for risk can be found in different scientific sources. Each definition depends on a specific and particular perspective or dimension. The effects of potential risks present along the new proposed routes and existing infrastructures of large transportation projects like railways should be studied under comprehensive engineering frameworks. Despite various definitions provided for ‘risk’, all include a uniform concept. Two obvious aspects, loss and unreliability, have always been pointed in all definitions of this term. But, selection as the third aspect is usually implied and means how one notices it. Currently, conducting engineering studies on the environmental effects of railway projects have become obligatory according to the Environmental Assessment Act in developing countries. Considering the longitudinal nature of these projects and probable passage of railways through various ecosystems, scientific research on the environmental risk of these projects have become of great interest. Although many areas of expertise such as road construction in developing countries have not seriously committed to these studies yet, attention to these subjects in establishment or implementation of different systems have become an inseparable part of this wave of research. The present study used environmental risks identified and existing in previous studies and stations to use in next step. The second step proposes a new hybrid approach of analytical network process (ANP) and DEMATEL in fuzzy conditions for assessment of determined risks. Since evaluation of identified risks was not an easy touch, mesh structure was an appropriate approach for analyzing complex systems which were accordingly employed for problem description and modeling. Researchers faced the shortage of real space data and also due to the ambiguity of experts’ opinions and judgments, they were declared in language variables instead of numerical ones. Since fuzzy logic is appropriate for ambiguity and uncertainty, formulation of experts’ opinions in the form of fuzzy numbers seemed an appropriate approach. Fuzzy DEMATEL method was used to extract the relations between major and minor risk factors. Considering the internal relations of risk major factors and its sub-factors in the analysis of fuzzy network, the weight of risk’s main factors and sub-factors were determined. In general, findings of the present study, in which effective railway environmental risk indicators were theoretically identified and rated through the first usage of combined model of DEMATEL and fuzzy network analysis, indicate that environmental risks can be evaluated more accurately and also employed in railway projects.

Keywords: DEMATEL, ANP, fuzzy, risk

Procedia PDF Downloads 387
3132 Transient and Persistent Efficiency Estimation for Electric Grid Utilities Based on Meta-Frontier: Comparative Analysis of China and Japan

Authors: Bai-Chen Xie, Biao Li

Abstract:

With the deepening of international exchanges and investment, the international comparison of power grid firms has become the focus of regulatory authorities. Ignoring the differences in the economic environment, resource endowment, technology, and other aspects of different countries or regions may lead to efficiency bias. Based on the Meta-frontier model, this paper divides China and Japan into two groups by using the data of China and Japan from 2006 to 2020. While preserving the differences between the two countries, it analyzes and compares the efficiency of the transmission and distribution industries of the two countries. Combined with the four-component stochastic frontier model, the efficiency is divided into transient and persistent efficiency. We found that there are obvious differences between the transmission and distribution sectors in China and Japan. On the one hand, the inefficiency of the two countries is mostly caused by long-term and structural problems. The key to improve the efficiency of the two countries is to focus more on solving long-term and structural problems. On the other hand, the long-term and structural problems that cause the inefficiency of the two countries are not the same. Quality factors have different effects on the efficiency of the two countries, and this different effect is captured by the common frontier model but is offset in the overall model. Based on these findings, this paper proposes some targeted policy recommendations.

Keywords: transmission and distribution industries, transient efficiency, persistent efficiency, meta-frontier, international comparison

Procedia PDF Downloads 71
3131 Analysis of Evolution of Higher Order Solitons by Numerical Simulation

Authors: K. Khadidja

Abstract:

Solitons are stable solution of nonlinear Schrodinger equation. Their stability is due to the exact combination between nonlinearity and dispersion which causes pulse broadening. Higher order solitons are born when nonlinear length is N multiple of dispersive length. Soliton order is determined by the number N itself. In this paper, evolution of higher order solitons is illustrated by simulation using Matlab. Results show that higher order solitons change their shape periodically, the reason why they are bad for transmission comparing to fundamental solitons which are constant. Partial analysis of a soliton of higher order explains that the periodic shape is due to the interplay between nonlinearity and dispersion which are not equal during a period. This class of solitons has many applications such as generation of supercontinuum and the impulse compression on the Femtosecond scale. As a conclusion, the periodicity which is harmful to transmission can be beneficial in other applications.

Keywords: dispersion, nonlinearity, optical fiber, soliton

Procedia PDF Downloads 143
3130 ATC in Competitive Electricity Market Using TCSC

Authors: S. K. Gupta, Richa Bansal

Abstract:

In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.

Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric

Procedia PDF Downloads 477
3129 Identification of Architectural Design Error Risk Factors in Construction Projects Using IDEF0 Technique

Authors: Sahar Tabarroki, Ahad Nazari

Abstract:

The design process is one of the most key project processes in the construction industry. Although architects have the responsibility to produce complete, accurate, and coordinated documents, architectural design is accompanied by many errors. A design error occurs when the constraints and requirements of the design are not satisfied. Errors are potentially costly and time-consuming to correct if not caught early during the design phase, and they become expensive in either construction documents or in the construction phase. The aim of this research is to identify the risk factors of architectural design errors, so identification of risks is necessary. First, a literature review in the design process was conducted and then a questionnaire was designed to identify the risks and risk factors. The questions in the form of the questionnaire were based on the “similar service description of study and supervision of architectural works” published by “Vice Presidency of Strategic Planning & Supervision of I.R. Iran” as the base of architects’ tasks. Second, the top 10 risks of architectural activities were identified. To determine the positions of possible causes of risks with respect to architectural activities, these activities were located in a design process modeled by the IDEF0 technique. The research was carried out by choosing a case study, checking the design drawings, interviewing its architect and client, and providing a checklist in order to identify the concrete examples of architectural design errors. The results revealed that activities such as “defining the current and future requirements of the project”, “studies and space planning,” and “time and cost estimation of suggested solution” has a higher error risk than others. Moreover, the most important causes include “unclear goals of a client”, “time force by a client”, and “lack of knowledge of architects about the requirements of end-users”. For error detecting in the case study, lack of criteria, standards and design criteria, and lack of coordination among them, was a barrier, anyway, “lack of coordination between architectural design and electrical and mechanical facility”, “violation of the standard dimensions and sizes in space designing”, “design omissions” were identified as the most important design errors.

Keywords: architectural design, design error, risk management, risk factor

Procedia PDF Downloads 106
3128 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 102
3127 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 274
3126 Mathematics Model Approaching: Parameter Estimation of Transmission Dynamics of HIV and AIDS in Indonesia

Authors: Endrik Mifta Shaiful, Firman Riyudha

Abstract:

Acquired Immunodeficiency Syndrome (AIDS) is one of the world's deadliest diseases caused by the Human Immunodeficiency Virus (HIV) that infects white blood cells and cause a decline in the immune system. AIDS quickly became a world epidemic disease that affects almost all countries. Therefore, mathematical modeling approach to the spread of HIV and AIDS is needed to anticipate the spread of HIV and AIDS which are widespread. The purpose of this study is to determine the parameter estimation on mathematical models of HIV transmission and AIDS using cumulative data of people with HIV and AIDS each year in Indonesia. In this model, there are parameters of r ∈ [0,1) which is the effectiveness of the treatment in patients with HIV. If the value of r is close to 1, the number of people with HIV and AIDS will decline toward zero. The estimation results indicate when the value of r is close to unity, there will be a significant decline in HIV patients, whereas in AIDS patients constantly decreases towards zero.

Keywords: HIV, AIDS, parameter estimation, mathematical models

Procedia PDF Downloads 222
3125 Tools and Techniques in Risk Assessment in Public Risk Management Organisations

Authors: Atousa Khodadadyan, Gabe Mythen, Hirbod Assa, Beverley Bishop

Abstract:

Risk assessment and the knowledge provided through this process is a crucial part of any decision-making process in the management of risks and uncertainties. Failure in assessment of risks can cause inadequacy in the entire process of risk management, which in turn can lead to failure in achieving organisational objectives as well as having significant damaging consequences on populations affected by the potential risks being assessed. The choice of tools and techniques in risk assessment can influence the degree and scope of decision-making and subsequently the risk response strategy. There are various available qualitative and quantitative tools and techniques that are deployed within the broad process of risk assessment. The sheer diversity of tools and techniques available to practitioners makes it difficult for organisations to consistently employ the most appropriate methods. This tools and techniques adaptation is rendered more difficult in public risk regulation organisations due to the sensitive and complex nature of their activities. This is particularly the case in areas relating to the environment, food, and human health and safety, when organisational goals are tied up with societal, political and individuals’ goals at national and international levels. Hence, recognising, analysing and evaluating different decision support tools and techniques employed in assessing risks in public risk management organisations was considered. This research is part of a mixed method study which aimed to examine the perception of risk assessment and the extent to which organisations practise risk assessment’ tools and techniques. The study adopted a semi-structured questionnaire with qualitative and quantitative data analysis to include a range of public risk regulation organisations from the UK, Germany, France, Belgium and the Netherlands. The results indicated the public risk management organisations mainly use diverse tools and techniques in the risk assessment process. The primary hazard analysis; brainstorming; hazard analysis and critical control points were described as the most practiced risk identification techniques. Within qualitative and quantitative risk analysis, the participants named the expert judgement, risk probability and impact assessment, sensitivity analysis and data gathering and representation as the most practised techniques.

Keywords: decision-making, public risk management organisations, risk assessment, tools and techniques

Procedia PDF Downloads 254
3124 A Comparative Study of Linearly Graded and without Graded Photonic Crystal Structure

Authors: Rajeev Kumar, Angad Singh Kushwaha, Amritanshu Pandey, S. K. Srivastava

Abstract:

Photonic crystals (PCs) have attracted much attention due to its electromagnetic properties and potential applications. In PCs, there is certain range of wavelength where electromagnetic waves are not allowed to pass are called photonic band gap (PBG). A localized defect mode will appear within PBG, due to change in the interference behavior of light, when we create a defect in the periodic structure. We can also create different types of defect structures by inserting or removing a layer from the periodic layered structure in two and three-dimensional PCs. We can design microcavity, waveguide, and perfect mirror by creating a point defect, line defect, and palanar defect in two and three- dimensional PC structure. One-dimensional and two-dimensional PCs with defects were reported theoretically and experimentally by Smith et al.. in conventional photonic band gap structure. In the present paper, we have presented the defect mode tunability in tilted non-graded photonic crystal (NGPC) and linearly graded photonic crystal (LGPC) using lead sulphide (PbS) and titanium dioxide (TiO2) in the infrared region. A birefringent defect layer is created in NGPC and LGPC using potassium titany phosphate (KTP). With the help of transfer matrix method, the transmission properties of proposed structure is investigated for transverse electric (TE) and transverse magnetic (TM) polarization. NGPC and LGPC without defect layer is also investigated. We have found that a photonic band gap (PBG) arises in the infrared region. An additional defect layer of KTP is created in NGPC and LGPC structure. We have seen that an additional transmission mode appers in PBG region. It is due to the addition of defect layer. We have also seen the effect, linear gradation in thickness, angle of incidence, tilt angle, and thickness of defect layer, on PBG and additional transmission mode. We have observed that the additional transmission mode and PBG can be tuned by changing the above parameters. The proposed structure may be used as channeled filter, optical switches, monochromator, and broadband optical reflector.

Keywords: defect modes, graded photonic crystal, photonic crystal, tilt angle

Procedia PDF Downloads 349
3123 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 272
3122 Overhead Lines Induced Transient Overvoltage Analysis Using Finite Difference Time Domain Method

Authors: Abdi Ammar, Ouazir Youcef, Laissaoui Abdelmalek

Abstract:

In this work, an approach based on transmission lines theory is presented. It is exploited for the calculation of overvoltage created by direct impacts of lightning waves on a guard cable of an overhead high-voltage line. First, we show the theoretical developments leading to the propagation equation, its discretization by finite difference time domain method (FDTD), and the resulting linear algebraic equations, followed by the calculation of the linear parameters of the line. The second step consists of solving the transmission lines system of equations by the FDTD method. This enabled us to determine the spatio-temporal evolution of the induced overvoltage.

Keywords: lightning surge, transient overvoltage, eddy current, FDTD, electromagnetic compatibility, ground wire

Procedia PDF Downloads 57
3121 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 546
3120 Synchronization of Bus Frames during Universal Serial Bus Transfer

Authors: Petr Šimek

Abstract:

This work deals with the problem of synchronization of bus frames during transmission using USB (Universal Serial Bus). The principles for synchronization between USB and the non-deterministic CAN (Controller Area Network) bus will be described here. Furthermore, the work deals with ensuring the time sequence of communication frames when receiving from multiple communication bus channels. The structure of a general object for storing frames from different types of communication buses, such as CAN and LIN (Local Interconnect Network), will be described here. Finally, an evaluation of the communication throughput of bus frames for USB High speed will be performed. The creation of this architecture was based on the analysis of the communication of control units with a large number of communication buses. For the design of the architecture, a test HW with a USB-HS interface was used, which received previously known messages, which were compared with the received result. The result of this investigation is the block architecture of the control program for test HW ensuring correct data transmission via the USB bus.

Keywords: analysis, CAN, interface, LIN, synchronization, USB

Procedia PDF Downloads 26
3119 Competing Risks Modeling Using within Node Homogeneity Classification Tree

Authors: Kazeem Adesina Dauda, Waheed Babatunde Yahya

Abstract:

To design a tree that maximizes within-node homogeneity, there is a need for a homogeneity measure that is appropriate for event history data with multiple risks. We consider the use of Deviance and Modified Cox-Snell residuals as a measure of impurity in Classification Regression Tree (CART) and compare our results with the results of Fiona (2008) in which homogeneity measures were based on Martingale Residual. Data structure approach was used to validate the performance of our proposed techniques via simulation and real life data. The results of univariate competing risk revealed that: using Deviance and Cox-Snell residuals as a response in within node homogeneity classification tree perform better than using other residuals irrespective of performance techniques. Bone marrow transplant data and double-blinded randomized clinical trial, conducted in other to compare two treatments for patients with prostate cancer were used to demonstrate the efficiency of our proposed method vis-à-vis the existing ones. Results from empirical studies of the bone marrow transplant data showed that the proposed model with Cox-Snell residual (Deviance=16.6498) performs better than both the Martingale residual (deviance=160.3592) and Deviance residual (Deviance=556.8822) in both event of interest and competing risks. Additionally, results from prostate cancer also reveal the performance of proposed model over the existing one in both causes, interestingly, Cox-Snell residual (MSE=0.01783563) outfit both the Martingale residual (MSE=0.1853148) and Deviance residual (MSE=0.8043366). Moreover, these results validate those obtained from the Monte-Carlo studies.

Keywords: within-node homogeneity, Martingale residual, modified Cox-Snell residual, classification and regression tree

Procedia PDF Downloads 244
3118 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 376
3117 Wireless Information Transfer Management and Case Study of a Fire Alarm System in a Residential Building

Authors: Mohsen Azarmjoo, Mehdi Mehdizadeh Koupaei, Maryam Mehdizadeh Koupaei, Asghar Mahdlouei Azar

Abstract:

The increasing prevalence of wireless networks in our daily lives has made them indispensable. The aim of this research is to investigate the management of information transfer in wireless networks and the integration of renewable solar energy resources in a residential building. The focus is on the transmission of electricity and information through wireless networks, as well as the utilization of sensors and wireless fire alarm systems. The research employs a descriptive approach to examine the transmission of electricity and information on a wireless network with electric and optical telephone lines. It also investigates the transmission of signals from sensors and wireless fire alarm systems via radio waves. The methodology includes a detailed analysis of security, comfort conditions, and costs related to the utilization of wireless networks and renewable solar energy resources. The study reveals that it is feasible to transmit electricity on a network cable using two pairs of network cables without the need for separate power cabling. Additionally, the integration of renewable solar energy systems in residential buildings can reduce dependence on traditional energy carriers. The use of sensors and wireless remote information processing can enhance the safety and efficiency of energy usage in buildings and the surrounding spaces.

Keywords: renewable energy, intelligentization, wireless sensors, fire alarm system

Procedia PDF Downloads 31
3116 Supermarket Shoppers Perceptions to Genetically Modified Foods in Trinidad and Tobago: Focus on Health Risks and Benefits

Authors: Safia Hasan Varachhia, Neela Badrie, Marsha Singh

Abstract:

Genetic modification of food is an innovative technology that offers a host of benefits and advantages to consumers. Consumer attitudes towards GM food and GM technologies can be identified a major determinant in conditioning market force and encouraging policy makers and regulators to recognize the significance of consumer influence on the market. This study aimed to investigate and evaluate the extent of consumer awareness, knowledge, perception and acceptance of GM foods and its associated health risks and benefit in Trinidad and Tobago, West Indies. The specific objectives of this study were to (determine consumer awareness to GM foods, ascertain their perspectives on health and safety risks and ethical issues associated with GM foods and determine whether labeling of GM foods and ingredients will influence consumers’ willingness to purchase GM foods. A survey comprising of a questionnaire consisting of 40 questions, both open-ended and close-ended was administered to 240 shoppers in small, medium and large-scale supermarkets throughout Trinidad between April-May, 2015 using convenience sampling. This survey investigated consumer awareness, knowledge, perception and acceptance of GM foods and its associated health risks/benefits. The data was analyzed using SPSS 19.0 and Minitab 16.0. One-way ANOVA investigated the effects categories of supermarkets and knowledge scores on shoppers’ awareness, knowledge, perception and acceptance of GM foods. Linear Regression tested whether demographic variables (category of supermarket, age of consumer, level of were useful predictors of consumer’s knowledge of GM foods). More than half of respondents (64.3%) were aware of GM foods and GM technologies, 28.3% of consumers indicated the presence of GM foods in local supermarkets and 47.1% claimed to be knowledgeable of GM foods. Furthermore, significant associations (P < 0.05) were observed between demographic variables (age, income, and education), and consumer knowledge of GM foods. Also, significant differences (P < 0.05) were observed between demographic variables (education, gender, and income) and consumer knowledge of GM foods. In addition, age, education, gender and income (P < 0.05) were useful predictors of consumer knowledge of GM foods. There was a contradiction as whilst 35% of consumers considered GM foods safe for consumption, 70% of consumers were wary of the unknown health risks of GM foods. About two-thirds of respondents (67.5%) considered the creation of GM foods morally wrong and unethical. Regarding GM food labeling preferences, 88% of consumers preferred mandatory labeling of GM foods and 67% of consumers specified that any food product containing a trace of GM food ingredients required mandatory GM labeling. Also, despite the declaration of GM food ingredients on food labels and the reassurance of its safety for consumption by food safety and regulatory institutions, the majority of consumers (76.1%) still preferred conventionally produced foods over GM foods. The study revealed the need to inform shoppers of the presence of GM foods and technologies, present the scientific evidence as to the benefits and risks and the need for a policy on labeling so that informed choices could be taken.

Keywords: genetically modified foods, income, labeling consumer awareness, ingredients, morality and ethics, policy

Procedia PDF Downloads 303
3115 Power Flow and Modal Analysis of a Power System Including Unified Power Flow Controller

Authors: Djilani Kobibi Youcef Islam, Hadjeri Samir, Djehaf Mohamed Abdeldjalil

Abstract:

The Flexible AC Transmission System (FACTS) technology is a new advanced solution that increases the reliability and provides more flexibility, controllability, and stability of a power system. The Unified Power Flow Controller (UPFC), as the most versatile FACTS device for regulating power flow, is able to control respectively transmission line real power, reactive power, and node voltage. The main purpose of this paper is to analyze the effect of the UPFC on the load flow, the power losses, and the voltage stability using NEPLAN software modules, Newton-Raphson load flow is used for the power flow analysis and the modal analysis is used for the study of the voltage stability. The simulation was carried out on the IEEE 14-bus test system.

Keywords: FACTS, load flow, modal analysis, UPFC, voltage stability

Procedia PDF Downloads 484
3114 Comprehensive Framework for Pandemic-Resilient Cities to Avert Future Migrant Crisis: A Case of Mumbai

Authors: Vasudha Thapa, Kiran Chappa

Abstract:

There is a pressing need to prepare cities in the developing countries of the global south such as India against the chaos created by COVID 19 pandemic and future disaster risks. This pandemic posed the nation with an unprecedented challenge of dealing with a wave of stranded migrant workers. These workers comprise the most vulnerable section of the society in case of any pandemic or disaster risks. The COVID 19 pandemic exposed the vulnerability of migrant workers in the urban form and the need for capacity-building strategies against future pandemics. This paper highlights the challenges of these migrant workers in the case of Mumbai city in lockdown, post lockdown, and the current uncertain scenarios. The paper deals with a thorough investigation of the existing and the recent policies and strategies taken by the Urban Local Bodies (ULBs), state, and central government to assist these migrants in the city during this mayhem of uncertainties. The paper looks further deep into the challenges and opportunities presented in the current scenario through the assessment of existing data and response to policy measures taken by the government organizations. The ULBs are at the forefront in the response to any disaster risk, hence the paper assesses the capacity gaps of the Urban local bodies in mitigating the risks posed by any pandemic-like situation. The study further recommends capacity-building strategies at various levels of governance and uniform policy measures to assist the migrant population of the city.

Keywords: urban resilience, covid 19, migrant population, India, capacity building, governance

Procedia PDF Downloads 164
3113 Health Risk Assessment According to Exposure with Heavy Metals and Physicochemical Parameters; Water Quality Index and Contamination Degree Evaluation in Bottled Water

Authors: Samaneh Abolli, Mahmood Alimohammadi

Abstract:

The survey analyzed 71 bottled water brands in Tehran, Iran, examining 10 physicochemical parameters and 16 heavy metals. The water quality index (WQI) approach was used to assess water quality, and methods such as carcinogen risk (CR) and hazard index (HI) were employed to evaluate health risks. The results indicated that the bottled water had good quality overall, but some brands were of poor or very poor quality. The study also revealed significant human health risks, especially for children, due to the presence of minerals and heavy metals in bottled water. Correlation analyses and risk assessments for various substances were conducted, providing valuable insights into the potential health impacts of the analyzed bottled water.

Keywords: bottled wate, rwater quality index, health risk assessment, contamination degree, heavy metal evaluation index

Procedia PDF Downloads 25
3112 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 58
3111 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 109
3110 Human Health Risk Assessment of Mercury-Contaminated Soils in Alebediah Mining Community, Sudan

Authors: Ahmed Elwaleed, Huiho Jeong, Ali H. Abdelbagi, Nguyen Thi Quynh, Koji Arizono, Yasuhiro Ishibashi

Abstract:

Artisanal and small-scale gold mining (ASGM) poses substantial risks to both human health and the environment, particularly through contamination of soil, water, and air. Prolonged exposure to ASGM-contaminated soils can lead to acute or chronic mercury toxicity. This study assesses the human health risks associated with mercury-contaminated soils and tailings in the Alebediah mining community in Sudan. Soil samples were collected from various locations within Alebediah, including ASGM areas, farmlands, and residential areas, along with tailings samples commonly found within ASGM sites. The evaluation of potential health risks to humans included the computation of the estimated daily intake (AvDI), the hazard quotient (HQ), and the hazard index (HI) for both adults and children. The primary exposure route identified as potentially posing a significant health risk was the volatilization of mercury from tailings samples, where mercury concentrations reached up to 25.5 mg/kg. In contrast, other samples within the ASGM area showed elevated mercury levels but did not present significant health risks, with HI values below 1. However, all areas indicated HI values above 1 for the remaining exposure routes. The study observed a decrease in mercury concentration with increasing distance from the ASGM community. Additionally, soil samples revealed elevated mercury levels exceeding background values, prompting an assessment of contamination levels using the enrichment factor (EF). The findings indicated that farmlands and residential areas exhibited depleted EF, while areas surrounding the ASGM community showed none to moderate pollution. In contrast, ASGM areas exhibited significant to extreme pollution. A GIS map was generated to visually depict the extent of mercury pollution, facilitating communication with stakeholders and decision-makers.

Keywords: mercury pollution, artisanal and small-scale gold mining, health risk assessment, hazard index, soil and tailings, enrichment factor

Procedia PDF Downloads 50
3109 Microscopic Analysis of Bulk, High-Tc Superconductors by Transmission Kikuchi Diffraction

Authors: Anjela Koblischka-Veneva, Michael R. Koblischka

Abstract:

In this contribution, the Transmission-Kikuchi Diffraction (TKD, or sometimes called t-EBSD) is applied to bulk, melt-grown YBa₂Cu₃O₇ (YBCO) superconductors prepared by the MTMG (melt-textured melt-grown) technique and the infiltration growth (IG) technique. TEM slices required for the analysis were prepared by means of Focused Ion-Beam (FIB) milling using mechanically polished sample surfaces, which enable a proper selection of the interesting regions for investigations. The required optical transparency was reached by an additional polishing step of the resulting surfaces using FIB-Ga-ion and Ar-ion milling. The improved spatial resolution of TKD enabled the investigation of the tiny YBa₂Cu₃O₅ (Y-211) particles having a diameter of about 50-100 nm embedded within the YBCO matrix and of other added secondary phase particles. With the TKD technique, the microstructural properties of the YBCO matrix are studied in detail. It is observed that the matrix shows the effects of stress/strain, depending on the size and distribution of the embedded particles, which are important for providing additional flux pinning centers in such superconducting bulk samples. Using the Kernel Average Misorientation (KAM) maps, the strain induced in the superconducting matrix around the particles, which increases the flux pinning effectivity, can be clearly revealed. This type of analysis of the EBSD/TKD data is, therefore, also important for other material systems, where nanoparticles are embedded in a matrix.

Keywords: transmission Kikuchi diffraction, EBSD, TKD, embedded particles, superconductors YBa₂Cu₃O₇

Procedia PDF Downloads 111
3108 Random Access in IoT Using Naïve Bayes Classification

Authors: Alhusein Almahjoub, Dongyu Qiu

Abstract:

This paper deals with the random access procedure in next-generation networks and presents the solution to reduce total service time (TST) which is one of the most important performance metrics in current and future internet of things (IoT) based networks. The proposed solution focuses on the calculation of optimal transmission probability which maximizes the success probability and reduces TST. It uses the information of several idle preambles in every time slot, and based on it, it estimates the number of backlogged IoT devices using Naïve Bayes estimation which is a type of supervised learning in the machine learning domain. The estimation of backlogged devices is necessary since optimal transmission probability depends on it and the eNodeB does not have information about it. The simulations are carried out in MATLAB which verify that the proposed solution gives excellent performance.

Keywords: random access, LTE/LTE-A, 5G, machine learning, Naïve Bayes estimation

Procedia PDF Downloads 123
3107 The Politics of Health Education: A Cultural Analysis of Tobacco Control Communication in India

Authors: Ajay Ivan

Abstract:

This paper focuses on the cultural politics of health-promotional and disease-preventive pedagogic practices in the context of the national tobacco control programme in India. Tobacco consumption is typically problematised as a paradox: tobacco poses objective health risks such as cancer and heart disease, but its production, sale and export contribute significantly to state revenue. A blanket ban on tobacco products, therefore, is infeasible though desirable. Instead, initiatives against tobacco use have prioritised awareness creation and behaviour change to reduce its demand. This paper argues that public health communication is not, as commonly assumed, an apolitical and neutral transmission of disease-preventive information. Drawing on Michel Foucault’s concept of governmentality, it examines such campaigns as techniques of disciplining people rather than coercing them to give up tobacco use, which would be both impractical and counter-productive. At the level of the population, these programmes constitute a security mechanism that reduces risks without eliminating them, so as to ensure an optimal level of public health without hampering the economy. Anti-tobacco pedagogy thus aligns with a contemporary paradigm of health that emphasises risk-assessment and lifestyle management as tools of governance, using pedagogic techniques to teach people how to be healthy. The paper analyses the pictorial health warnings on tobacco packets and anti-tobacco advertisements in movie theatres mandated by the state, along with awareness-creation messages circulated by anti-tobacco advocacy groups in India, to show how they discursively construct tobacco and its consumption as a health risk. Smoking is resignified from a pleasurable and sociable practice to a deadly addiction that jeopardises the health of those who smoke and those who passively inhale the smoke. While disseminating information about the health risks of tobacco, these initiatives employ emotional and affective techniques of persuasion to discipline tobacco users. They incite fear of death and of social ostracism to motivate behaviour change, complementing their appeals to reason. Tobacco is portrayed as a grave moral danger to the family and a detriment to the vitality of the nation, such that using it contradicts one’s duties as a parent or citizen. Awareness programmes reproduce prevailing societal assumptions about health and disease, normalcy and deviance, and proper and improper conduct. Pedagogy thus functions as an apparatus of public health governance, recruiting subjects as volunteers in their own regulation and aligning their personal goals and aspirations to the objectives of tobacco control. The paper links this calculated management of subjectivity and the self-responsibilisation of the pedagogic subject to a distinct mode of neoliberal civic governance in contemporary India. Health features prominently in this mode of governance that serves the biopolitical obligation of the state as laid down in Article 39 of the Constitution, which includes a duty to ensure the health of its citizens. Insofar as the health of individuals is concerned, the problem is how to balance this duty of the state with the fundamental right of the citizen to choose how to live. Public health pedagogy, by directing the citizen’s ‘free’ choice without unduly infringing upon it, offers a tactical solution.

Keywords: public health communication, pedagogic power, tobacco control, neoliberal governance

Procedia PDF Downloads 58
3106 A Supply Chain Risk Management Model Based on Both Qualitative and Quantitative Approaches

Authors: Henry Lau, Dilupa Nakandala, Li Zhao

Abstract:

In today’s business, it is well-recognized that risk is an important factor that needs to be taken into consideration before a decision is made. Studies indicate that both the number of risks faced by organizations and their potential consequences are growing. Supply chain risk management has become one of the major concerns for practitioners and researchers. Supply chain leaders and scholars are now focusing on the importance of managing supply chain risk. In order to meet the challenge of managing and mitigating supply chain risk (SCR), we must first identify the different dimensions of SCR and assess its relevant probability and severity. SCR has been classified in many different ways, and there are no consistently accepted dimensions of SCRs and several different classifications are reported in the literature. Basically, supply chain risks can be classified into two dimensions namely disruption risk and operational risk. Disruption risks are those caused by events such as bankruptcy, natural disasters and terrorist attack. Operational risks are related to supply and demand coordination and uncertainty, such as uncertain demand and uncertain supply. Disruption risks are rare but severe and hard to manage, while operational risk can be reduced through effective SCM activities. Other SCRs include supply risk, process risk, demand risk and technology risk. In fact, the disorganized classification of SCR has created confusion for SCR scholars. Moreover, practitioners need to identify and assess SCR. As such, it is important to have an overarching framework tying all these SCR dimensions together for two reasons. First, it helps researchers use these terms for communication of ideas based on the same concept. Second, a shared understanding of the SCR dimensions will support the researchers to focus on the more important research objective: operationalization of SCR, which is very important for assessing SCR. In general, fresh food supply chain is subject to certain level of risks, such as supply risk (low quality, delivery failure, hot weather etc.) and demand risk (season food imbalance, new competitors). Effective strategies to mitigate fresh food supply chain risk are required to enhance operations. Before implementing effective mitigation strategies, we need to identify the risk sources and evaluate the risk level. However, assessing the supply chain risk is not an easy matter, and existing research mainly use qualitative method, such as risk assessment matrix. To address the relevant issues, this paper aims to analyze the risk factor of the fresh food supply chain using an approach comprising both fuzzy logic and hierarchical holographic modeling techniques. This novel approach is able to take advantage the benefits of both of these well-known techniques and at the same time offset their drawbacks in certain aspects. In order to develop this integrated approach, substantial research work is needed to effectively combine these two techniques in a seamless way, To validate the proposed integrated approach, a case study in a fresh food supply chain company was conducted to verify the feasibility of its functionality in a real environment.

Keywords: fresh food supply chain, fuzzy logic, hierarchical holographic modelling, operationalization, supply chain risk

Procedia PDF Downloads 223
3105 The Development of a School-Based Wellbeing Programme to Enhance the Social Functioning of Learners in Middle Childhood

Authors: Soretha Beets, Izanette Van Schalkwyk, Doret K. Kirsten

Abstract:

Children in middle childhood are exposed to various risks, for example, risks associated with poverty and/or dysfunctional families, that may threaten their social functioning. The aim of this study was to develop and design a programme that can be presented to children in middle childhood in order to enhance their social functioning towards better wellbeing. The skills and competencies needed to be included in the programme were identified by means of a literature review and 4 focus groups with educators from 4 sub-areas in a certain district in the North-West Province of South Africa. The programme consists of 8 sessions, presented in a certain order. The sessions cover the following aspects: self-esteem and gratitude, self-regulation and goal-setting, values and relationships, communication and listening, conflict management, emotional competence, and resilient coping. These aspects may benefit children in the middle child’s wellbeing and live on the short-term and may also hold long-term benefits.

Keywords: middle childhood, programme development, social functioning, wellbeing

Procedia PDF Downloads 136