Search results for: vulnerable
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1061

Search results for: vulnerable

671 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 116
670 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 231
669 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines

Authors: Pankaj Kumar

Abstract:

Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.

Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap

Procedia PDF Downloads 87
668 Baseline Study on Human Trafficking Crimes: A Case Study of Mapping Human Trafficking Crimes in East Java Province, Indonesia

Authors: Ni Komang Desy Arya Pinatih

Abstract:

Transnational crime is a crime with 'unique' feature because the activities benefit the lack of state monitoring on the borders so dealing with it cannot be based on conventional engagement but also need joint operation with other countries. On the other hand with the flow of globalization and the growth of information technology and transportation, states become more vulnerable to transnational crime threats especially human trafficking. This paper would examine transnational crime activities, especially human trafficking in Indonesia. With the case study on the mapping of human trafficking crime in East Java province, Indonesia, this paper would try to analyze how the difference in human trafficking crime trends at the national and sub-national levels. The findings of this research were first, there is difference in human trafficking crime trends whereas at the national level the trend is rising, while at sub-national (province) level the trend is declining. Second, regarding the decline of human trafficking number, it’s interesting to see how the method to decrease human trafficking crime in East Jawa Province in order to reduce transnational crime accounts in the region. These things are hopefully becoming a model for transnational crimes engagement in other regions to reduce human trafficking numbers as much as possible.

Keywords: transnational crime, human trafficking, southeast Asia, anticipation model on transnational crimes

Procedia PDF Downloads 281
667 Urban Areas Management in Developing Countries: Analysis of the Urban Areas Crossed with Risk of Storm Water Drains, Aswan-Egypt

Authors: Omar Hamdy, Schichen Zhao, Hussein Abd El-Atty, Ayman Ragab, Muhammad Salem

Abstract:

One of the most risky areas in Aswan is Abouelreesh, which is suffering from flood disasters, as heavy deluge inundates urban areas causing considerable damage to buildings and infrastructure. Moreover, the main problem was the urban sprawl towards this risky area. This paper aims to identify the urban areas located in the risk areas prone to flash floods. Analyzing this phenomenon needs a lot of data to ensure satisfactory results; however, in this case the official data and field data were limited, and therefore, free sources of satellite data were used. This paper used ArcGIS tools to obtain the storm water drains network by analyzing DEM files. Additionally, historical imagery in Google Earth was studied to determine the age of each building. The last step was to overlay the urban area layer and the storm water drains layer to identify the vulnerable areas. The results of this study would be helpful to urban planners and government officials to make the disasters risk estimation and develop primary plans to recover the risky area, especially urban areas located in torrents.

Keywords: risk area, DEM, storm water drains, GIS

Procedia PDF Downloads 440
666 Analysis of Experimentally Designed Soundproof Gypsum Partition Wall's Sections in Terms of Structural Engineering

Authors: Abdulkerim Ilgun, Ahmad Javid Zia

Abstract:

In developing countries, the urban populations are increasing rapidly and with this increment the residential areas are experiencing major problems. Construction of high-rise buildings in confined spaces is one of the most practical solutions for this problem. However, by living in high-rise buildings and sharing common residential areas, residents will face many problems. Irritating sound problem which is known as noise is one of the major problems mentioned above. The second most important problem is the weight of the high-rise buildings which makes the structure more vulnerable to earthquakes. To decrease earthquake loads it’s very important to decrease the weight of the buildings. To solve the problem of noise and keep the building weight at minimum level, experimentally designed soundproof gypsum partition wall which has optimum thickness has been used in high-rise story building and the results have been compared with ordinary brick partition walls. In this compression the effect of weights of soundproof gypsum walls and ordinary brick walls in accordance to structural engineering have been investigated.

Keywords: cellubor, gypsum board, gypsum partition walls, light partition walls, noise, sound

Procedia PDF Downloads 296
665 An Evaluation of the Impact of Social Media on Nigerian Youths

Authors: Haruna Shola Adeosun, Lekan M. Togunwa, Ajoke F. Adebiyi

Abstract:

This paper examines the impact of social media on Nigerian Youths particularly in Nigeria. This study reviewed secondary sources data. The research adopted survey method which involves the use of questionnaire that was administered to gather primary data analysis and presentation were done with the use of tables, figures, percentages and chi-square were used to test the hypotheses formulated. The study revealed that social media consumers, especially Facebook are prone to the benefits or risks aspect of its contents. At this expense, what user derived, seeks, sought and gains from such media depend on the motive they are being used for. The study also revealed that users have the tendency to be positively influenced through heavy or over exposure to numerous contents that are damaging and harmful. This means that social media usage may be considered as good or bad. As its contents may or may not subject consumers to vulnerable use depending on what is saved from it. The study recommends that the use of Facebook should be subjected to gate keeping and monitoring in order to control the activities of users that embrace depression, bullying, sexing and sexual harassment as a way of life. Parents should close watch on their children and caution them towards cultivating the habit of over exposure to social sites so at to protect them form risks social media poses.

Keywords: evaluation, impact, soocial media, nigerian youths

Procedia PDF Downloads 274
664 The Perspective of Smart Thermoregulation in Personal Protective Equipment

Authors: Alireza Saidi

Abstract:

Aside from injuries due to direct contact with hot or cold substances or objects, exposure to extreme temperatures in the workplace involves physical hazards to workers. On the other hand, a poorly acclimatized worker may have reduced performance and alertness and may, therefore, be more vulnerable to the risk of accidents and injuries. Due to the incompatibility of the standards put in place with certain workplaces and the lack of thermoregulation in many protective equipments, thermal strains remain among the physical risks most present in many work sectors. However, many of these problems can be overcome thanks to the potential of intelligent textile technologies allowing intelligent thermoregulation in protective equipment. Nowadays, technologies such as heating elements, cooling elements are applied in products intended for sport and leisure, and research work has been carried out in the integration of temperature sensors and thermal stress detectors in personal protective equipment. However, the usage of all of these technologies in personal protective equipment remains very marginal. This article presents a portrait of the current state of intelligent thermoregulation systems by carrying out a synthesis of technical developments, which is accompanied by a gap analysis of current developments. Thus, the research work necessary for the adaptation and integration of intelligent thermoregulation systems with personal protective equipment is discussed in order to offer a perspective of future developments.

Keywords: personal protective equipment, smart textiles, thermoregulation, thermal strain

Procedia PDF Downloads 90
663 Community and School Partnerships: Raising Student Outcomes through Shared Goals and Values Using Integrated Learning as a Change Model

Authors: Sheila Santharamohana, Susan Bennett

Abstract:

Historically, the attrition rates in secondary schools of Indigenous people or Orang Asli of Malaysia have been a cause for nationwide concern. Efforts to increase student engagement focusing on curriculum re-design and aid have not had the targeted impact. The scope of the research explored a change model incorporating project-based learning and wrap-around support through school-community partnerships to increase Orang Asli engagement, student outcomes and improve cultural connectedness. The evaluation methodology was mixed-method comprising a student questionnaire, interviews, and document analysis. Data and evidence were gathered from school staff, community, the Orang Asli governmental authority (JAKOA) and external agencies. Findings from the year-long research suggests shared values and goals in school-community partnerships foster responsive leadership and is key to safeguarding vulnerable Orang Asli, resulting in improved student outcomes. The research highlighted the barriers to the recognition and distinct needs and unique values of the Orang Asli that impact their educational equity and outcomes.

Keywords: Indigenous Education, Cultural Connectedness, School-Community Partnership, Student Outcomes

Procedia PDF Downloads 121
662 Health Policies towards Refugees: A Comparison of Policy Implementations from the EU and Turkey

Authors: Pelin Sonmez

Abstract:

Health services provided to refugees and asylum seekers are very important and of priority due to their physical damages during the war and conflict situation, possible diseases in migration journey and negative psychological mood. However, there are very poor international standards in regards to providing health services to these people, which in return cause each country to differ their regulations. United Nations Sustainable Development Goals that are in effect as of 2016 assure that attention should be provided to non-citizen vulnerable groups in terms of health policies and they should be included in the global development, thereby aims to decrease the problems arising from providing health services to refugees. Though, we should not forget that these are the recent and yet uncertain attempts, mostly, as a result of Syrian War's forced migration wave. As an attempt to reveal different attitudes of international actors, this study compares/analyzes health services provided to refugees and asylum seekers on the basis of Turkey-EU policy implementations. While doing so, two research data will be focused upon. In this globe, results of the focus group interviews and a field study in a specific work (from its health related section) which was done in 2017 to 5000 Syrian women living in Turkey and presented to Republic of Turkey Disaster and Emergency Management Presidency will be utilized.

Keywords: European Union, health policies, refugee, Syrian women, Turkey

Procedia PDF Downloads 170
661 Modern Cardiac Surgical Outcomes in Nonagenarians: A Multicentre Retrospective Observational Study

Authors: Laurence Weinberg, Dominic Walpole, Dong-Kyu Lee, Michael D’Silva, Jian W. Chan, Lachlan F. Miles, Bradley Carp, Adam Wells, Tuck S. Ngun, Siven Seevanayagam, George Matalanis, Ziauddin Ansari, Rinaldo Bellomo, Michael Yii

Abstract:

Background: There have been multiple recent advancements in the selection, optimization and management of cardiac surgical patients. However, there is limited data regarding the outcomes of nonagenarians undergoing cardiac surgery, despite this vulnerable cohort increasingly receiving these interventions. This study describes the patient characteristics, management and outcomes of a group of nonagenarians undergoing cardiac surgery in the context of contemporary peri-operative care. Methods: A retrospective observational study was conducted of patients 90 to 99 years of age (i.e., nonagenarians) who had undergone cardiac surgery requiring a classic median sternotomy (i.e., open-heart surgery). All operative indications were included. Patients who underwent minimally invasive surgery, transcatheter aortic valve implantation and thoracic aorta surgery were excluded. Data were collected from four hospitals in Victoria, Australia, over an 8-year period (January 2012 – December 2019). The primary objective was to assess six-month mortality in nonagenarians undergoing open-heart surgery and to evaluate the incidence and severity of postoperative complications using the Clavien-Dindo classification system. The secondary objective was to provide a detailed description of the characteristics and peri-operative management of this group. Results: A total of 12,358 adult patients underwent cardiac surgery at the study centers during the observation period, of whom 18 nonagenarians (0.15%) fulfilled the inclusion criteria. The median (IQR) [min-max] age was 91 years (90.0:91.8) [90-94] and 14 patients (78%) were men. Cardiovascular comorbidities, polypharmacy and frailty, were common. The median (IQR) predicted in-hospital mortality by EuroSCORE II was 6.1% (4.1-14.5). All patients were optimized preoperatively by a multidisciplinary team of surgeons, cardiologists, geriatricians and anesthetists. All index surgeries were performed on cardiopulmonary bypass. Isolated coronary artery bypass grafting (CABG) and CABG with aortic valve replacement were the most common surgeries being performed in four and five patients, respectively. Half the study group underwent surgery involving two or more major procedures (e.g. CABG and valve replacement). Surgery was undertaken emergently in 44% of patients. All patients except one experienced at least one postoperative complication. The most common complications were acute kidney injury (72%), new atrial fibrillation (44%) and delirium (39%). The highest Clavien-Dindo complication grade was IIIb occurring once each in three patients. Clavien-Dindo grade IIIa complications occurred in only one patient. The median (IQR) postoperative length of stay was 11.6 days (9.8:17.6). One patient was discharged home and all others to an inpatient rehabilitation facility. Three patients had an unplanned readmission within 30 days of discharge. All patients had follow-up to at least six months after surgery and mortality over this period was zero. The median (IQR) duration of follow-up was 11.3 months (6.0:26.4) and there were no cases of mortality observed within the available follow-up records. Conclusion: In this group of nonagenarians undergoing cardiac surgery, postoperative six-month mortality was zero. Complications were common but generally of low severity. These findings support carefully selected nonagenarian patients being offered cardiac surgery in the context of contemporary, multidisciplinary perioperative care. Further, studies are needed to assess longer-term mortality and functional and quality of life outcomes in this vulnerable surgical cohort.

Keywords: cardiac surgery, mortality, nonagenarians, postoperative complications

Procedia PDF Downloads 106
660 Rethinking Everyday Urban Spaces Using Principles of Resilient Urbanism: A Case of Flooding in Thiruvalla

Authors: Prejily Thomas John

Abstract:

Flooding of urban areas often has an adverse impact on the dense population residing in cities. The vulnerable areas are the most affected due to flooding, which even results in loss of life. The increasing trend of urban floods is a universal phenomenon and leads to a vital loss in the physical, economic, social, and environmental dimensions. The shift from floods being natural disasters to man-made disasters due to unplanned urban growth is evident from national and international reports. Thiruvalla, bordered by the Manimala River in the Pathanamthitta district, is an important urban node and a drainage point of various estuaries. The city is often faced with flash floods and overflow from rivers since it is a low-lying land. The need for urban flood resilience for planned urban development is a necessity for livability in consideration of the topography. The paper focuses on developing an urban design framework in everyday urban spaces through the principles of resilient urbanism. The principles guide the creation of flood-resilient spaces and productive urban landscapes for the city to enable better and safer living conditions. A flood-resilient city not only prepares the city for disasters but also improves the ecological and economic conditions.

Keywords: everyday urban spaces, flood resilience, resilient urbanism, productive urban landscapes

Procedia PDF Downloads 67
659 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 171
658 Computational Fluid Dynamics Simulation to Study the Effect of Ambient Temperature on the Ventilation in a Metro Tunnel

Authors: Yousef Almutairi, Yajue Wu

Abstract:

Various large-scale trends have characterized the current century thus far, including increasing shifts towards urbanization and greater movement. It is predicted that there will be 9.3 billion people on Earth in 2050 and that over two-thirds of this population will be city dwellers. Moreover, in larger cities worldwide, mass transportation systems, including underground systems, have grown to account for the majority of travel in those settings. Underground networks are vulnerable to fires, however, endangering travellers’ safety, with various examples of fire outbreaks in this setting. This study aims to increase knowledge of the impacts of extreme climatic conditions on fires, including the role of the high ambient temperatures experienced in Middle Eastern countries and specifically in Saudi Arabia. This is an element that is not always included when assessments of fire safety are made (considering visibility, temperatures, and flows of smoke). This paper focuses on a tunnel within Riyadh’s underground system as a case study and includes simulations based on computational fluid dynamics using ANSYS Fluent, which investigates the impact of various ventilation systems while identifying smoke density, speed, pressure and temperatures within this tunnel.

Keywords: fire, subway tunnel, CFD, mechanical ventilation, smoke, temperature, harsh weather

Procedia PDF Downloads 105
657 Potentially Inappropriate Prescribing in Elderly Population

Authors: Ajit Kumar Sah, Rajesh Kumar Jha, Phoolgen Sah, Dev Kumar Shah

Abstract:

Older individuals often suffer from multiple systemic diseases and are particularly more vulnerable to potentially inappropriate medicine prescribing. Inappropriate medication can cause serious medical problem for the elderly. The purpose of this study was to determine the prevalence of potentially inappropriate medicine (PIM) prescribing in older Nepalese patients in a medicine outpatient department. Beers’ criteria are the most widely used tools to assess PIM to elderly patients. Prospective observational analysis of drugs prescribed in medicine out-patient department (OPD) of a hospital of Bharatpur, Chitwan, Nepal during November 2011 to October 2012 to 869 older adults aged 65 years and above. The use of potentially inappropriate medications (PIM) in elderly patients was analyzed using Beers Criteria updated to 2013. In the 869 patients included the average number of drugs prescribed per prescription was 5.56. The most commonly used drugs were atenolol (24.3%), amlodipine (23.16%), paracetamol (17.6%), salbutamol (15.72%) and vitamin B complex (13.26%). The total number of medications prescribed was 4833. At least one instance of PIM was experienced by approximately 26.3% of patients when evaluated using the Beers criteria. Potentially inappropriate medications are highly prevalent among older patients attending medical OPD and are associated with a number of medications prescribed. Further research is warranted to study the impact of PIMs towards health-related outcomes in these elderly.

Keywords: Beers criteria, elderly, polypharmacy, potentially inappropriate medicines

Procedia PDF Downloads 545
656 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 95
655 Population Dynamics of Juvenile Dusky Groupers, Epinephelus Marginatus: "Lowe, 1834" From Two Sites in Terceira Island, Azores, Portugal

Authors: Regina Streltsov

Abstract:

The Archipelago of the Azores in the NE Atlantic is a hot spot of marine biodiversity, both pelagic and demersal. Epinephelus marginatus is a solitary species commonly observed in these waters, with distinct territorial/residential behaviors from their post- larva and juvenile stages to the adult phase. Being commercially high valued species, about 13% of all groupers (Family Epinephelidae) face an increasing pressure that has produced known impacts in both the abundance and distribution of this group of fishes. Epinephelus marginatus is currently assessed by the IUCN as a vulnerable species. Dusky gropers inhabit rocky bottoms from shallow waters down to 200 m. Juveniles are usually found in shallow shoreline waters. Population dynamics of juveniles can lead to a better understanding of the competition for resources and predation and further conservation measures that must be taken upon dusky groupers. This study is carried out in rocky reefs from two sheltered bays on the south and north coast of the island in two different spots with four sampling sites in total. Using Transects individuals are counted at the peak of high tide and all abiotic factors are recorded. Our goal is to complete a statistically significant number of observations in order to detail these populations and to better understand their dynamics and dimension.

Keywords: Azores, dusky groupers, Epinephelus marginatus, population dynamics

Procedia PDF Downloads 145
654 Morphology of the Acetabular Cartilage Surface in Elderly Cadavers Analyzing the Contact between the Acetabulum and Femoral Head

Authors: Keisuke Akiyama, Takashi Sakai, Junichiro Koyanagi, Hideki Yoshikawa, Kazuomi Sugamoto

Abstract:

The geometry of acetabular cartilage surface plays an important role in hip joint biomechanics. The aim of this study was to analyze the morphology of acetabular articular cartilage surface in elderly subjects using a 3D-digitizer. Twenty hemipelves from 12 subjects (mean ages 85 years) were scanned with 3D-digitizer. Each acetabular surface model was divided into four regions: anterosuperior (AS), anteroinferior (AI), posterosuperior (PS), and posteroinferior (PI). In the global acetabulum and each region, the acetabular sphere radius and the standard deviation (SD) of the distance from the acetabular sphere center to the acetabular cartilage surface were calculated. In the global acetabulum, the distance between the acetabular surface model and the maximum sphere which did not penetrate over the acetabular surface model was calculated as the inferred femoral head, and then the distribution was mapped at intervals of 0.5 mm. The SD in AS was significantly larger than that in AI (p = 0.006) and PI (p = 0.001). The SD in PS was significantly larger than that in PI (p = 0.005). The closest region (0-0.5 mm) tended to be distributed at anterior or posterosuperior acetabular edge. The contact between the femoral head and acetabulum might start at the periphery of the lunate surface, especially in the anterior or posterosuperior region. From viewpoint of acetabular morphology, the acetabular articular cartilage in the anterior or posterosuperior edge could be more vulnerable due to direct contact mechanism.

Keywords: acetabulum, cartilage, morphology, 3D-digitizer

Procedia PDF Downloads 332
653 Elevated of Interleukin-6 Serum Levels in Pregnant Women with Corona Virus Disease 2019

Authors: Dzatur Rizqi Fathienah Syarifuddin, Isharyah Sunarno, Eddy Hartono, Siti Maisuri T. Chalid

Abstract:

Introduction: The potential impact of coronavirus disease 2019 (COVID-19) on the health of expectant mothers and fetuses has strained attention. Pregnant women are considered a vulnerable category to respiratory infections. Moreover, several inflammatory cytokines are 2-100 times more abundant in COVID-19 with cytokine storms than in normal individuals; interleukin 6 (IL-6) exhibits much higher elevations. Investigating potential relationships between IL-6 serum levels and the severity of COVID-19 symptoms in pregnant women is the aim of this study. Material and Methods: Sixty-two eligible pregnant women were divided into a positive COVID-19 group (n=31) and a negative COVID-19 group (n=31) in this cross-sectional study. The research subjects were selected using consecutive sampling. The IL-6 was measured from a vein blood specimen using ELISA methods. Results: The COVID-19 positive group had a higher median IL-6 serum level (45.35 (35.15- 153.99) vs. 38.86 ± 11.43 (15.02-59.52), p=0.03) than the negative group. On the other hand, the IL-6 serum level had comparable value according to the COVID-19 symptoms severity (88.35 ± 36.14 ng/mL vs. 51.09 ± 25.48 ng/mL vs. 56.02 ± 33.20 ng/mL in moderate symptoms, mild symptoms, and asymptomatic, respectively; p=0.152). Conclusion: Although the IL-6 serum levels are not related to COVID-19 symptoms severity, an elevated of this biomarker was found in pregnant women with affected diagnoses.

Keywords: interleukin-6, pregnancy, COVID-19, several inflammatory

Procedia PDF Downloads 41
652 Exploring the Physical Environment and Building Features in Earthquake Disaster Areas

Authors: Chang Hsueh-Sheng, Chen Tzu-Ling

Abstract:

Earthquake is an unpredictable natural disaster and intensive earthquakes have caused serious impacts on social-economic system, environmental and social resilience. Conventional ways to mitigate earthquake disaster are to enhance building codes and advance structural engineering measures. However, earthquake-induced ground damage such as liquefaction, land subsidence, landslide happen on places nearby earthquake prone or poor soil condition areas. Therefore, this study uses spatial statistical analysis to explore the spatial pattern of damaged buildings. Afterwards, principle components analysis (PCA) is applied to categorize the similar features in different kinds of clustered patterns. The results show that serious landslide prone area, close to fault, vegetated ground surface and mudslide prone area are common in those highly damaged buildings. In addition, the oldest building might not be directly referred to the most vulnerable one. In fact, it seems that buildings built between 1974 and 1989 become more fragile during the earthquake. The incorporation of both spatial statistical analyses and PCA can provide more accurate information to subsidize retrofit programs to enhance earthquake resistance in particular areas.

Keywords: earthquake disaster, spatial statistic analysis, principle components analysis (pca), clustered patterns

Procedia PDF Downloads 295
651 Mastery and Lifestyle Intervention to Prevent Preterm Birth among Latinas

Authors: Kathie Records, R. Jeanne Ruiz, Kimberly Ayers, Rebecca Pasillas

Abstract:

Background: Preterm births of less than 37 weeks gestation occur disproportionately to Hispanics living along the U.S.-Mexico border. Prematurity has devastating and costly effects on children, families and the health care system. Few preventive interventions have been tested for this vulnerable group. Objectives: To present the modeling and pilot testing of the theory-based Mastery Lifestyle Intervention (MLI), designed to reduce and prevent PTB among Mexican American women (the terms Hispanics or Latinas will also be used to represent this group) living in the United States. Design and Methods: The conceptualization of the problem of preterm births and the available literature underpinning the mastery lifestyle intervention will be reviewed. The lifestyle intervention includes foundational components of problem solving therapy and acceptance and commitment therapy. Findings from implementation of a one-group pilot test and focus group evaluated the feasibility and acceptability of the MLI. Summary: Participants found the MLI to be feasible and acceptable, and reported perceiving improved health status and familial relationships. Suggestions were provided for modifications prior to efficacy testing. The MLI appears to be a theoretically and empirically grounded intervention that holds promise for preventing preterm births among Latinas.

Keywords: birth, Hispanic, intervention, stress

Procedia PDF Downloads 352
650 Gender Based of Sustainable Food Self-Resilience for Village Using Dynamic System Model

Authors: Kholil, Laksanto Utomo

Abstract:

The food needs of the Indonesian people will continue increase year to year due to the increase of population growth. For ensuring food securityand and resilience, the government has developed a program food self-resilience village since 2006. Food resilience is a complex system, consisting of subsystem availability, distribution and consumption of the sufficiency of food consumed both in quantity and quality. Low access, and limited assets to food sources is the dominant factor vulnerable of food. Women have a major role in supporting the productive activities of the family to meet food sufficiency and resilience. The purpose of this paper is to discuss the model of food self-resilience village wich gender responsive by using a dynamic system model. Model will be developed into 3 level: family, vilage, and regency in accordance with the concept of village food resilience model wich has been developed by ministry of agriculture. Model development based on the results of experts discussion and field study. By some scenarios and simulation models we will able to develop appropriate policy strategies for family food resilience. The result of study show that food resilience was influenced by many factors: goverment policies, technology, human resource, and in the same time it will be a feed back for goverment policies and number of poor family.

Keywords: food availability, food sufficiency, gender, model dynamic, law enfrocement

Procedia PDF Downloads 521
649 Development of an Information System Based on the Establishment and Evaluation of Performance Rating by Application Part/Type of Remodeling Element Technologies

Authors: Sungwon Jung

Abstract:

The percentage of 20 years or older apartment houses in South Korea is approximately 20% (1.55 million houses), and the explosive increase of aged houses is expected around the first planned new towns. Accordingly, we should prepare for social issues such as difficulty of housing lease and degradation of housing performance. The improvement of performance of aged houses is essential for achieving the national energy and carbon reduction goals, and we should develop techniques to respond to the changing construction environment. Furthermore, we should develop a performance evaluation system that is appropriate for the demands of residents such as the improvement of remodeling floor plan by performance improvement in line with the residence type of the housing vulnerable groups such as low-income group and elderly people living alone. For this purpose, remodeling techniques and business models optimized for the target complexes must be spread through the development of various business models. In addition, it is necessary to improve the remodeling business by improving the laws and systems related to the improvement of the residential performance and to prepare techniques to respond to the increasing business demands. In other words, performance improvement and evaluation and knowledge systems need to be researched as new issues related to remodeling that has not been addressed in the existing research.

Keywords: remodelling, performance evaluation, web-based system, big data

Procedia PDF Downloads 211
648 The Effect of Vertical Shear-link in Improving the Seismic Performance of Structures with Eccentrically Bracing Systems

Authors: Mohammad Reza Baradaran, Farhad Hamzezarghani, Mehdi Rastegari Ghiri, Zahra Mirsanjari

Abstract:

Passive control methods can be utilized to build earthquake resistant structures, and also to strengthen the vulnerable ones. One of the most effective, yet simple passive control methods is the use of vertical shear-links (VSL) in systems with eccentric bracing. In fact, vertical shear-links dissipate the earthquake energy and act like a ductile fuse. In this paper, we studied the effect of this system in increasing the ductility and energy dissipation and also modeled the behavior of this type of eccentric bracing, and compared the hysteresis diagram of the modeled samples with the laboratory samples. We studied several samples of frames with vertical shear-links in order to assess the behavior of this type of eccentric bracing. Each of these samples was modeled in finite element software ANSYS 9.0, and was analyzed under the static cyclic loading. It was found that vertical shear-links have a more stable hysteresis loops. Another analysis showed that using honeycomb beams as the horizontal beam along with steel reinforcement has no negative effect on the hysteresis behavior of the sample.

Keywords: vertical shear-link, passive control, cyclic analysis, energy dissipation, honeycomb beam

Procedia PDF Downloads 478
647 Differential Infection of Primary Human B-Cells and EBV Positive B-Lymphoma Cell Lines by Recombinant AAV Serotypes

Authors: Elham Ahmadi, Mehrdad Ravanshad, Joyce Fingeroth, Mazyar Ziyaeyan, Rajesh Panigrahi, Jun Xie, Gao Guangping

Abstract:

B-cell proliferative disorders often occur among persons that are T-cell compromised. These disorders are primarily EBV+ and can first present with a focal lesion. Direct introduction of oncolytic viruses into localized tumors provides theoretical advantages over chemotherapy and immunotherapy by reducing systemic toxicity, to which the immunocompromised host is most vulnerable. Widely studied as a vehicle for gene therapy, AAV has only rarely been applied to treat cancer. As a prelude to development of a therapeutic vehicle, we assessed the ability of 15 distinct recombinant AAV serotypes (rAAV1, rAAV2, rAAV3b, rAAV4, rAAV5, rAAV6, rAAV6.2, rAAV6TM, rAAV7, rAAV8, rAAVrh8, rAAV9, rAAVrh10, rAAV39, rAAV43) bearing eGFP to infect human B-cell tumor lines compared with primary B-cells in vitro. Enhanced infection of tumor lines by AAV 6.2 was demonstrated by flow cytometry. EBV superinfection of EBV negative B-cell tumor lines increased susceptibility to AAV6.2 infection. As proof of concept, AAV6.2 bearing HSV-1 thymidine kinase in place of eGFP eliminated tumor cells upon exposure to ganciclovir.

Keywords: AAV, gene therapy, lymphoma, malignancy, tropism

Procedia PDF Downloads 99
646 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 322
645 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India

Authors: Mohammed Bashir Uddin

Abstract:

Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.

Keywords: globalization, human security, human trafficking, political economy

Procedia PDF Downloads 453
644 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 268
643 Feeding Ecology and Habitat Preference of Red Panda in Dhorpatan Hunting Reserve, Nepal

Authors: Saroj Panthi

Abstract:

The red panda (Ailurus fulgens fulgens) is distributed throughout the Himalayas and is found in both protected and unprotected areas of Nepal. Loss and fragmentation of habitat threaten red panda population throughout its range, and as a consequence, it is listed as vulnerable on the IUCN Red List of Threatened Species. Despite this pressing situation, data on the ecology of the red panda in western Nepal are lacking. Our aim in the current study was to determine the distribution, associated habitats, and summer diet of the red panda in Dhorpatan Hunting Reserve (DHR), Nepal. Evidence of red pandas was found in all 7 blocks of the reserve, spanning an area of 345.8 km2, between elevations of 2800 m and 4000 m and predominantly (> 75%) in forests comprising plant communities dominated by Abies spectabilis, Acer caesium, Tsuga domusa, and Betula utilis, with ground cover of Arundinaria spp. The dominant plant found in scat of the red panda was Arundinaria spp. (81.7%), with Acer spp., B. utilis, and lichen also frequently present. Livestock grazing and human activities were significantly higher in habitats where signs of pandas were recorded than in areas where they were absent. This habitat overlap between the red panda and livestock potentially poses a major threat to the panda’s survival in the DHR, a fact that should be taken into account in devising management strategies for this threatened species.

Keywords: red panda, Dhorpatan hunting reserve, diet, habitat preference

Procedia PDF Downloads 332
642 Climate Variability on Hydro-Energy Potential: An MCDM and Neural Network Approach

Authors: Apu Kumar Saha, Mrinmoy Majumder

Abstract:

The increase in the concentration of Green House gases all over the World has induced global warming phenomena whereby the average temperature of the world has aggravated to impact the pattern of climate in different regions. The frequency of extreme event has increased, early onset of season and change in an average amount of rainfall all are engrossing the conclusion that normal pattern of climate is changing. Sophisticated and complex models are prepared to estimate the future situation of the climate in different zones of the Earth. As hydro-energy is directly related to climatic parameters like rainfall and evaporation such energy resources will have to sustain the onset of the climatic abnormalities. The present investigation has tried to assess the impact of climatic abnormalities upon hydropower potential of different regions of the World. In this regard multi-criteria, decision making, and the neural network is used to predict the impact of the change cognitively by an index. The results from the study show that hydro-energy potential of Asian region is mostly vulnerable with respect to other regions of the world. The model results also encourage further application of the index to analyze the impact of climate change on the potential of hydro-energy.

Keywords: hydro-energy potential, neural networks, multi criteria decision analysis, environmental and ecological engineering

Procedia PDF Downloads 536