Search results for: vibrational states
2566 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children
Authors: R. M. Chandler, A. J. Stringer
Abstract:
In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric
Procedia PDF Downloads 1362565 A Real Time Set Up for Retrieval of Emotional States from Human Neural Responses
Authors: Rashima Mahajan, Dipali Bansal, Shweta Singh
Abstract:
Real time non-invasive Brain Computer Interfaces have a significant progressive role in restoring or maintaining a quality life for medically challenged people. This manuscript provides a comprehensive review of emerging research in the field of cognitive/affective computing in context of human neural responses. The perspectives of different emotion assessment modalities like face expressions, speech, text, gestures, and human physiological responses have also been discussed. Focus has been paid to explore the ability of EEG (Electroencephalogram) signals to portray thoughts, feelings, and unspoken words. An automated workflow-based protocol to design an EEG-based real time Brain Computer Interface system for analysis and classification of human emotions elicited by external audio/visual stimuli has been proposed. The front end hardware includes a cost effective and portable Emotive EEG Neuroheadset unit, a personal computer and a set of external stimulators. Primary signal analysis and processing of real time acquired EEG shall be performed using MATLAB based advanced brain mapping toolbox EEGLab/BCILab. This shall be followed by the development of MATLAB based self-defined algorithm to capture and characterize temporal and spectral variations in EEG under emotional stimulations. The extracted hybrid feature set shall be used to classify emotional states using artificial intelligence tools like Artificial Neural Network. The final system would result in an inexpensive, portable and more intuitive Brain Computer Interface in real time scenario to control prosthetic devices by translating different brain states into operative control signals.Keywords: brain computer interface, electroencephalogram, EEGLab, BCILab, emotive, emotions, interval features, spectral features, artificial neural network, control applications
Procedia PDF Downloads 3182564 Creating Trauma-Sensitive Yoga Programs for University Students With Stress and Anxiety: Lessons From a Program in the United States
Authors: Jessica Gladden
Abstract:
Anxiety remains one of the most common mental health disorders in the United States. Many university students report having a high level of anxiety, with additional life stressors that might include being away from home for the first time, being around unfamiliar people, having new expectations placed on them, and often have financial struggles. Universities have the ability and opportunity to form programs that can involve students with activities that reduce stress and teach coping skills. This research includes one example of using a somatic based group format of yoga to teach these skills and assist students in applying these strategies to their daily lives. This study compared a group of 17 students participating in weekly yoga classes to 34 students who did not attend the program. The students who attended the program reported a larger reduction of anxiety on both the BAI and GAD-7 than the control group, and verbally reported additional benefits in relaxation and coping skills. This presentation will review the results of the program as well as detailing the steps taken in creating a yoga program for university students with stress and anxiety. This will include a discussion on the components of trauma-sensitive yoga and the concerns and strategies to consider when developing a program for students.Keywords: yoga, trauma-sensitive yoga, anxiety, students
Procedia PDF Downloads 1162563 Impact of Technology on Product Quality, Speed up Delivery and Cost
Authors: Rehan Ullah
Abstract:
This paper explores the hypothesis that technology can be used to improve product quality, speed up delivery and reduced cost. For companies improving the quality of their products, reducing the cost and improving the speed of delivery makes them favorable to the client who feels like all their needs have been met. The research occurs between the months of January 2018 to April 2018 which is about four months. The research experiment design uses the pretest-posttest experimental design set up between two companies both using the traditional method of manufacturing with no technology. In one company technology is introduced while in the other company the process remains the same traditional method of production. Both companies analyze the results at the end of a four-month period before a conclusion is drawn from both the pretest and the final test. The experiment results show that technology improves quality of the product, improves the speed of delivery while at the same time reduce cost benefiting both the producer and the client. Technology should, therefore, be implemented in companies to give them an edge over the competition. With technology in companies, the United States can reclaim production from overseas companies that have taken over by providing cheap labor. Better satisfied customers mean more production which in turn means more jobs for the people in the United States.Keywords: technology, quality of product, speed up delivery, cost
Procedia PDF Downloads 1572562 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4552561 Media Representation of China: A Content Analysis of Coverage of China-Related Energy in the New York Times
Authors: Lian Liu
Abstract:
By analyzing the content of the New York Times' China-related energy reports, this study aims to explore the construction of China's national image by the mainstream media in the United States. The study analyzes three aspects of the coverage: topics, reporting tendencies, and countries involved. The results of the study show that economic issues are the main focus of the New York Times’ China-related energy coverage, followed by political issues and environmental issues. Overall, the coverage tendency was mainly negative, but positive coverage was dominated by science and technology issues. In addition, the study found that U.S.-China relations and Sino-Russian relations were important contexts for the construction of China's national image in the NYT's China-related energy coverage. These stories highlight China's interstate interactions with the United States, Japan, and Russia, which serve as important links in the coverage. The findings of this study reveal some characteristics and trends of the U.S. mainstream media's country image of China, which are important for a deeper understanding of the U.S.-China relationship and the media's influence on the construction of the country's image.Keywords: media coverage, China, content analysis, visualization technology
Procedia PDF Downloads 882560 TiO₂ Deactivation Process during Photocatalytic Ethanol Degradation in the Gas Phase
Authors: W. El-Alami, J. Araña, O. González Díaz, J. M. Doña Rodríguez
Abstract:
The efficiency of the semiconductor TiO₂ needs to be improved to be an effective tool for pollutant removal. To improve the efficiency of this semiconductor, it is necessary to deepen the knowledge of the processes that take place on its surface. In this sense, the deactivation of the catalyst is one of the aspects considered relevant. In order to study this point, the processes of deactivation of TiO₂ during the gas phase degradation of ethanol have been studied. For this, catalysts with only the anatase phase (SA and PC100) and catalysts with anatase and rutile phases (P25 and P90) have been selected. In order to force the deactivation processes, different cycles have been performed, adding ethanol gas but avoiding the degradation of acetates to determine their effect on the process. The surface concentration of fluorine on the catalysts was semi-quantitatively determined by EDAX analysis. The photocatalytic experiments were done with four commercial catalysts (P25, SA, P90, and PC100) and the two fluoride catalysts indicated above. The interaction and photocatalytic degradation of ethanol were followed by Fourier transform infrared spectroscopy (FTIR). EDAX analysis has revealed the presence of sodium on the surface of fluorinated catalysts. In FTIR studies, it has been observed that the acetates adsorbed on the anatase phase in P25 and P90 give rise to electron transfer to surface traps that modify the electronic states of the semiconductor. These deactivation studies have also been carried out with fluorinated P25 and SA catalysts (F-P25 and F-SA) which have observed similar electron transfers but in the opposite direction during illumination. In these materials, it has been observed that the electrons present in the surface traps, as a consequence of the interaction Ti-F, react with the holes, causing a change in the electronic states of the semiconductor. In this way, deactivated states of these materials have been detected by different electron transfer routes. It has been identified that acetates produced from the degradation of ethanol in P25 and P90 are probably hydrated on the surface of the rutile phase. In the catalysts with only the anatase phase (SA and PC100), the deactivation is immediate if the acetates are not removed before adsorbing ethanol again. In F-P25 and F-SA has been observed that the acetates formed react with the sodium ions present on the surface and not with the Ti atoms because they are interacting with the fluorine.Keywords: photocatalytic degradation, ethanol, TiO₂, deactivation process, F-P25
Procedia PDF Downloads 742559 Gas Injection Transport Mechanism for Shale Oil Recovery
Authors: Chinedu Ejike
Abstract:
The United States is now energy self-sufficient due to the production of shale oil reserves. With more than half of it being tapped daily in the United States, these unconventional reserves are massive and provide immense potential for future energy demands. Drilling horizontal wells and fracking are the primary methods for developing these reserves. Regrettably, recovery efficiency is rarely greater than 10%. As a result, optimizing recuperation offers a significant benefit. Huff and puff gas flooding and cyclic gas injection have all been demonstrated to be more successful than tapping the remaining oil in place. Methane, nitrogen, and carbon (IV) oxide, among other high-pressure gases, can be injected. Operators use Darcy's law to assess a reservoir's productive capacity, but they are unaware that the law may not apply to shale oil reserves. This is due to the fact that, unlike pressure differences alone, diffusion, concentration, and gas selection all play a role in the flow of gas injected into the wellbore. The reservoir drainage and oil sweep efficiency rates are determined by the transport method. This research assesses the parameters that influence the gas injection transport mechanism. Understanding the process causing these factors could accelerate recovery by two to three times, according to peer-reviewed studies and effective field testing.Keywords: enhanced oil recovery, gas injection, shale oil, transport mechanism, unconventional reserve
Procedia PDF Downloads 1732558 Sludge Densification: Emerging and Efficient Way to Look at Biological Nutrient Removal Treatment
Authors: Raj Chavan
Abstract:
Currently, there are over 14,500 Water Resource Recovery Facilities (WRRFs) in the United States, with ~35% of them having some type of nutrient limits in place. These WRRFs account for about 1% of overall power demand and 2% of total greenhouse gas emissions (GHG) in the United States and contribute for 10 to 15% of the overall nutrient load to surface rivers in the United States. The evolution of densification technologies toward more compact and energy-efficient nutrient removal processes has been impacted by a number of factors. Existing facilities that require capacity expansion or biomass densification for higher treatability within the same footprint are being subjected to more stringent requirements relating to nutrient removal prior to surface water discharge. Densification of activated sludge has received recent widespread interest as a means for achieving process intensification and nutrient removal at WRRFs. At the core of the technology are the aerobic sludge granules where the biological processes occur. There is considerable interest in the prospect of producing granular sludge in continuous (or traditional) activated sludge processes (CAS) or densification of biomass by moving activated sludge flocs to a denser aggregate of biomass as a highly effective technique of intensification. This presentation will provide a fundamental understanding of densification by presenting insights and practical issues. The topics that will be discussed include methods used to generate and retain densified granules; the mechanisms that allow biological flocs to densify; the role that physical selectors play in the densification of biological flocs; some viable ways for managing biological flocs that have become densified; effects of physical selection design parameters on the retention of densified biological flocs and finally some operational solutions for customizing the flocs and granules required to meet performance and capacity targets. In addition, it will present some case studies where biological and physical parameters were used to generate aerobic granular sludge in the continuous flow system.Keywords: densification, aerobic granular sludge, nutrient removal, intensification
Procedia PDF Downloads 1892557 From Shelf to Shell - The Corporate Form in the Era of Over-Regulation
Authors: Chrysthia Papacleovoulou
Abstract:
The era of de-regulation, off-shore and tax haven jurisdictions, and shelf companies has come to an end. The usage of complex corporate structures involving trust instruments, special purpose vehicles, holding-subsidiaries in offshore haven jurisdictions, and taking advantage of tax treaties is soaring. States which raced to introduce corporate friendly legislation, tax incentives, and creative international trust law in order to attract greater FDI are now faced with regulatory challenges and are forced to revisit the corporate form and its tax treatment. The fiduciary services industry, which dominated over the last 3 decades, is now striving to keep up with the new regulatory framework as a result of a number of European and international legislative measures. This article considers the challenges to the company and the corporate form as a result of the legislative measures on tax planning and tax avoidance, CRS reporting, FATCA, CFC rules, OECD’s BEPS, the EU Commission's new transparency rules for intermediaries that extends to tax advisors, accountants, banks & lawyers who design and promote tax planning schemes for their clients, new EU rules to block artificial tax arrangements and new transparency requirements for financial accounts, tax rulings and multinationals activities (DAC 6), G20's decision for a global 15% minimum corporate tax and banking regulation. As a result, states are found in a race of over-regulation and compliance. These legislative measures constitute a global up-side down tax-harmonisation. Through the adoption of the OECD’s BEPS, states agreed to an international collaboration to end tax avoidance and reform international taxation rules. Whilst the idea was to ensure that multinationals would pay their fair share of tax everywhere they operate, an indirect result of the aforementioned regulatory measures was to attack private clients-individuals who -over the past 3 decades- used the international tax system and jurisdictions such as Marshal Islands, Cayman Islands, British Virgin Islands, Bermuda, Seychelles, St. Vincent, Jersey, Guernsey, Liechtenstein, Monaco, Cyprus, and Malta, to name but a few, to engage in legitimate tax planning and tax avoidance. Companies can no longer maintain bank accounts without satisfying the real substance test. States override the incorporation doctrine theory and apply a real seat or real substance test in taxing companies and their activities, targeting even the beneficial owners personally with tax liability. Tax authorities in civil law jurisdictions lift the corporate veil through the public registries of UBO Registries and Trust Registries. As a result, the corporate form and the doctrine of limited liability are challenged in their core. Lastly, this article identifies the development of new instruments, such as funds and private placement insurance policies, and the trend of digital nomad workers. The baffling question is whether industry and states can meet somewhere in the middle and exit this over-regulation frenzy.Keywords: company, regulation, TAX, corporate structure, trust vehicles, real seat
Procedia PDF Downloads 1402556 Constructing a Bayesian Network for Solar Energy in Egypt Using Life Cycle Analysis and Machine Learning Algorithms
Authors: Rawaa H. El-Bidweihy, Hisham M. Abdelsalam, Ihab A. El-Khodary
Abstract:
In an era where machines run and shape our world, the need for a stable, non-ending source of energy emerges. In this study, the focus was on the solar energy in Egypt as a renewable source, the most important factors that could affect the solar energy’s market share throughout its life cycle production were analyzed and filtered, the relationships between them were derived before structuring a Bayesian network. Also, forecasted models were built for multiple factors to predict the states in Egypt by 2035, based on historical data and patterns, to be used as the nodes’ states in the network. 37 factors were found to might have an impact on the use of solar energy and then were deducted to 12 factors that were chosen to be the most effective to the solar energy’s life cycle in Egypt, based on surveying experts and data analysis, some of the factors were found to be recurring in multiple stages. The presented Bayesian network could be used later for scenario and decision analysis of using solar energy in Egypt, as a stable renewable source for generating any type of energy needed.Keywords: ARIMA, auto correlation, Bayesian network, forecasting models, life cycle, partial correlation, renewable energy, SARIMA, solar energy
Procedia PDF Downloads 1572555 Challenges in Adopting 3R Concept in the Heritage Building Restoration
Authors: H. H. Goh, K. C. Goh, T. W. Seow, N. S. Said, S. E. P. Ang
Abstract:
Malaysia is rich with historic buildings, particularly in Penang and Malacca states. Restoration activities are increasingly important as these states are recognized under UNESCO World Heritage Sites. Restoration activities help to maintain the uniqueness and value of a heritage building. However, increasing in restoration activities has resulted in large quantities of waste. To cope with this problem, the 3R concept (reduce, reuse and recycle) is introduced. The 3R concept is one of the waste management hierarchies. This concept is still yet to apply in the building restoration industry compared to the construction industry. Therefore, this study aims to promote the 3R concept in the heritage building restoration industry. This study aims to examine the importance of 3R concept and to identify challenges in applying the 3R concept in the heritage building restoration industry. This study focused on contractors and consultants who are involved in heritage restoration projects in Penang. Literature review and interviews helps to reach the research objective. Data that obtained is analyzed by using content analysis. For the research, application of 3R concept is important to conserve natural resources and reduce pollution problems. However, limited space to organise waste is the obstruction during the implementation of this concept. In conclusion, the 3R concept plays an important role in promoting environmental conservation and helping in reducing the construction wasteKeywords: 3R Concept, heritage building, restoration activities, building science
Procedia PDF Downloads 3142554 Identification of EEG Attention Level Using Empirical Mode Decompositions for BCI Applications
Authors: Chia-Ju Peng, Shih-Jui Chen
Abstract:
This paper proposes a method to discriminate electroencephalogram (EEG) signals between different concentration states using empirical mode decomposition (EMD). Brain-computer interface (BCI), also called brain-machine interface, is a direct communication pathway between the brain and an external device without the inherent pathway such as the peripheral nervous system or skeletal muscles. Attention level is a common index as a control signal of BCI systems. The EEG signals acquired from people paying attention or in relaxation, respectively, are decomposed into a set of intrinsic mode functions (IMF) by EMD. Fast Fourier transform (FFT) analysis is then applied to each IMF to obtain the frequency spectrums. By observing power spectrums of IMFs, the proposed method has the better identification of EEG attention level than the original EEG signals between different concentration states. The band power of IMF3 is the most obvious especially in β wave, which corresponds to fully awake and generally alert. The signal processing method and results of this experiment paves a new way for BCI robotic system using the attention-level control strategy. The integrated signal processing method reveals appropriate information for discrimination of the attention and relaxation, contributing to a more enhanced BCI performance.Keywords: biomedical engineering, brain computer interface, electroencephalography, rehabilitation
Procedia PDF Downloads 3912553 Digitalization: The Uneven Geography of Information and Communication Technology (ICTS) CTSoss Four Major States in India
Authors: Sanchari Mukhopadhyay
Abstract:
Today, almost the entire realm of human activities are becoming increasingly dependent on the power of information, where through ICTs it is now possible to cater distances and avail various services at a few clicks. In principle, ICTs are thus expected to blur location-specific differences and affiliations of development and bring in an inclusive society at the wake of globalization. However, eventually researchers and policy analysts realized that ICTs are also generating inequality in spite of the hope for an integrated world and widespread social well-being. Regarding this unevenness, location plays a major role as often ICT development is seen to be concentrated into pockets, leaving behind large tracks as underprivileged. Thus, understanding the spatial pattern of ICT development and distribution is significant in relation to exploring the extent to which ICTs are fulfilling the promises or reassuring the existing divisions. In addition, it is also profoundly crucial to investigate how regions are connecting and competing both locally and globally. The focus of the research paper is to evaluate the spatial structure of ICT led development in India. Thereby, it attempts to understand the state level (four selected states) pattern of ICT penetration, the pattern of diffusion across districts with respect to large urban centres and the rural-urban disparity of technology adoption. It also tries to assess the changes in access dynamisms of ICTs as one move away from a large metropolitan city towards the periphery. In brief, the analysis investigates into the tendency towards the uneven growth of development through the identification of the core areas of ICT advancement within the country and its diffusion from the core to the periphery. In order to assess the level of ICT development and rural-urban disparity across the districts of selected states, two indices named ICT Development Index and Rural-Urban Digital Divide Index have been constructed. The study mostly encompasses the latest Census (2011) of the country and TRAI (Telecom Regulatory Authority of India) in some cases.Keywords: ICT development, diffusion, core-periphery, digital divide
Procedia PDF Downloads 3342552 Political Implications of Shared Authority: Efforts to Retain Indigenous Sovereignty Within the Modern Global Power Structures
Authors: David E. Wilkins
Abstract:
While colonialism in its many guises remains the dominant theoretical framework within which to analyze Indigenous relations with state powers, this paper takes a deep look at the treaty, policy, and statutory efforts initiated by both Indigenous peoples and colonial, and later federal representatives within what is now the United States that were intended to create a Native constituent state of the union. While these plans ultimately failed, they are indicative of the reality that, throughout much of the shared Indigenous and American history, there were both Native and non-Native political elites who were keen on the idea of incorporating Indigenous peoples into the burgeoning body politic. This paper explores why these plans arose, who the architects were that devised them, which Native peoples were involved in, and why they ultimately failed to be enacted. Although governmental relations within the US remain fraught and unpredictable, Native nations continue to wield a form of sovereignty that, while truncated, has maintained their distinctive political statuses. There is much to be learned from the exploration of these mixed successes and failures. There are other examples across the globe whereby Indigenous peoples like the Saami and the Māori have secured greater clarity of their retained autonomy through structural political arrangements with the states that have laid claim to their territories while the Ainu struggle to regain their status.Keywords: indigenous, sovereignty, diplomacy, intergovernmental
Procedia PDF Downloads 682551 Risk and Emotion: Measuring the Effect of Emotion and Other Visceral Factors on Decision Making under Risk
Authors: Michael Mihalicz, Aziz Guergachi
Abstract:
Background: The science of modelling choice preferences has evolved over centuries into an interdisciplinary field contributing to several branches of Microeconomics and Mathematical Psychology. Early theories in Decision Science rested on the logic of rationality, but as it and related fields matured, descriptive theories emerged capable of explaining systematic violations of rationality through cognitive mechanisms underlying the thought processes that guide human behaviour. Cognitive limitations are not, however, solely responsible for systematic deviations from rationality and many are now exploring the effect of visceral factors as the more dominant drivers. The current study builds on the existing literature by exploring sleep deprivation, thermal comfort, stress, hunger, fear, anger and sadness as moderators to three distinct elements that define individual risk preference under Cumulative Prospect Theory. Methodology: This study is designed to compare the risk preference of participants experiencing an elevated affective or visceral state to those in a neutral state using nonparametric elicitation methods across three domains. Two experiments will be conducted simultaneously using different methodologies. The first will determine visceral states and risk preferences randomly over a two-week period by prompting participants to complete an online survey remotely. In each round of questions, participants will be asked to self-assess their current state using Visual Analogue Scales before answering a series of lottery-style elicitation questions. The second experiment will be conducted in a laboratory setting using psychological primes to induce a desired state. In this experiment, emotional states will be recorded using emotion analytics and used a basis for comparison between the two methods. Significance: The expected results include a series of measurable and systematic effects on the subjective interpretations of gamble attributes and evidence supporting the proposition that a portion of the variability in human choice preferences unaccounted for by cognitive limitations can be explained by interacting visceral states. Significant results will promote awareness about the subconscious effect that emotions and other drive states have on the way people process and interpret information, and can guide more effective decision making by informing decision-makers of the sources and consequences of irrational behaviour.Keywords: decision making, emotions, prospect theory, visceral factors
Procedia PDF Downloads 1492550 Managing Gender Based Violence in Nigeria: A Legal Conundrum
Authors: Foluke Dada
Abstract:
The Prevalence of gender-based violence in Nigeria is of such concern and magnitude that the government has intervened by ratifying international instruments such as the convention on the elimination of all forms of discrimination against women, the declaration on the elimination of violence against women; the protocol to the African charter on human and people’s rights on the rights of women, etc. By promulgating domestic laws that sought to prevent the perpetration of Gender-based violence and also protect victims from future occurrences. Nigeria principally has two legal codes creating criminal offenses and punishments for breach of those offenses, the Criminal Code Law, applying to most states in Southern Nigeria and the Penal Code applying to states in Northern Nigeria. Individual State laws such as the Ekiti State and Lagos State Gender-Based Violence laws are also discussed. This paper addresses Gender-Based Violence in Nigeria and exposes the inadequacies in the laws and their application. The paper postulates that there is a need for more workable public policy that strengthens the social structure fortified by the law in order to engender the necessary changes and provide the opportunity for government to embark on grassroots-based advocacy that engage the victims and sensitize them of their rights and how they can enjoy some of the protections afforded by the laws.Keywords: gender, violence, human rights, law and policy
Procedia PDF Downloads 6132549 Exploring the Impact of Corruption on Human Rights in Cameroon: The Quest for Sustainable Solutions
Authors: Eugene Muambeh Muntoh
Abstract:
Corruption has a destructive effect on State institutions and on the capacity of States to respect, protect and fulfil human rights, particularly of those persons and groups in situation of vulnerability and marginalization. In Cameroon, corruption pose a major challenge as it divert public revenues and cripple public budgets that should provide healthcare, housing, education, and other essential services. Corruption has undermined the States’ ability to meet the minimum core obligations and pre-existing legal obligations to maximize all available resources to respect, protect and fulfil Economic, Social and Cultural Rights. This study therefore makes use of the qualitative research design, ranging from interviews, observations and content analysis of vital documents to provide evidence and associations between corruption and human rights concerns in Cameroon. The study made use of research material from both primary and secondary sources. Findings from the study reveals that the impact of corruption in Cameroon is especially pronounced regarding economic, social and cultural rights. In most cases, the right to be treated equally is violated, for example, when someone is requested to pay a bribe to obtain a public service. There is an urgent need for sustainable measures to counter corruption in order to protect and promote human rights.Keywords: corruption, governance, human rights, law
Procedia PDF Downloads 892548 Economic Isolation in the Globalised World Order: A Case Study of North Korea
Authors: Nizika Sorokhaibam
Abstract:
With the collapse of the Soviet Union in 1989, that marked the end of the prolonged struggle of ideologies between capitalism of the United States of America and communism of the Soviet Union, the world entered a new era of free markets, trade and economic liberalization. Through analysis of various literatures on North Korea, this study focuses on the impact of Globalization on North Korea- its people, economy and the regime. The study also takes a glance at the Juche ideology, which was crafted by the Supreme Leader Kim Il Sung, for the people of DPRK and its role and influence in shaping the North Korean economy. The new buzz word being Globalization, as businesses started to expand on international scale, demanding the need for co-operation, connectivity and interdependence of countries around the world. States tilted their focus towards industrialization, production of raw materials, production of goods to meet the growing demands and grabbing markets for the manufactured products. This became the norm as many newly independent countries adopted democracy and aligned their views with globalization processes. Socialist and communist regimes either fell one after the other to join the globalization trend or reformed their economic system to meet the globalization trends. However, even after staying isolated for more than six decades, Democratic People’s Republic of Korea, the Hermit Kingdom, refuses to open up its economy to the globalised world. North Korean regime still controls all the sectors of the country and no trade and investment freedom is given to the people. North Korea vigorously makes efforts to emphasize on its Juche ideology of self-sustenance and self-reliance to keep away from actively engaging in global trade and process of globalization, which they refer to as “Americanization” of the world. Nevertheless, the reality is that North Korea’s economy is not self sustained and is collapsing from within, which led them to solicit foreign aid from the United States of America, South Korea (Republic of Korea) and People’s Republic of China. The regime needs to implement reforms and make adjustments for the economy to survive in the competing world.Keywords: economic globalization, economic isolation, Juche, North Korea
Procedia PDF Downloads 2722547 Initial Settlers and Gender Norms: Evidence From the United States
Authors: Joanne Haddad
Abstract:
The distinctive traits of early settlers at initial stages of institutional development may be crucial for cultural formation. In 1973, the cultural geographer Wilbur Zelinsky postulated this in his doctrine of “first effective settlement”. There is however little empirical evidence supporting the role of early settlers in shaping culture over the long run. This paper tests this hypothesis by relating early settlers’ culture to within state variation in gender norms in the United States. Settlers’ culture is captured using past female labor force participation, women’s suffrage, and financial rights at their place of origin. The paper documents the distinctive characteristics of settlers’ populations and provide suggestive evidence in support of the transmission of gender norms across space and time. Results from this analysis show that women’s labor supply is higher, in both the short and long run, in U.S. counties that historically hosted a larger settler population originating from places with favorable gender attitudes. Findings from this study shed new light on the importance of the characteristics of immigrants and their place of origin for cultural formation in hosting societies.Keywords: female labor force participation, settlers, gender norms, cultural formation.
Procedia PDF Downloads 1102546 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime
Authors: Loukou Amoin Marie Djedri
Abstract:
Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach
Procedia PDF Downloads 2762545 DNA Barcoding for Identification of Dengue Vectors from Assam and Arunachal Pradesh: North-Eastern States in India
Authors: Monika Soni, Shovonlal Bhowmick, Chandra Bhattacharya, Jitendra Sharma, Prafulla Dutta, Jagadish Mahanta
Abstract:
Aedes aegypti and Aedes albopictus are considered as two major vectors to transmit dengue virus. In North-east India, two states viz. Assam and Arunachal Pradesh are known to be high endemic zone for dengue and Chikungunya viral infection. The taxonomical classification of medically important vectors are important for mapping of actual evolutionary trends and epidemiological studies. However, misidentification of mosquito species in field-collected mosquito specimens could have a negative impact which may affect vector-borne disease control policy. DNA barcoding is a prominent method to record available species, differentiate from new addition and change of population structure. In this study, a combined approach of a morphological and molecular technique of DNA barcoding was adopted to explore sequence variation in mitochondrial cytochrome c oxidase subunit I (COI) gene within dengue vectors. The study has revealed the map distribution of the dengue vector from two states i.e. Assam and Arunachal Pradesh, India. Approximate five hundred mosquito specimens were collected from different parts of two states, and their morphological features were compared with the taxonomic keys. The analysis of detailed taxonomic study revealed identification of two species Aedes aegypti and Aedes albopictus. The species aegypti comprised of 66.6% of the specimen and represented as dominant dengue vector species. The sequences obtained through standard DNA barcoding protocol were compared with public databases, viz. GenBank and BOLD. The sequences of all Aedes albopictus have shown 100% similarity whereas sequence of Aedes aegypti has shown 99.77 - 100% similarity of COI gene with that of different geographically located same species based on BOLD database search. From dengue prevalent different geographical regions fifty-nine sequences were retrieved from NCBI and BOLD databases of the same and related taxa to determine the evolutionary distance model based on the phylogenetic analysis. Neighbor-Joining (NJ) and Maximum Likelihood (ML) phylogenetic tree was constructed in MEGA6.06 software with 1000 bootstrap replicates using Kimura-2-Parameter model. Data were analyzed for sequence divergence and found that intraspecific divergence ranged from 0.0 to 2.0% and interspecific divergence ranged from 11.0 to 12.0%. The transitional and transversional substitutions were tested individually. The sequences were deposited in NCBI: GenBank database. This observation claimed the first DNA barcoding analysis of Aedes mosquitoes from North-eastern states in India and also confirmed the range expansion of two important mosquito species. Overall, this study insight into the molecular ecology of the dengue vectors from North-eastern India which will enhance the understanding to improve the existing entomological surveillance and vector incrimination program.Keywords: COI, dengue vectors, DNA barcoding, molecular identification, North-east India, phylogenetics
Procedia PDF Downloads 3042544 The Impact of Globalization on the Economic and Cultural Development of Nigeria: A Cost-Benefit Analysis
Authors: Odeh Ibn Iganga
Abstract:
Globalization as a process is gradually taking mankind along a uniform path of ‘one world, one destiny’ whether coercively or voluntarily. As a phenomenon, it is gradually ascending the status of the New World Order ideology, questioning the fundamental assumptions of the state -centric system- independence, sovereignty, equality of states, non-interference in internal affairs etc. by the demands it makes of, and the attendant consequences upon all nations, especially the less developed and weaker states of the Third World. Thus one of the raging and contentious issues in contemporary development discourse is whether globalization comparatively favors developing economies of the third world countries generally and Africa in particular. Narrowing the issue home also is the contentious issue of whether globalization comparatively favors a developing economy like Nigeria. This paper examines the impact of globalization on the economic and cultural development of Nigeria (given her active and continued participation in the global process spanning a period of about 3 decades now). It reveals the negative and positive consequences of the process and concept of globalization on the economic and cultural development of Nigeria adjudging the country did not benefit much from globalization. The paper then recommends measures as to how the negative consequences could be reduced considerably and to make Nigeria benefit maximally from globalization.Keywords: globalization, developing countries, economic and cultural growth, third world
Procedia PDF Downloads 3402543 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 3022542 A Study on the Role of Human Rights in the Aid Allocations of China and the United States
Authors: Shazmeen Maroof
Abstract:
The study is motivated by a desire to investigate whether there is substance to claims that, relative to traditional donors, China disregards human rights considerations when allocating overseas aid. While the stated policy of the U.S. is that consideration of potential aid recipients’ respect for human rights is mandatory, some quantitative studies have cast doubt on whether this is reflected in actual allocations. There is a lack of academic literature that formally assesses the extent to which the two countries' aid allocations differ; which is essential to test whether the criticisms of China's aid policy in comparison to that of the U.S. are justified. Using data on two standard human rights measures, 'Political Terror Scale' and 'Civil Liberties', the study analyse the two donors’ aid allocations among 125 countries over the period 2000 to 2014. The bivariate analysis demonstrated that a significant share of China’s aid flow to countries with poor human rights record. At the same time, the U.S. seems little different in providing aid to these countries. The empirical results obtained from the Fractional Logit model also provided some support to the general pessimism regarding China’s provision of aid to countries with poor human rights record, yet challenge the optimists expecting better targeted aid from the U.S. These findings are consistent with the split between humanitarian and non-humanitarian aid and in the sample of countries whose human rights record is below some threshold level.Keywords: China's aid policy, foreign aid allocation, human rights, United States Foreign Assistance Act
Procedia PDF Downloads 1092541 Federalism, a System of Government: Comparative Study of Australia and Canada
Authors: Rana Tajammal Rashid
Abstract:
Federalism is a political system in which government power and responsibility are divided between a federal legislature and units of the state or provincial legislatures. This system provides the structure for the states having large territory and through that can manage the state affairs and administration easily. Many of the largest countries in the world are federations, like; The United States, Canada, India, Pakistan South Africa, Argentina, and Australia. Every large democratic nation has a federal system of government. This study will explore the feature and good governance of two developed countries Canada and Australia. This study will be helpful to the developing countries like Pakistan, India which have a federal form of structure to run the affairs of the state. In the federal system of Pakistan there are lot of issues and conflicts with the provinces with a comparative study of these two developed countries, i.e., Australia and Canada, our policy and decision maker political actors will understand in which way a state will successfully manage the issues related to federalism. This study will also provide the help to the students of comparative politics that how to analysis the different political system of the developed countries of the world.Keywords: federalism, features of federalism, types of federalism, history of federalism, Australian federalism, Canadian federalism, federalism developments, executives, federal and provincial autonomy legislative, judicial
Procedia PDF Downloads 2872540 Experimental Study on Use of Crumb Rubber to Mitigate Expansive Soil Pressures on Basement Walls
Authors: Kwestan Salimi, Jenna Jacoby, Michelle Basham, Amy Cerato
Abstract:
The extreme annual weather patterns of the central United States have increased the need for underground shelters for protection from destructive tornadic activity. However, very few residential homes have basements due to the added construction expense and the prevalence of expansive soils covering the central portion of the United States. These expansive soils shrink and swell, increasing earth pressure on basement walls. To mitigate the effect of expansive soils on basement walls, this study performed bench-scale tests using a common natural expansive soil mitigated with a backfill layer of crumb rubber. The results revealed that at 80% soil compaction, a 1:6 backfill height to total height ratio produced a 66% reduction in swell pressure. However, this percent reduction decreased to 27% for 90% soil compaction. It was also found that there is a strong linear correlation between compaction percentage and reduction in swell pressure when using the same backfill height to total height ratio. Using this correlation and extrapolating to 95% compaction, the percent reduction in swell pressure was approximately 12%.Keywords: expansive soils, swell/shrink, swell pressure, stabilization, crumb rubber
Procedia PDF Downloads 1612539 A Social Identity Analysis of Ottoman and Safavid Architects in the Historical Documents of the 16th to 17th Centuries
Authors: Farzaneh Farrokhfar, Mohammad Khazaie
Abstract:
The 16th and 17th centuries coincide with the classical age of Ottoman art history. Simultaneously with this age and in the eastern neighborhood of the Ottoman state, the Safavid Shiite state emerged, which, despite political and religious differences with the Ottomans, played an important role in cultural and artistic exchanges with Anatolia. The harmony of arts, including architecture, is one of the most important manifestations of cultural exchange between the two regions, which shows the intellectual commonalities of the two regions. In parallel with the production of works of art, the registration of information and identities of Ottoman and Safavid artists and craftsmen has been done by many historians and biographers, some of whom, fortunately, are available to us today and can be evaluated. This research first intends to read historical documents and reports related to the architects of the two Ottoman states in Anatolia and Safavid states in Iran in the 16th and 17th centuries and then examines the status of architects' information records and their location in the two regions. The results reveal the names and identities of some Ottoman and Safavid architects in the 16th and 17th centuries and show the method of recording information in the documents of the two regions. This research is done in a comparative historical method, and the method of collecting its resources is a documentary library.Keywords: classical era, Ottoman architecture, Safavid architecture, Central Asian historical documents
Procedia PDF Downloads 1302538 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2272537 Child Soldier in Africa: A Big Challenge to Human Right
Authors: Adegboyega Adeolapo Ola, Gerelene Jagganath
Abstract:
One of the greatest challenges of human right in the world, especially African states is the use of child soldiers in armed conflict, constituting a major source of destruction of lives and properties. Mostly, they are in developing countries with the situation in Sub-Saharan Africa, the abduction and employment of children as soldiers is a form of exploitative labour that is tantamount to slavery. Since the end of cold war, Child soldier has increased in Africa countries like Angola, Liberia, Sierra Leone and Uganda. This study examines the main cause of the recruitment and use of child soldiers and its challenges to human right. It further assesses the role of international regional bodies and various governments in curbing child soldiers with a view to proffer suggestions on how to address some of the resultant threat of human right. The study posits that the control of small arms and light weapons is essential in curtailing the spread of child soldier and abuse of human right. This hopefully should result in the sustainability of human/child right in African continent. It is a recommendation of this study that, in order to sustain human right in the region, all Africa leaders, government and regional bodies; such as African Union, Economic Community of West African States, South African Development Community among others, should cooperate and work together to address the issue of illicit small arms, which could eventually lead to child soldier.Keywords: arms control, child soldier, human right, small arms
Procedia PDF Downloads 207