Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 729

Search results for: cyber defense

189 Saponins vs Anthraquinones: Different Chemicals, Similar Ecological Roles in Marine Symbioses

Authors: Guillaume Caulier, Lola Brasseur, Patrick Flammang, Pascal Gerbaux, Igor Eeckhaut

Abstract:

Saponins and quinones are two major groups of secondary metabolites widely distributed in the biosphere. More specifically, triterpenoid saponins and anthraquinones are mainly found in a wide variety of plants, bacteria and fungi. In the animal kingdom, these natural organic compounds are rare and only found in small quantities in arthropods, marine sponges and echinoderms. In this last group, triterpenoid saponins are specific to holothuroids (sea cucumbers) while anthraquinones are the chemical signature of crinoids (feather stars). Depending on the species, they present different molecular cocktails. Despite presenting different chemical properties, these molecules share numerous similarities. This study compares the biological distribution, the pharmacological effects and the ecological roles of holothuroid saponins and crinoid anthraquinones. Both of them have been defined as allomones repelling predators and parasites (i.e. chemical defense) and have interesting pharmacological properties (e.g. anti-bacterial, anti-fungal, anti-cancer). Our study investigates the chemical ecology of two symbiotic associations models; between the snapping shrimp Synalpheus stimpsonii associated with crinoids and the Harlequin crab Lissocarcinus orbicularis associated with holothuroids. Using behavioral experiments in olfactometers, chemical extractions and mass spectrometry analyses, we discovered that saponins and anthraquinones present a second ecological role: the attraction of obligatory symbionts towards their hosts. They can, therefore, be defined as kairomones. This highlights a new paradigm in marine chemical ecology: Chemical repellents are attractants to obligatory symbionts because they constitute host specific chemical signatures.

Keywords: anthraquinones, kairomones, marine symbiosis, saponins, attractant

Procedia PDF Downloads 197
188 A Real-Time Moving Object Detection and Tracking Scheme and Its Implementation for Video Surveillance System

Authors: Mulugeta K. Tefera, Xiaolong Yang, Jian Liu

Abstract:

Detection and tracking of moving objects are very important in many application contexts such as detection and recognition of people, visual surveillance and automatic generation of video effect and so on. However, the task of detecting a real shape of an object in motion becomes tricky due to various challenges like dynamic scene changes, presence of shadow, and illumination variations due to light switch. For such systems, once the moving object is detected, tracking is also a crucial step for those applications that used in military defense, video surveillance, human computer interaction, and medical diagnostics as well as in commercial fields such as video games. In this paper, an object presents in dynamic background is detected using adaptive mixture of Gaussian based analysis of the video sequences. Then the detected moving object is tracked using the region based moving object tracking and inter-frame differential mechanisms to address the partial overlapping and occlusion problems. Firstly, the detection algorithm effectively detects and extracts the moving object target by enhancing and post processing morphological operations. Secondly, the extracted object uses region based moving object tracking and inter-frame difference to improve the tracking speed of real-time moving objects in different video frames. Finally, the plotting method was applied to detect the moving objects effectively and describes the object’s motion being tracked. The experiment has been performed on image sequences acquired both indoor and outdoor environments and one stationary and web camera has been used.

Keywords: background modeling, Gaussian mixture model, inter-frame difference, object detection and tracking, video surveillance

Procedia PDF Downloads 471
187 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 163
186 Innovative Design Considerations for Adaptive Spacecraft

Authors: K. Parandhama Gowd

Abstract:

Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.

Keywords: satellites, low earth orbit (LEO), medium earth orbit (MEO), geostationary earth orbit (GEO), self-organizing control system, anti-satellite weapons (ASAT), orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems (AOCS), command and data handling (CDH)

Procedia PDF Downloads 291
185 Trade Liberalization and Domestic Private Investment in Nigeria

Authors: George-Anokwuru Chioma Chidinma Bernadette

Abstract:

This paper investigated the effect of trade liberalization on domestic private investment in Nigeria from 1981 to 2020. To achieve this objective, secondary data on domestic private investment, trade openness, exchange rate and interest rate were sourced from the statistical bulletin of Nigeria’s apex bank. The Autoregressive Distributed Lag (ARDL) technique was used as the main analytical tool. The ARDL Bounds test revealed the existence of long run association among the variables. The results revealed that trade openness and exchange rate have positive and insignificant relationship with domestic private investment both in the long and short runs. At the same time, interest rate has negative relationship with domestic private investment both in the long and short runs. Therefore, it was concluded that there is no significant relationship between trade openness, exchange rate, interest rate and domestic private investment in Nigeria during the period of study. Based on the findings, the study recommended that government should formulate trade policies that will encourage the growth of domestic private investment in Nigeria. To achieve this, government should ensure consistency in trade policies and at the same time strengthen the existing policies to build investors’ confidence. Also, government should make available an investment-friendly environment, as well as monitor real sector operators to ensure that foreign exchange allocations are not diverted. Government should increase capital investment in education, housing, transportation, agriculture, health, power, road construction, national defense, among others that will help the various sectors of the economy to function very well thereby making the business environment friendly thereby enhancing the growth and development of the country.

Keywords: trade openness, domestic private investment, ARDL, exchange rate

Procedia PDF Downloads 65
184 Executing the Law: The Practical Absence of Law and Its Effects on Death Row Inmates and Their Families in Egypt

Authors: Amira M. Othman

Abstract:

Despite the massive array of literature that engages with the Egyptian legislative system on a theoretical level, very little attention has been dedicated to the comparison between the legislative clauses on the one hand, and the (absence of their) real-world implementation on the other. This paper starts with this discrepancy, focusing on the legal proceedings in some recent cases dubbed ‘political,’ in which defendants received death sentences. Then, it sheds light on the trend of practical disregard of the law on behalf of the criminal justice apparatuses (whether security forces, public prosecution offices, lawyers, judges, prison wardens, and executioners) through the examination of case files and the conduction of interviews with some defense lawyers in the cases in question. It also identifies the resultant state of confusion among prison staff, as manifest in their treatment of defendants even before the death sentences against them is pronounced; in other words, the application of some aspects of the law in certain cases, and their simultaneous disregard of others. Then, the paper explores the effects of such execution of the law on the death row inmates, as it identifies the different strategies through which defendants who are sentenced to death appropriate a number of legal clauses to their benefit, thereby embarrassing - or highly irritating - the judges that pronounce their death sentences. In addition to appropriation, other strategies include the contestation of the law and their presence before the courts in general, as well as the complete disregard and dismissal of the legal system altogether. Finally, the paper investigates the consequent conceptual effect on the first degree families of death row inmates, namely how their daily encounters with the Egyptian legislative system - particularly its emphasis on the absence of the otherwise binding local legislation - continue to shape their conceptions of the ‘law,’ of ‘justice,’ and their trust in the ‘state.’

Keywords: death penalty, Egyptian law absence, justice, political cases

Procedia PDF Downloads 171
183 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 149
182 Modeling and Simulation of Honeycomb Steel Sandwich Panels under Blast Loading

Authors: Sayed M. Soleimani, Nader H. Ghareeb, Nourhan H. Shaker, Muhammad B. Siddiqui

Abstract:

Honeycomb sandwich panels have been widely used as protective structural elements against blast loading. The main advantages of these panels include their light weight due to the presence of voids, as well as their energy absorption capability. Terrorist activities have imposed new challenges to structural engineers to design protective measures for vital structures. Since blast loading is not usually considered in the load combinations during the design process of a structure, researchers around the world have been motivated to study the behavior of potential elements capable of resisting sudden loads imposed by the detonation of explosive materials. One of the best candidates for this objective is the honeycomb sandwich panel. Studying the effects of explosive materials on the panels requires costly and time-consuming experiments. Moreover, these type of experiments need permission from defense organizations which can become a hurdle. As a result, modeling and simulation using an appropriate tool can be considered as a good alternative. In this research work, the finite element package ABAQUS® is used to study the behavior of hexagonal and squared honeycomb steel sandwich panels under the explosive effects of different amounts of trinitrotoluene (TNT). The results of finite element modeling of a specific honeycomb configuration are initially validated by comparing them with the experimental results from literature. Afterwards, several configurations including different geometrical properties of the honeycomb wall are investigated and the results are compared with the original model. Finally, the effectiveness of the core shape and wall thickness are discussed, and conclusions are made.

Keywords: Abaqus, blast loading, finite element modeling, steel honeycomb sandwich panel

Procedia PDF Downloads 348
181 EDTA Enhanced Plant Growth, Antioxidant Defense System, and Phytoextraction of Copper by Brassica napus L.

Authors: Ume Habiba, Shafaqat Ali, Mujahid Farid, Muhammad Bilal Shakoor

Abstract:

Copper (Cu) is an essential micronutrient for normal plant growth and development, but in excess, it is also toxic to plants. The present study investigated the influence of ethylenediaminetetraacetic acid (EDTA) in enhancing Cu uptake and tolerance as well as the morphological and physiological responses of Brassica napus L. seedlings under Cu stress. Four-week-old seedlings were transferred to hydroponics containing Hoagland’s nutrient solution. After 2 weeks of transplanting, three levels (0, 50, and 100 μM) of Cu were applied with or without application of 2.5 mM EDTA and plants were further grown for 8 weeks in culture media. Results showed that Cu alone significantly decreased plant growth, biomass, photosynthetic pigments, and gas exchange characteristics. Cu stress also reduced the activities of antioxidants, such as superoxide dismutase (SOD), peroxidase (POD), ascorbate peroxidase (APX), and catalase (CAT) along with protein contents. Cu toxicity increased the concentration of reactive oxygen species (ROS) as indicated by the increased production of malondialdehyde (MDA) and hydrogen peroxide (H2O2) in both leaves and roots. The application of EDTA significantly alleviated Cu-induced toxic effects in B. napus, showing remarkable improvement in all these parameters. EDTA amendment increased the activity of antioxidant enzymes by decreasing the concentrations of MDA and H2O2 both in leaves and roots of B. napus. Although, EDTA amendment with Cu significantly increased Cu uptake in roots, stems, and leaves in decreasing order of concentration but increased the growth, photosynthetic parameters, and antioxidant enzymes. These results showed that the application of EDTA can be a useful strategy for phytoextraction of Cu by B. napus from contaminated soils.

Keywords: antioxidants, biomass, copper, EDTA, phytoextraction, tolerance

Procedia PDF Downloads 410
180 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 69
179 Chrysin-Loaded PLGA-PEG Nanoparticles Designed for Enhanced Inhibitory Effect on the Breast Cancer Cell Line

Authors: Faraz Zarghami, Elham Anari, Nosratollah Zarghami, Yones Pilehvar-Soltanahmadi, Abolfazl Akbarzadeh, Sepideh Jalilzadeh-Tabrizi

Abstract:

The development of nanotherapy has presented a new method of drug delivery targeted directly to the neoplasmic tissues, to maximize the action with fewer dose requirements. In the past two decades, poly(lactic-co-glycolic acid) (PLGA) has frequently been investigated by many researchers and is a popular polymeric candidate, due to its biocompatibility and biodegradability, exhibition of a wide range of erosion times, tunable mechanical properties, and most notably, because it is a FDA-approved polymer. Chrysin is a natural flavonoid which has been reported to have some significant biological effects on the processes of chemical defense, nitrogen fixation, inflammation, and oxidation. However, the low solubility in water decreases its bioavailability and consequently disrupts the biomedical benefits. Being loaded with PLGA-PEG increases chrysin solubility and drug tolerance, and decreases the discordant effects of the drug. The well-structured chrysin efficiently accumulates in the breast cancer cell line (T47D). In the present study, the structure and chrysin loading were delineated using proton nuclear magnetic resonance (HNMR), Fourier-transform infrared spectroscopy (FT-IR), and scanning electron microscopy (SEM), and the in vitro cytotoxicity of pure and nanochrysin was studied by the MTT assay. Next, the RNA was exploited and the cytotoxic effects of chrysin were studied by real-time PCR. In conclusion, the nanochrysin therapy developed is a novel method that could increase cytotoxicity to cancer cells without damaging the normal cells, and would be promising in breast cancer therapy.

Keywords: MTT assay, chrysin, flavonoids, nanotherapy

Procedia PDF Downloads 248
178 Cerebrum Maturity Damage Induced by Fluoride in Suckling Mice

Authors: Hanen Bouaziz, Françoise Croute, Najiba Zeghal

Abstract:

In order to investigate the toxic effects of fluoride on cerebrum maturity of suckling mice, we treated adult female mice of Swiss Albinos strain by 500 ppm NaF in their drinking water from the 15th day of pregnancy until the day 14 after delivery. All mice were sacrificed on day 14 after parturition. During treatment, levels of thiobarbituric acid reactive substances, the marker of lipid peroxidation extend, increased, while the activities of the antioxidant enzymes such as glutathione peroxidase, superoxide dismutase and catalase and the level of glutathione decreased significantly in cerebellum compared with those of the control group. These results suggested that fluoride enhanced oxidative stress, thereby disturbing the antioxidant defense of nursing pups. In addition, acetylcholinesterase activity in cerebellum was inhibited after treatment with fluoride. In cerebellum of mice, migration of neurons from the external granular layer to the internal granular layer occurred postnatally. Key guidance signals to these migrating neurons were provided by laminin, an extracellular matrix protein fixed to the surface of astrocytes. In the present study, we examined the expression and distribution of laminin in cerebellum of 14-day-old mice. Immunoreactive laminin was disappeared by postnatal day 14 in cerebellum parenchyma of control pups and was restricted to vasculature despite the continued presence of granular cells in the external granular layer. In contrast, in cerebellum of NaF treated pups, laminin was deposited in organised punctuate clusters in the molecular layer. These data indicated that the disruption of laminin distribution might play a major role in the profound derangement of neuronal migration observed in cerebellum of NaF treated pups.

Keywords: acetylcholinesterase activity, cerebellum, laminin, oxidative stress, suckling mice

Procedia PDF Downloads 393
177 Intercultural Sensitivity in Iran: A Case Study of Intercultural Relations between Turks and Lors

Authors: Sepideh Mohammadi

Abstract:

Iran is a country that boasts of ethnic diversity, comprising various groups such as Turks, Lors, Arabs, Baluchs, Persians, Kurds, Gliks, Azaris, and Tabaris. The majority of people in Iran are Persians and as such, the Persian language is the official language of the country. However, it is also a common language among different ethnic groups. It is worth noting that there is a longstanding history of coexistence and cultural relations between the Turkic and Lor ethnic groups. The purpose of this article is to study the range of intercultural sensitivities of Turks and Lor peoples to identify the state of intercultural competence and reduce conflicts in the direction of cultural policy. It is important to gain insight into the mutual perceptions of Lor and Turkic people towards each other. Understanding these perceptions can greatly aid in fostering stronger relationships and promoting effective communication between the two ethnic groups. The study employed a qualitative content analysis approach to gather data using a semi-structured interview tool. The participants consisted of ten individuals from the Lor ethnic and ten individuals from the Turk ethnic. According to Milton Bennett's six-stage model, our findings reveal that the Turkish and Lor ethnic groups tend to exhibit higher intercultural sensitivity in the second stage, which consists of defense against differences. Both groups tend to emphasize the differences between them, and the notion of "us and the other" holds significant importance for them. It is important to acknowledge that both the Turk and Lor ethnicities consist of various clans, which significantly shape intercultural relations between them. A common stereotype in this regard is that the Turks of Tabriz province often do not recognize the Turks of other provinces of the country as their own. Moreover, our study indicates that an increase in interaction and communication between the Lor and Turk ethnic groups may lead to a reduction in cultural sensitivities between them.

Keywords: intercultural communication, intercultural sensitivity, Iran, Lor, Turk

Procedia PDF Downloads 43
176 Susceptibility of Different Clones of Eucalyptus Species against Gall Wasp, Leptocybe invasa Fisher and La Salle in Punjab, India

Authors: Ashwinder K. Dhaliwal, G. P. S. Dhillon

Abstract:

Eucalyptus is one of the most important forest tree species that can tolerate and grow well on degraded and unfertile soils which are not suitable for other tree species. Besides this, these trees have a short rotation and good economic value. However, the gall inducing wasp Leptocybe invasa Fisher and La Salle has been reported from many countries throughout the world. The spread of L. invasa is of huge economic concern as more than 20,000 ha of young Eucalyptus trees have already been affected in southern states of India. The host plant resistance being the first line of defense against insect pests demands the screening of different germplasm source against L. invasa. Keeping this in view, fourteen different clones of Eucalyptus spp. were evaluated for their susceptibility to L. invasa from a replicated clonal trial planted at Punjab Agricultural University, Ludhiana. The degree of gall infestation was recorded from three plants of each clone in each replication. Three branches selected from the lower, middle and upper canopy of the trees were selected for recording the total number of galls induced by L. invasa. The statistical analysis was done as per the procedure laid down for completely randomised block design (CRBD), analysis of variance (ANOVA), critical difference (CD) and variance components using Proc GLM (SAS software 9.3, SAS Institute Ltd. U.S.A). All possible treatment means were compared with Duncan’s multiple range test (DMRT) at 1 % probability level. The results showed that the clones C-9, C-45 and C-42 were completely free from the infestation of L. invasa. However, there was minor infestation of L. invasa on C-2135, C-413, C-407, C-35, C-72 and C-37 clones. The clone C-6 was severely infested by L. invasa followed by C-11, C-12, F-316 and C-25 clones. The information generated by this study will be helpful for future breeding and use in afforestation programmes.

Keywords: eucalyptus clones, gall wasp, Leptocybe invasa, screening, susceptibility

Procedia PDF Downloads 218
175 Review and Analysis of Sustainable-Based Risk Management in Humanitarian Supply Chains

Authors: Marinko Maslaric, Maja Jokic

Abstract:

When searching for fast and long term responses, sustainable logistics and supply chain applications have developed irrefutable theories and hypotheses towards market requirements. Nevertheless, there are certain misunderstandings on how the implementation of sustainability principles (social, economical, and environmental) and concepts should work in practice, more specifically, within a humanitarian supply chain management context. This paper will focus on the review and analysis of risk management concepts in humanitarian supply chain in order to identify their compliance with sustainable principles. In this direction, the study will look for strategies that suggest: minimization of environmental impacts throughout the reduction of resources consumption, depreciation of logistics costs, including supply chain ones, minimization of transportation and service costs, elaboration of quality performance of supply chain and logistics, and reduction of supply chain delivery time. On the side of meeting all defense, trades and humanitarian logistics needs, the research will be aligned to UN Sustainable Development Goals, standards, and performances. It will start with relevant strategies for identification of risk indicators and it will end with suggestion of valuable strategic approaches for their minimization or total prevention. Finally, a content analysis will propose a suitable methodological structure for the creation of most sustainable strategy in risk management of humanitarian supply chain. Content analysis will accompany thorough, consistent and methodical approach of literature review for potential disaster risk management plan. Thereupon, the propositions of this research will look for contemporary literature gaps, with respect to operate the literature analysis and to suggest the appropriate sustained risk low master plan. The indicated is here to secure the high quality of logistics practices in hazardous events.

Keywords: humanitarian logistics, sustainability, supply chain risk, risk management plan

Procedia PDF Downloads 234
174 Dynamic Determination of Spare Engine Requirements for Air Fighters Integrating Feedback of Operational Information

Authors: Tae Bo Jeon

Abstract:

Korean air force is undertaking a big project to replace prevailing hundreds of old air fighters such as F-4, F-5, KF-16 etc. The task is to develop and produce domestic fighters equipped with 2 complete-type engines each. A large number of engines, however, will be purchased as products from a foreign engine maker. In addition to the fighters themselves, secure the proper number of spare engines serves a significant role in maintaining combat readiness and effectively managing the national defense budget due to high cost. In this paper, we presented a model dynamically updating spare engine requirements. Currently, the military administration purchases all the fighters, engines, and spare engines at acquisition stage and does not have additional procurement processes during the life cycle, 30-40 years. With the assumption that procurement procedure during the operational stage is established, our model starts from the initial estimate of spare engine requirements based on limited information. The model then performs military missions and repair/maintenance works when necessary. During operation, detailed field information - aircraft repair and test, engine repair, planned maintenance, administration time, transportation pipeline between base, field, and depot etc., - should be considered for actual engine requirements. At the end of each year, the performance measure is recorded and proceeds to next year when it shows higher the threshold set. Otherwise, additional engine(s) will be bought and added to the current system. We repeat the process for the life cycle period and compare the results. The proposed model is seen to generate far better results appropriately adding spare engines thus avoiding possible undesirable situations. Our model may well be applied to future air force military operations.

Keywords: DMSMS, operational availability, METRIC, PRS

Procedia PDF Downloads 165
173 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 113
172 Night Shift Work as an Oxidative Stressor: A Systematic Review

Authors: Madeline Gibson

Abstract:

Night shift workers make up an essential part of the modern workforce. However, night shift workers have higher incidences of late in life diseases and earlier mortality. Night shift workers are exposed to constant light and experience circadian rhythm disruption. Sleep disruption is thought to increase oxidative stress, defined as an imbalance of excess pro-oxidative factors and reactive oxygen species over anti-oxidative activity. Oxidative stress can damage cells, proteins and DNA and can eventually lead to varied chronic diseases such as cancer, diabetes, cardiovascular disease, Alzheimer’s and dementia. This review aimed to understand whether night shift workers were at greater risk of oxidative stress and to contribute to a consensus on this relationship. Twelve studies published in 2001-2019 examining 2,081 workers were included in the review. Studies compared both the impact of working a single shift and in comparisons between those who regularly work night shifts and only day shifts. All studies had evidence to support this relationship across a range of oxidative stress indicators, including increased DNA damage, reduced DNA repair capacity, increased lipid peroxidation, higher levels of reactive oxygen species, and to a lesser extent, a reduction in antioxidant defense. This research supports the theory that melatonin and the sleep-wake cycle mediate the relationship between shift work and oxidative stress. It is concluded that night shift work increases the risk for oxidative stress and, therefore, future disease. Recommendations are made to promote the long-term health of shift workers considering these findings.

Keywords: night shift work, coxidative stress, circadian rhythm, melatonin, disease, circadian rhythm disruption

Procedia PDF Downloads 262
171 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 62
170 Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network

Authors: Serkan Tezgel

Abstract:

Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace.

Keywords: postmodern navy, transnational navy, transnational mentality, institutional network

Procedia PDF Downloads 515
169 Using Fly Ash Based Synthetic Zeolite Permeable Reactive Barrier to Remove Arsenic, Cadmium, and their Mixture from Aqueous Solution

Authors: Mozhgan Bahadory, Gholam-Hossein Rostami

Abstract:

Over the next quarter of a century, the US government and the private sector will spend billions of dollars annually to clean the contaminated sites from pollution such as petroleum products, heavy metals, and solvents organic compounds. During the past three decades, almost 750,000 sites that require remediation have been reported to the United States federal and state agencies. Out of these contamination sites, approximately 300,000 are still in need of remediation. In these sites, the most widespread forms of contamination are petroleum products and heavy metals. At least half of US Department of Defense, US Department of Energy, Superfund sites, and Resource Conservation and Recovery Act (RCRA) sites have been reported to contain heavy metals. Heavy metals most often found in the contaminated water are lead, mercury, chromium, cadmium, arsenic, and zinc. This investigation emphasizes the elimination of arsenic and cadmium from aqueous solution. During the past several years, we developed a novel material called Alkali-Activated fly ash Material Permeable Reactive Barrier (AAM-PRB), which includes fly ash, fine aggregates, coarse aggregates, activating chemicals, and water. AAM can be produced with high permeability, 10-1 cm/s, then crushed into pelletized form. Laboratory experiments showed that water containing 10 ppm, 100 ppm, and 1000 ppm of arsenic and cadmium ion passing through AAM-PRB reduced to less than 0.1 ppm. However, water containing 10,000 ppm arsenic ion passing through AAM- PRB shows that the breakthrough was achieved. The removal of the mixture of arsenic and cadmium from aqueous solutions was also tested by using AAM-PRB. The results indicate that the efficiency of AAM-PRB for simultaneous removal of arsenic and cadmium from 10 ppm, 100 ppm, and 1,000 ppm were marginally below that of arsenic alone. Still, it was significantly lower for cadmium from the aqueous solution. The basic science behind removing heavy metal and microstructural investigation AAM-PRB will be the focus of our future work.

Keywords: arsenic, cadmium, contaminated water, fly ash, permeability, reactive barrier

Procedia PDF Downloads 67
168 Vital Pulp Therapy: The Minimally Invasive Endodontic Therapy for Mature Permanent Teeth

Authors: Fadwa Chtioui

Abstract:

Vital Pulp Therapy (VPT) is nowadays challenging the deep-rooted dogma of root canal treatment, being the only therapeutic option for permanent teeth diagnosed with irreversible pulpitis or carious pulp exposure. Histologic and clinical research has shown that compromised dental pulp can be treated without the full removal or excavation of all healthy pulp, and the outcome of the partial or full pulpotomy followed by a Tricalcium-Silicate-based dressing seems to show promising results in maintaining pulp vitality and preserving affected teeth in the long term. By reviewing recent advances in the techniques of VPT and their clinical effectiveness and safety in permanent teeth with irreversible Pulpitis, this work provides a new understanding of pulp pathophysiology and defense mechanisms and will reform dental practitioners' decision-making in treating irreversible pulpits from root canal therapy to vital pulp therapy by taking advantage of the biological effects of Tricalcium Silicate materials. Biography of presenting author: Fadwa Chitoui graduated from the school of Dental Medicine of Monastir, Tunisia, in 2015. After getting her DDS degree with honors, she earned her Postgraduate master's Degree in Endodontics and Restorative Dentistry from her Faculty. Since 2021, she has Started her own private and specialized practice based in the capital Tunis. She enjoys the sphere of associative life, worked with national and international associations, and got engaged in scientific dental research, whereby she tailored her passion for her field of specialty towards broadening her knowledge and ambitions, holding conferences and workshops nationally and internationally and publishing scientific articles in several journals.

Keywords: irreversible pulpitis, permanenet teeth, vital pulp therapy, pulpotomy

Procedia PDF Downloads 61
167 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 295
166 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 548
165 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 306
164 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm

Authors: Frodouard Minani

Abstract:

Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.

Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks

Procedia PDF Downloads 140
163 Humoral and Cellular Immune Responses to Major Human Cytomegalovirus Antigens in Mice Model

Authors: S. Essa, H. Safar, R. Raghupathy

Abstract:

Human cytomegalovirus (CMV) continues to be a source of severe complications to immunologically immature and immune-compromised hosts. Effective CMV vaccine that diminishes CMV disease in transplant patients and avoids congenital infection remains of high importance as no approved vaccines exist. Though the exact links of defense mechanisms are unidentified, viral-specific antibodies and Th1/Th2 cytokine responses have been involved in controlling viral infections. CMV envelope glycoprotein B (UL55/gB), the matrix proteins (UL83/pp65, UL99/pp28, UL32/pp150), and the assembly protein UL80a/pp38 are known to be targets of antiviral immune responses. In this study, mice were immunized with five HCMV antigens (UL32/pp150, UL80a/pp38, UL99/pp28, and UL83/pp65), and serum samples were collected and evaluated for eliciting viral-specific antibody responses. Moreover, Splenocytes were collected, stimulated, and assessed for cytokine responses. The results demonstrated a CMV-antigen-specific antibody response to pp38 and pp65 (E/C >2.0). The highest titers were detected with pp38 (average E/C 16.275) followed by pp65 (average E/C 7.72). Compared to control cells, splenocytes from PP38 antigen immunized mice gave a significantly higher concentration of GM-CSF, IFN-γ, IL-2 IL-4, IL-5, and IL-17A (P<0.05). Also, splenocytes from pp65 antigen immunized mice resulted in a significantly higher concentration of GM-CSF, IFN-γ, IL-2 IL-4, IL-10, IL-12, IL-17A, and TNF- α. The designation of target CMV peptides by identifying viral-specific antibodies and cytokine responses is vital for understanding the protective immune mechanisms during CMV infection and identifying appropriate viral antigens to develop novel vaccines.

Keywords: hepatitis C virus, peripheral blood mononuclear cells, neutrophils, cytokines

Procedia PDF Downloads 135
162 Military Bases and Prostitution: Olongapo City after the Bases

Authors: Karl Gerrard Tiu See

Abstract:

Military bases are an indelible mark of prolonged US defense relationships in the Pacific. Bases like the Subic Naval Base in Olongapo City have irreversible consequences for their host communities, not all of which are positive. One consequence the Subic Naval Base had for Olongapo City was the rise of vibrant sex industry. While the Philippine Senate voted to remove US bases like Subic in 1991, the question remains as to why did prostitution not end after the bases pull-out? To answer this question, the study used an institutionalist lens coupled with focus group discussions from the sex industry. It found that prostitution persisted due to two main reasons. The first was that like Olongapo City; the sex industry successfully shifted its reliance from the military to foreign tourism. The second was that agreements such as the 1996 Visiting Forces Agreement (VFA) ensured that the sex industry continued to receive US military clientele. With the contextual factors as the backdrop, this study used the Theory of Institutional Change to study institutions pivotal in altering Olongapo City and its sex industry after Subic Naval Base. These include local government, civil society actors such as NGOs, and the city’s economic base. The study found that policy such as the VFA allowed the bases period status quo to revive (Symbionts). This led to renewed exploitation from the military presence coupled with foreign tourism (Opportunists). The local government, however, shifted focus away from base reliance which allowed a reinvigorated civil society to effect a gradual change (Subversives). Furthermore, uncertainties like rising HIV incidence, abandoned children born from US soldiers, and the Enhanced Defence Cooperation Agreement (EDCA) remain to change the sex industry’s future, for better or worse.

Keywords: Philippine-USA defence relations, overseas USA basing, 1991 Philippine-USA bases pull-out, Olongapo city, Subic naval base, institutional change

Procedia PDF Downloads 445
161 Urbanization and Income Inequality in Thailand

Authors: Acumsiri Tantikarnpanit

Abstract:

This paper aims to examine the relationship between urbanization and income inequality in Thailand during the period 2002–2020. Using a panel of data for 76 provinces collected from Thailand’s National Statistical Office (Labor Force Survey: LFS), as well as geospatial data from the U.S. Air Force Defense Meteorological Satellite Program (DMSP) and the Visible Infrared Imaging Radiometer Suite Day/Night band (VIIRS-DNB) satellite for nineteen selected years. This paper employs two different definitions to identify urban areas: 1) Urban areas defined by Thailand's National Statistical Office (Labor Force Survey: LFS), and 2) Urban areas estimated using nighttime light data from the DMSP and VIIRS-DNB satellite. The second method includes two sub-categories: 2.1) Determining urban areas by calculating nighttime light density with a population density of 300 people per square kilometer, and 2.2) Calculating urban areas based on nighttime light density corresponding to a population density of 1,500 people per square kilometer. The empirical analysis based on Ordinary Least Squares (OLS), fixed effects, and random effects models reveals a consistent U-shaped relationship between income inequality and urbanization. The findings from the econometric analysis demonstrate that urbanization or population density has a significant and negative impact on income inequality. Moreover, the square of urbanization shows a statistically significant positive impact on income inequality. Additionally, there is a negative association between logarithmically transformed income and income inequality. This paper also proposes the inclusion of satellite imagery, geospatial data, and spatial econometric techniques in future studies to conduct quantitative analysis of spatial relationships.

Keywords: income inequality, nighttime light, population density, Thailand, urbanization

Procedia PDF Downloads 75
160 Migration Law in Republic of Panama

Authors: Ronel Solis, Leonardo Collado

Abstract:

Migration law in the Republic of Panama has been regulated mainly by the executive branch. This has created a crisis not only institutional but also social because the evolution of these norms has rested greatly from the discretion of the government in office. This has created instability in immigration regulation and more now, with the migration crisis of which Panama is also part. Different migration policies have been established. The most recent is that of the controlled migration flow, in which, for humanitarian reasons, migrants move from the border with Colombia to the border with Costa Rica. Unfortunately, such control is not enough, and in some cases, unprotected migrants have been confined for months, their passports have been withheld, and no recognition of their rights is offered. The Inter-American Court of Human Rights has condemned Panama for the unfair detention of an irregular migrant, who was detained for two years in Panamanian prisons, without having committed a crime and without accessing a just defense. This is the case Vélez Loor vs. the Republic of Panama. Uncontrollable migration has been putting pressure on Panamanian public health services. The recent denunciation of HIV-related NGOs that warns that there are hundreds of foreigners who receive expensive antiretroviral therapy in Panama is serious, and several of them are irregular migrants. On the other hand, there are no border control posts with the Republic of Colombia, because it is a jungle area and migrants are exposed to arms and drug trafficking, and unfortunately, also to prostitution. Government entities such as the border police service have provided humanitarian support to migrants on the border with Colombia, although it is not their administrative function, and various entities discuss who should address this crisis. However, few economic resources are allocated by the government to solve this problem, especially with the recent mass migration of Venezuelans who have fled their country. The establishment of a migratory normative code is necessary to establish uniformity in the recognition and application of migratory rights. In this way, dependence on the changing migration policies of the different Panamanian governments would be eliminated, and the rights of migrants and nationals would be guaranteed.

Keywords: executive branch, irregular migration, migration code, Republic of Panama

Procedia PDF Downloads 120